SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Insertion
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A single hard drive could be partitioned and labeled with multiple drive ________.
The cursor is often a blinking rectangle and its location is called the __________ point.
2. Group
_______ ________ was the first to define concepts that were to be later used in modern computers.
A _____ of adjacent cells on a spreadsheet is called a range.
When a computer performs several tasks simultaneously - this is called ________ processing.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
3. Processor
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
The particular operating system and _________ model on which a computer system is based is called the platform.
Products which are announced but are never ________ are called vaporware.
4. Input
____ is an internet protocol used to make phone calls over the internet.
Data consists of ___ facts and figures that is processed to produce information.
_____ data can be text - images - numbers - or sounds.
While the computer is running - it remains in main ______ and manages nonresident programs.
5. Decrypt
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
6. Web browser
Values are the actual numbers or dates entered into ______.
A bus network has two endpoints and all computers are connected to a single wire or _____.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
7. KB
The particular operating system and _________ model on which a computer system is based is called the platform.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
A kilobyte is generally abbreviated as __.
8. Lost
This data is _____ when the computer is turned off.
Lettered ______ headings appear across the top frame of the spreadsheet.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
They are for ______ use only and are ignored by the compiler when it processes the code.
9. Processing
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Output is the result of ___________.
A message that has not been _________ is called plaintext.
Software obtained _________ is said to be pirated.
10. Buffer
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
On a hard disk - this waiting area is called a _______.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
UNIVAC was the first commercially successful _______ computer.
11. Bits per second
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Proprietary information about a company concerns information a __________ might find valuable.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Most computer processing takes place in a component called the ___.
12. Images
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
A print server manages one or more printers and stores printed ______.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
___ - ring - and star are the three basic network topologies.
13. Processing
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Cache speeds up _________.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
14. Slide show
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
A firewall can be _________ or software-based or a combination of the two.
A message that has not been _________ is called plaintext.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
15. Administrator
IP addresses can be changed by the network _______________.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Personal Information Management software helps users organize and manage daily ________ activities.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
16. Windows
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
The main circuit board of the computer is called the ___________.
The central computer is called a ____.
17. Byte
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
This data is _____ when the computer is turned off.
___ allows a block of program code to be reused in other programs.
A unit of measure equaling 8 bits is a ____.
18. Artificial intelligence
LISP is a programming language used primarily for creating __________ _____________ programs.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
This data is _____ when the computer is turned off.
19. Cannot
The information on a ROM chip _____ be altered by the user.
Databases use structured files to _________ data.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A ___ is a commonly used component that connects devices on the LAN.
20. OOP
A modem is a device that sends and receives data over __________ lines to and from computers.
____ and RPG-I are examples of fourth generation languages.
A spreadsheet _____ is any number used in a calculation.
___ allows a block of program code to be reused in other programs.
21. Spelling
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Random access is much faster than ___________ access storage (tape).
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
Search agents and _____ search tools allow you to automate your search process across many sites.
22. File names
A _________ logger is a type of spyware that records each character you type.
A modem is a device that sends and receives data over __________ lines to and from computers.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
Current versions of Windows support ____ ______ up to 255 characters long.
23. Finland
A _________ logger is a type of spyware that records each character you type.
Column headings are used to select an entire _______ with a mouse click.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
24. PDA
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Analytical graphics are graphical forms that make _______ data easier to analyze.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
25. Bits
Disposal of _______ is a major environmental problem caused by information technology.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
The more _____ in a word - the faster the computer.
Values are the actual numbers or dates entered into ______.
26. URL
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Examples of an event include a key press or a mouse ______.
Programmers use assembly languages to write ______ software.
27. Point
IP addresses can be changed by the network _______________.
Each connection _____ on a network is called a node.
DHCP stands for Dynamic Host _______________ Protocol.
_______ errors can be found with a debugger.
28. Wide Area
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
On a hard disk - this waiting area is called a _______.
The internet is an example of a WAN (______ ____ Network).
29. Fourth
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
______ generation languages are typically used for database applications.
30. Cyberspace
_______ ________ was the first to define concepts that were to be later used in modern computers.
_______ are computer depictions of humans often found in computer games and training software.
MIDI stands for Musicial ___________ Digital Interface.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
31. Partition
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Private _________ that connect internal personnel and selected vendors are called extranets.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
32. Bits
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
The prefix '____' means a million.
33. Flowchart
_____ generation computers used integrated circuits.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
A _________ is a graphical representation of a series of steps needed to solve a problem.
Cache is ____ when the computer power is turned off.
34. Unique
35. Shortcut
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Such information includes information related to company finances - _________ - products and procedures.
_______ is a version of UNIX popular for large websites and e-commerce servers.
36. Network
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
37. Record
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
A data communications network that connects personal computers within a limited geographical area is called a ___.
________ are used to transmit data between LANs of different network topologies or network operating systems.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
38. One
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Random access storage allows access to any location in any _____.
39. Professional
40. Printed
A data communications network that connects personal computers within a limited geographical area is called a ___.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
41. Primary
In a relational database - the _______ key holds a unique value for each record.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A _________ is a graphical representation of a series of steps needed to solve a problem.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
42. CIO
Most Information Systems departments are managed by a ___.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
Search agents and _____ search tools allow you to automate your search process across many sites.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
43. Certification
Linux is an ____ _______ operating system that can be modified and freely distributed.
Many employers view IT _____________ with some degree of skepticism.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
______ generation computers were microprocessor based.
44. Circuit boards
45. Services
46. Hard disk
A wiki is one or more ___ documents that can be viewed and changed by users.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
___ - ring - and star are the three basic network topologies.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
47. Hash
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
A megabyte is often abbreviated as ___.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
48. Outsourcing
Using components or labor from outside suppliers is called ___________.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A _________ is a limited working system - developed to test design concepts.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
49. Manipulation
The information on a ROM chip _____ be altered by the user.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Computer processing is the ____________ of data which transforms data into information.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
50. Hijacker
A browser ________ is spyware that changes browser settings without your knowledge.
Products which are announced but are never ________ are called vaporware.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
In MS PowerPoint - the outline view helps you ________ the content of your material.