SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol
In a _____________ LAN - individual computer users share the services of a centralized computer.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
Output is the result of ___________.
_______ are computer depictions of humans often found in computer games and training software.
2. Infrared
The monitor - speakers - and printer are examples of computer ______ devices.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
3. Value
____ is a graphics file format used on both PCs and Macs for high quality printable files.
The internet is an example of a WAN (______ ____ Network).
A spreadsheet _____ is any number used in a calculation.
The public key encryption software used to encrypt documents such as _____ is called PGP.
4. Ports
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Settings automatically used by a program unless changed by the user are called _______ settings.
Messages are encrypted using a cryptographic _________ and a key.
Like hubs - switches have multiple ______.
5. Competitor
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A browser ________ is spyware that changes browser settings without your knowledge.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
Proprietary information about a company concerns information a __________ might find valuable.
6. Slide show
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
In a relational database - the _______ key holds a unique value for each record.
DHCP is a protocol designed to automatically distribute IP _________.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
7. Viruses
A ________ is a collection of interrelated files in a computer system.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
Micropayments are __________ payments for internet transactions as small as 25 cents.
Logic bombs are _______ that are set to go off at a certain time.
8. Viruses
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
Trojan horses can also carry ________ and destructive instructions.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
9. Scheduling
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
The ________ ________ is the computer software that manages the basic operation of the computer.
Meeting ___________ software is an example of groupware.
Companies do this to keep _______ low.
10. Driver
A device ______ is system software used by the computer to control peripheral devices.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
___________ programming rules are called syntax.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
11. Wozniak
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
12. Hard
_______ ________ was the first to define concepts that were to be later used in modern computers.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
A computer's ____ size is the number of bits that the processor may process at any one time.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
13. Mega
14. Pretty Good
A ________ is a unit of measurement equaling 1024 bytes of data.
_______ errors can be found with a debugger.
System software include device ________ - operating systems - and compilers.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
15. Instruction
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
Common expansion cards include ________ cards - graphic cards - and memory cards.
In programming - a _________ is a prewritten module designed for a specific task.
16. PDA
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Word processing software is used to create - edit - print - format and store ____.
The more _____ in a word - the faster the computer.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
17. Disk drive
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Meeting ___________ software is an example of groupware.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
18. Multimedia
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
Web page design software allows users to create sophisticated web pages with ___________ features.
Secondary storage refers to devices and media that store data _____________.
On the job choices that reflect a person's values are called ____________ ethics.
19. Application
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
In a relational database - a ___ field is used to sort data.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Software designed to solve a specific problem is called ___________ software.
20. Telephone
Telephone lines have traditionally been _______.
The section of code that repeats is called a _____ or an iteration.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
A modem is a device that sends and receives data over __________ lines to and from computers.
21. Purchases
Proprietary information about a company concerns information a __________ might find valuable.
A communications network that covers a large geographic area such as a country is called a ___.
Adware is spyware that tracks surfing and online _________.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
22. Organize
In MS PowerPoint - the outline view helps you ________ the content of your material.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
23. Record
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
The columns are called _______.
A ________ is a unit of measurement equaling 1024 bytes of data.
24. Copies
25. Importing
Using components or labor from outside suppliers is called ___________.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
The public key encryption software used to encrypt documents such as _____ is called PGP.
26. Key
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
In a relational database - a ___ field is used to sort data.
27. Disk drive
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
28. Software
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Companies do this to keep _______ low.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
29. Voice
In programming - an event is defined as an ______.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
VoIP stands for ______ over Internet Protocol.
30. Employees
31. Bulletin board
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Groupware is software that allows several people to collaborate on projects over a _______.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
32. CAD
Nowadays - cash registers have been replaced by ___ terminals.
The cursor is often a blinking rectangle and its location is called the __________ point.
In programming - an event is defined as an ______.
___ software is used to design products - maps - structures and civil engineering drawings.
33. VPNs
Private networks that are connected to remote sites via the internet are called ____.
Public domain software is not ___________ and can be copied without fear of prosecution.
Common expansion cards include ________ cards - graphic cards - and memory cards.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
34. Permanently
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
In programming - a _________ is a prewritten module designed for a specific task.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Secondary storage refers to devices and media that store data _____________.
35. Icons
Small pictures on the desktop that represent documents - procedures and programs are called _____.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
Plaintext is also called __________.
A unit of measure equaling one ______ digit is a bit.
36. Phased
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
With a ______ implementation - parts of the new system are implemented separately.
A single hard drive could be partitioned and labeled with multiple drive ________.
Early computers stored ____ for calculations and programs on punched cards.
37. Point of Sale
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
___________ programming rules are called syntax.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
38. Cannot
The section of code that repeats is called a _____ or an iteration.
The information on a ROM chip _____ be altered by the user.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
39. Companies
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
________ ________ plan and implement new or improved computer services.
ISPs are connected to the internet backbone via a ___.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
40. Volatile
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
41. Served
FTP is a protocol used to copy _____ from one computer to another over the Internet.
VPN stands for ________ Private Network.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Word processing software is used to create - edit - print - format and store ____.
42. Flash
43. Design
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
VPN stands for ________ Private Network.
In programming - an event is defined as an ______.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
44. Fourth
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
______ generation computers were microprocessor based.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
___________ programming rules are called syntax.
45. Socket
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
46. Vacuum tubes
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
The monitor - speakers - and printer are examples of computer ______ devices.
First generation computers used _______ _____ to store individual bits of data.
47. Overclocking
_______ storage is temporary and holds data waiting to be processed.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
__________ is the study of safe and efficient work environments.
48. Virtual
Cache is ____ when the computer power is turned off.
Settings automatically used by a program unless changed by the user are called _______ settings.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
VPN stands for ________ Private Network.
49. Hardware
Commands written for a specific CPU or microprocessor are ____ _____ languages.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
All the physical equipment in a computer system is called ________.
50. Remote
Transferring data from a ______ computer to a local computer is called downloading.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
_______ is the operating system installed on more than 80% of the world's personal computers.
_____ generation computers used integrated circuits.