Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






2. Allows a user to plan schedule and track costs of a project






3. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






4. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






5. A small flat rectangular pointing device that is sensitive to pressure and motion.






6. A collection of data organized in a manner that allows access retrieval and use of that data






7. Serves as the interface between the user - the app software - and the computers hardware






8. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






9. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






10. zombie






11. Can be peropheral or chip - creates sound from digital instructions.






12. Designed for mobile devices






13. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






14. A device that enables you to join a port and a connector that are both male or female






15. Internet teephony- enables users to speak to other users over the internet






16. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






17. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






18. A legal agreement that permits users to install the software on multiple computers.






19. Connects the processor to cache.






20. Is an online area in which isers have wrtten discussions about a particular subject.






21. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






22. Is a security measure that defines who can access it and what actions they can take while acessing the computer






23. Graphical User interface - interact with software using text - graphics - and icons






24. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






25. Searches for and removes unneccessary files






26. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






27. A vulnerable computer that is set up to entice an intruder to break into it.






28. World wide web consortium oversees research and sets standards for many areas of the internet






29. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






30. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






31. The smallest unit of disk space that stores data and info






32. Two main parts are processor and memory.






33. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






34. Operating system on mobile devices that generally resides on ROM






35. Integrates the functions of a processor - memory and a video card on a single chip.






36. Popular for LAN. single central cable.






37. Unencrypted readable data






38. A personal computer you can carry from place to place






39. An instruction that causes a program to perform a specific action.






40. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






41. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






42. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






43. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






44. A collection of computers and devices connected together - via communications devices and transmissions media.






45. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






46. Storage over an internet service






47. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






48. A communications device that sends and recieves data and info to and from digital line






49. Allows users to keep typing without using enter at the end of each line






50. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media