Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






2. Designed for mobile devices






3. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






4. A notcie that guarantees a user or web site is legit. E- commerce use it often






5. One or more computers on the network request services from the server. 10 or more computers






6. Encrypted data






7. Enahnces the sound generating capabilites of a personal computer






8. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






9. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






10. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






11. An instruction that causes a program to perform a specific action.






12. Screen savors were made to prevent this - which etched images permanently onto the screen






13. Rambus inline memory module house RDRAM chips






14. Links in text based documents






15. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






16. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






17. Digital light processor uses tiny mirrors to reflect light






18. Dish shaped antenna for internet connection






19. Uses devices that emit and sense light to detect the mouses movement






20. Instead of port - jack is used to identify audio or video ports.






21. Provides the user with a physcial response from the device






22. Records in a file both successful and unsuccessful attempts.






23. Organization that sells and manages domain names






24. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






25. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






26. Searches for and removes unneccessary files






27. The discovery - collection adn analysis of evidence found on computers and networks






28. A rectangular opeining that typically holds disk drives.






29. Device with a monitor - keyboard - and memory






30. Can connect multiple types of devices that require faster data transmission speeds.






31. A know specific pattern of virus code.






32. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






33. Internet teephony- enables users to speak to other users over the internet






34. Personal information manager is application software that includes features to help users organize personal info






35. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






36. Any unwanted signal usually varying quickly






37. A window that provides info - presents availabe options - or requests a response.






38. Accepts the transmission of data - instructions - or info






39. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






40. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






41. A cable forms a closed loop with all computers. one direction






42. The number of bytes a storage medium can hold






43. Reorganizing it so that the files are store in continous sectors






44. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






45. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






46. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






47. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






48. Retains existing application software and data files even if you can change computer models or vendors






49. Any data or instructions entered into the memory of the computer






50. Controls timing of all computer operations







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests