Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provids mobile users with a secure connection to the company server as if the user has a private line.






2. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






3. When turning on a computer that has been turned off completly






4. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






5. The fastest most powerful computer






6. Random access memory- memory chips that can be read from and written to by the processor and other devices






7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






8. Any unwanted signal usually varying quickly






9. Graphic file (JPEG - GIF) slowly replacing GIF






10. Software that helps groups of people work together on projects and share info over a network






11. Cables - telephone lines - radio networks - satellites






12. A family member on a computer






13. Any data or instructions entered into the memory of the computer






14. A legal agreement that permits users to install the software on multiple computers.






15. The destructive event or prank the program intended to deliver






16. (laptop computer) portable personal computer often able to fit in your lap






17. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






18. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






19. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






20. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






21. A system that attempts to imitate the behavior of a human brain.






22. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






23. Used to gain competitive advantage






24. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






25. Saves any open docs or programs to hardisk before removing power






26. The technology of authenticating a persons identity by verifying a personal characteristic.






27. Privately owned and limited to a specific vendor or computer model.






28. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






29. The process if a computer or device recieveing info info from the server on the internet






30. Copyrighted software that is distributed at no cost for a trial period






31. One or more computers on the network request services from the server. 10 or more computers






32. Major carriers of network traffic






33. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






34. Can be peropheral or chip - creates sound from digital instructions.






35. Uses devices that emit and sense light to detect the mouses movement






36. Processor begins to fetch a second instruction before it completes the full machine cycle






37. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






38. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






39. Computing device small enough to hold in your hand






40. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






41. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






42. A know specific pattern of virus code.






43. On software is infinitie space and depth for VR






44. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






45. Is an online area in which isers have wrtten discussions about a particular subject.






46. CA resposible for giving out digital certificate






47. Controls timing of all computer operations






48. Electrical supply drops.can cause data loss but generally not cause equipment damage






49. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






50. They can execute more than one instruction per clock cycle