Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of computers and devices connected together - via communications devices and transmissions media.






2. On software is infinitie space and depth for VR






3. Allows the processor to communicate with peripherals.






4. Does not require a newsreader - easier to use than a newsgroup






5. Is a security measure that defines who can access it and what actions they can take while acessing the computer






6. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






7. One or more computers on the network request services from the server. 10 or more computers






8. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






9. Special software to listen to audio






10. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






11. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






12. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






13. May break in to computer to exploit security weakness. financial gains - revenge.






14. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






15. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






16. The number of bytes a storage medium can hold






17. All computers connected to central device. Hub or switch






18. Communications activity. Handled by NSFnet.






19. Smallest unit of data the computer can process






20. Short for key generator creats software registration numbers and sometimes activation codes.






21. Electrical supply drops.can cause data loss but generally not cause equipment damage






22. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






23. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






24. Processor begins to fetch a second instruction before it completes the full machine cycle






25. The role of memory to store both data and programs






26. A program that restricts access to certain material on the web






27. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






28. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






29. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






30. Local area network- network tat connects computers and devices in a limited geographical area such as a home






31. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






32. Two or more computers transfer data - instructions - and information.






33. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






34. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






35. Hides within or looks like a legitimate program such as a screen saver






36. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






37. A type of always on connection that is established between two communications devices. better than dial up line






38. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






39. A system that attempts to imitate the behavior of a human brain.






40. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






41. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






42. Anopening inside the system unit in which you can install additional equipment. Different than a slot






43. A type of storage media that consists of flat disc and is written and read by a laser






44. Any data or instructions entered into the memory of the computer






45. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






46. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






47. Allows a user to plan schedule and track costs of a project






48. Most computers (on and off)






49. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






50. Transmission media on which the data - instructions - information travel.