Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






2. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






3. The destructive event or prank the program intended to deliver






4. Storage over an internet service






5. Organization that sells and manages domain names






6. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor






7. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






8. Single inline memory module forms a single set of contacts






9. Graphics processing unit controls the manipulation and display of graphics on the display device.






10. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






11. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






12. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






13. PGP an encryption program






14. Most computers (on and off)






15. A system that attempts to imitate the behavior of a human brain.






16. Communications activity. Handled by NSFnet.






17. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






18. Is a security measure that defines who can access it and what actions they can take while acessing the computer






19. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






20. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






21. Cables - telephone lines - radio networks - satellites






22. Random access memory- memory chips that can be read from and written to by the processor and other devices






23. Software that helps groups of people work together on projects and share info over a network






24. Connects the processor to cache.






25. Unencrypted readable data






26. Errors that can be recognized by automatic update






27. 8 bits grouped together. basic storage unit in memory. Each byte has an address






28. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






29. Online service provider- has many members features along with internet access such as IM or Web browsers.






30. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






31. A legal agreement that permits users to install the software on multiple computers.






32. Enahnces the sound generating capabilites of a personal computer






33. A computer that delivers requested web pages to your computer






34. Used to track and identify the location of high risk or high value items.






35. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






36. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






37. The last section of the domain name






38. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






39. A notcie that guarantees a user or web site is legit. E- commerce use it often






40. A small metal or plastic device that uses pressure instead of ink.






41. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






42. Sends digital data and info from a comp to a DSL line






43. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






44. On software is infinitie space and depth for VR






45. A document that you return to the company that creates and sends it.






46. Rambus inline memory module house RDRAM chips






47. Programs designed to make users more productive and assist them with personal tasks. (Web browser)






48. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






49. Computer aided design software assists a professional user in creating designs






50. A web site that evaluates your comouter to check for internet and e mail vulnerabilities







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests