Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any data or instructions entered into the memory of the computer






2. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






3. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






4. A web application that combines services from two or more sources creating a new application.






5. Joins a cable and a port






6. When online meetings take place on the web






7. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






8. Perpetrator attempts to obtain your personal or financial info.






9. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






10. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






11. Does not require a newsreader - easier to use than a newsgroup






12. Federally funded internet security research and development center






13. Program is one that runs the same on multiple operating systems






14. A unique number that identifies the location of a byte in memory






15. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






16. A rectangular opeining that typically holds disk drives.






17. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






18. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






19. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






20. Initiates an instruction to transmit data - instructions - or information.






21. Small program that tells the operating system how to communicate with a specific device






22. Anopening inside the system unit in which you can install additional equipment. Different than a slot






23. A program that restricts access to certain material on the web






24. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






25. Single inline memory module forms a single set of contacts






26. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






27. Someone who uses internet to destroy or damage computers for political reasons.






28. 8 bits grouped together. basic storage unit in memory. Each byte has an address






29. PGP an encryption program






30. Rambus inline memory module house RDRAM chips






31. A type of storage media that consists of flat disc and is written and read by a laser






32. Smallest unit of data the computer can process






33. The process if a computer or device recieveing info info from the server on the internet






34. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






35. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






36. Is a security measure that defines who can access it and what actions they can take while acessing the computer






37. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






38. A type of system software that allows users to perform maintenence type tasks






39. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






40. A document that you return to the company that creates and sends it.






41. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






42. CA resposible for giving out digital certificate






43. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






44. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






45. Needed generally to participate in a newsgroup






46. Builds and maintains lists of words found on websites. Useful for search engines






47. A special purpose computer that functions as a component in a larger product. Small with limited hardware






48. Mathematical formula that generates a code from the contents of the message






49. Small capacity built directly in the processor chip






50. On the motherboard hold memory modules