Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transmission media on which the data - instructions - information travel.






2. Two main parts are processor and memory.






3. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






4. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






5. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






6. Used to gain competitive advantage






7. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






8. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






9. Is a security measure that defines who can access it and what actions they can take while acessing the computer






10. Provids mobile users with a secure connection to the company server as if the user has a private line.






11. Allows a user to plan schedule and track costs of a project






12. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






13. zombie






14. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






15. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






16. A type of always on connection that is established between two communications devices. better than dial up line






17. Protective case for optical discs






18. An instruction that causes a program to perform a specific action.






19. Single chip with two or more processor cores.






20. Storage over an internet service






21. Software used by criminals






22. Screen savors were made to prevent this - which etched images permanently onto the screen






23. Method that the internet uses to store domain names and their corressponding IP addresses






24. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






25. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






26. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






27. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






28. When online meetings take place on the web






29. Provides the user with a physcial response from the device






30. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






31. Hides within or looks like a legitimate program such as a screen saver






32. Any unwanted signal usually varying quickly






33. The delivery of education via some electronic method such as the internet - networks - or optical disks.






34. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






35. Privately owned and limited to a specific vendor or computer model.






36. A type of system software that allows users to perform maintenence type tasks






37. A rectangular opeining that typically holds disk drives.






38. The process of dividing the disk into tracks and sectors






39. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






40. Acts as an electronic switch that opens or closes the circuit for electrical charges






41. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






42. Uses devices that emit and sense light to detect the mouses movement






43. Smaller than heat sink cools processors in notebook comps






44. Combines several GIF images ina single GIF file.






45. Most computers (on and off)






46. Dish shaped antenna for internet connection






47. Copyrighted software that is distributed at no cost for a trial period






48. Extends the capabilites of a browser.






49. A program that restricts access to certain material on the web






50. Small capacity built directly in the processor chip