Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






3. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






4. Most computers (on and off)






5. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






6. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






7. Any data or instructions entered into the memory of the computer






8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together






9. 8 bits grouped together. basic storage unit in memory. Each byte has an address






10. Two main parts are processor and memory.






11. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.






12. Transmission media on which the data - instructions - information travel.






13. Privately owned and limited to a specific vendor or computer model.






14. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






15. Dish shaped antenna for internet connection






16. Provids mobile users with a secure connection to the company server as if the user has a private line.






17. Holds one or more disk drives






18. A system that attempts to imitate the behavior of a human brain.






19. Dual inline memory module forms two sets of contact






20. Software used by criminals






21. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size






22. When turning on a computer that has been turned off completly






23. A personal computer you can carry from place to place






24. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






25. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






26. Graphics processing unit controls the manipulation and display of graphics on the display device.






27. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






28. May break in to computer to exploit security weakness. financial gains - revenge.






29. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






30. A type of always on connection that is established between two communications devices. better than dial up line






31. A case that contains electronic components of the computer used to process data.






32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






33. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






34. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






35. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






36. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






37. PGP an encryption program






38. A rectangular opeining that typically holds disk drives.






39. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax






40. Builds and maintains lists of words found on websites. Useful for search engines






41. Someone who accesses a computer or network illegally. Some say they hack to improve security






42. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






43. CA resposible for giving out digital certificate






44. Small program that tells the operating system how to communicate with a specific device






45. World wide web consortium oversees research and sets standards for many areas of the internet






46. Does not require a newsreader - easier to use than a newsgroup






47. Obtains data directly at the location where the transaction or event takes place.






48. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






49. Instead of port - jack is used to identify audio or video ports.






50. Broadband modem- sends and recives digital data over the cable television