SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Flight
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
Early computers stored ____ for calculations and programs on punched cards.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
2. Nonvolatile
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
A ______ is a small unit of data transmitted over a network.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
3. VPNs
Private networks that are connected to remote sites via the internet are called ____.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A file extension is an optional file identifier that is separated from the main file name by a ______.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
4. Images
A print server manages one or more printers and stores printed ______.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Each connection _____ on a network is called a node.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
5. Administrator
__________ is the study of safe and efficient work environments.
IP addresses can be changed by the network _______________.
Such information includes information related to company finances - _________ - products and procedures.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
6. Windows
With a relational database - users _____ records to locate and display them.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
7. Decryption
The process of converting cyphertext to plaintext is ___________
Servers can store files or provide services (i.e. printing) to ________ on the network.
Computer processing is the ____________ of data which transforms data into information.
In Windows - to see a list of active _________ - you must open the task manager.
8. Cars
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
Plaintext is also called __________.
The internet is an example of a WAN (______ ____ Network).
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
9. Macro
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
With a relational database - users _____ records to locate and display them.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
__________ appear as colored or underlined words on a webpag
10. Spammers
A kilobyte is generally abbreviated as __.
Zipped files are _________ as part of the installation process.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
11. MYCIN
A bus network has two endpoints and all computers are connected to a single wire or _____.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
12. Controlling
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
_____________ people is one important way to protect software and data.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
13. RSI
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
VPN stands for ________ Private Network.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Improper positioning of your keyboard and mouse can cause ___.
14. Communications
TCP/IP is an example of a network ________________ protocol.
This data is _____ when the computer is turned off.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
A file extension is an optional file identifier that is separated from the main file name by a ______.
15. Cycle
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
The prefix '_____' means a thousand.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Trojan horses can also carry ________ and destructive instructions.
16. Single
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A bus network has two endpoints and all computers are connected to a single wire or _____.
17. Reliable
The monitor - speakers - and printer are examples of computer ______ devices.
Nowadays - cash registers have been replaced by ___ terminals.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
18. Digital
______ data is data that has been converted into discrete digits such as 0s and 1s.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
A template is a ____________ document often provided with word processing software.
While the computer is running - it remains in main ______ and manages nonresident programs.
19. CPU
Most computer processing takes place in a component called the ___.
Syntax refers to the _______ in which computer programming commands must be entered.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
20. Files
The internet is an example of a WAN (______ ____ Network).
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Private networks that are connected to remote sites via the internet are called ____.
21. Architecture
Using components or labor from outside suppliers is called ___________.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
22. Serial
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
First generation computers used _______ _____ to store individual bits of data.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
_____________ people is one important way to protect software and data.
23. Cannot
The information on a ROM chip _____ be altered by the user.
DHCP is a protocol designed to automatically distribute IP _________.
They are for ______ use only and are ignored by the compiler when it processes the code.
The columns are called _______.
24. Application
Software designed to solve a specific problem is called ___________ software.
___________ and security are MS Windows' two major weaknesses.
When you install software or hardware - information is ______ in the registry.
An organization's internal _______ network is called an intranet.
25. Fil
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
26. Difference
MAC addresses are set from the factory and cannot be ________ by the network admin.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
Transmission is limited to ______ range.
27. Human
Telephone lines have traditionally been _______.
They are for ______ use only and are ignored by the compiler when it processes the code.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Zipped files are _________ as part of the installation process.
28. Free
Freeware is software that is copyrighted but is available for ____.
LISP is a programming language used primarily for creating __________ _____________ programs.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
A ________ is a collection of interrelated files in a computer system.
29. Fraud
__________ uses mathematical formulas to create coded messages.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
This act established financial reporting regulations to prevent corporate ______.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
30. Intruders
System software helps the computer manage internal and external _________ and enables the computer to run applications.
________ and assembly languages are low level languages.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
A firewall is designed to protect a computer or network from _________.
31. Operating System
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
CSMA/CD is the Ethernet protocol that handles __________.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
32. Artificial intelligence
LISP is a programming language used primarily for creating __________ _____________ programs.
The ________ ________ is the computer software that manages the basic operation of the computer.
Database ______________ create - maintain - and supervise the day to day operation of databases.
Common expansion cards include ________ cards - graphic cards - and memory cards.
33. Solved
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
34. Processing
_______ ________ was the first to define concepts that were to be later used in modern computers.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
The most common user interface for UNIX systems is the ________ ____ interface.
Cache speeds up _________.
35. Timeline
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
A message which has been encrypted is called __________.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
Random access storage allows access to any location in any _____.
36. 1971
CSMA/CD is the Ethernet protocol that handles __________.
The first microprocessor was developed in _____.
_____________ people is one important way to protect software and data.
_______ are computer depictions of humans often found in computer games and training software.
37. Wozniak
A database index can be used to _________ data in alphabetical or numerical order.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
38. Infrared
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
DHCP is a protocol designed to automatically distribute IP _________.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
39. Supervisor
This can also be called a command-_____ interface.
The kernel is also known as the ___________.
This data is _____ when the computer is turned off.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
40. Programmable
ENIAC was the first ____________ electronic computer in the United States.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
Most Information Systems departments are managed by a ___.
A unit of measure equaling 8 bits is a ____.
41. Overclocking
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
42. Word wrap
On a hard disk - this waiting area is called a _______.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
An organization's internal _______ network is called an intranet.
43. BIOS
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
A spreadsheet ________ is a built-in formula which performs common calculations.
44. Fourth
DHCP stands for Dynamic Host _______________ Protocol.
A communications network that covers a large geographic area such as a country is called a ___.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
______ generation computers were microprocessor based.
45. Produced
Products which are announced but are never ________ are called vaporware.
The 1s and 0s used to represent digital data are known as _______ digits.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
46. Peripheral
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A typical computer includes the system and a variety of input - output and ______ devices.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
A file extension is an optional file identifier that is separated from the main file name by a ______.
47. Instructions
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
_______ errors can be found with a debugger.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
48. Copied
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Micropayments are __________ payments for internet transactions as small as 25 cents.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
49. Top
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
The process of converting cyphertext to plaintext is ___________
Public domain software is not ___________ and can be copied without fear of prosecution.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
50. Stopping
Forging an email ______'s name is called spoofing.
___ allows a block of program code to be reused in other programs.
The public key encryption software used to encrypt documents such as _____ is called PGP.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.