Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






2. A program that hides in a computer and allows someone from a remote location to take control of the computer






3. Donated for public use has no copyright restrictions






4. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






5. Digital light processor uses tiny mirrors to reflect light






6. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






7. A server that you connect to to start a chat session.






8. Is a security measure that defines who can access it and what actions they can take while acessing the computer






9. Uses fiber optic cable for internet connection.






10. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






11. Encrypted data






12. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






13. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






14. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






15. Does not require a newsreader - easier to use than a newsgroup






16. Unencrypted readable data






17. A collection of data organized in a manner that allows access retrieval and use of that data






18. Joins a cable and a port






19. Builds and maintains lists of words found on websites. Useful for search engines






20. A computer that delivers requested web pages to your computer






21. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






22. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






23. A special purpose computer that functions as a component in a larger product. Small with limited hardware






24. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






25. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






26. Copyrighted software provided at no cost by company that retains all rights to software






27. Small program that tells the operating system how to communicate with a specific device






28. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






29. Each computer or device on the network. often connected by cables






30. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






31. Latest version of Post office Protocol






32. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






33. When online meetings take place on the web






34. Internet connections using regular copper telephone lines.






35. Internet Service Provider- a regional or national access provider






36. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






37. When turning on a computer that has been turned off completly






38. Dual inline memory module forms two sets of contact






39. A window that provides info - presents availabe options - or requests a response.






40. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






41. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






42. Case of the system unit to protect internal damage






43. Internet teephony- enables users to speak to other users over the internet






44. Federally funded internet security research and development center






45. Provids mobile users with a secure connection to the company server as if the user has a private line.






46. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






47. Controls timing of all computer operations






48. Allows users to keep typing without using enter at the end of each line






49. Moving pictures experts group is a popular video compression standard






50. (program) consists of related instructions that tells computer what tasks to perform and how to perform them