Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






2. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






3. A number that uniquely identifies each computer or device connected to the internet (0-255)






4. Program is one that runs the same on multiple operating systems






5. The standard that outlines characteristics of how two network devices communicate






6. Graphics processing unit controls the manipulation and display of graphics on the display device.






7. Personal information manager is application software that includes features to help users organize personal info






8. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






9. Uses radio waves to transmit data between two devices.






10. Contains many microscopic pathways capable of carrying an electrical current






11. A special purpose computer that functions as a component in a larger product. Small with limited hardware






12. A temporary connection that uses one or more analog telphone lines for communications.






13. A set of programs that coordinates all of the activies among computer hardware devices.






14. Major carriers of network traffic






15. Builds and maintains lists of words found on websites. Useful for search engines






16. Internet Service Provider- a regional or national access provider






17. The destructive event or prank the program intended to deliver






18. Computer automatically can configure adapter cards and other peripherals as you install them






19. A personal computer you can carry from place to place






20. (laptop computer) portable personal computer often able to fit in your lap






21. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






22. A legal agreement that permits users to install the software on multiple computers.






23. Electrical supply drops.can cause data loss but generally not cause equipment damage






24. Company that provides wireless internet access to computers






25. A communications device that sends and recieves data and info to and from digital line






26. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






27. A program that hides in a computer and allows someone from a remote location to take control of the computer






28. Basic input/output systemis firmware that contains the computers startup instructions






29. Read only memory refers to memory chips storing permanent data and instructions (firmware)






30. The technology of authenticating a persons identity by verifying a personal characteristic.






31. Dynamic ram- chips must be re energized constantly or they lose their contents.






32. CA resposible for giving out digital certificate






33. Reorganizing it so that the files are store in continous sectors






34. A cable forms a closed loop with all computers. one direction






35. Single inline memory module forms a single set of contacts






36. Communications activity. Handled by NSFnet.






37. Privately owned and limited to a specific vendor or computer model.






38. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






39. A communications device that enables a computer or device that does not have a built in networking capability to access a network






40. Fetching - decoding - executing - storing






41. A type of storage media that consists of flat disc and is written and read by a laser






42. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






43. Latest version of Post office Protocol






44. The fastest most powerful computer






45. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






46. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






47. Allows users to keep typing without using enter at the end of each line






48. A program that restricts access to certain material on the web






49. Federally funded internet security research and development center






50. Initiates an instruction to transmit data - instructions - or information.