Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hypertext transfer protocol

2. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands

3. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif

4. A type of storage media that consists of flat disc and is written and read by a laser

5. The original article and all subsequent related replies

6. Needed generally to participate in a newsgroup

7. Two or more computers transfer data - instructions - and information.

8. Holds one or more disk drives

9. Special software to listen to audio

10. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.

11. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.

12. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)

13. Does not require a newsreader - easier to use than a newsgroup

14. Moving pictures experts group is a popular video compression standard

15. Method that the internet uses to store domain names and their corressponding IP addresses

16. The fastest most powerful computer

17. Most computers (on and off)

18. Internet Service Provider- a regional or national access provider

19. Perpetrator attempts to obtain your personal or financial info.

20. Is a security measure that defines who can access it and what actions they can take while acessing the computer

21. Program that euns only on a specific type or make of computer

22. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching

23. The technology of authenticating a persons identity by verifying a personal characteristic.

24. They can execute more than one instruction per clock cycle

25. Random access memory- memory chips that can be read from and written to by the processor and other devices

26. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.

27. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks

28. The standard that outlines characteristics of how two network devices communicate

29. A real time internet communications service where you can talk to people online.

30. Computer aided design software assists a professional user in creating designs

31. Contains 10 or fewer comps - with similar reponsibilities and capabilities

32. Saves any open documents and programs to RAM and places computer into a low power state

33. A window that provides info - presents availabe options - or requests a response.

34. Continues to operate when one of its components fails - ensuring that no data is lost

35. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o

36. World wide web consortium oversees research and sets standards for many areas of the internet

37. Smaller than heat sink cools processors in notebook comps

38. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.

39. When online meetings take place on the web

40. Organization that sells and manages domain names

41. Universal serial bus port connects peripherals to the computer

42. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -

43. Circuit boards tjay provide connections and functions not built into the motherboard

44. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive

45. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.

46. A know specific pattern of virus code.

47. The code of acceptable behaviors users should follow while on the internet.

48. Communications activity. Handled by NSFnet.

49. May break in to computer to exploit security weakness. financial gains - revenge.

50. Contain permanently writeen data - instructions - and information