Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






2. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






3. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






4. The number of bytes a storage medium can hold






5. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






6. Case of the system unit to protect internal damage






7. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






8. Pressure sensitive eraser shaped pointing device






9. A program that hides in a computer and allows someone from a remote location to take control of the computer






10. A part of the motherboard and connects the processor to main memory






11. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






12. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






13. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






14. The role of memory to store both data and programs






15. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






16. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






17. Dish shaped antenna for internet connection






18. Uses radio waves to transmit data between two devices.






19. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






20. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






21. Is an online area in which isers have wrtten discussions about a particular subject.






22. Consumer consumer e commerce.






23. The destructive event or prank the program intended to deliver






24. Transmission media on which the data - instructions - information travel.






25. Mathematical formula that generates a code from the contents of the message






26. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






27. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






28. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






29. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






30. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






31. Program that euns only on a specific type or make of computer






32. They consist entirely of electronic components and contain no moving parts.






33. The process of dividing the disk into tracks and sectors






34. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






35. The use of computer or network with out permission






36. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






37. When turning on a computer that has been turned off completly






38. Computing device small enough to hold in your hand






39. Latest version of Post office Protocol






40. A personal computer you can carry from place to place






41. Electrical supply drops.can cause data loss but generally not cause equipment damage






42. Copyrighted software that is distributed at no cost for a trial period






43. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






44. Screen savors were made to prevent this - which etched images permanently onto the screen






45. Small capacity built directly in the processor chip






46. Single chip with two or more processor cores.






47. They can execute more than one instruction per clock cycle






48. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






49. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






50. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.