SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Dashboard
System software include device ________ - operating systems - and compilers.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
2. Restore
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
On the job choices that reflect a person's values are called ____________ ethics.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
3. Word wrap
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
A bus network has two endpoints and all computers are connected to a single wire or _____.
_____ data can be text - images - numbers - or sounds.
4. Sort
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
The instruction cycle is also often referred to as the ________ cycle.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
5. Hard
First generation computers used _______ _____ to store individual bits of data.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
A single hard drive could be partitioned and labeled with multiple drive ________.
Transferring data from a ______ computer to a local computer is called downloading.
6. Javascript
Private _________ that connect internal personnel and selected vendors are called extranets.
Micropayments are __________ payments for internet transactions as small as 25 cents.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
7. Publisher
In Windows - to see a list of active _________ - you must open the task manager.
Examples of DTP software include MS __________ and PageMaker.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
8. Employment
The ________ ________ is the computer software that manages the basic operation of the computer.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
_____ data can be text - images - numbers - or sounds.
9. Calculations
A firewall can be _________ or software-based or a combination of the two.
Using components or labor from outside suppliers is called ___________.
Examples of keywords include READ - ______ - IF - and THEN
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
10. Parallel
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
Logic bombs are _______ that are set to go off at a certain time.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
When a computer performs several tasks simultaneously - this is called ________ processing.
11. Served
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
Logic bombs are _______ that are set to go off at a certain time.
_________ is the process of moving up - down - or sideways through the text or other screen display.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
12. Action
In programming - an event is defined as an ______.
____ is an internet protocol used to make phone calls over the internet.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
_______ is the operating system installed on more than 80% of the world's personal computers.
13. Query
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
The process of converting cyphertext to plaintext is ___________
With a relational database - users _____ records to locate and display them.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
14. Switching
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
System ______________ involves converting files - software and hardware to the new system.
In recent years - antivirus software has been one of the most popular categories of _______ software.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
15. Change
In a star network - all computers are connected to a _______ computer.
In programming - a variable represents a value that can ______.
Disposal of _______ is a major environmental problem caused by information technology.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
16. Purchases
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
Adware is spyware that tracks surfing and online _________.
TCP/IP is an example of a network ________________ protocol.
Personal Information Management software helps users organize and manage daily ________ activities.
17. Output
A bus network has two endpoints and all computers are connected to a single wire or _____.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
Telephone lines have traditionally been _______.
The monitor - speakers - and printer are examples of computer ______ devices.
18. Implementation
System ______________ involves converting files - software and hardware to the new system.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
__________ uses mathematical formulas to create coded messages.
19. Former
A ____ network has no endpoints and all computers are connected in a continuous loop.
A bus network has two endpoints and all computers are connected to a single wire or _____.
CIO stands for _______ ____________ Officer.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
20. Repetitive
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Like hubs - switches have multiple ______.
Microsoft Windows is the world's best selling ________ __________.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
21. Images
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
A print server manages one or more printers and stores printed ______.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
In recent years - antivirus software has been one of the most popular categories of _______ software.
22. Packet
A ______ is a small unit of data transmitted over a network.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
In a _____________ LAN - individual computer users share the services of a centralized computer.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
23. Network
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Groupware is software that allows several people to collaborate on projects over a _______.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
24. PowerPoint
Settings automatically used by a program unless changed by the user are called _______ settings.
Harvard Graphics and MS __________ are examples of presentation graphics software.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Micropayments are __________ payments for internet transactions as small as 25 cents.
25. Email
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
26. Period
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A file extension is an optional file identifier that is separated from the main file name by a ______.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
A template is a ____________ document often provided with word processing software.
27. Artificial intelligence
LISP is a programming language used primarily for creating __________ _____________ programs.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
In the same year - they released the ________ computer.
28. Protocol
TCP/IP is an example of a network ________________ protocol.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
__________ uses mathematical formulas to create coded messages.
29. Slide show
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
30. Fraud
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
In a ring network - all packets flow in only one __________; there are no data collisions.
MIDI stands for Musicial ___________ Digital Interface.
31. Security
A firewall can be _________ or software-based or a combination of the two.
The cursor is often a blinking rectangle and its location is called the __________ point.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
32. Manipulation
Computer processing is the ____________ of data which transforms data into information.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
A firewall is designed to protect a computer or network from _________.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
33. Transistors
_______ are computer depictions of humans often found in computer games and training software.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
34. Word processor
A _________ is a limited working system - developed to test design concepts.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
A keystroke logger can be used to steal __________.
Private networks that are connected to remote sites via the internet are called ____.
35. Networking
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
One ___________ is one thousandth of a second.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
36. Peripheral
_______ are computer depictions of humans often found in computer games and training software.
With a relational database - users _____ records to locate and display them.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Second generation computers used ___________ instead of vacuum tubes.
37. Finland
Many employers view IT _____________ with some degree of skepticism.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
38. Instruction
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
39. Bulletin board
Using components or labor from outside suppliers is called ___________.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Programmers use assembly languages to write ______ software.
40. Formats
Database ______________ create - maintain - and supervise the day to day operation of databases.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
A bus network has two endpoints and all computers are connected to a single wire or _____.
41. Inference
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Algorithm
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
When you install software or hardware - information is ______ in the registry.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Messages are encrypted using a cryptographic _________ and a key.
43. Apple I
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
In the same year - they released the ________ computer.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
44. Certification
A single hard drive could be partitioned and labeled with multiple drive ________.
Cache speeds up _________.
Alpha testing involves desk checking and _________.
Many employers view IT _____________ with some degree of skepticism.
45. Securely
Private networks that are connected to remote sites via the internet are called ____.
__________ is the study of safe and efficient work environments.
When a computer performs several tasks simultaneously - this is called ________ processing.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
46. Filename
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Email
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
The public key encryption software used to encrypt documents such as _____ is called PGP.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
48. Denial of service
System software helps the computer manage internal and external _________ and enables the computer to run applications.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
The first microprocessor was developed in _____.
49. Cyphertext
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
A message which has been encrypted is called __________.
A browser ________ is spyware that changes browser settings without your knowledge.
Data and programs waiting to be processed wait in ______ in temporary storage.
50. Multiply
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Settings automatically used by a program unless changed by the user are called _______ settings.
Public domain software is not ___________ and can be copied without fear of prosecution.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.