Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.






2. Initiates an instruction to transmit data - instructions - or information.






3. Processor begins to fetch a second instruction before it completes the full machine cycle






4. Surgeon performs operation by controlling robot when not in the same area as patient.






5. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






6. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






7. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






8. The number of bytes a storage medium can hold






9. Organization that sells and manages domain names






10. Computing device small enough to hold in your hand






11. PGP an encryption program






12. Hardware - software - data - people - procedures






13. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






14. System board- is the main circuit board of the system unit.






15. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






16. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






17. The technology of authenticating a persons identity by verifying a personal characteristic.






18. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






19. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






20. The process of dividing the disk into tracks and sectors






21. Privately owned and limited to a specific vendor or computer model.






22. ...






23. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






24. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.






25. Errors that can be recognized by automatic update






26. Small capacity built directly in the processor chip






27. Completely Automated Public Turing test to tell Computers and Humans Apart.






28. Used to track and identify the location of high risk or high value items.






29. A family member on a computer






30. Electrical supply drops.can cause data loss but generally not cause equipment damage






31. Connects the processor to cache.






32. Is an online area in which isers have wrtten discussions about a particular subject.






33. A communications device that enables a computer or device that does not have a built in networking capability to access a network






34. Holds one or more disk drives






35. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






36. Company that provides wireless internet access to computers






37. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






38. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






39. Searches for and removes unneccessary files






40. Two or more computers transfer data - instructions - and information.






41. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






42. Determines the number of bits that can be transmitted at one time






43. Graphic file (JPEG - GIF) slowly replacing GIF






44. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






45. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






46. The code of acceptable behaviors users should follow while on the internet.






47. Latest version of Post office Protocol






48. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






49. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






50. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.