Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






2. Device with a monitor - keyboard - and memory






3. Internet connections using regular copper telephone lines.






4. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






5. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






6. Pressure sensitive eraser shaped pointing device






7. Program is one that runs the same on multiple operating systems






8. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






9. Accepts the transmission of data - instructions - or info






10. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






11. A special purpose computer that functions as a component in a larger product. Small with limited hardware






12. Enahnces the sound generating capabilites of a personal computer






13. Any data or instructions entered into the memory of the computer






14. Contain permanently writeen data - instructions - and information






15. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






16. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






17. Initiates an instruction to transmit data - instructions - or information.






18. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






19. A system that attempts to imitate the behavior of a human brain.






20. A collection of computers and devices connected together - via communications devices and transmissions media.






21. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






22. Each computer or device on the network. often connected by cables






23. Smallest unit of data the computer can process






24. Allows the processor to communicate with peripherals.






25. A collection of data organized in a manner that allows access retrieval and use of that data






26. A type of always on connection that is established between two communications devices. better than dial up line






27. Integrates the functions of a processor - memory and a video card on a single chip.






28. Errors that can be recognized by automatic update






29. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






30. Started the internet as a networking project






31. Random access memory- memory chips that can be read from and written to by the processor and other devices






32. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






33. CA resposible for giving out digital certificate






34. Internet Service Provider- a regional or national access provider






35. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






36. A case that contains electronic components of the computer used to process data.






37. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






38. Computing device small enough to hold in your hand






39. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






40. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






41. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






42. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






43. Universal serial bus port connects peripherals to the computer






44. Records in a file both successful and unsuccessful attempts.






45. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






46. Can connect multiple types of devices that require faster data transmission speeds.






47. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






48. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






49. Consists of electronic components that store instructions waiting to be executed (On motherboard)






50. Surgeon performs operation by controlling robot when not in the same area as patient.