Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The role of memory to store both data and programs






2. All computers connected to central device. Hub or switch






3. A program that restricts access to certain material on the web






4. Acts as an electronic switch that opens or closes the circuit for electrical charges






5. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






6. Can be peropheral or chip - creates sound from digital instructions.






7. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






8. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






9. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






10. A type of system software that allows users to perform maintenence type tasks






11. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






12. A unique number that identifies the location of a byte in memory






13. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






14. Online service provider- has many members features along with internet access such as IM or Web browsers.






15. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






16. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






17. Any data or instructions entered into the memory of the computer






18. CA resposible for giving out digital certificate






19. Internet teephony- enables users to speak to other users over the internet






20. Two or more computers transfer data - instructions - and information.






21. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






22. Communications activity. Handled by NSFnet.






23. Copyrighted software provided at no cost by company that retains all rights to software






24. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






25. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television






26. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






27. When turning on a computer that has been turned off completly






28. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






29. Initiates an instruction to transmit data - instructions - or information.






30. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






31. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






32. A set of programs that coordinates all of the activies among computer hardware devices.






33. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






34. Graphical User interface - interact with software using text - graphics - and icons






35. Pressure sensitive eraser shaped pointing device






36. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






37. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






38. The standard that outlines characteristics of how two network devices communicate






39. Holds one or more disk drives






40. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






41. The smallest unit of disk space that stores data and info






42. Used to gain competitive advantage






43. The destructive event or prank the program intended to deliver






44. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.






45. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






46. A collection of computers and devices connected together - via communications devices and transmissions media.






47. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






48. Saves any open documents and programs to RAM and places computer into a low power state






49. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






50. Hardware - software - data - people - procedures