SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Configuration
DHCP stands for Dynamic Host _______________ Protocol.
_________ is the process of moving up - down - or sideways through the text or other screen display.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Computer processing is the ____________ of data which transforms data into information.
2. Certification
Many employers view IT _____________ with some degree of skepticism.
System software include device ________ - operating systems - and compilers.
UNIVAC was the first commercially successful _______ computer.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
3. Business
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A LAN (______ _____ Network) normally occupies a single building.
The prefix '____' means a million.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
4. Divide
5. Disk scanner
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
6. Viruses
DHCP is a protocol designed to automatically distribute IP _________.
Trojan horses can also carry ________ and destructive instructions.
Servers can store files or provide services (i.e. printing) to ________ on the network.
Programmers use assembly languages to write ______ software.
7. Filename
8. Direction
In a ring network - all packets flow in only one __________; there are no data collisions.
In programming - an event is defined as an ______.
A unit of measure equaling 8 bits is a ____.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
9. Tape drive
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
10. Employees
11. Memory
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Paint - photo _______ - and drawing software are all examples of graphics software.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
12. Network
Cache speeds up _________.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
13. Low level
Commands written for a specific CPU or microprocessor are ____ _____ languages.
______ data can be represented as a wave.
A ________ is a unit of measurement equaling 1024 bytes of data.
In recent years - antivirus software has been one of the most popular categories of _______ software.
14. Scheduling
Meeting ___________ software is an example of groupware.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
In programming - a _________ is a prewritten module designed for a specific task.
15. Point
Each connection _____ on a network is called a node.
On a hard disk - this waiting area is called a _______.
Servers can store files or provide services (i.e. printing) to ________ on the network.
______ times for PC storage devices are measured in milliseconds.
16. Internet
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A unit of measure equaling 8 bits is a ____.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
17. Text
System software includes device drivers - utility programs - and the __________ system.
Secondary storage refers to devices and media that store data _____________.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
Word processing software is used to create - edit - print - format and store ____.
18. Denial of service
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
___________ programming rules are called syntax.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
19. PDA
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Micropayments are __________ payments for internet transactions as small as 25 cents.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
20. Memory
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
In programming - a _________ is a prewritten module designed for a specific task.
______________ are the most expensive and fastest computers available.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
21. Instructions
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
22. Files
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
With serial processing - instructions are executed ______________ in the order received.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
23. Standalone
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
The location on a spreadsheet where a row and a column intersect is called a ____.
24. Millisecond
One ___________ is one thousandth of a second.
In a relational database - information is organized in rows and columns. Rows are called _______.
A message which has been encrypted is called __________.
With serial processing - instructions are executed ______________ in the order received.
25. Mega
26. Resources
Zipped files are _________ as part of the installation process.
_______ are small text files left on your hard drive by websites you visit.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
27. Transistors
Second generation computers used ___________ instead of vacuum tubes.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Like hubs - switches have multiple ______.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
28. Debugger
A megabyte is often abbreviated as ___.
_______ are notes included in the program code by the programmer.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
29. Flash
30. Finland
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
In a relational database - information is organized in rows and columns. Rows are called _______.
A ___ is a commonly used component that connects devices on the LAN.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
31. Encryption
Like hubs - switches have multiple ______.
__________ uses mathematical formulas to create coded messages.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
32. Two
This act established financial reporting regulations to prevent corporate ______.
Public key encryption uses ___ keys.
Proprietary information about a company concerns information a __________ might find valuable.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
33. Solaris
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
This data is _____ when the computer is turned off.
_______ is a version of UNIX popular for large websites and e-commerce servers.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
34. Hyperlinks
_____ ______ cable transmits pulsating beams of light rather than electricity.
A spreadsheet _____ is any number used in a calculation.
The main circuit board of the computer is called the ___________.
__________ appear as colored or underlined words on a webpag
35. Free
Public domain software is not ___________ and can be copied without fear of prosecution.
Freeware is software that is copyrighted but is available for ____.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
36. Settings
The compiled program is saved as object code for later __________.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
37. Nonvolatile
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
A typical computer includes the system and a variety of input - output and ______ devices.
A keystroke logger can be used to steal __________.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
38. Loop
On a hard disk - this waiting area is called a _______.
Second generation computers used ___________ instead of vacuum tubes.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
The section of code that repeats is called a _____ or an iteration.
39. Spelling
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Using components or labor from outside suppliers is called ___________.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
40. Location
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
With a ______ implementation - parts of the new system are implemented separately.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
Site licenses allow software to be used on all computers at a specific ________.
41. E-waste
A collection of fields make up a _______.
Disposal of _______ is a major environmental problem caused by information technology.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
With a ______ implementation - parts of the new system are implemented separately.
42. Icons
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
This UNIX-based kernel also contributes to stronger _________.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A keystroke logger can be used to steal __________.
43. Cell
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Meeting ___________ software is an example of groupware.
The location on a spreadsheet where a row and a column intersect is called a ____.
_______ is a version of UNIX popular for large websites and e-commerce servers.
44. Fields
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
________ ________ plan and implement new or improved computer services.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
The columns are called _______.
45. Disk drive
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
In a relational database - the _______ key holds a unique value for each record.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
46. Gateways
________ are used to transmit data between LANs of different network topologies or network operating systems.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
A communications network that covers a large geographic area such as a country is called a ___.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
47. Run
The main circuit board of the computer is called the ___________.
A ________ is a unit of measurement equaling 1024 bytes of data.
Most computer processing takes place in a component called the ___.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
48. Permission
49. Letters
Forging an email ______'s name is called spoofing.
A spreadsheet _____ is any number used in a calculation.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
A single hard drive could be partitioned and labeled with multiple drive ________.
50. Cells
Early computers stored ____ for calculations and programs on punched cards.
Values are the actual numbers or dates entered into ______.
In Windows - to see a list of active _________ - you must open the task manager.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.