Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






2. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






3. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






4. Mathematical formula that generates a code from the contents of the message






5. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






6. Power on self test to check the various system components and the results are compared with data in a CMOS chip






7. Uses devices that emit and sense light to detect the mouses movement






8. They can execute more than one instruction per clock cycle






9. Does not require a newsreader - easier to use than a newsgroup






10. Privately owned and limited to a specific vendor or computer model.






11. A device that enables you to join a port and a connector that are both male or female






12. Completely Automated Public Turing test to tell Computers and Humans Apart.






13. A collection of computers and devices connected together - via communications devices and transmissions media.






14. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






15. Electrical supply drops.can cause data loss but generally not cause equipment damage






16. Hypertext transfer protocol






17. Each computer or device on the network. often connected by cables






18. Hides within or looks like a legitimate program such as a screen saver






19. Dish shaped antenna for internet connection






20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






21. System board- is the main circuit board of the system unit.






22. The smallest unit of disk space that stores data and info






23. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources






24. On software is infinitie space and depth for VR






25. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






26. Organization that sells and manages domain names






27. Uses fiber optic cable for internet connection.






28. Acts as an electronic switch that opens or closes the circuit for electrical charges






29. The destructive event or prank the program intended to deliver






30. An electrical disturbance that can degrade communications






31. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






32. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






33. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






34. Circuit boards tjay provide connections and functions not built into the motherboard






35. zombie






36. Controls timing of all computer operations






37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






38. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






39. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






40. Fetching - decoding - executing - storing






41. A legal agreement that permits users to install the software on multiple computers.






42. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






43. Human speech is bc of its continous signal that vary in strength and quality






44. A communications device that enables a computer or device that does not have a built in networking capability to access a network






45. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






46. Reorganizing it so that the files are store in continous sectors






47. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






48. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






49. A set of programs that coordinates all of the activies among computer hardware devices.






50. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.