Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copyrighted software that is distributed at no cost for a trial period






2. Personal information manager is application software that includes features to help users organize personal info






3. Instead of port - jack is used to identify audio or video ports.






4. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






5. Rambus inline memory module house RDRAM chips






6. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






7. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






8. The discovery - collection adn analysis of evidence found on computers and networks






9. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






10. An electrical disturbance that can degrade communications






11. Sends digital data and info from a comp to a DSL line






12. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






13. A computer that delivers requested web pages to your computer






14. A system that attempts to imitate the behavior of a human brain.






15. A socket in the motherboard that can hold an adapter card






16. Software used by criminals






17. Circuit boards tjay provide connections and functions not built into the motherboard






18. Computer aided design software assists a professional user in creating designs






19. May break in to computer to exploit security weakness. financial gains - revenge.






20. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)






22. Acts as an electronic switch that opens or closes the circuit for electrical charges






23. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






24. Pressure sensitive eraser shaped pointing device






25. Small capacity built directly in the processor chip






26. Federally funded internet security research and development center






27. A legal agreement that allows multiple users to access the software on the server simutaneously






28. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






29. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






30. A type of system software that allows users to perform maintenence type tasks






31. Storage over an internet service






32. A unique number that identifies the location of a byte in memory






33. The role of memory to store both data and programs






34. Fetching - decoding - executing - storing






35. Device with a monitor - keyboard - and memory






36. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






37. A communications device that enables a computer or device that does not have a built in networking capability to access a network






38. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






39. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






40. The last section of the domain name






41. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






42. Dish shaped antenna for internet connection






43. Major carriers of network traffic






44. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






45. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






46. Enahnces the sound generating capabilites of a personal computer






47. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






48. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






49. Media transmit multiple signals simutaneously. Download faster than upload






50. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance