SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cannot
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Common expansion cards include ________ cards - graphic cards - and memory cards.
The information on a ROM chip _____ be altered by the user.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
2. Benchmarks
Meeting ___________ software is an example of groupware.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
3. Formula
Cache is ____ when the computer power is turned off.
_____ data can be text - images - numbers - or sounds.
An algorithm is a _______ or set of steps for solving a particular problem.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
4. Certification
Settings automatically used by a program unless changed by the user are called _______ settings.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
Many employers view IT _____________ with some degree of skepticism.
Virtual memory uses the hard disk to _____ primary storage (RAM).
5. Memory
ISPs are connected to the internet backbone via a ___.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Search agents and _____ search tools allow you to automate your search process across many sites.
While the computer is running - it remains in main ______ and manages nonresident programs.
6. Requests
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Random access storage allows access to any location in any _____.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
7. Hyperlinks
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
__________ appear as colored or underlined words on a webpag
When data is ________ in one cell - data in other cells is automatically recalculated.
8. PIM
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
The central computer is called a ____.
In a relational database - information is organized in rows and columns. Rows are called _______.
Data and programs waiting to be processed wait in ______ in temporary storage.
9. Debugging
Alpha testing involves desk checking and _________.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
This act established financial reporting regulations to prevent corporate ______.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
10. Lost
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
This data is _____ when the computer is turned off.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
A ______ is a small unit of data transmitted over a network.
11. CAD
___ software is used to design products - maps - structures and civil engineering drawings.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A keystroke logger can be used to steal __________.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
12. Web page
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
A bus network has two endpoints and all computers are connected to a single wire or _____.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
13. Access
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
This is where the term __________ (a group edited encyclopedia) comes from.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
________ row headings appear down the left frame of the spreadsheet.
14. Hijacker
_________ is the process of moving up - down - or sideways through the text or other screen display.
Second generation computers used ___________ instead of vacuum tubes.
A _________ logger is a type of spyware that records each character you type.
A browser ________ is spyware that changes browser settings without your knowledge.
15. Kilo
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. Background
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Improper positioning of your keyboard and mouse can cause ___.
A computer resource is any component required to perform ____.
17. Operating
A unit of measure equaling 8 bits is a ____.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
_________ systems were first used in second generation computers.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
18. Hub
One ___________ is one thousandth of a second.
A ___ is a commonly used component that connects devices on the LAN.
An IP address is a series of numbers used to identify a network ______.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
19. Commands
___ allows a block of program code to be reused in other programs.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
The toolbar displays menus and icons of commonly used ________ and options.
In a _____________ LAN - individual computer users share the services of a centralized computer.
20. Processors
System software helps the computer manage internal and external _________ and enables the computer to run applications.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
21. Employees
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. PDA
________ row headings appear down the left frame of the spreadsheet.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
The toolbar displays menus and icons of commonly used ________ and options.
23. Three dimensional
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
Trojan horses can also carry ________ and destructive instructions.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
24. Utility
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
___ - ring - and star are the three basic network topologies.
In recent years - antivirus software has been one of the most popular categories of _______ software.
The cursor is often a blinking rectangle and its location is called the __________ point.
25. File names
The columns are called _______.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Current versions of Windows support ____ ______ up to 255 characters long.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
26. Central
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
27. Input
_____ data can be text - images - numbers - or sounds.
In a _____________ LAN - individual computer users share the services of a centralized computer.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
28. Motherboard
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
The main circuit board of the computer is called the ___________.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
A file extension is an optional file identifier that is separated from the main file name by a ______.
29. Copyrighted
Public domain software is not ___________ and can be copied without fear of prosecution.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
A file extension is an optional file identifier that is separated from the main file name by a ______.
30. Intranets
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
A browser ________ is spyware that changes browser settings without your knowledge.
A unit of measure equaling 8 bits is a ____.
Private _________ that connect internal personnel and selected vendors are called extranets.
31. Radiation
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
32. POS
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Many employers view IT _____________ with some degree of skepticism.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Nowadays - cash registers have been replaced by ___ terminals.
33. Source
The hub prevents packet collisions - but if the hub goes down the _____ stops.
Personal Information Management software helps users organize and manage daily ________ activities.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
34. Network
Computer resources include the ____ - RAM - storage space - and peripherals.
________ row headings appear down the left frame of the spreadsheet.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
35. Syntax
A device ______ is system software used by the computer to control peripheral devices.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
_______ errors can be found with a debugger.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
36. Supervisor
Disposal of _______ is a major environmental problem caused by information technology.
The kernel is also known as the ___________.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
CSMA/CD is the Ethernet protocol that handles __________.
37. Cookies
_______ are small text files left on your hard drive by websites you visit.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
In recent years - antivirus software has been one of the most popular categories of _______ software.
38. Files
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Databases use structured files to _________ data.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Random access storage devices are able to go _____ to the requested data
39. Word wrap
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
Examples of OOP languages include C++ and _____.
40. Binary
In the same year - they released the ________ computer.
The 1s and 0s used to represent digital data are known as _______ digits.
A ____ network has no endpoints and all computers are connected in a continuous loop.
Personal computers are also called ______________.
41. Guide
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
42. Importing
A LAN (______ _____ Network) normally occupies a single building.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
_____ data can be text - images - numbers - or sounds.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
43. Viruses
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
Trojan horses can also carry ________ and destructive instructions.
______ data is data that has been converted into discrete digits such as 0s and 1s.
44. Calculations
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
ISPs are connected to the internet backbone via a ___.
45. 64
In programming - an event is defined as an ______.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
A ________ is a unit of measurement equaling 1024 bytes of data.
46. Tables
_______ ________ was the first to define concepts that were to be later used in modern computers.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
_______ storage is temporary and holds data waiting to be processed.
Settings automatically used by a program unless changed by the user are called _______ settings.
47. Backup
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
A firewall can be _________ or software-based or a combination of the two.
IP addresses can be changed by the network _______________.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
48. Processing
Data and programs waiting to be processed wait in ______ in temporary storage.
In the same year - they released the ________ computer.
Output is the result of ___________.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
49. 255
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
_____ generation computers used integrated circuits.
50. Processes
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
_____ generation computers used integrated circuits.
Using components or labor from outside suppliers is called ___________.