Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






2. A communications device that sends and recieves data and info to and from digital line






3. A small flat rectangular pointing device that is sensitive to pressure and motion.






4. Method that the internet uses to store domain names and their corressponding IP addresses






5. CA resposible for giving out digital certificate






6. Holds one or more disk drives






7. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






8. Surgeon performs operation by controlling robot when not in the same area as patient.






9. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






10. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






11. Sends documents to be printed to a buffer instead of sending them immediately to the printer.






12. The destructive event or prank the program intended to deliver






13. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






14. Encrypted data






15. Major carriers of network traffic






16. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






17. Short for key generator creats software registration numbers and sometimes activation codes.






18. Human speech is bc of its continous signal that vary in strength and quality






19. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






20. A type of system software that allows users to perform maintenence type tasks






21. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






22. Used to track and identify the location of high risk or high value items.






23. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






24. Digital light processor uses tiny mirrors to reflect light






25. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






26. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






27. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






28. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






29. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






30. The technology of authenticating a persons identity by verifying a personal characteristic.






31. Storage over an internet service






32. Two main parts are processor and memory.






33. Someone who accesses a computer or network illegally. Some say they hack to improve security






34. Internet teephony- enables users to speak to other users over the internet






35. Graphic file (JPEG - GIF) slowly replacing GIF






36. The discovery - collection adn analysis of evidence found on computers and networks






37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






38. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






39. A personal computer you can carry from place to place






40. Graphics processing unit controls the manipulation and display of graphics on the display device.






41. Used to gain competitive advantage






42. Copyrighted software that is distributed at no cost for a trial period






43. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






44. Smallest element in an electronic image






45. Uses devices that emit and sense light to detect the mouses movement






46. They consist entirely of electronic components and contain no moving parts.






47. A collection of data organized in a manner that allows access retrieval and use of that data






48. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






49. Small capacity built directly in the processor chip






50. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.