Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CA resposible for giving out digital certificate






2. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






3. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






4. Acts as an electronic switch that opens or closes the circuit for electrical charges






5. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






6. Any data or instructions entered into the memory of the computer






7. May break in to computer to exploit security weakness. financial gains - revenge.






8. (laptop computer) portable personal computer often able to fit in your lap






9. Method that the internet uses to store domain names and their corressponding IP addresses






10. Unencrypted readable data






11. Provides the user with a physcial response from the device






12. Internet teephony- enables users to speak to other users over the internet






13. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






14. Picure messaging can occur from mobile to mobile and mobile to email






15. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






16. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






17. A document that you return to the company that creates and sends it.






18. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






19. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






20. A computer that delivers requested web pages to your computer






21. Latest version of Post office Protocol






22. Circuit boards tjay provide connections and functions not built into the motherboard






23. They can execute more than one instruction per clock cycle






24. When turning on a computer that has been turned off completly






25. Company that provides wireless internet access to computers






26. The process of dividing the disk into tracks and sectors






27. Type of notebook comp that is smaller and less powerful than a normal notebook comp






28. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources






29. The delivery of education via some electronic method such as the internet - networks - or optical disks.






30. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






31. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






32. Provids mobile users with a secure connection to the company server as if the user has a private line.






33. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






34. Someone who accesses a computer or network illegally. Some say they hack to improve security






35. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






36. The amount of data - instructions - and information that can travel over communications channel






37. A legal agreement that allows multiple users to access the software on the server simutaneously






38. A device that enables you to join a port and a connector that are both male or female






39. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






40. Continues to operate when one of its components fails - ensuring that no data is lost






41. Contain permanently writeen data - instructions - and information






42. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






43. Software that helps groups of people work together on projects and share info over a network






44. Program that euns only on a specific type or make of computer






45. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






46. Storage over an internet service






47. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






48. Privately owned and limited to a specific vendor or computer model.






49. Hypertext transfer protocol






50. Used to gain competitive advantage