Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provids mobile users with a secure connection to the company server as if the user has a private line.






2. Anopening inside the system unit in which you can install additional equipment. Different than a slot






3. The number of bits in an area on a storage medium - Higher density means more storage capacity






4. Screen savors were made to prevent this - which etched images permanently onto the screen






5. The process of dividing the disk into tracks and sectors






6. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






7. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






8. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






9. A small metal or plastic device that uses pressure instead of ink.






10. Can be peropheral or chip - creates sound from digital instructions.






11. When online meetings take place on the web






12. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






13. A legal agreement that allows multiple users to access the software on the server simutaneously






14. Internet teephony- enables users to speak to other users over the internet






15. They can execute more than one instruction per clock cycle






16. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






17. Latest version of Post office Protocol






18. Hypertext transfer protocol






19. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






21. The technology of authenticating a persons identity by verifying a personal characteristic.






22. Human speech is bc of its continous signal that vary in strength and quality






23. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






24. Hides within or looks like a legitimate program such as a screen saver






25. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






26. 8 bits grouped together. basic storage unit in memory. Each byte has an address






27. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






28. A type of always on connection that is established between two communications devices. better than dial up line






29. Used to gain competitive advantage






30. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






31. Unencrypted readable data






32. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






33. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






34. Transmits data via infared light waves.. Both computer and device must have the port for it to work






35. Graphic file (JPEG - GIF) slowly replacing GIF






36. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






37. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






38. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






39. Can connect multiple types of devices that require faster data transmission speeds.






40. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






41. Used to track and identify the location of high risk or high value items.






42. Continues to operate when one of its components fails - ensuring that no data is lost






43. The process if a computer or device recieveing info info from the server on the internet






44. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






45. An instruction that causes a program to perform a specific action.






46. Determines the number of bits that can be transmitted at one time






47. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






48. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






49. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






50. The code of acceptable behaviors users should follow while on the internet.