SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Text
The monitor - speakers - and printer are examples of computer ______ devices.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Each connection _____ on a network is called a node.
2. Javascript
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Most computer processing takes place in a component called the ___.
______ data is data that has been converted into discrete digits such as 0s and 1s.
3. Millisecond
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
One ___________ is one thousandth of a second.
The internet is an example of a WAN (______ ____ Network).
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
4. Encrypted
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
A message that has not been _________ is called plaintext.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Forging an email ______'s name is called spoofing.
5. Chief Information
A _________ logger is a type of spyware that records each character you type.
CIO stands for _______ ____________ Officer.
Lettered ______ headings appear across the top frame of the spreadsheet.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
6. Memory
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
7. Miniatures
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
This data is _____ when the computer is turned off.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
8. Business
Personal Information Management software helps users organize and manage daily ________ activities.
_________ authentication devices verify a person's identity using the person's physical characteristics.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
9. Circuit boards
10. Fields
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
System software includes device drivers - utility programs - and the __________ system.
A database index can be used to _________ data in alphabetical or numerical order.
The columns are called _______.
11. Macro
A _________ is a graphical representation of a series of steps needed to solve a problem.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
A communications network that covers a large geographic area such as a country is called a ___.
12. Research
_______ are notes included in the program code by the programmer.
A computer resource is any component required to perform ____.
A database index can be used to _________ data in alphabetical or numerical order.
Such information includes information related to company finances - _________ - products and procedures.
13. Debugger
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
In the same year - they released the ________ computer.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
14. Design
Microsoft Windows is the world's best selling ________ __________.
Examples include _____________ identification and retina scanners.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
A wiki is one or more ___ documents that can be viewed and changed by users.
15. Routes
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A message which has been encrypted is called __________.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
16. Multimedia
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Web page design software allows users to create sophisticated web pages with ___________ features.
HTML is a set of special instructions used to create ____ _____.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
17. Protocol
Productivity software is designed to help people work more ___________.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
18. Domain name
19. Analog
Telephone lines have traditionally been _______.
Freeware is software that is copyrighted but is available for ____.
On the job choices that reflect a person's values are called ____________ ethics.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
20. Publisher
The first microprocessor was developed in _____.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
Examples of DTP software include MS __________ and PageMaker.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
21. Email
In Windows - to see a list of active _________ - you must open the task manager.
In a star network - all computers are connected to a _______ computer.
The public key encryption software used to encrypt documents such as _____ is called PGP.
Logic bombs are _______ that are set to go off at a certain time.
22. Click
Site licenses allow software to be used on all computers at a specific ________.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Examples of an event include a key press or a mouse ______.
23. Squiggly
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
A _________ logger is a type of spyware that records each character you type.
24. Cyberterrorists
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
25. Java
______________ are the most expensive and fastest computers available.
An IP address is a series of numbers used to identify a network ______.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
Examples of OOP languages include C++ and _____.
26. Intranets
In programming - a _________ is a prewritten module designed for a specific task.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Improper positioning of your keyboard and mouse can cause ___.
Private _________ that connect internal personnel and selected vendors are called extranets.
27. Timeline
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
ISPs are connected to the internet backbone via a ___.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
28. Word
29. Reliable
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
The more _____ in a word - the faster the computer.
Search agents and _____ search tools allow you to automate your search process across many sites.
Examples of keywords include READ - ______ - IF - and THEN
30. Viruses
Examples of DTP software include MS __________ and PageMaker.
A unit of measure equaling 8 bits is a ____.
In programming - an event is defined as an ______.
Trojan horses can also carry ________ and destructive instructions.
31. Windows
32. Records
In a relational database - information is organized in rows and columns. Rows are called _______.
With a ______ implementation - parts of the new system are implemented separately.
___ - ring - and star are the three basic network topologies.
Examples of keywords include READ - ______ - IF - and THEN
33. Sender's
34. Packet
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
A ______ is a small unit of data transmitted over a network.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
35. PowerPoint
A message that has not been _________ is called plaintext.
Harvard Graphics and MS __________ are examples of presentation graphics software.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Graphics software is designed to help users manipulate and ______ graphics.
36. Widget
System software includes device drivers - utility programs - and the __________ system.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Most computer processing takes place in a component called the ___.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
37. Fil
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
______ generation computers were microprocessor based.
Computer processing is the ____________ of data which transforms data into information.
A collection of fields make up a _______.
38. Central
Meeting ___________ software is an example of groupware.
In a star network - all computers are connected to a _______ computer.
Column headings are used to select an entire _______ with a mouse click.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
39. Copyrighted
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
___ - ring - and star are the three basic network topologies.
40. Free
Freeware is software that is copyrighted but is available for ____.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
41. Icons
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
Plaintext is also called __________.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
42. Avatars
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
_______ are computer depictions of humans often found in computer games and training software.
_____________ people is one important way to protect software and data.
All the physical equipment in a computer system is called ________.
43. Copyrighted
Public domain software is not ___________ and can be copied without fear of prosecution.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
Examples of keywords include READ - ______ - IF - and THEN
44. Operating system
The ________ ________ is the computer software that manages the basic operation of the computer.
An ______ _______ is an interactive computer program that helps users solve problems.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Site licenses allow software to be used on all computers at a specific ________.
45. Operating system
46. Outcome
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
47. RSI
MAC addresses are set from the factory and cannot be ________ by the network admin.
Trojan horses can also carry ________ and destructive instructions.
Improper positioning of your keyboard and mouse can cause ___.
A megabyte is often abbreviated as ___.
48. Fourth
The internet is an example of a WAN (______ ____ Network).
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
______ generation languages are typically used for database applications.
49. E-waste
Disposal of _______ is a major environmental problem caused by information technology.
In a ring network - all packets flow in only one __________; there are no data collisions.
With a ______ implementation - parts of the new system are implemented separately.
Random access storage allows access to any location in any _____.
50. System
Search agents and _____ search tools allow you to automate your search process across many sites.
A bus network has two endpoints and all computers are connected to a single wire or _____.
The more _____ in a word - the faster the computer.
Programmers use assembly languages to write ______ software.