SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Format
Syntax refers to the _______ in which computer programming commands must be entered.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
2. Filename
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Biometric
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Inference
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Printed
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
6. Decode
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
The columns are called _______.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
7. Timeline
A _________ is a graphical representation of a series of steps needed to solve a problem.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
A ________ is a collection of interrelated files in a computer system.
8. Network
In a _____________ LAN - individual computer users share the services of a centralized computer.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
9. Single
A ___ is the smallest unit of data that a system can handle.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Examples of keywords include READ - ______ - IF - and THEN
10. Electronic
Micropayments are __________ payments for internet transactions as small as 25 cents.
A computer resource is any component required to perform ____.
A ___ is a commonly used component that connects devices on the LAN.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
11. Served
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
12. Cookies
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
___ - ring - and star are the three basic network topologies.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
_______ are small text files left on your hard drive by websites you visit.
13. Defragmentation
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
A _________ is a limited working system - developed to test design concepts.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
14. Flight
Computer resources include the ____ - RAM - storage space - and peripherals.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
The compiled program is saved as object code for later __________.
On the job choices that reflect a person's values are called ____________ ethics.
15. Infrared
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
16. Processors
___ software is used to design products - maps - structures and civil engineering drawings.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
An organization's internal _______ network is called an intranet.
_________ authentication devices verify a person's identity using the person's physical characteristics.
17. Operating system
Groupware is software that allows several people to collaborate on projects over a _______.
The ________ ________ is the computer software that manages the basic operation of the computer.
The information on a ROM chip _____ be altered by the user.
When data is ________ in one cell - data in other cells is automatically recalculated.
18. Cable
A file extension is an optional file identifier that is separated from the main file name by a ______.
A bus network has two endpoints and all computers are connected to a single wire or _____.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
19. Bits
In a relational database - the _______ key holds a unique value for each record.
Second generation computers used ___________ instead of vacuum tubes.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
20. Fourth
Examples of personal finance manager software include ________ and Microsoft Money.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
MAC addresses are set from the factory and cannot be ________ by the network admin.
______ generation computers were microprocessor based.
21. Business
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Each connection _____ on a network is called a node.
Settings automatically used by a program unless changed by the user are called _______ settings.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
22. Multiply
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
An organization's internal _______ network is called an intranet.
A template is a ____________ document often provided with word processing software.
23. Design
___ allows a block of program code to be reused in other programs.
In the same year - they released the ________ computer.
In programming - a _________ is a prewritten module designed for a specific task.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
24. Cleartext
Plaintext is also called __________.
_________ is the process of moving up - down - or sideways through the text or other screen display.
In programming - a variable represents a value that can ______.
The main circuit board of the computer is called the ___________.
25. Central
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
26. Analog
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
______ data can be represented as a wave.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
27. Reliable
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
28. Central
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
An algorithm is a _______ or set of steps for solving a particular problem.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
29. Top
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
In recent years - antivirus software has been one of the most popular categories of _______ software.
TCP/IP is an example of a network ________________ protocol.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
30. Driver
A device ______ is system software used by the computer to control peripheral devices.
UNIX was first developed by _____ Laboratories in 1969.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Graphics software is designed to help users manipulate and ______ graphics.
31. Key
In a relational database - a ___ field is used to sort data.
Micropayments are __________ payments for internet transactions as small as 25 cents.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
First generation computers used _______ _____ to store individual bits of data.
32. Two
Public key encryption uses ___ keys.
Forging an email ______'s name is called spoofing.
Common expansion cards include ________ cards - graphic cards - and memory cards.
HTML is a set of special instructions used to create ____ _____.
33. Memory
This UNIX-based kernel also contributes to stronger _________.
______ data can be represented as a wave.
First generation computers used _______ _____ to store individual bits of data.
While the computer is running - it remains in main ______ and manages nonresident programs.
34. Processes
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
Many employers view IT _____________ with some degree of skepticism.
In Windows - to see a list of active _________ - you must open the task manager.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
35. Certification
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Many employers view IT _____________ with some degree of skepticism.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Data consists of ___ facts and figures that is processed to produce information.
36. Outsourcing
Using components or labor from outside suppliers is called ___________.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
A firewall can be _________ or software-based or a combination of the two.
Like hubs - switches have multiple ______.
37. Algorithm
Messages are encrypted using a cryptographic _________ and a key.
In a relational database - a ___ field is used to sort data.
A computer's ____ size is the number of bits that the processor may process at any one time.
An IP address is a series of numbers used to identify a network ______.
38. Wozniak
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
_________ systems were first used in second generation computers.
39. Ports
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
_______ ________ was the first to define concepts that were to be later used in modern computers.
Like hubs - switches have multiple ______.
With a ______ implementation - parts of the new system are implemented separately.
40. Fil
Computer resources include the ____ - RAM - storage space - and peripherals.
_________ is the process of moving up - down - or sideways through the text or other screen display.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
41. Disaster recovery
LISP is a programming language used primarily for creating __________ _____________ programs.
A database index can be used to _________ data in alphabetical or numerical order.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A data communications network that connects personal computers within a limited geographical area is called a ___.
42. SQL
____ and RPG-I are examples of fourth generation languages.
This can also be called a command-_____ interface.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
43. Quickly
UNIX was first developed by _____ Laboratories in 1969.
When data is ________ in one cell - data in other cells is automatically recalculated.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
44. Modem
The central computer is called a ____.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
With serial processing - instructions are executed ______________ in the order received.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
45. Competitor
____ and RPG-I are examples of fourth generation languages.
A _____ of adjacent cells on a spreadsheet is called a range.
Proprietary information about a company concerns information a __________ might find valuable.
In Windows - to see a list of active _________ - you must open the task manager.
46. Viruses
_____________ is the process of recomputing values in a spreadsheet.
Trojan horses can also carry ________ and destructive instructions.
Like hubs - switches have multiple ______.
_____ ______ cable transmits pulsating beams of light rather than electricity.
47. Radiation
DHCP stands for Dynamic Host _______________ Protocol.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
CIO stands for _______ ____________ Officer.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
48. Data
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
___ software is used to design products - maps - structures and civil engineering drawings.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
49. Commands
____ testing involves checking a program by running it with real world data.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
Microsoft Windows is the world's best selling ________ __________.
ISPs are connected to the internet backbone via a ___.
50. Administrator
IP addresses can be changed by the network _______________.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
The prefix '_____' means a thousand.