Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






2. Internet Service Provider- a regional or national access provider






3. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






4. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






5. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






6. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






7. Contain permanently writeen data - instructions - and information






8. Controls timing of all computer operations






9. Online service provider- has many members features along with internet access such as IM or Web browsers.






10. Optical mark recognition reads hand drawn marks such as circles or rectangles.






11. Serves as the interface between the user - the app software - and the computers hardware






12. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






13. Searches for and removes unneccessary files






14. Moving pictures experts group is a popular video compression standard






15. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






16. Encrypted data






17. A device that enables you to join a port and a connector that are both male or female






18. A vulnerable computer that is set up to entice an intruder to break into it.






19. Hides within or looks like a legitimate program such as a screen saver






20. A collection of computers and devices connected together - via communications devices and transmissions media.






21. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






22. Circuit boards tjay provide connections and functions not built into the motherboard






23. Single chip with two or more processor cores.






24. A system that attempts to imitate the behavior of a human brain.






25. A socket in the motherboard that can hold an adapter card






26. Is a security measure that defines who can access it and what actions they can take while acessing the computer






27. A web application that combines services from two or more sources creating a new application.






28. Picure messaging can occur from mobile to mobile and mobile to email






29. A number that uniquely identifies each computer or device connected to the internet (0-255)






30. Computer automatically can configure adapter cards and other peripherals as you install them






31. A family member on a computer






32. Cables - telephone lines - radio networks - satellites






33. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






34. Perpetrator attempts to obtain your personal or financial info.






35. Continues to operate when one of its components fails - ensuring that no data is lost






36. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






37. Reorganizing it so that the files are store in continous sectors






38. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






39. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






40. Transmits data via infared light waves.. Both computer and device must have the port for it to work






41. Copyrighted software that is distributed at no cost for a trial period






42. Small capacity built directly in the processor chip






43. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






44. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






45. Company that provides wireless internet access to computers






46. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






47. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






48. Mathematical formula that generates a code from the contents of the message






49. Computer aided design software assists a professional user in creating designs






50. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.