Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Program is one that runs the same on multiple operating systems






2. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






3. A legal agreement that permits users to install the software on multiple computers.






4. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






5. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






6. Used to track and identify the location of high risk or high value items.






7. Internet teephony- enables users to speak to other users over the internet






8. Storage over an internet service






9. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






10. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






11. Smallest element in an electronic image






12. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






13. Graphical User interface - interact with software using text - graphics - and icons






14. A personal computer you can carry from place to place






15. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






16. May break in to computer to exploit security weakness. financial gains - revenge.






17. An instruction that causes a program to perform a specific action.






18. Continues to operate when one of its components fails - ensuring that no data is lost






19. Small program that tells the operating system how to communicate with a specific device






20. Links in text based documents






21. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






22. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






23. The process if a computer or device recieveing info info from the server on the internet






24. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






25. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






26. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






27. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






28. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.






29. Computing device small enough to hold in your hand






30. CA resposible for giving out digital certificate






31. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






32. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






33. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






34. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






35. Digital light processor uses tiny mirrors to reflect light






36. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






37. Provids mobile users with a secure connection to the company server as if the user has a private line.






38. A vulnerable computer that is set up to entice an intruder to break into it.






39. Processor begins to fetch a second instruction before it completes the full machine cycle






40. Picure messaging can occur from mobile to mobile and mobile to email






41. Enahnces the sound generating capabilites of a personal computer






42. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






43. Organization that sells and manages domain names






44. Text version of an IP address






45. They consist entirely of electronic components and contain no moving parts.






46. Allows a user to plan schedule and track costs of a project






47. Rambus inline memory module house RDRAM chips






48. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






49. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






50. Integrates the functions of a processor - memory and a video card on a single chip.