SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Constant
Logic bombs are _______ that are set to go off at a certain time.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Data and programs waiting to be processed wait in ______ in temporary storage.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
2. Spreadsheet
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
The instruction cycle is also often referred to as the ________ cycle.
Settings automatically used by a program unless changed by the user are called _______ settings.
3. Overheat
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
In a ring network - all packets flow in only one __________; there are no data collisions.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
4. Math
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
A message that has not been _________ is called plaintext.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
5. Memory
A firewall is designed to protect a computer or network from _________.
While the computer is running - it remains in main ______ and manages nonresident programs.
The prefix '____' means a million.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
6. Buffer
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A unit of measure equaling 8 bits is a ____.
On a hard disk - this waiting area is called a _______.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
7. Fil
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
Virtual memory uses the hard disk to _____ primary storage (RAM).
_______ errors can be found with a debugger.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
8. Structured
A __________ file uses a uniform format to store data for each person or thing in the file.
__________ uses mathematical formulas to create coded messages.
This is where the term __________ (a group edited encyclopedia) comes from.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
9. URL
A ________ is a unit of measurement equaling 1024 bytes of data.
Examples of personal finance manager software include ________ and Microsoft Money.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Logic bombs are _______ that are set to go off at a certain time.
10. Primary
_______ storage is temporary and holds data waiting to be processed.
A megabyte is often abbreviated as ___.
Like hubs - switches have multiple ______.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
11. Click
Web page design software allows users to create sophisticated web pages with ___________ features.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
Examples of an event include a key press or a mouse ______.
______ data can be represented as a wave.
12. Sequential
Random access is much faster than ___________ access storage (tape).
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
With a relational database - users _____ records to locate and display them.
13. Peripheral
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
14. Organize
A database index can be used to _________ data in alphabetical or numerical order.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Improper positioning of your keyboard and mouse can cause ___.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
15. Publisher
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
Examples of DTP software include MS __________ and PageMaker.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
16. Filename
17. Beta
Common expansion cards include ________ cards - graphic cards - and memory cards.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Most Information Systems departments are managed by a ___.
____ testing involves checking a program by running it with real world data.
18. Research
Such information includes information related to company finances - _________ - products and procedures.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
A ___ is the smallest unit of data that a system can handle.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
19. Building
A _________ logger is a type of spyware that records each character you type.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
20. MB
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A megabyte is often abbreviated as ___.
In Windows - to see a list of active _________ - you must open the task manager.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
21. Spelling
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
22. Key
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
The central computer is called a ____.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
In a relational database - a ___ field is used to sort data.
23. Calculations
Spreadsheet instructions for ____________ are called formulas.
_______ are notes included in the program code by the programmer.
Examples of DTP software include MS __________ and PageMaker.
A ________ is a unit of measurement equaling 1024 bytes of data.
24. Radiation
Private _________ that connect internal personnel and selected vendors are called extranets.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
_____ generation computers used integrated circuits.
25. Data
Many employers view IT _____________ with some degree of skepticism.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
Early computers stored ____ for calculations and programs on punched cards.
A typical computer includes the system and a variety of input - output and ______ devices.
26. Settings
CIO stands for _______ ____________ Officer.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
Examples include _____________ identification and retina scanners.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
27. Switching
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
28. Ergonomics
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Output is the result of ___________.
__________ is the study of safe and efficient work environments.
Many employers view IT _____________ with some degree of skepticism.
29. DRM
_______ is the operating system installed on more than 80% of the world's personal computers.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
All the physical equipment in a computer system is called ________.
30. Kilobyte
A ________ is a unit of measurement equaling 1024 bytes of data.
________ and assembly languages are low level languages.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Computer resources include the ____ - RAM - storage space - and peripherals.
31. Partition
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
32. Outsourcing
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Databases use structured files to _________ data.
_____ data can be text - images - numbers - or sounds.
Using components or labor from outside suppliers is called ___________.
33. Restore
In programming - an event is defined as an ______.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
34. Disaster recovery
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
The 1s and 0s used to represent digital data are known as _______ digits.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A message that has not been _________ is called plaintext.
35. RSI
First generation computers used _______ _____ to store individual bits of data.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
Improper positioning of your keyboard and mouse can cause ___.
In recent years - antivirus software has been one of the most popular categories of _______ software.
36. Tape drive
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
The first microprocessor was developed in _____.
____ testing involves checking a program by running it with real world data.
37. Instruction
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
A ______ is a small unit of data transmitted over a network.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
38. Web page
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
A ______ is a small unit of data transmitted over a network.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
Freeware is software that is copyrighted but is available for ____.
39. Encrypted
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
A message that has not been _________ is called plaintext.
A firewall is designed to protect a computer or network from _________.
40. Miniatures
Computer resources include the ____ - RAM - storage space - and peripherals.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
A ________ is a collection of interrelated files in a computer system.
41. Billion
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
Computer processing is the ____________ of data which transforms data into information.
The columns are called _______.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
42. Cookies
_______ are small text files left on your hard drive by websites you visit.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
MIDI stands for Musicial ___________ Digital Interface.
Telephone lines have traditionally been _______.
43. Voice
VoIP stands for ______ over Internet Protocol.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
44. Storage
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
A typical computer includes the system and a variety of input - output and ______ devices.
When data is ________ in one cell - data in other cells is automatically recalculated.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
45. Spammers
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
46. Temporary
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
A _________ is a graphical representation of a series of steps needed to solve a problem.
Examples of DTP software include MS __________ and PageMaker.
A message which has been encrypted is called __________.
47. Reliability
48. Keyboard
_____ data can be text - images - numbers - or sounds.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
49. Flight
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
________ transmission sends data via light waves at a frequency too low for human eyes to see.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
50. Text
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.