Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers to obvious but it re-enforces your understanding as you take the test each time.
1. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






2. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






3. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






4. Started the internet as a networking project






5. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






6. Type of notebook comp that is smaller and less powerful than a normal notebook comp






7. Text version of an IP address






8. Health care professions conduct live conferences on the computer






9. Internet teephony- enables users to speak to other users over the internet






10. A program that hides in a computer and allows someone from a remote location to take control of the computer






11. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






12. Graphic file (JPEG - GIF) slowly replacing GIF






13. The design of computers - devices - and media in the network






14. Is a security measure that defines who can access it and what actions they can take while acessing the computer






15. Records in a file both successful and unsuccessful attempts.






16. When online meetings take place on the web






17. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






18. Program that euns only on a specific type or make of computer






19. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






20. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






21. The last section of the domain name






22. Smaller than heat sink cools processors in notebook comps






23. Integrates the functions of a processor - memory and a video card on a single chip.






24. Privately owned and limited to a specific vendor or computer model.






25. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






26. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






27. A communications device that enables a computer or device that does not have a built in networking capability to access a network






28. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






29. A notcie that guarantees a user or web site is legit. E- commerce use it often






30. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






31. They can execute more than one instruction per clock cycle






32. A type of system software that allows users to perform maintenence type tasks






33. A personal computer you can carry from place to place






34. A legal agreement that permits users to install the software on multiple computers.






35. Other computers and mobile devices on the networ that rely on the server for its resources






36. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






37. Local area network- network tat connects computers and devices in a limited geographical area such as a home






38. World wide web consortium oversees research and sets standards for many areas of the internet






39. Allows users to keep typing without using enter at the end of each line






40. Completely Automated Public Turing test to tell Computers and Humans Apart.






41. Computing device small enough to hold in your hand






42. Method that the internet uses to store domain names and their corressponding IP addresses






43. Read only memory refers to memory chips storing permanent data and instructions (firmware)






44. The destructive event or prank the program intended to deliver






45. Hypertext transfer protocol






46. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






47. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






48. Can connect multiple types of devices that require faster data transmission speeds.






49. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






50. Broadband modem- sends and recives digital data over the cable television