Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses devices that emit and sense light to detect the mouses movement






2. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






3. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






4. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






5. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






6. Initiates an instruction to transmit data - instructions - or information.






7. Power on self test to check the various system components and the results are compared with data in a CMOS chip






8. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






9. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






10. Moving pictures experts group is a popular video compression standard






11. Can be peropheral or chip - creates sound from digital instructions.






12. A collection of computers and devices connected together - via communications devices and transmissions media.






13. Consumer consumer e commerce.






14. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






15. Personal information manager is application software that includes features to help users organize personal info






16. Accepts the transmission of data - instructions - or info






17. Read only memory refers to memory chips storing permanent data and instructions (firmware)






18. Software used by criminals






19. Storage over an internet service






20. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)






21. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






22. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






23. A legal agreement that permits users to install the software on multiple computers.






24. Retains existing application software and data files even if you can change computer models or vendors






25. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






26. Unencrypted readable data






27. Two main parts are processor and memory.






28. Used to gain competitive advantage






29. Consists of electronic components that store instructions waiting to be executed (On motherboard)






30. Two or more computers transfer data - instructions - and information.






31. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






32. The standard that outlines characteristics of how two network devices communicate






33. Pressure sensitive eraser shaped pointing device






34. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






35. The design of computers - devices - and media in the network






36. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






37. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






38. Records in a file both successful and unsuccessful attempts.






39. Perpetrator attempts to obtain your personal or financial info.






40. Provide Wi Fi to mobile computers or devices






41. Single inline memory module forms a single set of contacts






42. A real time internet communications service where you can talk to people online.






43. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






44. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






45. A type of system software that allows users to perform maintenence type tasks






46. Provids mobile users with a secure connection to the company server as if the user has a private line.






47. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






48. The process if a computer or device recieveing info info from the server on the internet






49. A document that you return to the company that creates and sends it.






50. Any unwanted signal usually varying quickly