Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Graphics processing unit controls the manipulation and display of graphics on the display device.






2. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






3. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






4. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






6. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






7. Copyrighted software that is distributed at no cost for a trial period






8. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






9. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






10. Rambus inline memory module house RDRAM chips






11. A device that enables you to join a port and a connector that are both male or female






12. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






13. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






14. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






15. Pressure sensitive eraser shaped pointing device






16. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






17. Internet connections using regular copper telephone lines.






18. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






19. Sends documents to be printed to a buffer instead of sending them immediately to the printer.






20. Optical mark recognition reads hand drawn marks such as circles or rectangles.






21. A collection of data organized in a manner that allows access retrieval and use of that data






22. Graphic file (JPEG - GIF) slowly replacing GIF






23. A legal agreement that permits users to install the software on multiple computers.






24. Perpetrator attempts to obtain your personal or financial info.






25. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television






26. A colection of individual programs available together as a unit. lower cost and ease of use






27. Sends digital data and info from a comp to a DSL line






28. Federally funded internet security research and development center






29. Unencrypted readable data






30. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






31. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






32. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






33. When turning on a computer that has been turned off completly






34. Someone who accesses a computer or network illegally. Some say they hack to improve security






35. The code of acceptable behaviors users should follow while on the internet.






36. The role of memory to store both data and programs






37. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






38. A vulnerable computer that is set up to entice an intruder to break into it.






39. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






40. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






41. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






42. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






43. Random access memory- memory chips that can be read from and written to by the processor and other devices






44. A computer that delivers requested web pages to your computer






45. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






46. Device with a monitor - keyboard - and memory






47. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






48. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






49. Two main parts are processor and memory.






50. A small metal or plastic device that uses pressure instead of ink.