Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






2. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






3. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






4. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






5. The role of memory to store both data and programs






6. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






7. Someone who uses internet to destroy or damage computers for political reasons.






8. Consists of electronic components that store instructions waiting to be executed (On motherboard)






9. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






10. Device with a monitor - keyboard - and memory






11. Short for key generator creats software registration numbers and sometimes activation codes.






12. Small program that tells the operating system how to communicate with a specific device






13. (laptop computer) portable personal computer often able to fit in your lap






14. Popular for LAN. single central cable.






15. Picure messaging can occur from mobile to mobile and mobile to email






16. A temporary connection that uses one or more analog telphone lines for communications.






17. zombie






18. Computer aided design software assists a professional user in creating designs






19. Media transmit multiple signals simutaneously. Download faster than upload






20. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.






21. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






22. Processor begins to fetch a second instruction before it completes the full machine cycle






23. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






24. Can connect multiple types of devices that require faster data transmission speeds.






25. Searches for and removes unneccessary files






26. Software used by criminals






27. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






28. Pressure sensitive eraser shaped pointing device






29. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






30. Smallest element in an electronic image






31. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






32. Completely Automated Public Turing test to tell Computers and Humans Apart.






33. Loses its contents when power is turned off (RAM)






34. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






35. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






36. Smallest unit of data the computer can process






37. A computer that delivers requested web pages to your computer






38. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






39. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






40. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






41. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.






42. Encrypted data






43. Used to gain competitive advantage






44. Copyrighted software that is distributed at no cost for a trial period






45. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






46. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






47. Controls timing of all computer operations






48. Perpetrator attempts to obtain your personal or financial info.






49. When turning on a computer that has been turned off completly






50. Dual inline memory module forms two sets of contact