SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Expert system
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
An ______ _______ is an interactive computer program that helps users solve problems.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
2. URL
____ testing involves checking a program by running it with real world data.
Word processing software is used to create - edit - print - format and store ____.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
3. Algorithm
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Messages are encrypted using a cryptographic _________ and a key.
Databases use structured files to _________ data.
CSMA/CD is the Ethernet protocol that handles __________.
4. Encryption
Data consists of ___ facts and figures that is processed to produce information.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
__________ uses mathematical formulas to create coded messages.
5. Socket
Alpha testing involves desk checking and _________.
When data is ________ in one cell - data in other cells is automatically recalculated.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
6. Vacuum tubes
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
In programming - an event is defined as an ______.
First generation computers used _______ _____ to store individual bits of data.
7. Disk scanner
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
A _________ is a graphical representation of a series of steps needed to solve a problem.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
8. WAN
A communications network that covers a large geographic area such as a country is called a ___.
HTML is a set of special instructions used to create ____ _____.
A print server manages one or more printers and stores printed ______.
Public domain software is not ___________ and can be copied without fear of prosecution.
9. Fourth
______ generation computers were microprocessor based.
The location on a spreadsheet where a row and a column intersect is called a ____.
When you install software or hardware - information is ______ in the registry.
Values are the actual numbers or dates entered into ______.
10. Parallel
When a computer performs several tasks simultaneously - this is called ________ processing.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
_______ storage is temporary and holds data waiting to be processed.
11. Byte
________ are used to transmit data between LANs of different network topologies or network operating systems.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A unit of measure equaling 8 bits is a ____.
The 1s and 0s used to represent digital data are known as _______ digits.
12. Security
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
They are for ______ use only and are ignored by the compiler when it processes the code.
Micropayments are __________ payments for internet transactions as small as 25 cents.
This UNIX-based kernel also contributes to stronger _________.
13. Organize
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
A database index can be used to _________ data in alphabetical or numerical order.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
Most Information Systems departments are managed by a ___.
14. Timeline
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
15. Reliable
A typical computer includes the system and a variety of input - output and ______ devices.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
16. Avatars
_______ are computer depictions of humans often found in computer games and training software.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
An IP address is a series of numbers used to identify a network ______.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
17. High level
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
A message that has not been _________ is called plaintext.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
18. Processing
Output is the result of ___________.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Data and programs waiting to be processed wait in ______ in temporary storage.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
19. Web pages
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
While the computer is running - it remains in main ______ and manages nonresident programs.
A database index can be used to _________ data in alphabetical or numerical order.
HTML is a set of special instructions used to create ____ _____.
20. Finland
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Settings automatically used by a program unless changed by the user are called _______ settings.
A browser ________ is spyware that changes browser settings without your knowledge.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
21. Fraud
Values are the actual numbers or dates entered into ______.
This act established financial reporting regulations to prevent corporate ______.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
22. Network
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
The monitor - speakers - and printer are examples of computer ______ devices.
Settings automatically used by a program unless changed by the user are called _______ settings.
23. Bus
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
___ - ring - and star are the three basic network topologies.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
The monitor - speakers - and printer are examples of computer ______ devices.
24. Solved
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
_________ systems were first used in second generation computers.
________ are used to transmit data between LANs of different network topologies or network operating systems.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
25. Action
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
________ row headings appear down the left frame of the spreadsheet.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
In programming - an event is defined as an ______.
26. Outcome
A ________ is a unit of measurement equaling 1024 bytes of data.
The cursor is often a blinking rectangle and its location is called the __________ point.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Data and programs waiting to be processed wait in ______ in temporary storage.
27. Top
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Micropayments are __________ payments for internet transactions as small as 25 cents.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
________ row headings appear down the left frame of the spreadsheet.
28. Recorded
With a ______ implementation - parts of the new system are implemented separately.
When you install software or hardware - information is ______ in the registry.
LISP is a programming language used primarily for creating __________ _____________ programs.
Like hubs - switches have multiple ______.
29. Specific
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Settings automatically used by a program unless changed by the user are called _______ settings.
While the computer is running - it remains in main ______ and manages nonresident programs.
A _________ is a graphical representation of a series of steps needed to solve a problem.
30. Reliable
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Nowadays - cash registers have been replaced by ___ terminals.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
Private _________ that connect internal personnel and selected vendors are called extranets.
31. Hard
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
32. Benchmarks
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
A template is a ____________ document often provided with word processing software.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
33. Bits per second
Proprietary information about a company concerns information a __________ might find valuable.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
Search agents and _____ search tools allow you to automate your search process across many sites.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
34. Memory
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Charles Babbage
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
_______ ________ was the first to define concepts that were to be later used in modern computers.
Transferring data from a ______ computer to a local computer is called downloading.
36. Spreadsheet
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
Early computers stored ____ for calculations and programs on punched cards.
With a ______ implementation - parts of the new system are implemented separately.
37. Repetitive
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Forging an email ______'s name is called spoofing.
ISPs are connected to the internet backbone via a ___.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
38. Organize
In MS PowerPoint - the outline view helps you ________ the content of your material.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Word processing software is used to create - edit - print - format and store ____.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
39. Produced
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Products which are announced but are never ________ are called vaporware.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
40. Primary
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
The cursor is often a blinking rectangle and its location is called the __________ point.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
In a relational database - the _______ key holds a unique value for each record.
41. Wikipedia
This is where the term __________ (a group edited encyclopedia) comes from.
Improper positioning of your keyboard and mouse can cause ___.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
42. Employees
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Employment
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
On a hard disk - this waiting area is called a _______.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
44. Keystroke
An organization's internal _______ network is called an intranet.
A _________ logger is a type of spyware that records each character you type.
A unit of measure equaling 8 bits is a ____.
MAC addresses are set from the factory and cannot be ________ by the network admin.
45. Quicken
Search agents and _____ search tools allow you to automate your search process across many sites.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Examples of personal finance manager software include ________ and Microsoft Money.
_____ ______ cable transmits pulsating beams of light rather than electricity.
46. Text
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Word processing software is used to create - edit - print - format and store ____.
ENIAC was the first ____________ electronic computer in the United States.
A keystroke logger can be used to steal __________.
47. GUI
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
Current versions of Windows support ____ ______ up to 255 characters long.
_____________ is the process of recomputing values in a spreadsheet.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
48. Bulletin board
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
_____________ people is one important way to protect software and data.
On a hard disk - this waiting area is called a _______.
49. Musical
____ testing involves checking a program by running it with real world data.
Database ______________ create - maintain - and supervise the day to day operation of databases.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
VPN stands for ________ Private Network.
50. Proprietary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Disposal of _______ is a major environmental problem caused by information technology.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Public key encryption uses ___ keys.