Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copyrighted software provided at no cost by company that retains all rights to software






2. Connects the processor to cache.






3. A know specific pattern of virus code.






4. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program






5. Company that provides wireless internet access to computers






6. The destructive event or prank the program intended to deliver






7. Reorganizing it so that the files are store in continous sectors






8. Can connect multiple types of devices that require faster data transmission speeds.






9. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software






10. Obtains data directly at the location where the transaction or event takes place.






11. A collection of data organized in a manner that allows access retrieval and use of that data






12. The discovery - collection adn analysis of evidence found on computers and networks






13. When online meetings take place on the web






14. A program that restricts access to certain material on the web






15. Internet Service Provider- a regional or national access provider






16. Read only memory refers to memory chips storing permanent data and instructions (firmware)






17. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer






18. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






19. Unencrypted readable data






20. Personal information manager is application software that includes features to help users organize personal info






21. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






22. A type of system software that allows users to perform maintenence type tasks






23. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






24. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






25. A small metal or plastic device that uses pressure instead of ink.






26. The fastest most powerful computer






27. Computer automatically can configure adapter cards and other peripherals as you install them






28. Other computers and mobile devices on the networ that rely on the server for its resources






29. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.






30. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






31. Case of the system unit to protect internal damage






32. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door






33. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






34. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition






35. Privately owned and limited to a specific vendor or computer model.






36. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






37. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident






38. Holds one or more disk drives






39. Records in a file both successful and unsuccessful attempts.






40. Broadband modem- sends and recives digital data over the cable television






41. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






42. On software is infinitie space and depth for VR






43. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.






44. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications






45. Small program that tells the operating system how to communicate with a specific device






46. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.






47. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.






48. Storage over an internet service






49. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.






50. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)