SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Loop
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
The section of code that repeats is called a _____ or an iteration.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
_____ ______ cable transmits pulsating beams of light rather than electricity.
2. Windows
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Outsourcing
The 1s and 0s used to represent digital data are known as _______ digits.
MIDI stands for Musicial ___________ Digital Interface.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Using components or labor from outside suppliers is called ___________.
4. Bits per second
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
A firewall is designed to protect a computer or network from _________.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Zipped files are _________ as part of the installation process.
5. Solaris
_______ is a version of UNIX popular for large websites and e-commerce servers.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
On the job choices that reflect a person's values are called ____________ ethics.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
6. Protocol
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
The hub prevents packet collisions - but if the hub goes down the _____ stops.
____ is an internet protocol used to make phone calls over the internet.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
7. Hardware
A ________ is a collection of interrelated files in a computer system.
A firewall can be _________ or software-based or a combination of the two.
While the computer is running - it remains in main ______ and manages nonresident programs.
In a relational database - the _______ key holds a unique value for each record.
8. Application
This data is _____ when the computer is turned off.
Software designed to solve a specific problem is called ___________ software.
______ data can be represented as a wave.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
9. Execution
The compiled program is saved as object code for later __________.
IP addresses can be changed by the network _______________.
_________ authentication devices verify a person's identity using the person's physical characteristics.
HTML is a set of special instructions used to create ____ _____.
10. Intel
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A ________ is a collection of interrelated files in a computer system.
11. Million
Such information includes information related to company finances - _________ - products and procedures.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Forging an email ______'s name is called spoofing.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
12. Short
A browser ________ is spyware that changes browser settings without your knowledge.
Transmission is limited to ______ range.
ISPs are connected to the internet backbone via a ___.
The columns are called _______.
13. Packet
A ______ is a small unit of data transmitted over a network.
______ generation languages are typically used for database applications.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
14. Phased
With a ______ implementation - parts of the new system are implemented separately.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
This data is _____ when the computer is turned off.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
15. GUI
Examples of personal finance manager software include ________ and Microsoft Money.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
16. Analog
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
The particular operating system and _________ model on which a computer system is based is called the platform.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Telephone lines have traditionally been _______.
17. Kilo
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. Word wrap
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
ENIAC was the first ____________ electronic computer in the United States.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
19. PowerPoint
A print server manages one or more printers and stores printed ______.
A LAN (______ _____ Network) normally occupies a single building.
Harvard Graphics and MS __________ are examples of presentation graphics software.
NAP stands for ________________ Point.
20. Changed
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Programmers use assembly languages to write ______ software.
MAC addresses are set from the factory and cannot be ________ by the network admin.
21. Infrared
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
This act established financial reporting regulations to prevent corporate ______.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
A keystroke logger can be used to steal __________.
22. Stress
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
__________ uses mathematical formulas to create coded messages.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
______ generation computers were microprocessor based.
23. Switch
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
24. Local Area
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
The toolbar displays menus and icons of commonly used ________ and options.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
A LAN (______ _____ Network) normally occupies a single building.
25. Primary
Web page design software allows users to create sophisticated web pages with ___________ features.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
In a relational database - the _______ key holds a unique value for each record.
26. Digital
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
______ data is data that has been converted into discrete digits such as 0s and 1s.
27. Calculations
Examples of keywords include READ - ______ - IF - and THEN
Spreadsheet instructions for ____________ are called formulas.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
28. Hardware
____ is an internet protocol used to make phone calls over the internet.
All the physical equipment in a computer system is called ________.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
_________ systems were first used in second generation computers.
29. Byte
Proprietary information about a company concerns information a __________ might find valuable.
A unit of measure equaling 8 bits is a ____.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Messages are encrypted using a cryptographic _________ and a key.
30. Operating system
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
31. Biometric
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Clients
Private networks that are connected to remote sites via the internet are called ____.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Servers can store files or provide services (i.e. printing) to ________ on the network.
A ___ is the smallest unit of data that a system can handle.
33. OOP
Groupware is software that allows several people to collaborate on projects over a _______.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
___ allows a block of program code to be reused in other programs.
_______ ________ was the first to define concepts that were to be later used in modern computers.
34. Encryption
__________ uses mathematical formulas to create coded messages.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
Using components or labor from outside suppliers is called ___________.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
35. Apple I
In the same year - they released the ________ computer.
A modem is a device that sends and receives data over __________ lines to and from computers.
The most common user interface for UNIX systems is the ________ ____ interface.
A print server manages one or more printers and stores printed ______.
36. Third
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
______ times for PC storage devices are measured in milliseconds.
A device ______ is system software used by the computer to control peripheral devices.
_____ generation computers used integrated circuits.
37. Structured
Graphics software is designed to help users manipulate and ______ graphics.
Cache is ____ when the computer power is turned off.
A __________ file uses a uniform format to store data for each person or thing in the file.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
38. Macro
A _____ of adjacent cells on a spreadsheet is called a range.
______ generation languages are typically used for database applications.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
39. Time
___ - ring - and star are the three basic network topologies.
Examples include _____________ identification and retina scanners.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
40. Peripheral
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
_____________ people is one important way to protect software and data.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
41. Glass
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
The section of code that repeats is called a _____ or an iteration.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
42. Serial
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Data consists of ___ facts and figures that is processed to produce information.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
43. Domain name
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. Employees
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Business
______ times for PC storage devices are measured in milliseconds.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
46. Defragmentation
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
ISPs are connected to the internet backbone via a ___.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
47. Utility
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
Web page design software allows users to create sophisticated web pages with ___________ features.
In recent years - antivirus software has been one of the most popular categories of _______ software.
48. Formula
An algorithm is a _______ or set of steps for solving a particular problem.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Graphics software is designed to help users manipulate and ______ graphics.
49. Processing
Cache speeds up _________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
50. Cycle
A LAN (______ _____ Network) normally occupies a single building.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Transferring data from a ______ computer to a local computer is called downloading.