Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






2. The fastest most powerful computer






3. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






4. Saves any open documents and programs to RAM and places computer into a low power state






5. A web application that combines services from two or more sources creating a new application.






6. One or more computers on the network request services from the server. 10 or more computers






7. Is an online area in which isers have wrtten discussions about a particular subject.






8. Retains existing application software and data files even if you can change computer models or vendors






9. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






10. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






11. A part of the motherboard and connects the processor to main memory






12. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






13. Hardware - software - data - people - procedures






14. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






15. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






16. Instead of port - jack is used to identify audio or video ports.






17. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






18. Online service provider- has many members features along with internet access such as IM or Web browsers.






19. Loses its contents when power is turned off (RAM)






20. Short for key generator creats software registration numbers and sometimes activation codes.






21. A device that enables you to join a port and a connector that are both male or female






22. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






23. Data that has been processed in a useful form- text - graphics - audio - video






24. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






25. Program that euns only on a specific type or make of computer






26. Started the internet as a networking project






27. Enahnces the sound generating capabilites of a personal computer






28. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






29. Local area network- network tat connects computers and devices in a limited geographical area such as a home






30. Digital light processor uses tiny mirrors to reflect light






31. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






32. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






33. Determines the number of bits that can be transmitted at one time






34. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






35. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






36. Anopening inside the system unit in which you can install additional equipment. Different than a slot






37. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






38. Fetching - decoding - executing - storing






39. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






40. Needed generally to participate in a newsgroup






41. Computer automatically can configure adapter cards and other peripherals as you install them






42. Case of the system unit to protect internal damage






43. Internet teephony- enables users to speak to other users over the internet






44. Uses radio waves to transmit data between two devices.






45. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






46. Initiates an instruction to transmit data - instructions - or information.






47. The destructive event or prank the program intended to deliver






48. Latest version of Post office Protocol






49. Contains many microscopic pathways capable of carrying an electrical current






50. Transmission media on which the data - instructions - information travel.