Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






2. A special purpose computer that functions as a component in a larger product. Small with limited hardware






3. A server that you connect to to start a chat session.






4. A know specific pattern of virus code.






5. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






6. The process of dividing the disk into tracks and sectors






7. (laptop computer) portable personal computer often able to fit in your lap






8. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






9. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






10. Instead of port - jack is used to identify audio or video ports.






11. A vulnerable computer that is set up to entice an intruder to break into it.






12. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






13. Read only memory refers to memory chips storing permanent data and instructions (firmware)






14. zombie






15. Completely Automated Public Turing test to tell Computers and Humans Apart.






16. Protective case for optical discs






17. Started the internet as a networking project






18. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






19. Donated for public use has no copyright restrictions






20. A system that attempts to imitate the behavior of a human brain.






21. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






22. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






23. The delivery of education via some electronic method such as the internet - networks - or optical disks.






24. Encrypted data






25. A set of programs that coordinates all of the activies among computer hardware devices.






26. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






27. On the motherboard hold memory modules






28. Case of the system unit to protect internal damage






29. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






30. Transmits data via infared light waves.. Both computer and device must have the port for it to work






31. Allows the processor to communicate with peripherals.






32. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






33. Random access memory- memory chips that can be read from and written to by the processor and other devices






34. Single inline memory module forms a single set of contacts






35. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






36. Computing device small enough to hold in your hand






37. Saves any open docs or programs to hardisk before removing power






38. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






39. Universal serial bus port connects peripherals to the computer






40. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






41. Enahnces the sound generating capabilites of a personal computer






42. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






43. Text version of an IP address






44. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






45. Joins a cable and a port






46. Used to gain competitive advantage






47. Hardware - software - data - people - procedures






48. Someone who accesses a computer or network illegally. Some say they hack to improve security






49. Obtains data directly at the location where the transaction or event takes place.






50. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.