SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating system
2. Instructions
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A wiki is one or more ___ documents that can be viewed and changed by users.
A collection of fields make up a _______.
3. Utility
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
In recent years - antivirus software has been one of the most popular categories of _______ software.
UNIX was first developed by _____ Laboratories in 1969.
4. Research
Such information includes information related to company finances - _________ - products and procedures.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
5. Partition
In the same year - they released the ________ computer.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
CIO stands for _______ ____________ Officer.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
6. Networking
Nowadays - cash registers have been replaced by ___ terminals.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Most Information Systems departments are managed by a ___.
Databases use structured files to _________ data.
7. VPNs
_______ are small text files left on your hard drive by websites you visit.
MAC addresses are set from the factory and cannot be ________ by the network admin.
Private networks that are connected to remote sites via the internet are called ____.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
8. Bits
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
The more _____ in a word - the faster the computer.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
9. Off
UNIVAC was the first commercially successful _______ computer.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
10. Telephone
A modem is a device that sends and receives data over __________ lines to and from computers.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
______________ are the most expensive and fastest computers available.
Adware is spyware that tracks surfing and online _________.
11. Format
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
A data communications network that connects personal computers within a limited geographical area is called a ___.
The more _____ in a word - the faster the computer.
Syntax refers to the _______ in which computer programming commands must be entered.
12. Millisecond
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
One ___________ is one thousandth of a second.
TCP/IP is an example of a network ________________ protocol.
13. Default
Settings automatically used by a program unless changed by the user are called _______ settings.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
In a relational database - a ___ field is used to sort data.
14. Companies
________ are used to transmit data between LANs of different network topologies or network operating systems.
_____________ people is one important way to protect software and data.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
In the same year - they released the ________ computer.
15. Packet
A ______ is a small unit of data transmitted over a network.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
Early computers stored ____ for calculations and programs on punched cards.
Transferring data from a ______ computer to a local computer is called downloading.
16. 255
System ______________ involves converting files - software and hardware to the new system.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
17. Commands
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
Software obtained _________ is said to be pirated.
The toolbar displays menus and icons of commonly used ________ and options.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
18. Standalone
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
The internet is an example of a WAN (______ ____ Network).
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
19. Open source
Linux is an ____ _______ operating system that can be modified and freely distributed.
MAC addresses are set from the factory and cannot be ________ by the network admin.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
20. Whistleblowers
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Search agents and _____ search tools allow you to automate your search process across many sites.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
21. Cleartext
Plaintext is also called __________.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
22. Bit
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
Companies do this to keep _______ low.
A ___ is the smallest unit of data that a system can handle.
An organization that provides internet access is called an ___.
23. Processes
When data is ________ in one cell - data in other cells is automatically recalculated.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
A collection of fields make up a _______.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
24. Compression
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
On a hard disk - this waiting area is called a _______.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
25. Key
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
VoIP stands for ______ over Internet Protocol.
When data is ________ in one cell - data in other cells is automatically recalculated.
26. Glass
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
______ generation languages are typically used for database applications.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
In a relational database - information is organized in rows and columns. Rows are called _______.
27. Background
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
Examples of DTP software include MS __________ and PageMaker.
28. Data
Alpha testing involves desk checking and _________.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A kilobyte is generally abbreviated as __.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
29. Business
ENIAC was the first ____________ electronic computer in the United States.
VPN stands for ________ Private Network.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
30. Peripheral
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
A template is a ____________ document often provided with word processing software.
Lettered ______ headings appear across the top frame of the spreadsheet.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
31. Downloaded
Word processing software is used to create - edit - print - format and store ____.
MAC addresses are set from the factory and cannot be ________ by the network admin.
In a relational database - information is organized in rows and columns. Rows are called _______.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
32. Calculations
Spreadsheet instructions for ____________ are called formulas.
Meeting ___________ software is an example of groupware.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
33. Network
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Groupware is software that allows several people to collaborate on projects over a _______.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
34. Web browser
Examples include _____________ identification and retina scanners.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
35. Unzipped
A single hard drive could be partitioned and labeled with multiple drive ________.
Column headings are used to select an entire _______ with a mouse click.
Zipped files are _________ as part of the installation process.
Spreadsheet instructions for ____________ are called formulas.
36. Value
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
A spreadsheet _____ is any number used in a calculation.
A typical computer includes the system and a variety of input - output and ______ devices.
A browser ________ is spyware that changes browser settings without your knowledge.
37. Device
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
______________ are the most expensive and fastest computers available.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
An IP address is a series of numbers used to identify a network ______.
38. TCP/IP
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
The main circuit board of the computer is called the ___________.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
39. Restore
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
A single hard drive could be partitioned and labeled with multiple drive ________.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
40. Point of Sale
TCP/IP is an example of a network ________________ protocol.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
Adware is spyware that tracks surfing and online _________.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
41. Operating
_________ systems were first used in second generation computers.
Random access is much faster than ___________ access storage (tape).
_____ data can be text - images - numbers - or sounds.
This can also be called a command-_____ interface.
42. Organize
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
VoIP stands for ______ over Internet Protocol.
A database index can be used to _________ data in alphabetical or numerical order.
43. Divide
44. Real world
45. Unique
46. Work
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
The 1s and 0s used to represent digital data are known as _______ digits.
A computer resource is any component required to perform ____.
47. Pretty Good
Alpha testing involves desk checking and _________.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
48. GUI
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
49. PowerPoint
The hub prevents packet collisions - but if the hub goes down the _____ stops.
Harvard Graphics and MS __________ are examples of presentation graphics software.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
50. Spammers
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
In programming - a variable represents a value that can ______.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.