Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The role of memory to store both data and programs






2. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth






3. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






4. ...






5. Provids mobile users with a secure connection to the company server as if the user has a private line.






6. Broadband modem- sends and recives digital data over the cable television






7. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






8. The process if a computer or device recieveing info info from the server on the internet






9. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






10. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






11. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






12. CA resposible for giving out digital certificate






13. Company that provides wireless internet access to computers






14. Contains 10 or fewer comps - with similar reponsibilities and capabilities






15. Copyrighted software that is distributed at no cost for a trial period






16. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






17. Any unwanted signal usually varying quickly






18. A rectangular opeining that typically holds disk drives.






19. Screen savors were made to prevent this - which etched images permanently onto the screen






20. Short for key generator creats software registration numbers and sometimes activation codes.






21. A vulnerable computer that is set up to entice an intruder to break into it.






22. A program that restricts access to certain material on the web






23. Used to gain competitive advantage






24. Transmission media on which the data - instructions - information travel.






25. A temporary connection that uses one or more analog telphone lines for communications.






26. Hypertext transfer protocol






27. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






28. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






29. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






30. Dynamic ram- chips must be re energized constantly or they lose their contents.






31. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






32. When businesses use the internet to sell products






33. Used to track and identify the location of high risk or high value items.






34. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






35. Uses devices that emit and sense light to detect the mouses movement






36. A computer that delivers requested web pages to your computer






37. Graphic file (JPEG - GIF) slowly replacing GIF






38. Cables - telephone lines - radio networks - satellites






39. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






40. A small flat rectangular pointing device that is sensitive to pressure and motion.






41. A window that provides info - presents availabe options - or requests a response.






42. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






43. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.






44. The discovery - collection adn analysis of evidence found on computers and networks






45. Fetching - decoding - executing - storing






46. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






47. A socket in the motherboard that can hold an adapter card






48. The smallest unit of disk space that stores data and info






49. May break in to computer to exploit security weakness. financial gains - revenge.






50. All computers connected to central device. Hub or switch