SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Desk checking
Reading through a program to make sure it is logical and free of errors is called _____ ________.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
______ data can be represented as a wave.
Data and programs waiting to be processed wait in ______ in temporary storage.
2. PIM
____ is an internet protocol used to make phone calls over the internet.
Virtual memory uses the hard disk to _____ primary storage (RAM).
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
A unit of measure equaling 8 bits is a ____.
3. Memory
While the computer is running - it remains in main ______ and manages nonresident programs.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
A device ______ is system software used by the computer to control peripheral devices.
4. Type
Forging an email ______'s name is called spoofing.
A _____ of adjacent cells on a spreadsheet is called a range.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
5. Instructions
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Linux is an ____ _______ operating system that can be modified and freely distributed.
6. Repeat
A single hard drive could be partitioned and labeled with multiple drive ________.
Harvard Graphics and MS __________ are examples of presentation graphics software.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
The main circuit board of the computer is called the ___________.
7. Digital
UNIVAC was the first commercially successful _______ computer.
Freeware is software that is copyrighted but is available for ____.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A typical computer includes the system and a variety of input - output and ______ devices.
8. Intruders
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
A firewall is designed to protect a computer or network from _________.
__________ appear as colored or underlined words on a webpag
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
9. Cable
A bus network has two endpoints and all computers are connected to a single wire or _____.
Logic bombs are _______ that are set to go off at a certain time.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
10. Business
CIO stands for _______ ____________ Officer.
Like hubs - switches have multiple ______.
Personal Information Management software helps users organize and manage daily ________ activities.
A unit of measure equaling 8 bits is a ____.
11. Operating
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Computer processing is the ____________ of data which transforms data into information.
_________ systems were first used in second generation computers.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
12. Reliable
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
13. Restore
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
DHCP is a protocol designed to automatically distribute IP _________.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
14. Circuit boards
15. Text
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
16. GUI
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
17. Bit
One ___________ is one thousandth of a second.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
A ___ is the smallest unit of data that a system can handle.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
18. Programmable
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
A computer's ____ size is the number of bits that the processor may process at any one time.
ENIAC was the first ____________ electronic computer in the United States.
A modem is a device that sends and receives data over __________ lines to and from computers.
19. Cleartext
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Plaintext is also called __________.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
20. Windows
NAP stands for ________________ Point.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
21. Email
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
The public key encryption software used to encrypt documents such as _____ is called PGP.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
22. CPU
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Most computer processing takes place in a component called the ___.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Virtual memory uses the hard disk to _____ primary storage (RAM).
23. Query
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
With a relational database - users _____ records to locate and display them.
Search agents and _____ search tools allow you to automate your search process across many sites.
An organization that provides internet access is called an ___.
24. Human
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
They are for ______ use only and are ignored by the compiler when it processes the code.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
25. Vacuum tubes
First generation computers used _______ _____ to store individual bits of data.
A ___ is the smallest unit of data that a system can handle.
Public key encryption uses ___ keys.
Programmers use assembly languages to write ______ software.
26. Sequential
Messages are encrypted using a cryptographic _________ and a key.
System software include device ________ - operating systems - and compilers.
Transmission is limited to ______ range.
Random access is much faster than ___________ access storage (tape).
27. Publisher
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Examples of DTP software include MS __________ and PageMaker.
__________ is the study of safe and efficient work environments.
System software include device ________ - operating systems - and compilers.
28. Addresses
DHCP is a protocol designed to automatically distribute IP _________.
Groupware is software that allows several people to collaborate on projects over a _______.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
___________ and security are MS Windows' two major weaknesses.
29. Internet
The columns are called _______.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
30. Bits
The compiled program is saved as object code for later __________.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Trojan horses can also carry ________ and destructive instructions.
31. Network
Groupware is software that allows several people to collaborate on projects over a _______.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
___________ and security are MS Windows' two major weaknesses.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
32. Requests
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
Logic bombs are _______ that are set to go off at a certain time.
When a computer performs several tasks simultaneously - this is called ________ processing.
33. Ring
In recent years - antivirus software has been one of the most popular categories of _______ software.
A ____ network has no endpoints and all computers are connected in a continuous loop.
This data is _____ when the computer is turned off.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
34. 10
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Data consists of ___ facts and figures that is processed to produce information.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
35. Security
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
This UNIX-based kernel also contributes to stronger _________.
__________ appear as colored or underlined words on a webpag
36. Central
Like hubs - switches have multiple ______.
Cache is ____ when the computer power is turned off.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
VoIP stands for ______ over Internet Protocol.
37. Importing
A device ______ is system software used by the computer to control peripheral devices.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
A bus network has two endpoints and all computers are connected to a single wire or _____.
38. Preformatted
A template is a ____________ document often provided with word processing software.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
39. Processing
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
Output is the result of ___________.
40. Artificial intelligence
LISP is a programming language used primarily for creating __________ _____________ programs.
___________ programming rules are called syntax.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
41. Raw
Data consists of ___ facts and figures that is processed to produce information.
Examples of DTP software include MS __________ and PageMaker.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Improper positioning of your keyboard and mouse can cause ___.
42. Insertion
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
ENIAC was the first ____________ electronic computer in the United States.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
The cursor is often a blinking rectangle and its location is called the __________ point.
43. Reliability
44. Disk drive
The ______ is a marker on the monitor which indicates where the next character will appear.
____ and RPG-I are examples of fourth generation languages.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
45. 1971
_______ are computer depictions of humans often found in computer games and training software.
The first microprocessor was developed in _____.
The prefix '_____' means a thousand.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
46. Windows
_________ systems were first used in second generation computers.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
MAC addresses are set from the factory and cannot be ________ by the network admin.
47. Divide
48. Wozniak
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Productivity software is designed to help people work more ___________.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
49. Hub
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
_______ are small text files left on your hard drive by websites you visit.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
The central computer is called a ____.
50. Bell
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
UNIX was first developed by _____ Laboratories in 1969.