Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sends digital data and info from a comp to a DSL line






2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






3. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






4. An electrical disturbance that can degrade communications






5. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






6. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






7. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






8. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






9. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






10. Small program that tells the operating system how to communicate with a specific device






11. An instruction that causes a program to perform a specific action.






12. Smallest element in an electronic image






13. CA resposible for giving out digital certificate






14. Random access memory- memory chips that can be read from and written to by the processor and other devices






15. Can be peropheral or chip - creates sound from digital instructions.






16. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






17. Communications activity. Handled by NSFnet.






18. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






19. Loses its contents when power is turned off (RAM)






20. Graphics processing unit controls the manipulation and display of graphics on the display device.






21. The use of computer or network with out permission






22. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






23. Dish shaped antenna for internet connection






24. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






25. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






26. A legal agreement that permits users to install the software on multiple computers.






27. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






28. Builds and maintains lists of words found on websites. Useful for search engines






29. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






30. A colection of individual programs available together as a unit. lower cost and ease of use






31. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






32. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






33. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






34. Searches for and removes unneccessary files






35. Hardware - software - data - people - procedures






36. Latest version of Post office Protocol






37. Copyrighted software that is distributed at no cost for a trial period






38. A personal computer you can carry from place to place






39. Controls timing of all computer operations






40. Company that provides wireless internet access to computers






41. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






42. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






43. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






44. When online meetings take place on the web






45. Used to gain competitive advantage






46. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






47. Single chip with two or more processor cores.






48. Electrical supply drops.can cause data loss but generally not cause equipment damage






49. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






50. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly