Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. May break in to computer to exploit security weakness. financial gains - revenge.






2. Searches for and removes unneccessary files






3. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






4. A computer that delivers requested web pages to your computer






5. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






6. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.






7. Each computer or device on the network. often connected by cables






8. Software used by criminals






9. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






10. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






11. An instruction that causes a program to perform a specific action.






12. Someone who accesses a computer or network illegally. Some say they hack to improve security






13. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






14. Sends digital data and info from a comp to a DSL line






15. Started the internet as a networking project






16. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






17. A collection of data organized in a manner that allows access retrieval and use of that data






18. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






19. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






20. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






21. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






22. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






23. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






24. Storage over an internet service






25. Circuit boards tjay provide connections and functions not built into the motherboard






26. A small metal or plastic device that uses pressure instead of ink.






27. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






28. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






29. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






30. Unencrypted readable data






31. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






32. Dual inline memory module forms two sets of contact






33. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






34. Major carriers of network traffic






35. On software is infinitie space and depth for VR






36. Digital light processor uses tiny mirrors to reflect light






37. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






38. Smallest element in an electronic image






39. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






40. Connects the processor to cache.






41. Broadband modem- sends and recives digital data over the cable television






42. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






43. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






44. They consist entirely of electronic components and contain no moving parts.






45. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






46. On the motherboard hold memory modules






47. Special software to listen to audio






48. A system that attempts to imitate the behavior of a human brain.






49. The role of memory to store both data and programs






50. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses