Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






2. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






3. PGP an encryption program






4. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






5. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






6. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






7. A legal agreement that permits users to install the software on multiple computers.






8. Hardware - software - data - people - procedures






9. A communications device that sends and recieves data and info to and from digital line






10. Integrates the functions of a processor - memory and a video card on a single chip.






11. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






12. Communications activity. Handled by NSFnet.






13. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






14. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






15. A type of system software that allows users to perform maintenence type tasks






16. Continues to operate when one of its components fails - ensuring that no data is lost






17. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






18. Special software to listen to audio






19. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






20. A unique number that identifies the location of a byte in memory






21. A window that provides info - presents availabe options - or requests a response.






22. Holds one or more disk drives






23. A real time internet communications service where you can talk to people online.






24. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






25. A type of storage media that consists of flat disc and is written and read by a laser






26. Broadband modem- sends and recives digital data over the cable television






27. Combines several GIF images ina single GIF file.






28. Obtains data directly at the location where the transaction or event takes place.






29. Data that has been processed in a useful form- text - graphics - audio - video






30. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.






31. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






33. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






34. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






35. When turning on a computer that has been turned off completly






36. A server that you connect to to start a chat session.






37. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






38. Transmission media on which the data - instructions - information travel.






39. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






40. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






41. Acts as an electronic switch that opens or closes the circuit for electrical charges






42. A device that enables you to join a port and a connector that are both male or female






43. Is an online area in which isers have wrtten discussions about a particular subject.






44. Read only memory refers to memory chips storing permanent data and instructions (firmware)






45. A temporary connection that uses one or more analog telphone lines for communications.






46. Hides within or looks like a legitimate program such as a screen saver






47. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






48. A small flat rectangular pointing device that is sensitive to pressure and motion.






49. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






50. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.