Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






2. Links in text based documents






3. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






4. Is a security measure that defines who can access it and what actions they can take while acessing the computer






5. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






6. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






7. Someone who uses internet to destroy or damage computers for political reasons.






8. Started the internet as a networking project






9. Dynamic ram- chips must be re energized constantly or they lose their contents.






10. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






11. Circuit boards tjay provide connections and functions not built into the motherboard






12. Small capacity built directly in the processor chip






13. Allows the processor to communicate with peripherals.






14. All computers connected to central device. Hub or switch






15. A set of programs that coordinates all of the activies among computer hardware devices.






16. Consists of electronic components that store instructions waiting to be executed (On motherboard)






17. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






18. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






19. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






20. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






21. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






22. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






23. They consist entirely of electronic components and contain no moving parts.






24. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






25. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






26. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






27. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






28. One or more computers on the network request services from the server. 10 or more computers






29. Latest version of Post office Protocol






30. A know specific pattern of virus code.






31. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






33. An instruction that causes a program to perform a specific action.






34. Sends digital data and info from a comp to a DSL line






35. The last section of the domain name






36. The discovery - collection adn analysis of evidence found on computers and networks






37. Basic input/output systemis firmware that contains the computers startup instructions






38. Encrypted data






39. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






40. A legal agreement that allows multiple users to access the software on the server simutaneously






41. Operating system on mobile devices that generally resides on ROM






42. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






43. Contains many microscopic pathways capable of carrying an electrical current






44. Case of the system unit to protect internal damage






45. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






46. Anopening inside the system unit in which you can install additional equipment. Different than a slot






47. Instead of port - jack is used to identify audio or video ports.






48. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






49. The original article and all subsequent related replies






50. Single chip with two or more processor cores.