Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A small metal or plastic device that uses pressure instead of ink.






2. Internet Service Provider- a regional or national access provider






3. A program that hides in a computer and allows someone from a remote location to take control of the computer






4. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






5. A legal agreement that permits users to install the software on multiple computers.






6. Reorganizing it so that the files are store in continous sectors






7. Organization that sells and manages domain names






8. The role of memory to store both data and programs






9. A program that restricts access to certain material on the web






10. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






11. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






12. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






13. Contain permanently writeen data - instructions - and information






14. Copyrighted software that is distributed at no cost for a trial period






15. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






16. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






17. Hides within or looks like a legitimate program such as a screen saver






18. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






19. A server that you connect to to start a chat session.






20. Storage over an internet service






21. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






22. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






23. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






24. Software that helps groups of people work together on projects and share info over a network






25. Uses devices that emit and sense light to detect the mouses movement






26. Screen savors were made to prevent this - which etched images permanently onto the screen






27. Electrical supply drops.can cause data loss but generally not cause equipment damage






28. Hardware - software - data - people - procedures






29. Two main parts are processor and memory.






30. The number of bits in an area on a storage medium - Higher density means more storage capacity






31. PGP an encryption program






32. A colection of individual programs available together as a unit. lower cost and ease of use






33. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






34. Allows a user to plan schedule and track costs of a project






35. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






36. A computer that delivers requested web pages to your computer






37. Data that has been processed in a useful form- text - graphics - audio - video






38. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






39. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






40. Optical mark recognition reads hand drawn marks such as circles or rectangles.






41. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






42. Computer aided design software assists a professional user in creating designs






43. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






44. Program is one that runs the same on multiple operating systems






45. Small program that tells the operating system how to communicate with a specific device






46. A cable forms a closed loop with all computers. one direction






47. Consists of electronic components that store instructions waiting to be executed (On motherboard)






48. Read only memory refers to memory chips storing permanent data and instructions (firmware)






49. Does not require a newsreader - easier to use than a newsgroup






50. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically