Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.






2. A system that attempts to imitate the behavior of a human brain.






3. One or more computers on the network request services from the server. 10 or more computers






4. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






5. The fastest most powerful computer






6. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






7. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.






8. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






9. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.






10. (laptop computer) portable personal computer often able to fit in your lap






11. A notcie that guarantees a user or web site is legit. E- commerce use it often






12. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






13. An electrical disturbance that can degrade communications






14. Controls timing of all computer operations






15. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






16. Allows users to keep typing without using enter at the end of each line






17. A know specific pattern of virus code.






18. CA resposible for giving out digital certificate






19. Operating system on mobile devices that generally resides on ROM






20. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.






21. Other computers and mobile devices on the networ that rely on the server for its resources






22. A computer that delivers requested web pages to your computer






23. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






24. A communications device that enables a computer or device that does not have a built in networking capability to access a network






25. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






26. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






27. Someone who uses internet to destroy or damage computers for political reasons.






28. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






29. The use of computer or network with out permission






30. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






31. The original article and all subsequent related replies






32. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






33. Text version of an IP address






34. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






35. Data that has been processed in a useful form- text - graphics - audio - video






36. A set of programs that coordinates all of the activies among computer hardware devices.






37. Personal information manager is application software that includes features to help users organize personal info






38. A rectangular opeining that typically holds disk drives.






39. Case of the system unit to protect internal damage






40. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






41. A window that provides info - presents availabe options - or requests a response.






42. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






43. Device with a monitor - keyboard - and memory






44. A cable forms a closed loop with all computers. one direction






45. Internet teephony- enables users to speak to other users over the internet






46. Encrypted data






47. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






48. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






49. The design of computers - devices - and media in the network






50. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters