Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






2. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






3. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television






4. Used to track and identify the location of high risk or high value items.






5. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






6. A vulnerable computer that is set up to entice an intruder to break into it.






7. Special software to listen to audio






8. Optical mark recognition reads hand drawn marks such as circles or rectangles.






9. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






10. Health care professions conduct live conferences on the computer






11. Encrypted data






12. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






13. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






14. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






15. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






16. Someone who uses internet to destroy or damage computers for political reasons.






17. The standard that outlines characteristics of how two network devices communicate






18. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






19. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






20. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






21. ...






22. Organization that sells and manages domain names






23. A window that provides info - presents availabe options - or requests a response.






24. A unique number that identifies the location of a byte in memory






25. They consist entirely of electronic components and contain no moving parts.






26. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






27. All computers connected to central device. Hub or switch






28. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






29. Allows a user to plan schedule and track costs of a project






30. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






31. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






32. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






33. Perpetrator attempts to obtain your personal or financial info.






34. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






35. A temporary connection that uses one or more analog telphone lines for communications.






36. Contain permanently writeen data - instructions - and information






37. Random access memory- memory chips that can be read from and written to by the processor and other devices






38. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






39. CA resposible for giving out digital certificate






40. Power on self test to check the various system components and the results are compared with data in a CMOS chip






41. Data that has been processed in a useful form- text - graphics - audio - video






42. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






43. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






44. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






45. Does not require a newsreader - easier to use than a newsgroup






46. The discovery - collection adn analysis of evidence found on computers and networks






47. A set of programs that coordinates all of the activies among computer hardware devices.






48. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






49. Electrical supply drops.can cause data loss but generally not cause equipment damage






50. Is a security measure that defines who can access it and what actions they can take while acessing the computer