SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Processors
A ___ is the smallest unit of data that a system can handle.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
______ data is data that has been converted into discrete digits such as 0s and 1s.
2. Solaris
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
In programming - a _________ is a prewritten module designed for a specific task.
_______ is a version of UNIX popular for large websites and e-commerce servers.
3. Point of Sale
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Search agents and _____ search tools allow you to automate your search process across many sites.
4. Telephone
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
A modem is a device that sends and receives data over __________ lines to and from computers.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
A _________ is a graphical representation of a series of steps needed to solve a problem.
5. Editing
Paint - photo _______ - and drawing software are all examples of graphics software.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
IP addresses can be changed by the network _______________.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
6. Specific
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
TCP/IP is an example of a network ________________ protocol.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
The prefix '_____' means a thousand.
7. URL
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
____ is an internet protocol used to make phone calls over the internet.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
________ row headings appear down the left frame of the spreadsheet.
8. Order
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Random access storage allows access to any location in any _____.
Site licenses allow software to be used on all computers at a specific ________.
NAP stands for ________________ Point.
9. Operating System
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
HTML is a set of special instructions used to create ____ _____.
10. 64
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
While the computer is running - it remains in main ______ and manages nonresident programs.
11. Divide
12. Transistors
Software obtained _________ is said to be pirated.
Random access storage devices are able to go _____ to the requested data
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
Second generation computers used ___________ instead of vacuum tubes.
13. Modern
A template is a ____________ document often provided with word processing software.
Personal Information Management software helps users organize and manage daily ________ activities.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
14. Windows
A ____ network has no endpoints and all computers are connected in a continuous loop.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
15. Three dimensional
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A typical computer includes the system and a variety of input - output and ______ devices.
A file extension is an optional file identifier that is separated from the main file name by a ______.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
16. TCP/IP
Examples of keywords include READ - ______ - IF - and THEN
______ data can be represented as a wave.
Proprietary information about a company concerns information a __________ might find valuable.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
17. Flowchart
A _________ is a graphical representation of a series of steps needed to solve a problem.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
First generation computers used _______ _____ to store individual bits of data.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
18. Keyboard
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
19. Keystroke
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A _________ logger is a type of spyware that records each character you type.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
20. Pretty Good
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Output is the result of ___________.
___________ programming rules are called syntax.
21. Forum
Examples of keywords include READ - ______ - IF - and THEN
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
Transmission is limited to ______ range.
The most common user interface for UNIX systems is the ________ ____ interface.
22. Digital
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
NAP stands for ________________ Point.
______ data is data that has been converted into discrete digits such as 0s and 1s.
This is where the term __________ (a group edited encyclopedia) comes from.
23. Fourth
______ generation languages are typically used for database applications.
A bus network has two endpoints and all computers are connected to a single wire or _____.
DHCP is a protocol designed to automatically distribute IP _________.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
24. Driver
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
In a _____________ LAN - individual computer users share the services of a centralized computer.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
A device ______ is system software used by the computer to control peripheral devices.
25. Encryption
__________ uses mathematical formulas to create coded messages.
A data communications network that connects personal computers within a limited geographical area is called a ___.
On the job choices that reflect a person's values are called ____________ ethics.
Early computers stored ____ for calculations and programs on punched cards.
26. Denial of service
A communications network that covers a large geographic area such as a country is called a ___.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
27. Disaster recovery
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
This UNIX-based kernel also contributes to stronger _________.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
In a relational database - the _______ key holds a unique value for each record.
28. Permanently
Secondary storage refers to devices and media that store data _____________.
Transmission is limited to ______ range.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Public key encryption uses ___ keys.
29. E-waste
Output is the result of ___________.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Computer resources include the ____ - RAM - storage space - and peripherals.
Disposal of _______ is a major environmental problem caused by information technology.
30. Database
Common expansion cards include ________ cards - graphic cards - and memory cards.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A ________ is a collection of interrelated files in a computer system.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
31. Real world
32. Value
The internet is an example of a WAN (______ ____ Network).
A spreadsheet _____ is any number used in a calculation.
VoIP stands for ______ over Internet Protocol.
_________ is the process of moving up - down - or sideways through the text or other screen display.
33. Change
In programming - a variable represents a value that can ______.
______ data can be represented as a wave.
TCP/IP is an example of a network ________________ protocol.
Data and programs waiting to be processed wait in ______ in temporary storage.
34. Viruses
Logic bombs are _______ that are set to go off at a certain time.
Syntax refers to the _______ in which computer programming commands must be entered.
Lettered ______ headings appear across the top frame of the spreadsheet.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
35. Network Access
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
NAP stands for ________________ Point.
Random access is much faster than ___________ access storage (tape).
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
36. Hijacker
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
A browser ________ is spyware that changes browser settings without your knowledge.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
With a ______ implementation - parts of the new system are implemented separately.
37. Controlling
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
_____________ people is one important way to protect software and data.
An IP address is a series of numbers used to identify a network ______.
CIO stands for _______ ____________ Officer.
38. Passwords
A keystroke logger can be used to steal __________.
In programming - a variable represents a value that can ______.
Syntax refers to the _______ in which computer programming commands must be entered.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
39. Low level
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Microsoft Windows is the world's best selling ________ __________.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
40. Instruction
On a hard disk - this waiting area is called a _______.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
______ data is data that has been converted into discrete digits such as 0s and 1s.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
41. Processing
MAC addresses are set from the factory and cannot be ________ by the network admin.
Output is the result of ___________.
Database ______________ create - maintain - and supervise the day to day operation of databases.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
42. Local Area
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
A LAN (______ _____ Network) normally occupies a single building.
_________ systems were first used in second generation computers.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
43. Binary
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Like hubs - switches have multiple ______.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
44. Microcomputers
The hub prevents packet collisions - but if the hub goes down the _____ stops.
Personal computers are also called ______________.
In a relational database - the _______ key holds a unique value for each record.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
45. Operating
Zipped files are _________ as part of the installation process.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
System software includes device drivers - utility programs - and the __________ system.
46. Viruses
Trojan horses can also carry ________ and destructive instructions.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
First generation computers used _______ _____ to store individual bits of data.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
47. Fraud
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
A keystroke logger can be used to steal __________.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
48. Processes
In Windows - to see a list of active _________ - you must open the task manager.
TCP/IP is an example of a network ________________ protocol.
A file extension is an optional file identifier that is separated from the main file name by a ______.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
49. Gateways
________ are used to transmit data between LANs of different network topologies or network operating systems.
DHCP is a protocol designed to automatically distribute IP _________.
Values are the actual numbers or dates entered into ______.
___ allows a block of program code to be reused in other programs.
50. Mega
Link to This Test
Related Subjects
Soft Skills
Business Skills