Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






2. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






3. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






4. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






5. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






6. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






7. All computers connected to central device. Hub or switch






8. Internet Service Provider- a regional or national access provider






9. A type of storage media that consists of flat disc and is written and read by a laser






10. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






11. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






12. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






13. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






14. Storage over an internet service






15. Company that provides wireless internet access to computers






16. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






17. Hides within or looks like a legitimate program such as a screen saver






18. The destructive event or prank the program intended to deliver






19. Media transmit multiple signals simutaneously. Download faster than upload






20. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






21. A family member on a computer






22. The amount of data - instructions - and information that can travel over communications channel






23. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






24. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






25. Uses devices that emit and sense light to detect the mouses movement






26. Perpetrator attempts to obtain your personal or financial info.






27. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






28. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






29. A type of system software that allows users to perform maintenence type tasks






30. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






31. Most computers (on and off)






32. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






33. Builds and maintains lists of words found on websites. Useful for search engines






34. A web application that combines services from two or more sources creating a new application.






35. Retains existing application software and data files even if you can change computer models or vendors






36. Single inline memory module forms a single set of contacts






37. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






38. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






39. Joins a cable and a port






40. Contains 10 or fewer comps - with similar reponsibilities and capabilities






41. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






42. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






43. Enahnces the sound generating capabilites of a personal computer






44. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






45. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






46. A system that attempts to imitate the behavior of a human brain.






47. The use of computer or network with out permission






48. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






49. A program that hides in a computer and allows someone from a remote location to take control of the computer






50. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.