Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Read only memory refers to memory chips storing permanent data and instructions (firmware)






2. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






3. Combines several GIF images ina single GIF file.






4. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






5. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






6. Hides within or looks like a legitimate program such as a screen saver






7. Single chip with two or more processor cores.






8. Fetching - decoding - executing - storing






9. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






10. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






11. A document that you return to the company that creates and sends it.






12. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






13. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






14. Anopening inside the system unit in which you can install additional equipment. Different than a slot






15. Screen savors were made to prevent this - which etched images permanently onto the screen






16. A collection of computers and devices connected together - via communications devices and transmissions media.






17. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






18. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






19. Broadband modem- sends and recives digital data over the cable television






20. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.






21. Electrical supply drops.can cause data loss but generally not cause equipment damage






22. Communications activity. Handled by NSFnet.






23. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






24. Text version of an IP address






25. Case of the system unit to protect internal damage






26. Uses devices that emit and sense light to detect the mouses movement






27. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






28. Transmission media on which the data - instructions - information travel.






29. Internet teephony- enables users to speak to other users over the internet






30. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






31. A server that you connect to to start a chat session.






32. Cables - telephone lines - radio networks - satellites






33. Other computers and mobile devices on the networ that rely on the server for its resources






34. The process if a computer or device recieveing info info from the server on the internet






35. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






36. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






37. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






38. Is an online area in which isers have wrtten discussions about a particular subject.






39. Needed generally to participate in a newsgroup






40. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






41. Used to gain competitive advantage






42. A rectangular opeining that typically holds disk drives.






43. Smallest unit of data the computer can process






44. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






45. World wide web consortium oversees research and sets standards for many areas of the internet






46. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






47. They consist entirely of electronic components and contain no moving parts.






48. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






49. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






50. Hypertext transfer protocol