Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






2. Fetching - decoding - executing - storing






3. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






4. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






5. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






6. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






7. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






8. Computer automatically can configure adapter cards and other peripherals as you install them






9. Dish shaped antenna for internet connection






10. Extends the capabilites of a browser.






11. The amount of data - instructions - and information that can travel over communications channel






12. A small flat rectangular pointing device that is sensitive to pressure and motion.






13. Initiates an instruction to transmit data - instructions - or information.






14. Instead of port - jack is used to identify audio or video ports.






15. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






16. A legal agreement that allows multiple users to access the software on the server simutaneously






17. Saves any open docs or programs to hardisk before removing power






18. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






19. Communications activity. Handled by NSFnet.






20. Retains existing application software and data files even if you can change computer models or vendors






21. Uses radio waves to transmit data between two devices.






22. Can be peropheral or chip - creates sound from digital instructions.






23. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






24. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






25. Type of notebook comp that is smaller and less powerful than a normal notebook comp






26. A collection of computers and devices connected together - via communications devices and transmissions media.






27. Method that the internet uses to store domain names and their corressponding IP addresses






28. Each computer or device on the network. often connected by cables






29. A vulnerable computer that is set up to entice an intruder to break into it.






30. Smallest element in an electronic image






31. Protective case for optical discs






32. Any data or instructions entered into the memory of the computer






33. Basic input/output systemis firmware that contains the computers startup instructions






34. The smallest unit of disk space that stores data and info






35. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






36. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






37. Any unwanted signal usually varying quickly






38. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered






39. A computer that delivers requested web pages to your computer






40. Popular for LAN. single central cable.






41. World wide web consortium oversees research and sets standards for many areas of the internet






42. A window that provides info - presents availabe options - or requests a response.






43. Smaller than heat sink cools processors in notebook comps






44. A system that attempts to imitate the behavior of a human brain.






45. Computer aided design software assists a professional user in creating designs






46. Text version of an IP address






47. Dynamic ram- chips must be re energized constantly or they lose their contents.






48. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






49. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






50. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN