SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Central
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
_________ authentication devices verify a person's identity using the person's physical characteristics.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
2. Line
This can also be called a command-_____ interface.
A message that has not been _________ is called plaintext.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
3. Expansion
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
In MS PowerPoint - the outline view helps you ________ the content of your material.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
4. SQL
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
____ and RPG-I are examples of fourth generation languages.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
5. Security
MAC addresses are set from the factory and cannot be ________ by the network admin.
This UNIX-based kernel also contributes to stronger _________.
Groupware is software that allows several people to collaborate on projects over a _______.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
6. Disaster recovery
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
_____ data can be text - images - numbers - or sounds.
Productivity software is designed to help people work more ___________.
7. Radiation
The easiest way to reduce exposure to cellphone _________ is to use a headset.
An algorithm is a _______ or set of steps for solving a particular problem.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
8. Open source
Linux is an ____ _______ operating system that can be modified and freely distributed.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
_____ generation computers used integrated circuits.
Computer processing is the ____________ of data which transforms data into information.
9. Sort
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
________ ________ plan and implement new or improved computer services.
10. System
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Programmers use assembly languages to write ______ software.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
11. Modern
UNIX was first developed by _____ Laboratories in 1969.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
_______ are small text files left on your hard drive by websites you visit.
A __________ file uses a uniform format to store data for each person or thing in the file.
12. Quickly
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
A keystroke logger can be used to steal __________.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
13. Intranets
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
Private _________ that connect internal personnel and selected vendors are called extranets.
Linux is an ____ _______ operating system that can be modified and freely distributed.
14. Query
A computer's ____ size is the number of bits that the processor may process at any one time.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
With a relational database - users _____ records to locate and display them.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
15. Email
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
This UNIX-based kernel also contributes to stronger _________.
16. Domain name
17. Timeline
A spreadsheet ________ is a built-in formula which performs common calculations.
This data is _____ when the computer is turned off.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
ENIAC was the first ____________ electronic computer in the United States.
18. TIFF
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
Word processing software is used to create - edit - print - format and store ____.
Examples of DTP software include MS __________ and PageMaker.
19. Calculations
IP addresses can be changed by the network _______________.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
Random access storage allows access to any location in any _____.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
20. Overheat
NAP stands for ________________ Point.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
_______ is a version of UNIX popular for large websites and e-commerce servers.
21. Passwords
Database ______________ create - maintain - and supervise the day to day operation of databases.
VPN stands for ________ Private Network.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
A keystroke logger can be used to steal __________.
22. Cable
Analytical graphics are graphical forms that make _______ data easier to analyze.
_______ is a version of UNIX popular for large websites and e-commerce servers.
A bus network has two endpoints and all computers are connected to a single wire or _____.
__________ appear as colored or underlined words on a webpag
23. Voice
VoIP stands for ______ over Internet Protocol.
Alpha testing involves desk checking and _________.
In a ring network - all packets flow in only one __________; there are no data collisions.
Settings automatically used by a program unless changed by the user are called _______ settings.
24. LAN
A data communications network that connects personal computers within a limited geographical area is called a ___.
On the job choices that reflect a person's values are called ____________ ethics.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
Most Information Systems departments are managed by a ___.
25. Recalculation
A _________ logger is a type of spyware that records each character you type.
In a ring network - all packets flow in only one __________; there are no data collisions.
_____________ is the process of recomputing values in a spreadsheet.
Servers can store files or provide services (i.e. printing) to ________ on the network.
26. Controlling
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
_____________ people is one important way to protect software and data.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
27. Office
In programming - a variable represents a value that can ______.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
A message which has been encrypted is called __________.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
28. Binary
In MS PowerPoint - the outline view helps you ________ the content of your material.
A unit of measure equaling one ______ digit is a bit.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Logic bombs are _______ that are set to go off at a certain time.
29. Providers
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
First generation computers used _______ _____ to store individual bits of data.
Logic bombs are _______ that are set to go off at a certain time.
The ______ is a marker on the monitor which indicates where the next character will appear.
30. Windows
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Cache speeds up _________.
____ testing involves checking a program by running it with real world data.
_______ is the operating system installed on more than 80% of the world's personal computers.
31. Execution
Linux is an ____ _______ operating system that can be modified and freely distributed.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
The compiled program is saved as object code for later __________.
32. Work
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
In programming - a variable represents a value that can ______.
A computer resource is any component required to perform ____.
Examples of keywords include READ - ______ - IF - and THEN
33. Disk drive
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Servers can store files or provide services (i.e. printing) to ________ on the network.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Cache speeds up _________.
34. Scrolling
_________ is the process of moving up - down - or sideways through the text or other screen display.
In a relational database - information is organized in rows and columns. Rows are called _______.
A _____ of adjacent cells on a spreadsheet is called a range.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
35. Access
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
The 1s and 0s used to represent digital data are known as _______ digits.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
36. ENIAC
_____ data can be text - images - numbers - or sounds.
_________ authentication devices verify a person's identity using the person's physical characteristics.
All the physical equipment in a computer system is called ________.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
37. Web
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
A keystroke logger can be used to steal __________.
A wiki is one or more ___ documents that can be viewed and changed by users.
38. Email
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
An algorithm is a _______ or set of steps for solving a particular problem.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
One ___________ is one thousandth of a second.
39. Numeric
This UNIX-based kernel also contributes to stronger _________.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
An algorithm is a _______ or set of steps for solving a particular problem.
Analytical graphics are graphical forms that make _______ data easier to analyze.
40. Record
_____ generation computers used integrated circuits.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
41. Settings
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
Most computer processing takes place in a component called the ___.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
42. Socket
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
43. Windows
Trojan horses can also carry ________ and destructive instructions.
A ________ is a collection of interrelated files in a computer system.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
44. Mimic
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Virtual memory uses the hard disk to _____ primary storage (RAM).
The compiled program is saved as object code for later __________.
45. Change
In programming - a variable represents a value that can ______.
The ______ is a marker on the monitor which indicates where the next character will appear.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
First generation computers used _______ _____ to store individual bits of data.
46. Bus
On the job choices that reflect a person's values are called ____________ ethics.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
___ - ring - and star are the three basic network topologies.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
47. Bit
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
Spreadsheet instructions for ____________ are called formulas.
A ___ is the smallest unit of data that a system can handle.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
48. Inference
49. Central
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
An ______ _______ is an interactive computer program that helps users solve problems.
In a star network - all computers are connected to a _______ computer.
________ and assembly languages are low level languages.
50. Encryption
__________ uses mathematical formulas to create coded messages.
A browser ________ is spyware that changes browser settings without your knowledge.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.