Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two or more computers transfer data - instructions - and information.






2. PGP an encryption program






3. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






4. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






5. Special software to listen to audio






6. A collection of data organized in a manner that allows access retrieval and use of that data






7. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.






8. Uses fiber optic cable for internet connection.






9. A server that you connect to to start a chat session.






10. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






11. Enahnces the sound generating capabilites of a personal computer






12. A document that you return to the company that creates and sends it.






13. A type of system software that allows users to perform maintenence type tasks






14. Needed generally to participate in a newsgroup






15. Retains existing application software and data files even if you can change computer models or vendors






16. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






17. The code of acceptable behaviors users should follow while on the internet.






18. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






19. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






20. Allows users to keep typing without using enter at the end of each line






21. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






22. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






23. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






24. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






25. The design of computers - devices - and media in the network






26. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






27. Uses radio waves to transmit data between two devices.






28. The smallest unit of disk space that stores data and info






29. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






30. Mathematical formula that generates a code from the contents of the message






31. World wide web consortium oversees research and sets standards for many areas of the internet






32. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






33. Protective case for optical discs






34. Someone who accesses a computer or network illegally. Some say they hack to improve security






35. A special purpose computer that functions as a component in a larger product. Small with limited hardware






36. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






37. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






38. Major carriers of network traffic






39. Health care professions conduct live conferences on the computer






40. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






41. Obtains data directly at the location where the transaction or event takes place.






42. Extends the capabilites of a browser.






43. A vulnerable computer that is set up to entice an intruder to break into it.






44. Text version of an IP address






45. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






46. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






47. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






48. Completely Automated Public Turing test to tell Computers and Humans Apart.






49. A temporary connection that uses one or more analog telphone lines for communications.






50. CA resposible for giving out digital certificate