SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Binary
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
This is where the term __________ (a group edited encyclopedia) comes from.
__________ uses mathematical formulas to create coded messages.
2. Supervisor
The kernel is also known as the ___________.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
_______ are notes included in the program code by the programmer.
3. Million
A megabyte is a unit of measurement roughly equaling one _______ bytes.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
_______ errors can be found with a debugger.
4. URL
Many employers view IT _____________ with some degree of skepticism.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
VoIP stands for ______ over Internet Protocol.
The instruction cycle is also often referred to as the ________ cycle.
5. Copied
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
A device ______ is system software used by the computer to control peripheral devices.
6. Fil
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
DHCP is a protocol designed to automatically distribute IP _________.
On a hard disk - this waiting area is called a _______.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
7. Glass
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
Graphics software is designed to help users manipulate and ______ graphics.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
UNIX was first developed by _____ Laboratories in 1969.
8. Scrolling
Paint - photo _______ - and drawing software are all examples of graphics software.
Telephone lines have traditionally been _______.
_________ is the process of moving up - down - or sideways through the text or other screen display.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
9. Passwords
______ generation languages are typically used for database applications.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
The internet is an example of a WAN (______ ____ Network).
A keystroke logger can be used to steal __________.
10. Bits per second
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
11. Web browser
______ data can be represented as a wave.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
The information on a ROM chip _____ be altered by the user.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
12. Query
A _____ of adjacent cells on a spreadsheet is called a range.
With a relational database - users _____ records to locate and display them.
A firewall is designed to protect a computer or network from _________.
A computer resource is any component required to perform ____.
13. CAD
___ software is used to design products - maps - structures and civil engineering drawings.
_______ are notes included in the program code by the programmer.
________ row headings appear down the left frame of the spreadsheet.
Meeting ___________ software is an example of groupware.
14. Access
______ times for PC storage devices are measured in milliseconds.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Private _________ that connect internal personnel and selected vendors are called extranets.
15. Network interface
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
In a _____________ LAN - individual computer users share the services of a centralized computer.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
16. Proprietary
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
17. Key
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
In a relational database - a ___ field is used to sort data.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
18. Period
A file extension is an optional file identifier that is separated from the main file name by a ______.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
19. Email
Analytical graphics are graphical forms that make _______ data easier to analyze.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
A ________ is a collection of interrelated files in a computer system.
20. Keyboard
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
The instruction cycle is also often referred to as the ________ cycle.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
21. NAP
Open source software projects promote user modification - peer review - _____ distribution - and copying.
Public domain software is not ___________ and can be copied without fear of prosecution.
ISPs are connected to the internet backbone via a ___.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
22. Timeline
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
VoIP stands for ______ over Internet Protocol.
___________ and security are MS Windows' two major weaknesses.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
23. Debugger
Products which are announced but are never ________ are called vaporware.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
This UNIX-based kernel also contributes to stronger _________.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
24. KB
Examples of OOP languages include C++ and _____.
A kilobyte is generally abbreviated as __.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
A LAN (______ _____ Network) normally occupies a single building.
25. Cell
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A data communications network that connects personal computers within a limited geographical area is called a ___.
The location on a spreadsheet where a row and a column intersect is called a ____.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
26. Changed
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
Harvard Graphics and MS __________ are examples of presentation graphics software.
When data is ________ in one cell - data in other cells is automatically recalculated.
27. Serial
Graphics software is designed to help users manipulate and ______ graphics.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
NAP stands for ________________ Point.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
28. Operating system
The ________ ________ is the computer software that manages the basic operation of the computer.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Programmers use assembly languages to write ______ software.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
29. Systems analysts
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
________ ________ plan and implement new or improved computer services.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
Forging an email ______'s name is called spoofing.
30. Phishers
A firewall is designed to protect a computer or network from _________.
Using components or labor from outside suppliers is called ___________.
UNIVAC was the first commercially successful _______ computer.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
31. Transistors
Telephone lines have traditionally been _______.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Second generation computers used ___________ instead of vacuum tubes.
Graphics software is designed to help users manipulate and ______ graphics.
32. Reproduces
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
33. Intruders
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
An algorithm is a _______ or set of steps for solving a particular problem.
A firewall is designed to protect a computer or network from _________.
34. POS
Disposal of _______ is a major environmental problem caused by information technology.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
_____ data can be text - images - numbers - or sounds.
Nowadays - cash registers have been replaced by ___ terminals.
35. Expert system
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
An ______ _______ is an interactive computer program that helps users solve problems.
________ row headings appear down the left frame of the spreadsheet.
36. Modem
Virtual memory uses the hard disk to _____ primary storage (RAM).
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
On the job choices that reflect a person's values are called ____________ ethics.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
37. Third
They are for ______ use only and are ignored by the compiler when it processes the code.
_____ generation computers used integrated circuits.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
38. Free
Freeware is software that is copyrighted but is available for ____.
A bus network has two endpoints and all computers are connected to a single wire or _____.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
HTML is a set of special instructions used to create ____ _____.
39. Communications
CIO stands for _______ ____________ Officer.
TCP/IP is an example of a network ________________ protocol.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
40. Disk drive
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
An IP address is a series of numbers used to identify a network ______.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
41. CIO
Plaintext is also called __________.
Most Information Systems departments are managed by a ___.
Paint - photo _______ - and drawing software are all examples of graphics software.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
42. Disk scanner
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
The section of code that repeats is called a _____ or an iteration.
_______ errors can be found with a debugger.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
43. Permission
44. Fiber optic
_____ ______ cable transmits pulsating beams of light rather than electricity.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
This data is _____ when the computer is turned off.
45. Open source
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
The section of code that repeats is called a _____ or an iteration.
Linux is an ____ _______ operating system that can be modified and freely distributed.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
46. Multimedia
DHCP stands for Dynamic Host _______________ Protocol.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
Web page design software allows users to create sophisticated web pages with ___________ features.
47. Cannot
The ________ ________ is the computer software that manages the basic operation of the computer.
The information on a ROM chip _____ be altered by the user.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
48. Flash drives
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A unit of measure equaling 8 bits is a ____.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
49. Driver
A device ______ is system software used by the computer to control peripheral devices.
The internet is an example of a WAN (______ ____ Network).
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
50. Point
___ allows a block of program code to be reused in other programs.
Each connection _____ on a network is called a node.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
When you install software or hardware - information is ______ in the registry.