Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






2. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






3. A type of system software that allows users to perform maintenence type tasks






4. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






5. Can connect multiple types of devices that require faster data transmission speeds.






6. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






7. Smaller than heat sink cools processors in notebook comps






8. Two main parts are processor and memory.






9. Personal information manager is application software that includes features to help users organize personal info






10. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






11. One or more computers on the network request services from the server. 10 or more computers






12. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






13. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






14. Used to track and identify the location of high risk or high value items.






15. A part of the motherboard and connects the processor to main memory






16. Online service provider- has many members features along with internet access such as IM or Web browsers.






17. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






18. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






19. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






20. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






21. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






22. Any data or instructions entered into the memory of the computer






23. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






24. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






25. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






26. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






27. A device that enables you to join a port and a connector that are both male or female






28. zombie






29. The technology of authenticating a persons identity by verifying a personal characteristic.






30. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






31. Smallest element in an electronic image






32. Consists of electronic components that store instructions waiting to be executed (On motherboard)






33. The delivery of education via some electronic method such as the internet - networks - or optical disks.






34. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






35. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






36. A small metal or plastic device that uses pressure instead of ink.






37. When turning on a computer that has been turned off completly






38. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






39. Donated for public use has no copyright restrictions






40. Media transmit multiple signals simutaneously. Download faster than upload






41. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






42. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






43. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






44. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






45. Internet connections using regular copper telephone lines.






46. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






47. Extends the capabilites of a browser.






48. Anopening inside the system unit in which you can install additional equipment. Different than a slot






49. A program that restricts access to certain material on the web






50. The use of computer or network with out permission







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests