SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Phased
The section of code that repeats is called a _____ or an iteration.
UNIVAC was the first commercially successful _______ computer.
______ generation computers were microprocessor based.
With a ______ implementation - parts of the new system are implemented separately.
2. Kilobyte
The public key encryption software used to encrypt documents such as _____ is called PGP.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
In the same year - they released the ________ computer.
A ________ is a unit of measurement equaling 1024 bytes of data.
3. Input/Output
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Public key encryption uses ___ keys.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
4. Structured
The main circuit board of the computer is called the ___________.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
A computer's ____ size is the number of bits that the processor may process at any one time.
A __________ file uses a uniform format to store data for each person or thing in the file.
5. Primary
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
In a relational database - the _______ key holds a unique value for each record.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
6. Cursor
In a relational database - information is organized in rows and columns. Rows are called _______.
UNIX was first developed by _____ Laboratories in 1969.
The ______ is a marker on the monitor which indicates where the next character will appear.
A bus network has two endpoints and all computers are connected to a single wire or _____.
7. Recorded
They are for ______ use only and are ignored by the compiler when it processes the code.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Most computer processing takes place in a component called the ___.
When you install software or hardware - information is ______ in the registry.
8. Processes
Productivity software is designed to help people work more ___________.
HTML is a set of special instructions used to create ____ _____.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
9. Windows
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Adware is spyware that tracks surfing and online _________.
______ times for PC storage devices are measured in milliseconds.
A data communications network that connects personal computers within a limited geographical area is called a ___.
10. Column
System software include device ________ - operating systems - and compilers.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Column headings are used to select an entire _______ with a mouse click.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
11. MB
The monitor - speakers - and printer are examples of computer ______ devices.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
Site licenses allow software to be used on all computers at a specific ________.
A megabyte is often abbreviated as ___.
12. Text
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
__________ uses mathematical formulas to create coded messages.
_______ storage is temporary and holds data waiting to be processed.
A communications network that covers a large geographic area such as a country is called a ___.
13. Calculations
__________ uses mathematical formulas to create coded messages.
Random access is much faster than ___________ access storage (tape).
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
14. Group
A _____ of adjacent cells on a spreadsheet is called a range.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
________ row headings appear down the left frame of the spreadsheet.
Software obtained _________ is said to be pirated.
15. Data
The particular operating system and _________ model on which a computer system is based is called the platform.
Syntax refers to the _______ in which computer programming commands must be entered.
____ and RPG-I are examples of fourth generation languages.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
16. Sequentially
A file extension is an optional file identifier that is separated from the main file name by a ______.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
With serial processing - instructions are executed ______________ in the order received.
UNIVAC was the first commercially successful _______ computer.
17. Timeline
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
This data is _____ when the computer is turned off.
18. Modem
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
19. Recalculation
_____________ is the process of recomputing values in a spreadsheet.
_______ are notes included in the program code by the programmer.
A typical computer includes the system and a variety of input - output and ______ devices.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
20. Supervisor
Database ______________ create - maintain - and supervise the day to day operation of databases.
The kernel is also known as the ___________.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
21. Decode
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
_____________ is the process of recomputing values in a spreadsheet.
System software include device ________ - operating systems - and compilers.
22. Server
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
_______ are small text files left on your hard drive by websites you visit.
23. Communications
A _________ is a graphical representation of a series of steps needed to solve a problem.
_____ data can be text - images - numbers - or sounds.
TCP/IP is an example of a network ________________ protocol.
On a hard disk - this waiting area is called a _______.
24. Copied
In Windows - to see a list of active _________ - you must open the task manager.
In a ring network - all packets flow in only one __________; there are no data collisions.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Like hubs - switches have multiple ______.
25. Bits per second
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
UNIVAC was the first commercially successful _______ computer.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
26. CIO
A ________ is a collection of interrelated files in a computer system.
Most Information Systems departments are managed by a ___.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
The particular operating system and _________ model on which a computer system is based is called the platform.
27. VPNs
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
Private networks that are connected to remote sites via the internet are called ____.
A ________ is a unit of measurement equaling 1024 bytes of data.
Database ______________ create - maintain - and supervise the day to day operation of databases.
28. Compression
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
Spreadsheet instructions for ____________ are called formulas.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
29. Debugging
_____ ______ cable transmits pulsating beams of light rather than electricity.
Microsoft Windows is the world's best selling ________ __________.
Alpha testing involves desk checking and _________.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
30. Reliable
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
The 1s and 0s used to represent digital data are known as _______ digits.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
31. LAN
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
A data communications network that connects personal computers within a limited geographical area is called a ___.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
An organization that provides internet access is called an ___.
32. Standalone
Microsoft Windows is the world's best selling ________ __________.
Adware is spyware that tracks surfing and online _________.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
33. Unique
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Lost
A megabyte is a unit of measurement roughly equaling one _______ bytes.
A wiki is one or more ___ documents that can be viewed and changed by users.
A spreadsheet ________ is a built-in formula which performs common calculations.
Cache is ____ when the computer power is turned off.
35. Drivers
The ______ is a marker on the monitor which indicates where the next character will appear.
____ testing involves checking a program by running it with real world data.
The columns are called _______.
System software include device ________ - operating systems - and compilers.
36. Compiler
Microsoft Windows is the world's best selling ________ __________.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
37. Windows
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. Record
A collection of fields make up a _______.
____ and RPG-I are examples of fourth generation languages.
____ testing involves checking a program by running it with real world data.
___________ and security are MS Windows' two major weaknesses.
39. Cannot
When a computer performs several tasks simultaneously - this is called ________ processing.
The information on a ROM chip _____ be altered by the user.
A collection of fields make up a _______.
A wiki is one or more ___ documents that can be viewed and changed by users.
40. Syntax
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
______ data is data that has been converted into discrete digits such as 0s and 1s.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Private _________ that connect internal personnel and selected vendors are called extranets.
41. Off
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
In a _____________ LAN - individual computer users share the services of a centralized computer.
The internet is an example of a WAN (______ ____ Network).
A ________ is a collection of interrelated files in a computer system.
42. Text
Word processing software is used to create - edit - print - format and store ____.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
The section of code that repeats is called a _____ or an iteration.
43. Monitors
Transmission is limited to ______ range.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
Syntax refers to the _______ in which computer programming commands must be entered.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
44. Point of Sale
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
45. Open source
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
___ allows a block of program code to be reused in other programs.
Linux is an ____ _______ operating system that can be modified and freely distributed.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
46. Machine
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
________ and assembly languages are low level languages.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
A bus network has two endpoints and all computers are connected to a single wire or _____.
47. GUI
___ allows a block of program code to be reused in other programs.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
A modem is a device that sends and receives data over __________ lines to and from computers.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
48. 64
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Private _________ that connect internal personnel and selected vendors are called extranets.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
49. 10
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
A ___ is the smallest unit of data that a system can handle.
_____ generation computers used integrated circuits.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
50. Solaris
_______ is a version of UNIX popular for large websites and e-commerce servers.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
_____ ______ cable transmits pulsating beams of light rather than electricity.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.