Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A notcie that guarantees a user or web site is legit. E- commerce use it often






2. Any data or instructions entered into the memory of the computer






3. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






4. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






5. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






6. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






7. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






8. Has the illusion of moving images becuase it sends a continuos stream of images






9. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






10. The last section of the domain name






11. The role of memory to store both data and programs






12. 8 bits grouped together. basic storage unit in memory. Each byte has an address






13. Sends documents to be printed to a buffer instead of sending them immediately to the printer.






14. Contains 10 or fewer comps - with similar reponsibilities and capabilities






15. A number that uniquely identifies each computer or device connected to the internet (0-255)






16. A rectangular opeining that typically holds disk drives.






17. Protective case for optical discs






18. Software used by criminals






19. A collection of data organized in a manner that allows access retrieval and use of that data






20. Copyrighted software provided at no cost by company that retains all rights to software






21. Combines several GIF images ina single GIF file.






22. Method that the internet uses to store domain names and their corressponding IP addresses






23. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






24. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






25. A window that provides info - presents availabe options - or requests a response.






26. A case that contains electronic components of the computer used to process data.






27. On software is infinitie space and depth for VR






28. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






29. Can be peropheral or chip - creates sound from digital instructions.






30. Uses radio waves to transmit data between two devices.






31. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






32. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






33. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






34. Graphical User interface - interact with software using text - graphics - and icons






35. Internet Service Provider- a regional or national access provider






36. Company that provides wireless internet access to computers






37. Random access memory- memory chips that can be read from and written to by the processor and other devices






38. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






39. A small flat rectangular pointing device that is sensitive to pressure and motion.






40. Power on self test to check the various system components and the results are compared with data in a CMOS chip






41. Internet teephony- enables users to speak to other users over the internet






42. CA resposible for giving out digital certificate






43. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






44. Acts as an electronic switch that opens or closes the circuit for electrical charges






45. A device that enables you to join a port and a connector that are both male or female






46. The standard that outlines characteristics of how two network devices communicate






47. Designed for mobile devices






48. One or more computers on the network request services from the server. 10 or more computers






49. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






50. Anopening inside the system unit in which you can install additional equipment. Different than a slot