Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Saves any open documents and programs to RAM and places computer into a low power state






2. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






3. Links in text based documents






4. Can be peropheral or chip - creates sound from digital instructions.






5. Electrical supply drops.can cause data loss but generally not cause equipment damage






6. The design of computers - devices - and media in the network






7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






8. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






9. Circuit boards tjay provide connections and functions not built into the motherboard






10. Other computers and mobile devices on the networ that rely on the server for its resources






11. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






12. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






13. The discovery - collection adn analysis of evidence found on computers and networks






14. A unique number that identifies the location of a byte in memory






15. Is a security measure that defines who can access it and what actions they can take while acessing the computer






16. Reorganizing it so that the files are store in continous sectors






17. The amount of data - instructions - and information that can travel over communications channel






18. The role of memory to store both data and programs






19. Loses its contents when power is turned off (RAM)






20. Provide Wi Fi to mobile computers or devices






21. A colection of individual programs available together as a unit. lower cost and ease of use






22. Searches for and removes unneccessary files






23. Someone who uses internet to destroy or damage computers for political reasons.






24. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






25. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






26. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






27. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






28. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






29. They can execute more than one instruction per clock cycle






30. Type of notebook comp that is smaller and less powerful than a normal notebook comp






31. A family member on a computer






32. Donated for public use has no copyright restrictions






33. A number that uniquely identifies each computer or device connected to the internet (0-255)






34. The destructive event or prank the program intended to deliver






35. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






36. Federally funded internet security research and development center






37. Optical mark recognition reads hand drawn marks such as circles or rectangles.






38. Perpetrator attempts to obtain your personal or financial info.






39. Privately owned and limited to a specific vendor or computer model.






40. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






41. Graphic file (JPEG - GIF) slowly replacing GIF






42. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






43. Graphical User interface - interact with software using text - graphics - and icons






44. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive






45. Acts as an electronic switch that opens or closes the circuit for electrical charges






46. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






47. Internet Service Provider- a regional or national access provider






48. The use of computer or network with out permission






49. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






50. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration