Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






2. Device with a monitor - keyboard - and memory






3. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






4. World wide web consortium oversees research and sets standards for many areas of the internet






5. Needed generally to participate in a newsgroup






6. Obtains data directly at the location where the transaction or event takes place.






7. Dish shaped antenna for internet connection






8. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






9. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






10. Used to gain competitive advantage






11. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






12. System board- is the main circuit board of the system unit.






13. Picure messaging can occur from mobile to mobile and mobile to email






14. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






15. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






16. Internet connections using regular copper telephone lines.






17. Determines the number of bits that can be transmitted at one time






18. Single inline memory module forms a single set of contacts






19. Contain permanently writeen data - instructions - and information






20. May break in to computer to exploit security weakness. financial gains - revenge.






21. Continues to operate when one of its components fails - ensuring that no data is lost






22. The original article and all subsequent related replies






23. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






24. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






25. Program is one that runs the same on multiple operating systems






26. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






27. Short for key generator creats software registration numbers and sometimes activation codes.






28. Joins a cable and a port






29. Allows users to keep typing without using enter at the end of each line






30. Consumer consumer e commerce.






31. Software used by criminals






32. The number of bits in an area on a storage medium - Higher density means more storage capacity






33. Connects the processor to cache.






34. Software that helps groups of people work together on projects and share info over a network






35. Method that the internet uses to store domain names and their corressponding IP addresses






36. One or more computers on the network request services from the server. 10 or more computers






37. Allows a user to plan schedule and track costs of a project






38. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






39. Case of the system unit to protect internal damage






40. A communications device that enables a computer or device that does not have a built in networking capability to access a network






41. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






42. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






43. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






44. Allows the processor to communicate with peripherals.






45. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






46. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






47. Electrical supply drops.can cause data loss but generally not cause equipment damage






48. Smallest element in an electronic image






49. Can be peropheral or chip - creates sound from digital instructions.






50. The technology of authenticating a persons identity by verifying a personal characteristic.