Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small program that tells the operating system how to communicate with a specific device






2. Computing device small enough to hold in your hand






3. A vulnerable computer that is set up to entice an intruder to break into it.






4. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






5. A rectangular opeining that typically holds disk drives.






6. Optical mark recognition reads hand drawn marks such as circles or rectangles.






7. Special software to listen to audio






8. Any unwanted signal usually varying quickly






9. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






10. Single chip with two or more processor cores.






11. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






12. Serves as the interface between the user - the app software - and the computers hardware






13. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






14. Started the internet as a networking project






15. Donated for public use has no copyright restrictions






16. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






17. Mathematical formula that generates a code from the contents of the message






18. ...






19. Uses radio waves to transmit data between two devices.






20. Records in a file both successful and unsuccessful attempts.






21. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






22. May break in to computer to exploit security weakness. financial gains - revenge.






23. Federally funded internet security research and development center






24. On the motherboard hold memory modules






25. A special purpose computer that functions as a component in a larger product. Small with limited hardware






26. When turning on a computer that has been turned off completly






27. Obtains data directly at the location where the transaction or event takes place.






28. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






29. Searches for and removes unneccessary files






30. They can execute more than one instruction per clock cycle






31. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






32. The smallest unit of disk space that stores data and info






33. Instead of port - jack is used to identify audio or video ports.






34. When online meetings take place on the web






35. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






36. Joins a cable and a port






37. zombie






38. A case that contains electronic components of the computer used to process data.






39. Dynamic ram- chips must be re energized constantly or they lose their contents.






40. Saves any open docs or programs to hardisk before removing power






41. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






42. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






43. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






44. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






45. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






46. Text version of an IP address






47. A program that restricts access to certain material on the web






48. 8 bits grouped together. basic storage unit in memory. Each byte has an address






49. An electrical disturbance that can degrade communications






50. Small capacity built directly in the processor chip