Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Processor begins to fetch a second instruction before it completes the full machine cycle






2. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise






3. Major carriers of network traffic






4. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv






5. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






6. Continues to operate when one of its components fails - ensuring that no data is lost






7. Case of the system unit to protect internal damage






8. Small capacity built directly in the processor chip






9. Two main parts are processor and memory.






10. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






11. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






12. Used to track and identify the location of high risk or high value items.






13. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






14. Program is one that runs the same on multiple operating systems






15. Msot retail stores use POS to record purchases - process cards - and update inventory






16. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages






17. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






18. Someone who accesses a computer or network illegally. Some say they hack to improve security






19. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






20. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






21. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






22. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






23. A device that enables you to join a port and a connector that are both male or female






24. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






25. Random access memory- memory chips that can be read from and written to by the processor and other devices






26. A small flat rectangular pointing device that is sensitive to pressure and motion.






27. Smallest unit of data the computer can process






28. The process if a computer or device recieveing info info from the server on the internet






29. Loses its contents when power is turned off (RAM)






30. Instead of port - jack is used to identify audio or video ports.






31. A know specific pattern of virus code.






32. Organization that sells and manages domain names






33. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






34. Donated for public use has no copyright restrictions






35. Records in a file both successful and unsuccessful attempts.






36. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






37. Sends documents to be printed to a buffer instead of sending them immediately to the printer.






38. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






39. A communications device that sends and recieves data and info to and from digital line






40. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






41. Contains 10 or fewer comps - with similar reponsibilities and capabilities






42. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






43. Saves any open docs or programs to hardisk before removing power






44. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






45. Optical mark recognition reads hand drawn marks such as circles or rectangles.






46. Connects the processor to cache.






47. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






48. Mathematical formula that generates a code from the contents of the message






49. The design of computers - devices - and media in the network






50. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory