Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Digital video intefaceenables digital signals to translate directly to the LCD monitor.






2. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






3. Initiates an instruction to transmit data - instructions - or information.






4. Searches for and removes unneccessary files






5. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






6. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






7. Most computers (on and off)






8. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






9. Company that provides wireless internet access to computers






10. Programs designed to make users more productive and assist them with personal tasks. (Web browser)






11. (laptop computer) portable personal computer often able to fit in your lap






12. A system that attempts to imitate the behavior of a human brain.






13. Connects the processor to cache.






14. Links in text based documents






15. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power






16. Acts as an electronic switch that opens or closes the circuit for electrical charges






17. Communications activity. Handled by NSFnet.






18. Online service provider- has many members features along with internet access such as IM or Web browsers.






19. The amount of data - instructions - and information that can travel over communications channel






20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






21. Fetching - decoding - executing - storing






22. One or more computers on the network request services from the server. 10 or more computers






23. Program that euns only on a specific type or make of computer






24. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






25. Processor begins to fetch a second instruction before it completes the full machine cycle






26. Transmission media on which the data - instructions - information travel.






27. A program that hides in a computer and allows someone from a remote location to take control of the computer






28. Optical mark recognition reads hand drawn marks such as circles or rectangles.






29. A colection of individual programs available together as a unit. lower cost and ease of use






30. The last section of the domain name






31. Popular for LAN. single central cable.






32. Internet Service Provider- a regional or national access provider






33. Universal serial bus port connects peripherals to the computer






34. System board- is the main circuit board of the system unit.






35. A part of the motherboard and connects the processor to main memory






36. A case that contains electronic components of the computer used to process data.






37. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






38. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






39. Someone who accesses a computer or network illegally. Some say they hack to improve security






40. Any unwanted signal usually varying quickly






41. The role of memory to store both data and programs






42. Consumer consumer e commerce.






43. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen






44. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






45. Provides the user with a physcial response from the device






46. CA resposible for giving out digital certificate






47. A program that displays an online advertisement in a pop up. spyware can be hidden in adware






48. Uses fiber optic cable for internet connection.






49. Anopening inside the system unit in which you can install additional equipment. Different than a slot






50. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif