Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process if a computer or device recieveing info info from the server on the internet






2. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






3. The role of memory to store both data and programs






4. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






5. On the motherboard hold memory modules






6. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






7. A document that you return to the company that creates and sends it.






8. A type of storage media that consists of flat disc and is written and read by a laser






9. Two main parts are processor and memory.






10. Single chip with two or more processor cores.






11. Operating system on mobile devices that generally resides on ROM






12. The delivery of education via some electronic method such as the internet - networks - or optical disks.






13. Data that has been processed in a useful form- text - graphics - audio - video






14. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






15. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






16. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






17. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






18. Contains many microscopic pathways capable of carrying an electrical current






19. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






20. A window that provides info - presents availabe options - or requests a response.






21. Provide Wi Fi to mobile computers or devices






22. A vulnerable computer that is set up to entice an intruder to break into it.






23. Communications activity. Handled by NSFnet.






24. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






25. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






26. Any data or instructions entered into the memory of the computer






27. Hypertext transfer protocol






28. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






29. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






30. A web application that combines services from two or more sources creating a new application.






31. Consumer consumer e commerce.






32. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






33. Instead of port - jack is used to identify audio or video ports.






34. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






35. Latest version of Post office Protocol






36. A number that uniquely identifies each computer or device connected to the internet (0-255)






37. A part of the motherboard and connects the processor to main memory






38. Local area network- network tat connects computers and devices in a limited geographical area such as a home






39. An electrical disturbance that can degrade communications






40. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






41. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






42. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






43. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






44. Organization that sells and manages domain names






45. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






46. Perpetrator attempts to obtain your personal or financial info.






47. Fetching - decoding - executing - storing






48. Rambus inline memory module house RDRAM chips






49. They consist entirely of electronic components and contain no moving parts.






50. Used to track and identify the location of high risk or high value items.