Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The discovery - collection adn analysis of evidence found on computers and networks






2. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






3. Someone who accesses a computer or network illegally. Some say they hack to improve security






4. Software used by criminals






5. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






6. A communications device that enables a computer or device that does not have a built in networking capability to access a network






7. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






8. Contain permanently writeen data - instructions - and information






9. Media transmit multiple signals simutaneously. Download faster than upload






10. All computers connected to central device. Hub or switch






11. Popular for LAN. single central cable.






12. Online service provider- has many members features along with internet access such as IM or Web browsers.






13. A cable forms a closed loop with all computers. one direction






14. Moving pictures experts group is a popular video compression standard






15. Encrypted data






16. Major carriers of network traffic






17. A device that enables you to join a port and a connector that are both male or female






18. Builds and maintains lists of words found on websites. Useful for search engines






19. Serves as the interface between the user - the app software - and the computers hardware






20. A program that restricts access to certain material on the web






21. Any unwanted signal usually varying quickly






22. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






23. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






24. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






25. Other computers and mobile devices on the networ that rely on the server for its resources






26. Reorganizing it so that the files are store in continous sectors






27. May break in to computer to exploit security weakness. financial gains - revenge.






28. Smallest element in an electronic image






29. Transmits data via infared light waves.. Both computer and device must have the port for it to work






30. Donated for public use has no copyright restrictions






31. A know specific pattern of virus code.






32. Program that euns only on a specific type or make of computer






33. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






34. A system that attempts to imitate the behavior of a human brain.






35. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






36. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






37. Graphic file (JPEG - GIF) slowly replacing GIF






38. Federally funded internet security research and development center






39. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






40. World wide web consortium oversees research and sets standards for many areas of the internet






41. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






42. The use of computer or network with out permission






43. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






44. Obtains data directly at the location where the transaction or event takes place.






45. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






46. Random access memory- memory chips that can be read from and written to by the processor and other devices






47. When turning on a computer that has been turned off completly






48. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






49. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






50. Pressure sensitive eraser shaped pointing device