SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Domain name
2. Voice
Linux is an ____ _______ operating system that can be modified and freely distributed.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
VoIP stands for ______ over Internet Protocol.
A communications network that covers a large geographic area such as a country is called a ___.
3. Overclocking
A computer's ____ size is the number of bits that the processor may process at any one time.
Personal computers are also called ______________.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
4. PowerPoint
_______ is the operating system installed on more than 80% of the world's personal computers.
In programming - an event is defined as an ______.
Harvard Graphics and MS __________ are examples of presentation graphics software.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
5. Million
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
Zipped files are _________ as part of the installation process.
6. Publisher
Examples of an event include a key press or a mouse ______.
Examples of DTP software include MS __________ and PageMaker.
A ___ is a commonly used component that connects devices on the LAN.
Such information includes information related to company finances - _________ - products and procedures.
7. Hypertext
Micropayments are __________ payments for internet transactions as small as 25 cents.
A single hard drive could be partitioned and labeled with multiple drive ________.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
8. Central
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
9. Network Access
System ______________ involves converting files - software and hardware to the new system.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
NAP stands for ________________ Point.
In programming - a variable represents a value that can ______.
10. Addresses
A _____ of adjacent cells on a spreadsheet is called a range.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
DHCP is a protocol designed to automatically distribute IP _________.
__________ is the study of safe and efficient work environments.
11. File names
In a relational database - information is organized in rows and columns. Rows are called _______.
Meeting ___________ software is an example of groupware.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Current versions of Windows support ____ ______ up to 255 characters long.
12. Unique
13. Formula
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
An algorithm is a _______ or set of steps for solving a particular problem.
A spreadsheet _____ is any number used in a calculation.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
14. Function
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Private networks that are connected to remote sites via the internet are called ____.
The cursor is often a blinking rectangle and its location is called the __________ point.
A spreadsheet ________ is a built-in formula which performs common calculations.
15. Systems analysts
A _____ of adjacent cells on a spreadsheet is called a range.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
________ ________ plan and implement new or improved computer services.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
16. Supervisor
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
The kernel is also known as the ___________.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
17. Decode
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
Databases use structured files to _________ data.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
18. Cursor
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
An organization's internal _______ network is called an intranet.
The ______ is a marker on the monitor which indicates where the next character will appear.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
19. Copyrighted
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
A data communications network that connects personal computers within a limited geographical area is called a ___.
Public domain software is not ___________ and can be copied without fear of prosecution.
20. Network
On a hard disk - this waiting area is called a _______.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
21. Spreadsheet
Proprietary information about a company concerns information a __________ might find valuable.
Site licenses allow software to be used on all computers at a specific ________.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
22. Reliable
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
23. Raw
Virtual memory uses the hard disk to _____ primary storage (RAM).
Data consists of ___ facts and figures that is processed to produce information.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
A device ______ is system software used by the computer to control peripheral devices.
24. Files
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
25. Services
26. Operating system
27. Transistors
DHCP is a protocol designed to automatically distribute IP _________.
When a computer performs several tasks simultaneously - this is called ________ processing.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
An organization's internal _______ network is called an intranet.
28. Outsourcing
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
On a hard disk - this waiting area is called a _______.
When data is ________ in one cell - data in other cells is automatically recalculated.
Using components or labor from outside suppliers is called ___________.
29. Charles Babbage
In programming - an event is defined as an ______.
The first microprocessor was developed in _____.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
_______ ________ was the first to define concepts that were to be later used in modern computers.
30. Reliable
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
In MS PowerPoint - the outline view helps you ________ the content of your material.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
31. Overheat
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Most Information Systems departments are managed by a ___.
This can also be called a command-_____ interface.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
32. Keyboard
Most computer processing takes place in a component called the ___.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
33. Encrypted
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A message that has not been _________ is called plaintext.
34. Column
Column headings are used to select an entire _______ with a mouse click.
A _________ is a graphical representation of a series of steps needed to solve a problem.
Groupware is software that allows several people to collaborate on projects over a _______.
System software includes device drivers - utility programs - and the __________ system.
35. Monitors
______ times for PC storage devices are measured in milliseconds.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A _____ of adjacent cells on a spreadsheet is called a range.
When a computer performs several tasks simultaneously - this is called ________ processing.
36. Protocol
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Computer resources include the ____ - RAM - storage space - and peripherals.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
37. Unzipped
Zipped files are _________ as part of the installation process.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Personal computers are also called ______________.
38. Hijacker
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
This can also be called a command-_____ interface.
A browser ________ is spyware that changes browser settings without your knowledge.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
39. Transmit
Reading through a program to make sure it is logical and free of errors is called _____ ________.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Zipped files are _________ as part of the installation process.
40. Configuration
The prefix '_____' means a thousand.
While the computer is running - it remains in main ______ and manages nonresident programs.
DHCP stands for Dynamic Host _______________ Protocol.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
41. Research
Plaintext is also called __________.
Such information includes information related to company finances - _________ - products and procedures.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
42. Standalone
Groupware is software that allows several people to collaborate on projects over a _______.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
This act established financial reporting regulations to prevent corporate ______.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
43. VoIP
Output is the result of ___________.
____ is an internet protocol used to make phone calls over the internet.
ENIAC was the first ____________ electronic computer in the United States.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
44. Debugging
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Alpha testing involves desk checking and _________.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
A ___ is a commonly used component that connects devices on the LAN.
45. Operating system
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
_______ are notes included in the program code by the programmer.
46. Billion
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
A wiki is one or more ___ documents that can be viewed and changed by users.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
47. Slows down
48. Credit card
___ software is used to design products - maps - structures and civil engineering drawings.
________ row headings appear down the left frame of the spreadsheet.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
49. Cable
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
A bus network has two endpoints and all computers are connected to a single wire or _____.
Second generation computers used ___________ instead of vacuum tubes.
50. Before
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Zipped files are _________ as part of the installation process.