Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






2. Allows a user to plan schedule and track costs of a project






3. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






4. Connects the processor to cache.






5. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






6. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






7. Digital light processor uses tiny mirrors to reflect light






8. Allows the processor to communicate with peripherals.






9. A program that restricts access to certain material on the web






10. A type of always on connection that is established between two communications devices. better than dial up line






11. The standard that outlines characteristics of how two network devices communicate






12. All computers connected to central device. Hub or switch






13. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






14. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






15. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






16. Continues to operate when one of its components fails - ensuring that no data is lost






17. Privately owned and limited to a specific vendor or computer model.






18. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






19. Obtains data directly at the location where the transaction or event takes place.






20. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






21. Anopening inside the system unit in which you can install additional equipment. Different than a slot






22. The destructive event or prank the program intended to deliver






23. Online service provider- has many members features along with internet access such as IM or Web browsers.






24. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






25. The role of memory to store both data and programs






26. On software is infinitie space and depth for VR






27. Program that euns only on a specific type or make of computer






28. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






29. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






30. Perpetrator attempts to obtain your personal or financial info.






31. The technology of authenticating a persons identity by verifying a personal characteristic.






32. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






33. A personal computer you can carry from place to place






34. Local area network- network tat connects computers and devices in a limited geographical area such as a home






35. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






36. zombie






37. Has the illusion of moving images becuase it sends a continuos stream of images






38. Msot retail stores use POS to record purchases - process cards - and update inventory






39. Provids mobile users with a secure connection to the company server as if the user has a private line.






40. PGP an encryption program






41. They can execute more than one instruction per clock cycle






42. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






43. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






44. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






45. Basic input/output systemis firmware that contains the computers startup instructions






46. Health care professions conduct live conferences on the computer






47. Processor begins to fetch a second instruction before it completes the full machine cycle






48. Initiates an instruction to transmit data - instructions - or information.






49. Type of notebook comp that is smaller and less powerful than a normal notebook comp






50. A number that uniquely identifies each computer or device connected to the internet (0-255)