Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Special software to listen to audio

2. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.

3. Extends the capabilites of a browser.

4. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing

5. Personal information manager is application software that includes features to help users organize personal info

6. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)

7. Other computers and mobile devices on the networ that rely on the server for its resources

8. A small metal or plastic device that uses pressure instead of ink.

9. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time

10. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition

11. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor

12. Health care professions conduct live conferences on the computer

13. A device that enables you to join a port and a connector that are both male or female

14. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.

15. A system that attempts to imitate the behavior of a human brain.

16. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.

17. Copyrighted software provided at no cost by company that retains all rights to software

18. A program that displays an online advertisement in a pop up. spyware can be hidden in adware

19. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically

20. Allows a user to plan schedule and track costs of a project

21. An electrical disturbance that can degrade communications

22. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks

23. Read only memory refers to memory chips storing permanent data and instructions (firmware)

24. Controls timing of all computer operations

25. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)

26. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network

27. Sends documents to be printed to a buffer instead of sending them immediately to the printer.

28. Hardware - software - data - people - procedures

29. On the motherboard hold memory modules

30. Obtains data directly at the location where the transaction or event takes place.

31. 8 bits grouped together. basic storage unit in memory. Each byte has an address

32. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.

33. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money

34. Computing device small enough to hold in your hand

35. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.

36. Pressure sensitive eraser shaped pointing device

37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state

38. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it

39. A vulnerable computer that is set up to entice an intruder to break into it.

40. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.

41. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program

42. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)

43. Rambus inline memory module house RDRAM chips

44. Copyrighted software that is distributed at no cost for a trial period

45. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident

46. Universal serial bus port connects peripherals to the computer

47. Communications activity. Handled by NSFnet.

48. The process of dividing the disk into tracks and sectors

49. Hides within or looks like a legitimate program such as a screen saver

50. Company that provides wireless internet access to computers