Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Integrates the functions of a processor - memory and a video card on a single chip.






2. Can be peropheral or chip - creates sound from digital instructions.






3. A vulnerable computer that is set up to entice an intruder to break into it.






4. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






5. Searches for and removes unneccessary files






6. Uses radio waves to transmit data between two devices.






7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.






8. When turning on a computer that has been turned off completly






9. Online service provider- has many members features along with internet access such as IM or Web browsers.






10. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






11. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






12. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






13. Completely Automated Public Turing test to tell Computers and Humans Apart.






14. May break in to computer to exploit security weakness. financial gains - revenge.






15. Most computers (on and off)






16. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






17. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






18. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






19. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






20. Personal information manager is application software that includes features to help users organize personal info






21. A personal computer you can carry from place to place






22. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






23. The original article and all subsequent related replies






24. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






25. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






26. All computers connected to central device. Hub or switch






27. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






28. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






29. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






30. Type of notebook comp that is smaller and less powerful than a normal notebook comp






31. A unique number that identifies the location of a byte in memory






32. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






33. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






34. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






35. Reorganizing it so that the files are store in continous sectors






36. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






37. A real time internet communications service where you can talk to people online.






38. A collection of computers and devices connected together - via communications devices and transmissions media.






39. A legal agreement that permits users to install the software on multiple computers.






40. Allows a user to plan schedule and track costs of a project






41. Hardware - software - data - people - procedures






42. Program that euns only on a specific type or make of computer






43. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.






44. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






45. Acts as an electronic switch that opens or closes the circuit for electrical charges






46. Records in a file both successful and unsuccessful attempts.






47. Copyrighted software that is distributed at no cost for a trial period






48. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






49. Any unwanted signal usually varying quickly






50. Software used by criminals