SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Punctuation
___________ programming rules are called syntax.
Products which are announced but are never ________ are called vaporware.
A browser ________ is spyware that changes browser settings without your knowledge.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
2. NAP
Settings automatically used by a program unless changed by the user are called _______ settings.
A ____ network has no endpoints and all computers are connected in a continuous loop.
ISPs are connected to the internet backbone via a ___.
A ___ is a commonly used component that connects devices on the LAN.
3. Clients
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Servers can store files or provide services (i.e. printing) to ________ on the network.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
4. Printed
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
CIO stands for _______ ____________ Officer.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
5. Operating
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
System software includes device drivers - utility programs - and the __________ system.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
6. Network Access
Word processing software is used to create - edit - print - format and store ____.
NAP stands for ________________ Point.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Syntax refers to the _______ in which computer programming commands must be entered.
7. Supervisor
__________ appear as colored or underlined words on a webpag
UNIX was first developed by _____ Laboratories in 1969.
The kernel is also known as the ___________.
Secondary storage refers to devices and media that store data _____________.
8. Intranets
______________ are the most expensive and fastest computers available.
Private _________ that connect internal personnel and selected vendors are called extranets.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Like hubs - switches have multiple ______.
9. Denial of service
Examples of keywords include READ - ______ - IF - and THEN
Productivity software is designed to help people work more ___________.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
10. Machine
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
MIDI stands for Musicial ___________ Digital Interface.
__________ is the study of safe and efficient work environments.
The instruction cycle is also often referred to as the ________ cycle.
11. Processes
In Windows - to see a list of active _________ - you must open the task manager.
Transmission is limited to ______ range.
One ___________ is one thousandth of a second.
A unit of measure equaling one ______ digit is a bit.
12. Million
A megabyte is a unit of measurement roughly equaling one _______ bytes.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Transmission is limited to ______ range.
13. HTTP
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
A message that has not been _________ is called plaintext.
Syntax refers to the _______ in which computer programming commands must be entered.
14. Primary
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
In a relational database - the _______ key holds a unique value for each record.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A print server manages one or more printers and stores printed ______.
15. Scheduling
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Meeting ___________ software is an example of groupware.
A computer resource is any component required to perform ____.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
16. Gateways
In a ring network - all packets flow in only one __________; there are no data collisions.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
________ are used to transmit data between LANs of different network topologies or network operating systems.
17. Musical
A __________ file uses a uniform format to store data for each person or thing in the file.
VoIP stands for ______ over Internet Protocol.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
MIDI stands for Musicial ___________ Digital Interface.
18. VoIP
____ is an internet protocol used to make phone calls over the internet.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
A kilobyte is generally abbreviated as __.
19. Biometric
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Decrypt
Random access is much faster than ___________ access storage (tape).
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
___________ programming rules are called syntax.
21. Sender's
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Email
In a relational database - the _______ key holds a unique value for each record.
_____________ people is one important way to protect software and data.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
23. Desk checking
Reading through a program to make sure it is logical and free of errors is called _____ ________.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
________ and assembly languages are low level languages.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
24. Direction
_____________ people is one important way to protect software and data.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Early computers stored ____ for calculations and programs on punched cards.
In a ring network - all packets flow in only one __________; there are no data collisions.
25. Flowchart
A _________ is a graphical representation of a series of steps needed to solve a problem.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
The columns are called _______.
Alpha testing involves desk checking and _________.
26. Organize
A kilobyte is generally abbreviated as __.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
Databases use structured files to _________ data.
27. Slide show
Word processing software is used to create - edit - print - format and store ____.
Zipped files are _________ as part of the installation process.
________ ________ plan and implement new or improved computer services.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
28. Function
With a ______ implementation - parts of the new system are implemented separately.
A spreadsheet ________ is a built-in formula which performs common calculations.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
29. PIM
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
MIDI stands for Musicial ___________ Digital Interface.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
30. Directly
Random access storage devices are able to go _____ to the requested data
A firewall can be _________ or software-based or a combination of the two.
A collection of fields make up a _______.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
31. 64
______________ are the most expensive and fastest computers available.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Each connection _____ on a network is called a node.
Second generation computers used ___________ instead of vacuum tubes.
32. Sort
Cache speeds up _________.
A unit of measure equaling one ______ digit is a bit.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
33. Hypertext
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
The compiled program is saved as object code for later __________.
This data is _____ when the computer is turned off.
34. Record
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
A collection of fields make up a _______.
_______ is the operating system installed on more than 80% of the world's personal computers.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
35. Intel
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
___________ and security are MS Windows' two major weaknesses.
_______ are computer depictions of humans often found in computer games and training software.
36. Cookies
A unit of measure equaling one ______ digit is a bit.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
_______ are small text files left on your hard drive by websites you visit.
37. Millisecond
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
A collection of fields make up a _______.
One ___________ is one thousandth of a second.
A device ______ is system software used by the computer to control peripheral devices.
38. Processor
DHCP is a protocol designed to automatically distribute IP _________.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
The particular operating system and _________ model on which a computer system is based is called the platform.
The prefix '_____' means a thousand.
39. Input/Output
A firewall can be _________ or software-based or a combination of the two.
This UNIX-based kernel also contributes to stronger _________.
Linux is an ____ _______ operating system that can be modified and freely distributed.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
40. Decode
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
_____ data can be text - images - numbers - or sounds.
The most common user interface for UNIX systems is the ________ ____ interface.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
41. WAN
A communications network that covers a large geographic area such as a country is called a ___.
Cache is ____ when the computer power is turned off.
In a relational database - a ___ field is used to sort data.
IP addresses can be changed by the network _______________.
42. Remarks
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Word processing software is used to create - edit - print - format and store ____.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
_______ are notes included in the program code by the programmer.
43. Fraud
A _________ is a graphical representation of a series of steps needed to solve a problem.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
This act established financial reporting regulations to prevent corporate ______.
44. Decryption
A ____ network has no endpoints and all computers are connected in a continuous loop.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
When a computer performs several tasks simultaneously - this is called ________ processing.
The process of converting cyphertext to plaintext is ___________
45. Processors
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
The 1s and 0s used to represent digital data are known as _______ digits.
46. Tape drive
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
DHCP is a protocol designed to automatically distribute IP _________.
A communications network that covers a large geographic area such as a country is called a ___.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
47. DRM
Open source software projects promote user modification - peer review - _____ distribution - and copying.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
The location on a spreadsheet where a row and a column intersect is called a ____.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
48. Human
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Private networks that are connected to remote sites via the internet are called ____.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
They are for ______ use only and are ignored by the compiler when it processes the code.
49. Shortcut
A device ______ is system software used by the computer to control peripheral devices.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
_________ authentication devices verify a person's identity using the person's physical characteristics.
When a computer performs several tasks simultaneously - this is called ________ processing.
50. Debugger
System software includes device drivers - utility programs - and the __________ system.
_______ are notes included in the program code by the programmer.
IP addresses can be changed by the network _______________.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests