SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bits
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Examples include _____________ identification and retina scanners.
The more _____ in a word - the faster the computer.
ISPs are connected to the internet backbone via a ___.
2. Sequential
Random access is much faster than ___________ access storage (tape).
The 1s and 0s used to represent digital data are known as _______ digits.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
In MS PowerPoint - the outline view helps you ________ the content of your material.
3. Private
4. Checkbooks
_______ storage is temporary and holds data waiting to be processed.
Computer processing is the ____________ of data which transforms data into information.
Improper positioning of your keyboard and mouse can cause ___.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
5. Settings
Open source software projects promote user modification - peer review - _____ distribution - and copying.
In programming - an event is defined as an ______.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
6. Fragmentation
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
____ is an internet protocol used to make phone calls over the internet.
7. NAP
ISPs are connected to the internet backbone via a ___.
Public key encryption uses ___ keys.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
8. Backup
First generation computers used _______ _____ to store individual bits of data.
The first microprocessor was developed in _____.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
9. Order
Random access storage allows access to any location in any _____.
Nowadays - cash registers have been replaced by ___ terminals.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
10. Billion
_____ ______ cable transmits pulsating beams of light rather than electricity.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
11. Hardware
When a computer performs several tasks simultaneously - this is called ________ processing.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
A firewall can be _________ or software-based or a combination of the two.
Such information includes information related to company finances - _________ - products and procedures.
12. Resources
Second generation computers used ___________ instead of vacuum tubes.
Servers can store files or provide services (i.e. printing) to ________ on the network.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
13. Project management
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
14. Backup
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Data and programs waiting to be processed wait in ______ in temporary storage.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
15. Millisecond
One ___________ is one thousandth of a second.
A LAN (______ _____ Network) normally occupies a single building.
Graphics software is designed to help users manipulate and ______ graphics.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
16. WAN
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Freeware is software that is copyrighted but is available for ____.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
A communications network that covers a large geographic area such as a country is called a ___.
17. Administrator
IP addresses can be changed by the network _______________.
_______ is the operating system installed on more than 80% of the world's personal computers.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
Examples include _____________ identification and retina scanners.
18. Algorithm
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Adware is spyware that tracks surfing and online _________.
Lettered ______ headings appear across the top frame of the spreadsheet.
Messages are encrypted using a cryptographic _________ and a key.
19. Compiler
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
_________ is the process of moving up - down - or sideways through the text or other screen display.
_______ are computer depictions of humans often found in computer games and training software.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
20. Period
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
A file extension is an optional file identifier that is separated from the main file name by a ______.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
A ________ is a unit of measurement equaling 1024 bytes of data.
21. Time
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
An organization's internal _______ network is called an intranet.
_______ is the operating system installed on more than 80% of the world's personal computers.
22. Processing
Cache speeds up _________.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
A ______ is a small unit of data transmitted over a network.
_____ generation computers used integrated circuits.
23. Business
First generation computers used _______ _____ to store individual bits of data.
A unit of measure equaling one ______ digit is a bit.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
Personal Information Management software helps users organize and manage daily ________ activities.
24. Inference
25. Musical
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Transmission is limited to ______ range.
When you install software or hardware - information is ______ in the registry.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
26. Record
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
A megabyte is often abbreviated as ___.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
27. Benchmarks
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
The prefix '_____' means a thousand.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Early computers stored ____ for calculations and programs on punched cards.
28. Whistleblowers
NAP stands for ________________ Point.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
29. Mimic
Current versions of Windows support ____ ______ up to 255 characters long.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Virtual memory uses the hard disk to _____ primary storage (RAM).
_______ is a version of UNIX popular for large websites and e-commerce servers.
30. Trojan horse
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Linux is an ____ _______ operating system that can be modified and freely distributed.
__________ is the study of safe and efficient work environments.
___________ and security are MS Windows' two major weaknesses.
31. Fraud
The more _____ in a word - the faster the computer.
Search agents and _____ search tools allow you to automate your search process across many sites.
The public key encryption software used to encrypt documents such as _____ is called PGP.
This act established financial reporting regulations to prevent corporate ______.
32. Solved
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
33. Repeat
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
The most common user interface for UNIX systems is the ________ ____ interface.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
34. Hub
VPN stands for ________ Private Network.
A ___ is a commonly used component that connects devices on the LAN.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
Examples of an event include a key press or a mouse ______.
35. Transistors
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Examples of an event include a key press or a mouse ______.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
UNIVAC was the first commercially successful _______ computer.
36. Slows down
37. Bulletin board
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
A computer's ____ size is the number of bits that the processor may process at any one time.
An organization's internal _______ network is called an intranet.
38. Steps
Spreadsheet instructions for ____________ are called formulas.
____ is an internet protocol used to make phone calls over the internet.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
39. RSI
Most Information Systems departments are managed by a ___.
Improper positioning of your keyboard and mouse can cause ___.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Software designed to solve a specific problem is called ___________ software.
40. PDA
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
41. Former
When you install software or hardware - information is ______ in the registry.
Virtual memory uses the hard disk to _____ primary storage (RAM).
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
42. Numeric
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Analytical graphics are graphical forms that make _______ data easier to analyze.
43. Tape drive
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
Public key encryption uses ___ keys.
__________ appear as colored or underlined words on a webpag
________ row headings appear down the left frame of the spreadsheet.
44. Sort
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
45. Sequentially
Examples include _____________ identification and retina scanners.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
With serial processing - instructions are executed ______________ in the order received.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
46. Cursor
In MS PowerPoint - the outline view helps you ________ the content of your material.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
The ______ is a marker on the monitor which indicates where the next character will appear.
47. KB
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
______ times for PC storage devices are measured in milliseconds.
A kilobyte is generally abbreviated as __.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
48. Cycle
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
In a _____________ LAN - individual computer users share the services of a centralized computer.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
49. Clients
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Servers can store files or provide services (i.e. printing) to ________ on the network.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
Examples of personal finance manager software include ________ and Microsoft Money.
50. Processes
In Windows - to see a list of active _________ - you must open the task manager.
Groupware is software that allows several people to collaborate on projects over a _______.
The first microprocessor was developed in _____.
A megabyte is often abbreviated as ___.