Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Holds one or more disk drives






2. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






3. Short for key generator creats software registration numbers and sometimes activation codes.






4. Health care professions conduct live conferences on the computer






5. Human speech is bc of its continous signal that vary in strength and quality






6. Uses devices that emit and sense light to detect the mouses movement






7. The use of computer or network with out permission






8. Allows a user to plan schedule and track costs of a project






9. Program that euns only on a specific type or make of computer






10. Random access memory- memory chips that can be read from and written to by the processor and other devices






11. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






12. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






13. A small flat rectangular pointing device that is sensitive to pressure and motion.






14. Consists of electronic components that store instructions waiting to be executed (On motherboard)






15. Screen savors were made to prevent this - which etched images permanently onto the screen






16. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






17. Fetching - decoding - executing - storing






18. Retains existing application software and data files even if you can change computer models or vendors






19. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






20. PGP an encryption program






21. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






22. Searches for and removes unneccessary files






23. Contains many microscopic pathways capable of carrying an electrical current






24. They can execute more than one instruction per clock cycle






25. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






26. Data that has been processed in a useful form- text - graphics - audio - video






27. Provids mobile users with a secure connection to the company server as if the user has a private line.






28. A unique number that identifies the location of a byte in memory






29. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






30. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






31. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






32. Uses radio waves to transmit data between two devices.






33. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






35. Someone who accesses a computer or network illegally. Some say they hack to improve security






36. Copyrighted software provided at no cost by company that retains all rights to software






37. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






38. Any unwanted signal usually varying quickly






39. The destructive event or prank the program intended to deliver






40. The last section of the domain name






41. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






42. Type of notebook comp that is smaller and less powerful than a normal notebook comp






43. Initiates an instruction to transmit data - instructions - or information.






44. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






45. Obtains data directly at the location where the transaction or event takes place.






46. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






47. Dynamic ram- chips must be re energized constantly or they lose their contents.






48. The number of bytes a storage medium can hold






49. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






50. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth