Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






2. Obtains data directly at the location where the transaction or event takes place.






3. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






4. The technology of authenticating a persons identity by verifying a personal characteristic.






5. A type of system software that allows users to perform maintenence type tasks






6. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






7. The amount of data - instructions - and information that can travel over communications channel






8. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






9. Electrical supply drops.can cause data loss but generally not cause equipment damage






10. Graphical User interface - interact with software using text - graphics - and icons






11. Screen savors were made to prevent this - which etched images permanently onto the screen






12. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






13. On the motherboard hold memory modules






14. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






15. Connects the processor to cache.






16. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






17. Local area network- network tat connects computers and devices in a limited geographical area such as a home






18. A legal agreement that allows multiple users to access the software on the server simutaneously






19. Operating system on mobile devices that generally resides on ROM






20. Picure messaging can occur from mobile to mobile and mobile to email






21. The discovery - collection adn analysis of evidence found on computers and networks






22. The use of computer or network with out permission






23. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






24. Internet teephony- enables users to speak to other users over the internet






25. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






26. Personal information manager is application software that includes features to help users organize personal info






27. Graphic file (JPEG - GIF) slowly replacing GIF






28. A small metal or plastic device that uses pressure instead of ink.






29. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






30. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






31. Any unwanted signal usually varying quickly






32. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






33. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






34. When turning on a computer that has been turned off completly






35. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






36. The design of computers - devices - and media in the network






37. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






38. May break in to computer to exploit security weakness. financial gains - revenge.






39. Device with a monitor - keyboard - and memory






40. A number that uniquely identifies each computer or device connected to the internet (0-255)






41. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






42. Software used by criminals






43. Fetching - decoding - executing - storing






44. Computing device small enough to hold in your hand






45. Human speech is bc of its continous signal that vary in strength and quality






46. Has the illusion of moving images becuase it sends a continuos stream of images






47. Graphics processing unit controls the manipulation and display of graphics on the display device.






48. Used to gain competitive advantage






49. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






50. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info