Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






2. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






3. Method that the internet uses to store domain names and their corressponding IP addresses






4. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






5. Internet teephony- enables users to speak to other users over the internet






6. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






7. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






8. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






9. Can be peropheral or chip - creates sound from digital instructions.






10. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






11. Digital light processor uses tiny mirrors to reflect light






12. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






13. A small metal or plastic device that uses pressure instead of ink.






14. Short for key generator creats software registration numbers and sometimes activation codes.






15. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources






16. Accepts the transmission of data - instructions - or info






17. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






18. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






19. Circuit boards tjay provide connections and functions not built into the motherboard






20. Joins a cable and a port






21. A personal computer you can carry from place to place






22. Other computers and mobile devices on the networ that rely on the server for its resources






23. Cables - telephone lines - radio networks - satellites






24. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






25. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






26. Graphic file (JPEG - GIF) slowly replacing GIF






27. Designed for mobile devices






28. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






29. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






30. Contains many microscopic pathways capable of carrying an electrical current






31. Provids mobile users with a secure connection to the company server as if the user has a private line.






32. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






33. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






34. Program that euns only on a specific type or make of computer






35. Any data or instructions entered into the memory of the computer






36. Enahnces the sound generating capabilites of a personal computer






37. Communications activity. Handled by NSFnet.






38. A rectangular opeining that typically holds disk drives.






39. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






40. An instruction that causes a program to perform a specific action.






41. Is a security measure that defines who can access it and what actions they can take while acessing the computer






42. Basic input/output systemis firmware that contains the computers startup instructions






43. Software used by criminals






44. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






45. May break in to computer to exploit security weakness. financial gains - revenge.






46. System board- is the main circuit board of the system unit.






47. Screen savors were made to prevent this - which etched images permanently onto the screen






48. A collection of computers and devices connected together - via communications devices and transmissions media.






49. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






50. Copies itself repeatedly in memory using up system resources and possibly shutting down the system