Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Retains existing application software and data files even if you can change computer models or vendors






2. Consumer consumer e commerce.






3. Communications activity. Handled by NSFnet.






4. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






5. An instruction that causes a program to perform a specific action.






6. An electrical disturbance that can degrade communications






7. PGP an encryption program






8. Two main parts are processor and memory.






9. The smallest unit of disk space that stores data and info






10. Data that has been processed in a useful form- text - graphics - audio - video






11. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






12. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






13. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






14. Anopening inside the system unit in which you can install additional equipment. Different than a slot






15. Provides the user with a physcial response from the device






16. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.






17. A cable forms a closed loop with all computers. one direction






18. Extends the capabilites of a browser.






19. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






21. Contain permanently writeen data - instructions - and information






22. Is a security measure that defines who can access it and what actions they can take while acessing the computer






23. A collection of computers and devices connected together - via communications devices and transmissions media.






24. Does not require a newsreader - easier to use than a newsgroup






25. A type of storage media that consists of flat disc and is written and read by a laser






26. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






27. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television






28. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






29. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






30. Perpetrator attempts to obtain your personal or financial info.






31. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






32. Short for key generator creats software registration numbers and sometimes activation codes.






33. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






34. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






35. Provids mobile users with a secure connection to the company server as if the user has a private line.






36. Operating system on mobile devices that generally resides on ROM






37. A socket in the motherboard that can hold an adapter card






38. Dual inline memory module forms two sets of contact






39. Graphical User interface - interact with software using text - graphics - and icons






40. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






41. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






42. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






43. Obtains data directly at the location where the transaction or event takes place.






44. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






45. Any unwanted signal usually varying quickly






46. The destructive event or prank the program intended to deliver






47. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






48. The delivery of education via some electronic method such as the internet - networks - or optical disks.






49. Accepts the transmission of data - instructions - or info






50. A vulnerable computer that is set up to entice an intruder to break into it.