SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Communications
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
TCP/IP is an example of a network ________________ protocol.
2. Column
Lettered ______ headings appear across the top frame of the spreadsheet.
Software obtained _________ is said to be pirated.
A _________ logger is a type of spyware that records each character you type.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
3. Wide Area
The internet is an example of a WAN (______ ____ Network).
A megabyte is a unit of measurement roughly equaling one _______ bytes.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
Public key encryption uses ___ keys.
4. Calculations
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Spreadsheet instructions for ____________ are called formulas.
5. 255
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
This act established financial reporting regulations to prevent corporate ______.
Random access storage allows access to any location in any _____.
6. Web browser
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
___ - ring - and star are the three basic network topologies.
The most common user interface for UNIX systems is the ________ ____ interface.
A ________ is a unit of measurement equaling 1024 bytes of data.
7. Bulletin board
Settings automatically used by a program unless changed by the user are called _______ settings.
___ allows a block of program code to be reused in other programs.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
8. Printed
Random access is much faster than ___________ access storage (tape).
A ________ is a unit of measurement equaling 1024 bytes of data.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
9. Hijacker
An algorithm is a _______ or set of steps for solving a particular problem.
A browser ________ is spyware that changes browser settings without your knowledge.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
10. Clip art
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
_____________ is the process of recomputing values in a spreadsheet.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Freeware is software that is copyrighted but is available for ____.
11. Data
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
A _________ is a graphical representation of a series of steps needed to solve a problem.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
12. Electronic
A typical computer includes the system and a variety of input - output and ______ devices.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Products which are announced but are never ________ are called vaporware.
Micropayments are __________ payments for internet transactions as small as 25 cents.
13. Instructions
Web page design software allows users to create sophisticated web pages with ___________ features.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A firewall is designed to protect a computer or network from _________.
Telephone lines have traditionally been _______.
14. Device
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
The kernel is also known as the ___________.
A LAN (______ _____ Network) normally occupies a single building.
An IP address is a series of numbers used to identify a network ______.
15. Text
The location on a spreadsheet where a row and a column intersect is called a ____.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
16. Syntax
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
17. Wozniak
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
HTML is a set of special instructions used to create ____ _____.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
18. Sequential
Secondary storage refers to devices and media that store data _____________.
Random access is much faster than ___________ access storage (tape).
Such information includes information related to company finances - _________ - products and procedures.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
19. Three dimensional
Disposal of _______ is a major environmental problem caused by information technology.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
20. Virtual
VPN stands for ________ Private Network.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
21. Input/Output
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Examples include _____________ identification and retina scanners.
22. Copyrighted
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
Harvard Graphics and MS __________ are examples of presentation graphics software.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
23. Editing
Paint - photo _______ - and drawing software are all examples of graphics software.
They are for ______ use only and are ignored by the compiler when it processes the code.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Random access storage allows access to any location in any _____.
24. Tape drive
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
With serial processing - instructions are executed ______________ in the order received.
25. Radiation
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
MIDI stands for Musicial ___________ Digital Interface.
_______ are small text files left on your hard drive by websites you visit.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
26. Clients
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Analytical graphics are graphical forms that make _______ data easier to analyze.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
Freeware is software that is copyrighted but is available for ____.
27. WAN
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
VPN stands for ________ Private Network.
An ______ _______ is an interactive computer program that helps users solve problems.
A communications network that covers a large geographic area such as a country is called a ___.
28. Network
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
When you install software or hardware - information is ______ in the registry.
_______ errors can be found with a debugger.
29. Routes
In programming - an event is defined as an ______.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
30. Central
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
Personal Information Management software helps users organize and manage daily ________ activities.
System software include device ________ - operating systems - and compilers.
31. SQL
Word processing software is used to create - edit - print - format and store ____.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
____ and RPG-I are examples of fourth generation languages.
32. Location
Site licenses allow software to be used on all computers at a specific ________.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
The first microprocessor was developed in _____.
MIDI stands for Musicial ___________ Digital Interface.
33. Professional
34. Numeric
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Analytical graphics are graphical forms that make _______ data easier to analyze.
Web page design software allows users to create sophisticated web pages with ___________ features.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
35. Switching
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
36. Cookies
A typical computer includes the system and a variety of input - output and ______ devices.
A _____ of adjacent cells on a spreadsheet is called a range.
An IP address is a series of numbers used to identify a network ______.
_______ are small text files left on your hard drive by websites you visit.
37. Click
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Examples of an event include a key press or a mouse ______.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
______ data is data that has been converted into discrete digits such as 0s and 1s.
38. Standalone
DHCP stands for Dynamic Host _______________ Protocol.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
____ is an internet protocol used to make phone calls over the internet.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
39. Transmit
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
40. Illegally
In Windows - to see a list of active _________ - you must open the task manager.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
Software obtained _________ is said to be pirated.
41. Recalculation
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
The section of code that repeats is called a _____ or an iteration.
_____________ is the process of recomputing values in a spreadsheet.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
42. Web pages
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
HTML is a set of special instructions used to create ____ _____.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
43. Building
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
44. Fraud
The cursor is often a blinking rectangle and its location is called the __________ point.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
________ row headings appear down the left frame of the spreadsheet.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
45. Cyberspace
Computer resources include the ____ - RAM - storage space - and peripherals.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
In a relational database - the _______ key holds a unique value for each record.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
46. Free
Freeware is software that is copyrighted but is available for ____.
________ row headings appear down the left frame of the spreadsheet.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
ENIAC was the first ____________ electronic computer in the United States.
47. Desk checking
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Reading through a program to make sure it is logical and free of errors is called _____ ________.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
48. Chief Information
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
CIO stands for _______ ____________ Officer.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
49. Operating system
50. Kilobyte
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
The kernel is also known as the ___________.
A ________ is a unit of measurement equaling 1024 bytes of data.