Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who uses internet to destroy or damage computers for political reasons.






2. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






3. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






4. Consists of electronic components that store instructions waiting to be executed (On motherboard)






5. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






6. Is an online area in which isers have wrtten discussions about a particular subject.






7. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






8. A program that hides in a computer and allows someone from a remote location to take control of the computer






9. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






10. The design of computers - devices - and media in the network






11. Provide Wi Fi to mobile computers or devices






12. Human speech is bc of its continous signal that vary in strength and quality






13. Serves as the interface between the user - the app software - and the computers hardware






14. Rambus inline memory module house RDRAM chips






15. Combines several GIF images ina single GIF file.






16. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






17. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






18. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






19. The delivery of education via some electronic method such as the internet - networks - or optical disks.






20. Transmission media on which the data - instructions - information travel.






21. Can be peropheral or chip - creates sound from digital instructions.






22. Internet connections using regular copper telephone lines.






23. Operating system on mobile devices that generally resides on ROM






24. Smaller than heat sink cools processors in notebook comps






25. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






26. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






27. One or more computers on the network request services from the server. 10 or more computers






28. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






29. Major carriers of network traffic






30. The use of computer or network with out permission






31. Sends digital data and info from a comp to a DSL line






32. Graphical User interface - interact with software using text - graphics - and icons






33. Single chip with two or more processor cores.






34. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.






35. Privately owned and limited to a specific vendor or computer model.






36. Transmits data via infared light waves.. Both computer and device must have the port for it to work






37. Internet Service Provider- a regional or national access provider






38. Screen savors were made to prevent this - which etched images permanently onto the screen






39. Obtains data directly at the location where the transaction or event takes place.






40. Holds one or more disk drives






41. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






42. Copyrighted software provided at no cost by company that retains all rights to software






43. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






44. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






45. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






46. Enahnces the sound generating capabilites of a personal computer






47. Any data or instructions entered into the memory of the computer






48. Small capacity built directly in the processor chip






49. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






50. Processor begins to fetch a second instruction before it completes the full machine cycle