Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory






2. Company that provides wireless internet access to computers






3. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






4. A collection of data organized in a manner that allows access retrieval and use of that data






5. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






6. Each computer or device on the network. often connected by cables






7. Combines several GIF images ina single GIF file.






8. Protective case for optical discs






9. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






10. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air






11. A number that uniquely identifies each computer or device connected to the internet (0-255)






12. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






13. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






14. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






15. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






16. Started the internet as a networking project






17. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






18. PGP an encryption program






19. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






20. Dynamic ram- chips must be re energized constantly or they lose their contents.






21. Latest version of Post office Protocol






22. Controls timing of all computer operations






23. Perpetrator attempts to obtain your personal or financial info.






24. Builds and maintains lists of words found on websites. Useful for search engines






25. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






26. Serves as the interface between the user - the app software - and the computers hardware






27. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






28. Allows users to keep typing without using enter at the end of each line






29. A real time internet communications service where you can talk to people online.






30. A document that you return to the company that creates and sends it.






31. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






32. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






33. A know specific pattern of virus code.






34. Integrates the functions of a processor - memory and a video card on a single chip.






35. Online service provider- has many members features along with internet access such as IM or Web browsers.






36. Most computers (on and off)






37. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources






38. Designed for mobile devices






39. Someone who uses internet to destroy or damage computers for political reasons.






40. Human speech is bc of its continous signal that vary in strength and quality






41. Obtains data directly at the location where the transaction or event takes place.






42. Random access memory- memory chips that can be read from and written to by the processor and other devices






43. Smallest element in an electronic image






44. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






45. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






46. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






47. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






48. Software used by criminals






49. Popular for LAN. single central cable.






50. (laptop computer) portable personal computer often able to fit in your lap