SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Structured
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
A __________ file uses a uniform format to store data for each person or thing in the file.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
_____ ______ cable transmits pulsating beams of light rather than electricity.
2. Hardware
On a hard disk - this waiting area is called a _______.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
All the physical equipment in a computer system is called ________.
3. Machine
________ and assembly languages are low level languages.
Paint - photo _______ - and drawing software are all examples of graphics software.
The first microprocessor was developed in _____.
A message that has not been _________ is called plaintext.
4. Punctuation
HTML is a set of special instructions used to create ____ _____.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
___________ programming rules are called syntax.
5. Hypertext
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
System software includes device drivers - utility programs - and the __________ system.
Groupware is software that allows several people to collaborate on projects over a _______.
A message which has been encrypted is called __________.
6. Ports
A spreadsheet ________ is a built-in formula which performs common calculations.
Like hubs - switches have multiple ______.
A kilobyte is generally abbreviated as __.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
7. Primary
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
HTML is a set of special instructions used to create ____ _____.
A kilobyte is generally abbreviated as __.
In a relational database - the _______ key holds a unique value for each record.
8. Packet
The public key encryption software used to encrypt documents such as _____ is called PGP.
Transferring data from a ______ computer to a local computer is called downloading.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
A ______ is a small unit of data transmitted over a network.
9. Former
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
Virtual memory uses the hard disk to _____ primary storage (RAM).
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
Settings automatically used by a program unless changed by the user are called _______ settings.
10. OOP
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
A firewall is designed to protect a computer or network from _________.
___ allows a block of program code to be reused in other programs.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
11. Phased
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
The internet is an example of a WAN (______ ____ Network).
When you install software or hardware - information is ______ in the registry.
With a ______ implementation - parts of the new system are implemented separately.
12. Input
_____ data can be text - images - numbers - or sounds.
This is where the term __________ (a group edited encyclopedia) comes from.
A ___ is a commonly used component that connects devices on the LAN.
Syntax refers to the _______ in which computer programming commands must be entered.
13. Microcomputers
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
One ___________ is one thousandth of a second.
Personal computers are also called ______________.
Second generation computers used ___________ instead of vacuum tubes.
14. Backup
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
______ times for PC storage devices are measured in milliseconds.
_______ errors can be found with a debugger.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
15. Artificial intelligence
A bus network has two endpoints and all computers are connected to a single wire or _____.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
LISP is a programming language used primarily for creating __________ _____________ programs.
___________ programming rules are called syntax.
16. Remarks
_______ ________ was the first to define concepts that were to be later used in modern computers.
UNIX was first developed by _____ Laboratories in 1969.
System ______________ involves converting files - software and hardware to the new system.
_______ are notes included in the program code by the programmer.
17. Disk drive
Paint - photo _______ - and drawing software are all examples of graphics software.
Logic bombs are _______ that are set to go off at a certain time.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
18. Changed
In the same year - they released the ________ computer.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
When data is ________ in one cell - data in other cells is automatically recalculated.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
19. Connection
Word processing software is used to create - edit - print - format and store ____.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
20. Organize
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
In MS PowerPoint - the outline view helps you ________ the content of your material.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
21. Tables
__________ uses mathematical formulas to create coded messages.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
22. 64
A __________ file uses a uniform format to store data for each person or thing in the file.
MIDI stands for Musicial ___________ Digital Interface.
When a computer performs several tasks simultaneously - this is called ________ processing.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
23. Processing
Graphics software is designed to help users manipulate and ______ graphics.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Output is the result of ___________.
When a computer performs several tasks simultaneously - this is called ________ processing.
24. HTTP
A computer's ____ size is the number of bits that the processor may process at any one time.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
Companies do this to keep _______ low.
25. Decode
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
DHCP is a protocol designed to automatically distribute IP _________.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
Productivity software is designed to help people work more ___________.
26. CAD
A template is a ____________ document often provided with word processing software.
_______ is a version of UNIX popular for large websites and e-commerce servers.
___ software is used to design products - maps - structures and civil engineering drawings.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
27. Network Access
NAP stands for ________________ Point.
____ testing involves checking a program by running it with real world data.
A _________ logger is a type of spyware that records each character you type.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
28. Cyberspace
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
Second generation computers used ___________ instead of vacuum tubes.
Using components or labor from outside suppliers is called ___________.
29. Resetting
Analytical graphics are graphical forms that make _______ data easier to analyze.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
30. Multimedia
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Values are the actual numbers or dates entered into ______.
Web page design software allows users to create sophisticated web pages with ___________ features.
A megabyte is often abbreviated as ___.
31. Primary
_______ storage is temporary and holds data waiting to be processed.
Software designed to solve a specific problem is called ___________ software.
In programming - a variable represents a value that can ______.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
32. Shortcut
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
NAP stands for ________________ Point.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
33. Repeat
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
One ___________ is one thousandth of a second.
Secondary storage refers to devices and media that store data _____________.
34. Monitors
________ ________ plan and implement new or improved computer services.
An organization's internal _______ network is called an intranet.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
35. Multiply
___________ programming rules are called syntax.
Output is the result of ___________.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Proprietary information about a company concerns information a __________ might find valuable.
36. POS
_____ data can be text - images - numbers - or sounds.
______ data can be represented as a wave.
Nowadays - cash registers have been replaced by ___ terminals.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
37. Third
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
The cursor is often a blinking rectangle and its location is called the __________ point.
_____ generation computers used integrated circuits.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
38. Processing
_____ generation computers used integrated circuits.
Cache speeds up _________.
A __________ file uses a uniform format to store data for each person or thing in the file.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
39. Proprietary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
In programming - a _________ is a prewritten module designed for a specific task.
40. Modern
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
A collection of fields make up a _______.
Telephone lines have traditionally been _______.
41. Word wrap
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
They are for ______ use only and are ignored by the compiler when it processes the code.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
42. Kilobyte
_______ are computer depictions of humans often found in computer games and training software.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
A ________ is a unit of measurement equaling 1024 bytes of data.
43. Disk scanner
The more _____ in a word - the faster the computer.
______ data can be represented as a wave.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
Examples of an event include a key press or a mouse ______.
44. PDA
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
45. Permission
46. Access
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A _________ is a limited working system - developed to test design concepts.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
______ times for PC storage devices are measured in milliseconds.
47. Fraud
Messages are encrypted using a cryptographic _________ and a key.
The public key encryption software used to encrypt documents such as _____ is called PGP.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
_______ are computer depictions of humans often found in computer games and training software.
48. Binary
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
A unit of measure equaling one ______ digit is a bit.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
49. Pretty Good
This act established financial reporting regulations to prevent corporate ______.
Graphics software is designed to help users manipulate and ______ graphics.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
______________ are the most expensive and fastest computers available.
50. Windows
A computer's ____ size is the number of bits that the processor may process at any one time.
Random access is much faster than ___________ access storage (tape).
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.