Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet connections using regular copper telephone lines.






2. CA resposible for giving out digital certificate






3. Surgeon performs operation by controlling robot when not in the same area as patient.






4. The smallest unit of disk space that stores data and info






5. A window that provides info - presents availabe options - or requests a response.






6. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






7. Internet Service Provider- a regional or national access provider






8. Links in text based documents






9. Hypertext transfer protocol






10. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






11. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






12. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






13. The process if a computer or device recieveing info info from the server on the internet






14. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






15. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






16. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






17. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






18. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






19. A socket in the motherboard that can hold an adapter card






20. Sends digital data and info from a comp to a DSL line






21. Consists of electronic components that store instructions waiting to be executed (On motherboard)






22. The discovery - collection adn analysis of evidence found on computers and networks






23. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.






24. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






25. Media transmit multiple signals simutaneously. Download faster than upload






26. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






27. Software that helps groups of people work together on projects and share info over a network






28. A colection of individual programs available together as a unit. lower cost and ease of use






29. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






30. Two main parts are processor and memory.






31. Someone who accesses a computer or network illegally. Some say they hack to improve security






32. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






33. Small program that tells the operating system how to communicate with a specific device






34. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






35. Most computers (on and off)






36. World wide web consortium oversees research and sets standards for many areas of the internet






37. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






38. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






39. Software used by criminals






40. May break in to computer to exploit security weakness. financial gains - revenge.






41. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






42. Single chip with two or more processor cores.






43. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






44. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






45. Computing device small enough to hold in your hand






46. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






47. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






48. A system that attempts to imitate the behavior of a human brain.






49. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






50. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.