Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On the motherboard hold memory modules






2. Transmits data via infared light waves.. Both computer and device must have the port for it to work






3. Contains many microscopic pathways capable of carrying an electrical current






4. A cable forms a closed loop with all computers. one direction






5. Used to gain competitive advantage






6. A communications device that sends and recieves data and info to and from digital line






7. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






8. Broadband modem- sends and recives digital data over the cable television






9. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






10. Provides the user with a physcial response from the device






11. Company that provides wireless internet access to computers






12. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






13. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






14. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






15. Circuit boards tjay provide connections and functions not built into the motherboard






16. Perpetrator attempts to obtain your personal or financial info.






17. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






18. Contain permanently writeen data - instructions - and information






19. Allows users to keep typing without using enter at the end of each line






20. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






21. Smaller than heat sink cools processors in notebook comps






22. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






23. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






24. The code of acceptable behaviors users should follow while on the internet.






25. Software used by criminals






26. Connects the processor to cache.






27. System board- is the main circuit board of the system unit.






28. Uses devices that emit and sense light to detect the mouses movement






29. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






30. Latest version of Post office Protocol






31. A set of programs that coordinates all of the activies among computer hardware devices.






32. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






33. Any data or instructions entered into the memory of the computer






34. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






35. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






36. The discovery - collection adn analysis of evidence found on computers and networks






37. The technology of authenticating a persons identity by verifying a personal characteristic.






38. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet






39. Builds and maintains lists of words found on websites. Useful for search engines






40. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






41. Mathematical formula that generates a code from the contents of the message






42. A real time internet communications service where you can talk to people online.






43. Communications activity. Handled by NSFnet.






44. May break in to computer to exploit security weakness. financial gains - revenge.






45. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






46. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






47. The original article and all subsequent related replies






48. The process if a computer or device recieveing info info from the server on the internet






49. The role of memory to store both data and programs






50. Combines several GIF images ina single GIF file.