Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






2. Rambus inline memory module house RDRAM chips






3. A colection of individual programs available together as a unit. lower cost and ease of use






4. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






5. Method that the internet uses to store domain names and their corressponding IP addresses






6. Graphic file (JPEG - GIF) slowly replacing GIF






7. An electrical disturbance that can degrade communications






8. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






9. Federally funded internet security research and development center






10. Transmits data via infared light waves.. Both computer and device must have the port for it to work






11. Read only memory refers to memory chips storing permanent data and instructions (firmware)






12. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






13. Encrypted data






14. Allows users to keep typing without using enter at the end of each line






15. Surgeon performs operation by controlling robot when not in the same area as patient.






16. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






17. The original article and all subsequent related replies






18. Records in a file both successful and unsuccessful attempts.






19. A web application that combines services from two or more sources creating a new application.






20. Loses its contents when power is turned off (RAM)






21. Holds one or more disk drives






22. Each computer or device on the network. often connected by cables






23. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






24. Electrical supply drops.can cause data loss but generally not cause equipment damage






25. Graphical User interface - interact with software using text - graphics - and icons






26. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






27. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






28. Other computers and mobile devices on the networ that rely on the server for its resources






29. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






30. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






31. Short for key generator creats software registration numbers and sometimes activation codes.






32. Any unwanted signal usually varying quickly






33. Program that euns only on a specific type or make of computer






34. The role of memory to store both data and programs






35. A temporary connection that uses one or more analog telphone lines for communications.






36. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






37. Consumer consumer e commerce.






38. Designed for mobile devices






39. Any data or instructions entered into the memory of the computer






40. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






41. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






42. Copyrighted software provided at no cost by company that retains all rights to software






43. Provids mobile users with a secure connection to the company server as if the user has a private line.






44. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






45. Computing device small enough to hold in your hand






46. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






47. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






48. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






49. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






50. Uses radio waves to transmit data between two devices.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests