Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






3. Basic input/output systemis firmware that contains the computers startup instructions






4. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






5. Graphical User interface - interact with software using text - graphics - and icons






6. Controls timing of all computer operations






7. Dual inline memory module forms two sets of contact






8. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands






9. Graphic file (JPEG - GIF) slowly replacing GIF






10. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs






11. A know specific pattern of virus code.






12. All computers connected to central device. Hub or switch






13. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






14. Human speech is bc of its continous signal that vary in strength and quality






15. The process of dividing the disk into tracks and sectors






16. Short for key generator creats software registration numbers and sometimes activation codes.






17. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






18. Rambus inline memory module house RDRAM chips






19. Company that provides wireless internet access to computers






20. A communications device that sends and recieves data and info to and from digital line






21. A real time internet communications service where you can talk to people online.






22. Searches for and removes unneccessary files






23. Uses devices that emit and sense light to detect the mouses movement






24. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






25. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






26. When businesses use the internet to sell products






27. Circuit boards tjay provide connections and functions not built into the motherboard






28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






29. Designed for mobile devices






30. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






31. Accepts the transmission of data - instructions - or info






32. Encrypted data






33. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)






34. Transmission media on which the data - instructions - information travel.






35. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.






36. A small metal or plastic device that uses pressure instead of ink.






37. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






38. A system that attempts to imitate the behavior of a human brain.






39. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






40. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






41. Hardware - software - data - people - procedures






42. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






43. A communications device that enables a computer or device that does not have a built in networking capability to access a network






44. A personal computer you can carry from place to place






45. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






46. Loses its contents when power is turned off (RAM)






47. An electrical disturbance that can degrade communications






48. Smallest element in an electronic image






49. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






50. Holds one or more disk drives