Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The technology of authenticating a persons identity by verifying a personal characteristic.






2. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work






3. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






4. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






5. Protective case for optical discs






6. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.






7. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






8. Contains 10 or fewer comps - with similar reponsibilities and capabilities






9. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






10. Extends the capabilites of a browser.






11. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






12. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically






13. The design of computers - devices - and media in the network






14. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






15. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






16. Reorganizing it so that the files are store in continous sectors






17. Instead of port - jack is used to identify audio or video ports.






18. Two main parts are processor and memory.






19. Digital light processor uses tiny mirrors to reflect light






20. Dish shaped antenna for internet connection






21. A case that contains electronic components of the computer used to process data.






22. A small flat rectangular pointing device that is sensitive to pressure and motion.






23. The number of bits in an area on a storage medium - Higher density means more storage capacity






24. Sends digital data and info from a comp to a DSL line






25. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






26. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






27. Processor begins to fetch a second instruction before it completes the full machine cycle






28. A communications device that enables a computer or device that does not have a built in networking capability to access a network






29. Electrical supply drops.can cause data loss but generally not cause equipment damage






30. Allows the processor to communicate with peripherals.






31. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






32. A legal agreement that permits users to install the software on multiple computers.






33. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






34. The use of computer or network with out permission






35. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






36. Is an online area in which isers have wrtten discussions about a particular subject.






37. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






38. Special software to listen to audio






39. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






40. Online service provider- has many members features along with internet access such as IM or Web browsers.






41. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)






42. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network






43. Communications activity. Handled by NSFnet.






44. Uses radio waves to transmit data between two devices.






45. When turning on a computer that has been turned off completly






46. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






47. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






48. A family member on a computer






49. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






50. A rectangular opeining that typically holds disk drives.