SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Efficiently
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
Productivity software is designed to help people work more ___________.
Column headings are used to select an entire _______ with a mouse click.
2. Legitimate
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
3. Windows
4. Keystroke
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
______ data is data that has been converted into discrete digits such as 0s and 1s.
Common expansion cards include ________ cards - graphic cards - and memory cards.
A _________ logger is a type of spyware that records each character you type.
5. Free
______________ are the most expensive and fastest computers available.
__________ is the study of safe and efficient work environments.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Freeware is software that is copyrighted but is available for ____.
6. Cannot
Messages are encrypted using a cryptographic _________ and a key.
A _________ is a graphical representation of a series of steps needed to solve a problem.
The information on a ROM chip _____ be altered by the user.
A __________ file uses a uniform format to store data for each person or thing in the file.
7. Fraud
Freeware is software that is copyrighted but is available for ____.
Groupware is software that allows several people to collaborate on projects over a _______.
This act established financial reporting regulations to prevent corporate ______.
Improper positioning of your keyboard and mouse can cause ___.
8. Temporary
TCP/IP is an example of a network ________________ protocol.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
_____ ______ cable transmits pulsating beams of light rather than electricity.
9. Communications
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
TCP/IP is an example of a network ________________ protocol.
Transmission is limited to ______ range.
A wiki is one or more ___ documents that can be viewed and changed by users.
10. ENIAC
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
11. Background
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Early computers stored ____ for calculations and programs on punched cards.
12. Routes
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
13. Fourth
______ generation computers were microprocessor based.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
The process of converting cyphertext to plaintext is ___________
Computer processing is the ____________ of data which transforms data into information.
14. Project management
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
Each connection _____ on a network is called a node.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
_________ systems were first used in second generation computers.
15. Packet
The information on a ROM chip _____ be altered by the user.
A ______ is a small unit of data transmitted over a network.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
16. Collisions
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
CSMA/CD is the Ethernet protocol that handles __________.
In a relational database - information is organized in rows and columns. Rows are called _______.
A _________ logger is a type of spyware that records each character you type.
17. Bulletin board
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
The prefix '____' means a million.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
18. KB
An organization that provides internet access is called an ___.
A single hard drive could be partitioned and labeled with multiple drive ________.
An organization's internal _______ network is called an intranet.
A kilobyte is generally abbreviated as __.
19. Loop
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
The section of code that repeats is called a _____ or an iteration.
An organization that provides internet access is called an ___.
20. Served
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
21. Circuit boards
22. Scrolling
_________ is the process of moving up - down - or sideways through the text or other screen display.
___ software is used to design products - maps - structures and civil engineering drawings.
The prefix '____' means a million.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
23. Direction
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
This is where the term __________ (a group edited encyclopedia) comes from.
Nowadays - cash registers have been replaced by ___ terminals.
In a ring network - all packets flow in only one __________; there are no data collisions.
24. Retype
A wiki is one or more ___ documents that can be viewed and changed by users.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
25. Instruction
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Microsoft Windows is the world's best selling ________ __________.
26. Switching
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
The columns are called _______.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
27. Processing
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Cache speeds up _________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
28. 1971
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
The first microprocessor was developed in _____.
29. Central
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Early computers stored ____ for calculations and programs on punched cards.
30. Networking
This UNIX-based kernel also contributes to stronger _________.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
Micropayments are __________ payments for internet transactions as small as 25 cents.
31. Debugging
MIDI stands for Musicial ___________ Digital Interface.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
Alpha testing involves desk checking and _________.
32. Syntax
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
The section of code that repeats is called a _____ or an iteration.
A message that has not been _________ is called plaintext.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
33. Sender's
34. Security
This UNIX-based kernel also contributes to stronger _________.
ISPs are connected to the internet backbone via a ___.
Examples of DTP software include MS __________ and PageMaker.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
35. Unique
36. Resetting
A unit of measure equaling 8 bits is a ____.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
The internet is an example of a WAN (______ ____ Network).
Programmers use assembly languages to write ______ software.
37. CAD
___ software is used to design products - maps - structures and civil engineering drawings.
A file extension is an optional file identifier that is separated from the main file name by a ______.
This can also be called a command-_____ interface.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
38. Overclocking
Improper positioning of your keyboard and mouse can cause ___.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
39. Cyphertext
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
A message which has been encrypted is called __________.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
40. Monitors
Cache is ____ when the computer power is turned off.
In programming - a _________ is a prewritten module designed for a specific task.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
Computer processing is the ____________ of data which transforms data into information.
41. Formats
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Column headings are used to select an entire _______ with a mouse click.
42. E-waste
The kernel is also known as the ___________.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Disposal of _______ is a major environmental problem caused by information technology.
43. Restore
The columns are called _______.
NAP stands for ________________ Point.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
44. Windows
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
In a _____________ LAN - individual computer users share the services of a centralized computer.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
45. Implementation
Search agents and _____ search tools allow you to automate your search process across many sites.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
System ______________ involves converting files - software and hardware to the new system.
46. Hypertext
Database ______________ create - maintain - and supervise the day to day operation of databases.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
HTML is a set of special instructions used to create ____ _____.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
47. Letters
A single hard drive could be partitioned and labeled with multiple drive ________.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Forging an email ______'s name is called spoofing.
One ___________ is one thousandth of a second.
48. Network interface
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
The ________ ________ is the computer software that manages the basic operation of the computer.
A _________ logger is a type of spyware that records each character you type.
49. Microcomputers
______ data is data that has been converted into discrete digits such as 0s and 1s.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Personal computers are also called ______________.
The central computer is called a ____.
50. Commands
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.