Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On the motherboard hold memory modules






2. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






3. Software that helps groups of people work together on projects and share info over a network






4. Health care professions conduct live conferences on the computer






5. Perpetrator attempts to obtain your personal or financial info.






6. A case that contains electronic components of the computer used to process data.






7. A cable forms a closed loop with all computers. one direction






8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






9. Transmission media on which the data - instructions - information travel.






10. A colection of individual programs available together as a unit. lower cost and ease of use






11. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






12. 8 bits grouped together. basic storage unit in memory. Each byte has an address






13. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






14. Used to gain competitive advantage






15. The process of dividing the disk into tracks and sectors






16. Internet connections using regular copper telephone lines.






17. Has the illusion of moving images becuase it sends a continuos stream of images






18. Media transmit multiple signals simutaneously. Download faster than upload






19. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






20. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






21. Does not require a newsreader - easier to use than a newsgroup






22. Read only memory refers to memory chips storing permanent data and instructions (firmware)






23. The fastest most powerful computer






24. Personal information manager is application software that includes features to help users organize personal info






25. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






26. Used to track and identify the location of high risk or high value items.






27. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






28. The standard that outlines characteristics of how two network devices communicate






29. A web application that combines services from two or more sources creating a new application.






30. Smallest unit of data the computer can process






31. Computing device small enough to hold in your hand






32. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






33. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






34. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






35. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






36. May break in to computer to exploit security weakness. financial gains - revenge.






37. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






38. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






39. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






40. A real time internet communications service where you can talk to people online.






41. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






42. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






43. Obtains data directly at the location where the transaction or event takes place.






44. Cables - telephone lines - radio networks - satellites






45. When businesses use the internet to sell products






46. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






47. Connects the processor to cache.






48. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






49. Links in text based documents






50. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.