SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage
Small pictures on the desktop that represent documents - procedures and programs are called _____.
_______ are notes included in the program code by the programmer.
A typical computer includes the system and a variety of input - output and ______ devices.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
2. Cars
Microsoft Windows is the world's best selling ________ __________.
An ______ _______ is an interactive computer program that helps users solve problems.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
3. Unique
4. Word processor
In a relational database - a ___ field is used to sort data.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
When you install software or hardware - information is ______ in the registry.
____ is an internet protocol used to make phone calls over the internet.
5. Word
6. Cell
The location on a spreadsheet where a row and a column intersect is called a ____.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
7. ISP
An organization that provides internet access is called an ___.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Current versions of Windows support ____ ______ up to 255 characters long.
Meeting ___________ software is an example of groupware.
8. Volatile
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Alpha testing involves desk checking and _________.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
9. URL
_____ data can be text - images - numbers - or sounds.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Productivity software is designed to help people work more ___________.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
10. Flight
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
On a hard disk - this waiting area is called a _______.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
11. Hash
MAC addresses are set from the factory and cannot be ________ by the network admin.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
12. Served
Site licenses allow software to be used on all computers at a specific ________.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
The more _____ in a word - the faster the computer.
13. Hypertext Transfer
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
Public domain software is not ___________ and can be copied without fear of prosecution.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
14. Network Access
A _____ of adjacent cells on a spreadsheet is called a range.
NAP stands for ________________ Point.
A _________ logger is a type of spyware that records each character you type.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
15. Encrypted
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
A message that has not been _________ is called plaintext.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
16. Intranets
A data communications network that connects personal computers within a limited geographical area is called a ___.
Private _________ that connect internal personnel and selected vendors are called extranets.
_______ are small text files left on your hard drive by websites you visit.
Analytical graphics are graphical forms that make _______ data easier to analyze.
17. Spammers
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Private networks that are connected to remote sites via the internet are called ____.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
18. Memory
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
_____ data can be text - images - numbers - or sounds.
CIO stands for _______ ____________ Officer.
While the computer is running - it remains in main ______ and manages nonresident programs.
19. Clients
Servers can store files or provide services (i.e. printing) to ________ on the network.
Microsoft Windows is the world's best selling ________ __________.
A collection of fields make up a _______.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
20. Fragmentation
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
21. Period
The hub prevents packet collisions - but if the hub goes down the _____ stops.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
The prefix '____' means a million.
A file extension is an optional file identifier that is separated from the main file name by a ______.
22. Print
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Graphics software is designed to help users manipulate and ______ graphics.
23. Voice
VoIP stands for ______ over Internet Protocol.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
24. Widget
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
25. Web browser
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
UNIVAC was the first commercially successful _______ computer.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
26. Three dimensional
First generation computers used _______ _____ to store individual bits of data.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
While the computer is running - it remains in main ______ and manages nonresident programs.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
27. Line
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A _________ is a limited working system - developed to test design concepts.
This can also be called a command-_____ interface.
28. Binary
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
The 1s and 0s used to represent digital data are known as _______ digits.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
Secondary storage refers to devices and media that store data _____________.
29. Credit card
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
A kilobyte is generally abbreviated as __.
30. Competitor
Proprietary information about a company concerns information a __________ might find valuable.
Virtual memory uses the hard disk to _____ primary storage (RAM).
The compiled program is saved as object code for later __________.
NAP stands for ________________ Point.
31. Former
______________ are the most expensive and fastest computers available.
Productivity software is designed to help people work more ___________.
A modem is a device that sends and receives data over __________ lines to and from computers.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
32. Drivers
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
A typical computer includes the system and a variety of input - output and ______ devices.
System software include device ________ - operating systems - and compilers.
33. Systems analysts
________ ________ plan and implement new or improved computer services.
Like hubs - switches have multiple ______.
A message that has not been _________ is called plaintext.
The most common user interface for UNIX systems is the ________ ____ interface.
34. Function
The hub prevents packet collisions - but if the hub goes down the _____ stops.
____ is an internet protocol used to make phone calls over the internet.
Examples of personal finance manager software include ________ and Microsoft Money.
A spreadsheet ________ is a built-in formula which performs common calculations.
35. Checkbooks
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
36. Two
Proprietary information about a company concerns information a __________ might find valuable.
Public key encryption uses ___ keys.
Telephone lines have traditionally been _______.
This act established financial reporting regulations to prevent corporate ______.
37. Before
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Public key encryption uses ___ keys.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
38. Switch
________ ________ plan and implement new or improved computer services.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
39. Downloaded
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Public domain software is not ___________ and can be copied without fear of prosecution.
40. Flowchart
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
A _________ is a limited working system - developed to test design concepts.
A single hard drive could be partitioned and labeled with multiple drive ________.
A _________ is a graphical representation of a series of steps needed to solve a problem.
41. Organize
The ________ ________ is the computer software that manages the basic operation of the computer.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A megabyte is often abbreviated as ___.
In MS PowerPoint - the outline view helps you ________ the content of your material.
42. Decrypt
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
CIO stands for _______ ____________ Officer.
The more _____ in a word - the faster the computer.
____ testing involves checking a program by running it with real world data.
43. Dashboard
A firewall is designed to protect a computer or network from _________.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
44. Wozniak
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Examples of an event include a key press or a mouse ______.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
45. Defragmentation
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
CIO stands for _______ ____________ Officer.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
46. Preformatted
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
A template is a ____________ document often provided with word processing software.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
A keystroke logger can be used to steal __________.
47. Single
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
An algorithm is a _______ or set of steps for solving a particular problem.
System software include device ________ - operating systems - and compilers.
48. 10
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
The most common type of database used on PCs is the relational database in which data is organized into related ______.
49. Copyrighted
ISPs are connected to the internet backbone via a ___.
Private _________ that connect internal personnel and selected vendors are called extranets.
The process of converting cyphertext to plaintext is ___________
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
50. CIO
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Most Information Systems departments are managed by a ___.
A spreadsheet _____ is any number used in a calculation.