SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Scrolling
___ allows a block of program code to be reused in other programs.
_________ is the process of moving up - down - or sideways through the text or other screen display.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
______________ are the most expensive and fastest computers available.
2. Difference
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
A kilobyte is generally abbreviated as __.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
3. Syntax
_______ errors can be found with a debugger.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
_________ authentication devices verify a person's identity using the person's physical characteristics.
In the same year - they released the ________ computer.
4. Constant
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
5. Administrator
IP addresses can be changed by the network _______________.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
All the physical equipment in a computer system is called ________.
6. Loop
The section of code that repeats is called a _____ or an iteration.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
7. Direction
The 1s and 0s used to represent digital data are known as _______ digits.
Random access storage allows access to any location in any _____.
Nowadays - cash registers have been replaced by ___ terminals.
In a ring network - all packets flow in only one __________; there are no data collisions.
8. Requests
In Windows - to see a list of active _________ - you must open the task manager.
Freeware is software that is copyrighted but is available for ____.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
9. Fingerprint
A ___ is the smallest unit of data that a system can handle.
A typical computer includes the system and a variety of input - output and ______ devices.
Examples include _____________ identification and retina scanners.
This can also be called a command-_____ interface.
10. Virtual
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
VPN stands for ________ Private Network.
The information on a ROM chip _____ be altered by the user.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
11. Transistors
________ transmission sends data via light waves at a frequency too low for human eyes to see.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
A _________ logger is a type of spyware that records each character you type.
12. Compiler
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
In the same year - they released the ________ computer.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
13. CAD
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Values are the actual numbers or dates entered into ______.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
___ software is used to design products - maps - structures and civil engineering drawings.
14. Low level
A bus network has two endpoints and all computers are connected to a single wire or _____.
A message that has not been _________ is called plaintext.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
A print server manages one or more printers and stores printed ______.
15. Permission
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. Companies
Second generation computers used ___________ instead of vacuum tubes.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
This UNIX-based kernel also contributes to stronger _________.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
17. Kilobyte
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
A ________ is a unit of measurement equaling 1024 bytes of data.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
______ data is data that has been converted into discrete digits such as 0s and 1s.
18. Server
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
In programming - a _________ is a prewritten module designed for a specific task.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
___ - ring - and star are the three basic network topologies.
19. Fourth
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
______ generation computers were microprocessor based.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
20. Implementation
System ______________ involves converting files - software and hardware to the new system.
MAC addresses are set from the factory and cannot be ________ by the network admin.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
21. Protocol
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
Using components or labor from outside suppliers is called ___________.
Productivity software is designed to help people work more ___________.
22. Monitors
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Most computer processing takes place in a component called the ___.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
23. Flash drives
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
System software includes device drivers - utility programs - and the __________ system.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
24. Email
Messages are encrypted using a cryptographic _________ and a key.
The columns are called _______.
The public key encryption software used to encrypt documents such as _____ is called PGP.
In a ring network - all packets flow in only one __________; there are no data collisions.
25. Web
A wiki is one or more ___ documents that can be viewed and changed by users.
Paint - photo _______ - and drawing software are all examples of graphics software.
System software include device ________ - operating systems - and compilers.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
26. DRM
Second generation computers used ___________ instead of vacuum tubes.
Examples of DTP software include MS __________ and PageMaker.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
27. Motherboard
Using components or labor from outside suppliers is called ___________.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
The main circuit board of the computer is called the ___________.
Data consists of ___ facts and figures that is processed to produce information.
28. URL
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
29. Calculations
Such information includes information related to company finances - _________ - products and procedures.
_______ are small text files left on your hard drive by websites you visit.
_______ ________ was the first to define concepts that were to be later used in modern computers.
Spreadsheet instructions for ____________ are called formulas.
30. Binary
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
The 1s and 0s used to represent digital data are known as _______ digits.
Lettered ______ headings appear across the top frame of the spreadsheet.
31. Memory
Examples include _____________ identification and retina scanners.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
32. Sequential
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
Random access is much faster than ___________ access storage (tape).
System ______________ involves converting files - software and hardware to the new system.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
33. Kilo
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Architecture
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
A typical computer includes the system and a variety of input - output and ______ devices.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
35. SQL
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
_____ ______ cable transmits pulsating beams of light rather than electricity.
____ and RPG-I are examples of fourth generation languages.
VPN stands for ________ Private Network.
36. Fraud
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
This act established financial reporting regulations to prevent corporate ______.
_____________ people is one important way to protect software and data.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
37. Outsourcing
In programming - an event is defined as an ______.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Using components or labor from outside suppliers is called ___________.
38. Human
They are for ______ use only and are ignored by the compiler when it processes the code.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
39. One
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Output is the result of ___________.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
The public key encryption software used to encrypt documents such as _____ is called PGP.
40. Lost
This data is _____ when the computer is turned off.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
CSMA/CD is the Ethernet protocol that handles __________.
This act established financial reporting regulations to prevent corporate ______.
41. Operating
System software includes device drivers - utility programs - and the __________ system.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
42. Third
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
_____ generation computers used integrated circuits.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
43. Scheduling
Spreadsheet instructions for ____________ are called formulas.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
When data is ________ in one cell - data in other cells is automatically recalculated.
Meeting ___________ software is an example of groupware.
44. Operating System
Transmission is limited to ______ range.
The section of code that repeats is called a _____ or an iteration.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Linux is an ____ _______ operating system that can be modified and freely distributed.
45. Images
_________ systems were first used in second generation computers.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
ISPs are connected to the internet backbone via a ___.
A print server manages one or more printers and stores printed ______.
46. Reliable
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
________ and assembly languages are low level languages.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
47. Spelling
_______ are computer depictions of humans often found in computer games and training software.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
________ row headings appear down the left frame of the spreadsheet.
48. Formula
An algorithm is a _______ or set of steps for solving a particular problem.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
49. Commands
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
The compiled program is saved as object code for later __________.
_______ is a version of UNIX popular for large websites and e-commerce servers.
The toolbar displays menus and icons of commonly used ________ and options.
50. Sender's
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183