Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control unit- part of the processor that directs and coordinates most of the operations on the computer.

2. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor

3. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.

4. Fetching - decoding - executing - storing

5. Pressure sensitive eraser shaped pointing device

6. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware

7. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)

8. A web application that combines services from two or more sources creating a new application.

9. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile

10. Processor begins to fetch a second instruction before it completes the full machine cycle

11. (program) consists of related instructions that tells computer what tasks to perform and how to perform them

12. Started the internet as a networking project

13. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device

14. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.

15. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.

16. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device

17. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.

18. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing

19. Communications activity. Handled by NSFnet.

20. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.

21. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor

22. Single inline memory module forms a single set of contacts

23. Moving pictures experts group is a popular video compression standard

24. The design of computers - devices - and media in the network

25. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.

26. Mathematical formula that generates a code from the contents of the message

27. Provides the user with a physcial response from the device

28. A socket in the motherboard that can hold an adapter card

29. Personal information manager is application software that includes features to help users organize personal info

30. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size

31. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.

32. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting

33. PGP an encryption program

34. Msot retail stores use POS to record purchases - process cards - and update inventory

35. A special purpose computer that functions as a component in a larger product. Small with limited hardware

36. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door

37. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network

38. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.

39. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.

40. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info

41. Smallest element in an electronic image

42. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.

43. May break in to computer to exploit security weakness. financial gains - revenge.

44. The smallest unit of disk space that stores data and info

45. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs

46. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)

47. Encrypted data

48. Special software to listen to audio

49. Copies itself repeatedly in memory using up system resources and possibly shutting down the system

50. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks