Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






2. A rectangular opeining that typically holds disk drives.






3. Any data or instructions entered into the memory of the computer






4. The technology of authenticating a persons identity by verifying a personal characteristic.






5. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






6. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






7. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






8. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






9. Needed generally to participate in a newsgroup






10. Latest version of Post office Protocol






11. A server that you connect to to start a chat session.






12. Smaller than heat sink cools processors in notebook comps






13. A part of the motherboard and connects the processor to main memory






14. An instruction that causes a program to perform a specific action.






15. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






16. Any unwanted signal usually varying quickly






17. Dish shaped antenna for internet connection






18. The role of memory to store both data and programs






19. Text version of an IP address






20. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






21. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






22. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






23. A document that you return to the company that creates and sends it.






24. May break in to computer to exploit security weakness. financial gains - revenge.






25. Hypertext transfer protocol






26. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






27. A computer that delivers requested web pages to your computer






28. Builds and maintains lists of words found on websites. Useful for search engines






29. Contains 10 or fewer comps - with similar reponsibilities and capabilities






30. A communications device that sends and recieves data and info to and from digital line






31. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






32. On software is infinitie space and depth for VR






33. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






34. Serves as the interface between the user - the app software - and the computers hardware






35. Extends the capabilites of a browser.






36. The use of computer or network with out permission






37. Designed for mobile devices






38. Major carriers of network traffic






39. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






40. Computer aided design software assists a professional user in creating designs






41. Someone who uses internet to destroy or damage computers for political reasons.






42. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






43. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






44. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






45. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






46. The smallest unit of disk space that stores data and info






47. Popular for LAN. single central cable.






48. Special software to listen to audio






49. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






50. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it