Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






2. Allows a user to plan schedule and track costs of a project






3. Msot retail stores use POS to record purchases - process cards - and update inventory






4. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






5. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






6. Media transmit multiple signals simutaneously. Download faster than upload






7. A set of programs that coordinates all of the activies among computer hardware devices.






8. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






9. Random access memory- memory chips that can be read from and written to by the processor and other devices






10. Privately owned and limited to a specific vendor or computer model.






11. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






12. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






13. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






14. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






15. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






16. A legal agreement that permits users to install the software on multiple computers.






17. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






18. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






19. Graphics processing unit controls the manipulation and display of graphics on the display device.






20. On the motherboard hold memory modules






21. Consumer consumer e commerce.






22. The smallest unit of disk space that stores data and info






23. Provide Wi Fi to mobile computers or devices






24. A part of the motherboard and connects the processor to main memory






25. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






26. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






27. A document that you return to the company that creates and sends it.






28. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






29. The role of memory to store both data and programs






30. Allows users to keep typing without using enter at the end of each line






31. Basic input/output systemis firmware that contains the computers startup instructions






32. On software is infinitie space and depth for VR






33. A communications device that enables a computer or device that does not have a built in networking capability to access a network






34. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






35. A personal computer you can carry from place to place






36. Is a security measure that defines who can access it and what actions they can take while acessing the computer






37. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






38. A special purpose computer that functions as a component in a larger product. Small with limited hardware






39. They consist entirely of electronic components and contain no moving parts.






40. Cables - telephone lines - radio networks - satellites






41. Two or more computers transfer data - instructions - and information.






42. Each computer or device on the network. often connected by cables






43. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






44. Loses its contents when power is turned off (RAM)






45. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






46. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






47. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






48. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






49. Completely Automated Public Turing test to tell Computers and Humans Apart.






50. A web site that evaluates your comouter to check for internet and e mail vulnerabilities