Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instead of port - jack is used to identify audio or video ports.






2. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.






3. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






4. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






5. An electrical disturbance that can degrade communications






6. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






7. Accepts the transmission of data - instructions - or info






8. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






9. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






10. Builds and maintains lists of words found on websites. Useful for search engines






11. Transmits data via infared light waves.. Both computer and device must have the port for it to work






12. Federally funded internet security research and development center






13. Health care professions conduct live conferences on the computer






14. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






15. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






16. Records in a file both successful and unsuccessful attempts.






17. Latest version of Post office Protocol






18. Program that euns only on a specific type or make of computer






19. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






20. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






21. Screen savors were made to prevent this - which etched images permanently onto the screen






22. Text version of an IP address






23. Is an online area in which isers have wrtten discussions about a particular subject.






24. Software used by criminals






25. A communications device that enables a computer or device that does not have a built in networking capability to access a network






26. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it






27. Combines several GIF images ina single GIF file.






28. Dish shaped antenna for internet connection






29. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






30. Computer automatically can configure adapter cards and other peripherals as you install them






31. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.






32. Case of the system unit to protect internal damage






33. Copyrighted software provided at no cost by company that retains all rights to software






34. Basic input/output systemis firmware that contains the computers startup instructions






35. Circuit boards tjay provide connections and functions not built into the motherboard






36. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






37. When businesses use the internet to sell products






38. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






39. Msot retail stores use POS to record purchases - process cards - and update inventory






40. Transmission media on which the data - instructions - information travel.






41. Graphical User interface - interact with software using text - graphics - and icons






42. Smallest unit of data the computer can process






43. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






44. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






45. Provides the user with a physcial response from the device






46. Uses fiber optic cable for internet connection.






47. The technology of authenticating a persons identity by verifying a personal characteristic.






48. The original article and all subsequent related replies






49. They can execute more than one instruction per clock cycle






50. Storage over an internet service