SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Domain name
2. Hard
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
ISPs are connected to the internet backbone via a ___.
In a relational database - the _______ key holds a unique value for each record.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
3. Windows
Lettered ______ headings appear across the top frame of the spreadsheet.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
4. Whistleblowers
Output is the result of ___________.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A browser ________ is spyware that changes browser settings without your knowledge.
5. Protocol
Cache speeds up _________.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
6. Compression
With a ______ implementation - parts of the new system are implemented separately.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Trojan horses can also carry ________ and destructive instructions.
7. Point of Sale
The process of converting cyphertext to plaintext is ___________
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Early computers stored ____ for calculations and programs on punched cards.
8. Operating system
The ________ ________ is the computer software that manages the basic operation of the computer.
LISP is a programming language used primarily for creating __________ _____________ programs.
The 1s and 0s used to represent digital data are known as _______ digits.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
9. Hardware
All the physical equipment in a computer system is called ________.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
10. Modern
With a relational database - users _____ records to locate and display them.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
A typical computer includes the system and a variety of input - output and ______ devices.
11. Forum
A device ______ is system software used by the computer to control peripheral devices.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
Most Information Systems departments are managed by a ___.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
12. Unique
13. Peripheral
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
UNIX was first developed by _____ Laboratories in 1969.
One ___________ is one thousandth of a second.
Linux is an ____ _______ operating system that can be modified and freely distributed.
14. Lost
________ transmission sends data via light waves at a frequency too low for human eyes to see.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
This data is _____ when the computer is turned off.
15. System
In recent years - antivirus software has been one of the most popular categories of _______ software.
Programmers use assembly languages to write ______ software.
_____ generation computers used integrated circuits.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
16. Partition
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
___ software is used to design products - maps - structures and civil engineering drawings.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
17. Debugging
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Alpha testing involves desk checking and _________.
A unit of measure equaling one ______ digit is a bit.
18. Network interface
All the physical equipment in a computer system is called ________.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
19. Companies
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
In programming - a _________ is a prewritten module designed for a specific task.
All the physical equipment in a computer system is called ________.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
20. One
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Database ______________ create - maintain - and supervise the day to day operation of databases.
21. Credit card
A database index can be used to _________ data in alphabetical or numerical order.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
22. Machine
The instruction cycle is also often referred to as the ________ cycle.
_________ is the process of moving up - down - or sideways through the text or other screen display.
A keystroke logger can be used to steal __________.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
23. Apple I
Each connection _____ on a network is called a node.
In the same year - they released the ________ computer.
The toolbar displays menus and icons of commonly used ________ and options.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
24. WRITE
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
Examples of keywords include READ - ______ - IF - and THEN
A ______ is a small unit of data transmitted over a network.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
25. Temporary
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
_________ authentication devices verify a person's identity using the person's physical characteristics.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
26. Fourth
A ______ is a small unit of data transmitted over a network.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
With a relational database - users _____ records to locate and display them.
______ generation languages are typically used for database applications.
27. Quickly
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A device ______ is system software used by the computer to control peripheral devices.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
28. Settings
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Microsoft Windows is the world's best selling ________ __________.
The section of code that repeats is called a _____ or an iteration.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
29. Three dimensional
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Messages are encrypted using a cryptographic _________ and a key.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
An organization that provides internet access is called an ___.
30. Operating system
Reading through a program to make sure it is logical and free of errors is called _____ ________.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
A file extension is an optional file identifier that is separated from the main file name by a ______.
VoIP stands for ______ over Internet Protocol.
31. Clients
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Logic bombs are _______ that are set to go off at a certain time.
In a relational database - the _______ key holds a unique value for each record.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
32. Supervisor
This UNIX-based kernel also contributes to stronger _________.
All the physical equipment in a computer system is called ________.
The kernel is also known as the ___________.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
33. Free
A communications network that covers a large geographic area such as a country is called a ___.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
Groupware is software that allows several people to collaborate on projects over a _______.
Freeware is software that is copyrighted but is available for ____.
34. Javascript
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
The columns are called _______.
35. Network
Trojan horses can also carry ________ and destructive instructions.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
36. Ergonomics
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
__________ is the study of safe and efficient work environments.
In a relational database - the _______ key holds a unique value for each record.
37. Organize
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
A unit of measure equaling one ______ digit is a bit.
A database index can be used to _________ data in alphabetical or numerical order.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
38. Phishers
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Servers can store files or provide services (i.e. printing) to ________ on the network.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
39. Trojan horse
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
The first microprocessor was developed in _____.
This is where the term __________ (a group edited encyclopedia) comes from.
The central computer is called a ____.
40. Mega
41. Billion
A ___ is a commonly used component that connects devices on the LAN.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
42. Efficiently
Productivity software is designed to help people work more ___________.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
43. GUI
Productivity software is designed to help people work more ___________.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
HTML is a set of special instructions used to create ____ _____.
A collection of fields make up a _______.
44. Solved
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Transferring data from a ______ computer to a local computer is called downloading.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
45. Permanently
Such information includes information related to company finances - _________ - products and procedures.
Secondary storage refers to devices and media that store data _____________.
Forging an email ______'s name is called spoofing.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
46. Switch
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
Computer resources include the ____ - RAM - storage space - and peripherals.
A _________ is a graphical representation of a series of steps needed to solve a problem.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
47. Default
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
Settings automatically used by a program unless changed by the user are called _______ settings.
48. LAN
____ is an internet protocol used to make phone calls over the internet.
In a relational database - the _______ key holds a unique value for each record.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
A data communications network that connects personal computers within a limited geographical area is called a ___.
49. Copied
TCP/IP is an example of a network ________________ protocol.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Transferring data from a ______ computer to a local computer is called downloading.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
50. Short
A modem is a device that sends and receives data over __________ lines to and from computers.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Transmission is limited to ______ range.
_______ are notes included in the program code by the programmer.