Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






2. Donated for public use has no copyright restrictions






3. A socket in the motherboard that can hold an adapter card






4. Online service provider- has many members features along with internet access such as IM or Web browsers.






5. Communications activity. Handled by NSFnet.






6. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






7. Storage over an internet service






8. Health care professions conduct live conferences on the computer






9. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






10. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






11. Continues to operate when one of its components fails - ensuring that no data is lost






12. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






13. Searches for and removes unneccessary files






14. A rectangular opeining that typically holds disk drives.






15. Builds and maintains lists of words found on websites. Useful for search engines






16. Human speech is bc of its continous signal that vary in strength and quality






17. Needed generally to participate in a newsgroup






18. Can connect multiple types of devices that require faster data transmission speeds.






19. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






20. Text version of an IP address






21. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






22. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






23. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






24. A special purpose computer that functions as a component in a larger product. Small with limited hardware






25. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






26. The last section of the domain name






27. Extends the capabilites of a browser.






28. A know specific pattern of virus code.






29. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






30. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






31. A case that contains electronic components of the computer used to process data.






32. Designed for mobile devices






33. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






34. 8 bits grouped together. basic storage unit in memory. Each byte has an address






35. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






36. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






37. Picure messaging can occur from mobile to mobile and mobile to email






38. Any data or instructions entered into the memory of the computer






39. A server that you connect to to start a chat session.






40. Broadband modem- sends and recives digital data over the cable television






41. Optical mark recognition reads hand drawn marks such as circles or rectangles.






42. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






43. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






44. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






45. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






46. A legal agreement that allows multiple users to access the software on the server simutaneously






47. When businesses use the internet to sell products






48. Smallest unit of data the computer can process






49. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






50. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands