SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High level
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
2. Cyberterrorists
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
This can also be called a command-_____ interface.
Messages are encrypted using a cryptographic _________ and a key.
3. Fil
Alpha testing involves desk checking and _________.
An ______ _______ is an interactive computer program that helps users solve problems.
Data consists of ___ facts and figures that is processed to produce information.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
4. Hub
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
In a relational database - the _______ key holds a unique value for each record.
A ___ is a commonly used component that connects devices on the LAN.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
5. Editing
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Paint - photo _______ - and drawing software are all examples of graphics software.
The ______ is a marker on the monitor which indicates where the next character will appear.
_____ data can be text - images - numbers - or sounds.
6. Formatting
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
A keystroke logger can be used to steal __________.
The main circuit board of the computer is called the ___________.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
7. Cleartext
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Column headings are used to select an entire _______ with a mouse click.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
Plaintext is also called __________.
8. Systems analysts
Personal Information Management software helps users organize and manage daily ________ activities.
Proprietary information about a company concerns information a __________ might find valuable.
Examples of personal finance manager software include ________ and Microsoft Money.
________ ________ plan and implement new or improved computer services.
9. Spelling
The most common user interface for UNIX systems is the ________ ____ interface.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
10. 1971
The first microprocessor was developed in _____.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
A print server manages one or more printers and stores printed ______.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
11. Changed
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
When data is ________ in one cell - data in other cells is automatically recalculated.
Zipped files are _________ as part of the installation process.
Common expansion cards include ________ cards - graphic cards - and memory cards.
12. Kilobyte
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A ________ is a unit of measurement equaling 1024 bytes of data.
Early computers stored ____ for calculations and programs on punched cards.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
13. Math
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
__________ appear as colored or underlined words on a webpag
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Trojan horses can also carry ________ and destructive instructions.
14. Network
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
Data and programs waiting to be processed wait in ______ in temporary storage.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
15. Calculations
Programmers use assembly languages to write ______ software.
Spreadsheet instructions for ____________ are called formulas.
A single hard drive could be partitioned and labeled with multiple drive ________.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
16. Disaster recovery
________ row headings appear down the left frame of the spreadsheet.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
___ software is used to design products - maps - structures and civil engineering drawings.
17. Cache
A print server manages one or more printers and stores printed ______.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Most Information Systems departments are managed by a ___.
18. Mega
19. Storage
Linux is an ____ _______ operating system that can be modified and freely distributed.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
A typical computer includes the system and a variety of input - output and ______ devices.
____ and RPG-I are examples of fourth generation languages.
20. Reliability
21. Print
Data consists of ___ facts and figures that is processed to produce information.
Graphics software is designed to help users manipulate and ______ graphics.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
22. Scheduling
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Meeting ___________ software is an example of groupware.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Common expansion cards include ________ cards - graphic cards - and memory cards.
23. Numeric
Servers can store files or provide services (i.e. printing) to ________ on the network.
An organization that provides internet access is called an ___.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
Analytical graphics are graphical forms that make _______ data easier to analyze.
24. Transistors
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Meeting ___________ software is an example of groupware.
Second generation computers used ___________ instead of vacuum tubes.
A ____ network has no endpoints and all computers are connected in a continuous loop.
25. Human
_____________ is the process of recomputing values in a spreadsheet.
They are for ______ use only and are ignored by the compiler when it processes the code.
Computer resources include the ____ - RAM - storage space - and peripherals.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
26. Virtual
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
VPN stands for ________ Private Network.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
27. Access
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
CIO stands for _______ ____________ Officer.
______ times for PC storage devices are measured in milliseconds.
28. Millisecond
Settings automatically used by a program unless changed by the user are called _______ settings.
One ___________ is one thousandth of a second.
System software includes device drivers - utility programs - and the __________ system.
_______ is the operating system installed on more than 80% of the world's personal computers.
29. Point
Each connection _____ on a network is called a node.
Analytical graphics are graphical forms that make _______ data easier to analyze.
Graphics software is designed to help users manipulate and ______ graphics.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
30. Chief Information
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
The prefix '____' means a million.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
CIO stands for _______ ____________ Officer.
31. Fields
Examples of keywords include READ - ______ - IF - and THEN
The easiest way to reduce exposure to cellphone _________ is to use a headset.
The process of converting cyphertext to plaintext is ___________
The columns are called _______.
32. Instruction
UNIX was first developed by _____ Laboratories in 1969.
In programming - a _________ is a prewritten module designed for a specific task.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
A data communications network that connects personal computers within a limited geographical area is called a ___.
33. Security
In a _____________ LAN - individual computer users share the services of a centralized computer.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
34. Passwords
A megabyte is often abbreviated as ___.
Database ______________ create - maintain - and supervise the day to day operation of databases.
Examples of keywords include READ - ______ - IF - and THEN
A keystroke logger can be used to steal __________.
35. Research
Such information includes information related to company finances - _________ - products and procedures.
______ times for PC storage devices are measured in milliseconds.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
36. Organize
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
Databases use structured files to _________ data.
Examples of DTP software include MS __________ and PageMaker.
37. Click
Examples of an event include a key press or a mouse ______.
Examples of DTP software include MS __________ and PageMaker.
___ software is used to design products - maps - structures and civil engineering drawings.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
38. Ring
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
A unit of measure equaling one ______ digit is a bit.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
A ____ network has no endpoints and all computers are connected in a continuous loop.
39. Project management
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
In programming - a _________ is a prewritten module designed for a specific task.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
40. Sort
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
41. Steps
The cursor is often a blinking rectangle and its location is called the __________ point.
When you install software or hardware - information is ______ in the registry.
__________ appear as colored or underlined words on a webpag
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
42. Supercomputers
Linux is an ____ _______ operating system that can be modified and freely distributed.
______________ are the most expensive and fastest computers available.
NAP stands for ________________ Point.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
43. Windows
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
A browser ________ is spyware that changes browser settings without your knowledge.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
44. Format
Syntax refers to the _______ in which computer programming commands must be entered.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Site licenses allow software to be used on all computers at a specific ________.
45. Difference
Values are the actual numbers or dates entered into ______.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
System software include device ________ - operating systems - and compilers.
Harvard Graphics and MS __________ are examples of presentation graphics software.
46. Network Access
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
NAP stands for ________________ Point.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Improper positioning of your keyboard and mouse can cause ___.
47. Timeline
When data is ________ in one cell - data in other cells is automatically recalculated.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
The section of code that repeats is called a _____ or an iteration.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
48. Query
With a relational database - users _____ records to locate and display them.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
A spreadsheet _____ is any number used in a calculation.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
49. Shortcut
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
The columns are called _______.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
UNIX was first developed by _____ Laboratories in 1969.
50. Cookies
Cache speeds up _________.
______________ are the most expensive and fastest computers available.
_______ are small text files left on your hard drive by websites you visit.
A single hard drive could be partitioned and labeled with multiple drive ________.