Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A know specific pattern of virus code.






2. A unique number that identifies the location of a byte in memory






3. A part of the motherboard and connects the processor to main memory






4. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






6. Internet connections using regular copper telephone lines.






7. Storage over an internet service






8. Anopening inside the system unit in which you can install additional equipment. Different than a slot






9. Holds one or more disk drives






10. PGP an encryption program






11. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






12. Electrical supply drops.can cause data loss but generally not cause equipment damage






13. Someone who accesses a computer or network illegally. Some say they hack to improve security






14. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






15. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






16. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






17. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






18. A window that provides info - presents availabe options - or requests a response.






19. Computer automatically can configure adapter cards and other peripherals as you install them






20. The role of memory to store both data and programs






21. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






22. Connects the processor to cache.






23. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






24. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






25. Any unwanted signal usually varying quickly






26. Searches for and removes unneccessary files






27. A type of storage media that consists of flat disc and is written and read by a laser






28. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






29. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






30. A web application that combines services from two or more sources creating a new application.






31. Program that euns only on a specific type or make of computer






32. On software is infinitie space and depth for VR






33. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






34. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






35. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






36. Rambus inline memory module house RDRAM chips






37. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






38. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






39. Errors that can be recognized by automatic update






40. Picure messaging can occur from mobile to mobile and mobile to email






41. Provids mobile users with a secure connection to the company server as if the user has a private line.






42. Special software to listen to audio






43. Privately owned and limited to a specific vendor or computer model.






44. Computer aided design software assists a professional user in creating designs






45. Links in text based documents






46. Cables - telephone lines - radio networks - satellites






47. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






48. Single inline memory module forms a single set of contacts






49. Small program that tells the operating system how to communicate with a specific device






50. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.