Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of programs that coordinates all of the activies among computer hardware devices.






2. Case of the system unit to protect internal damage






3. Can be peropheral or chip - creates sound from digital instructions.






4. Can connect multiple types of devices that require faster data transmission speeds.






5. Method that the internet uses to store domain names and their corressponding IP addresses






6. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






7. Sends digital data and info from a comp to a DSL line






8. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






9. A small flat rectangular pointing device that is sensitive to pressure and motion.






10. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






11. Electrical supply drops.can cause data loss but generally not cause equipment damage






12. Searches for and removes unneccessary files






13. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






14. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






15. The technology of authenticating a persons identity by verifying a personal characteristic.






16. The design of computers - devices - and media in the network






17. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






18. Screen savors were made to prevent this - which etched images permanently onto the screen






19. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






20. A collection of computers and devices connected together - via communications devices and transmissions media.






21. A unique number that identifies the location of a byte in memory






22. Random access memory- memory chips that can be read from and written to by the processor and other devices






23. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






24. Most computers (on and off)






25. A vulnerable computer that is set up to entice an intruder to break into it.






26. Internet Service Provider- a regional or national access provider






27. Allows users to keep typing without using enter at the end of each line






28. Holds one or more disk drives






29. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






30. Dish shaped antenna for internet connection






31. Graphical User interface - interact with software using text - graphics - and icons






32. Uses radio waves to transmit data between two devices.






33. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






34. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






35. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






36. Computer aided design software assists a professional user in creating designs






37. A part of the motherboard and connects the processor to main memory






38. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






39. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






40. Provides the user with a physcial response from the device






41. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources






42. Controls timing of all computer operations






43. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






44. When turning on a computer that has been turned off completly






45. An instruction that causes a program to perform a specific action.






46. Designed for mobile devices






47. A device that enables you to join a port and a connector that are both male or female






48. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






49. Processor begins to fetch a second instruction before it completes the full machine cycle






50. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.