SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collisions
CSMA/CD is the Ethernet protocol that handles __________.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
Examples of DTP software include MS __________ and PageMaker.
2. Filename
3. Standalone
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
A collection of fields make up a _______.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
4. Fragmentation
The toolbar displays menus and icons of commonly used ________ and options.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
Companies do this to keep _______ low.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
5. Web browser
_____ ______ cable transmits pulsating beams of light rather than electricity.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
6. Backup
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
7. WRITE
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
CSMA/CD is the Ethernet protocol that handles __________.
Examples of keywords include READ - ______ - IF - and THEN
The more _____ in a word - the faster the computer.
8. Business
Graphics software is designed to help users manipulate and ______ graphics.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
CIO stands for _______ ____________ Officer.
9. Windows
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
TCP/IP is an example of a network ________________ protocol.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
10. Keystroke
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
A _________ logger is a type of spyware that records each character you type.
A __________ file uses a uniform format to store data for each person or thing in the file.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
11. Mimic
The toolbar displays menus and icons of commonly used ________ and options.
Data consists of ___ facts and figures that is processed to produce information.
Virtual memory uses the hard disk to _____ primary storage (RAM).
When a computer performs several tasks simultaneously - this is called ________ processing.
12. Order
A ___ is a commonly used component that connects devices on the LAN.
_______ ________ was the first to define concepts that were to be later used in modern computers.
Random access storage allows access to any location in any _____.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
13. Former
The monitor - speakers - and printer are examples of computer ______ devices.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
Examples of an event include a key press or a mouse ______.
Personal Information Management software helps users organize and manage daily ________ activities.
14. Decrypt
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
15. Queues
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
Cache speeds up _________.
Data and programs waiting to be processed wait in ______ in temporary storage.
16. Credit card
A _________ logger is a type of spyware that records each character you type.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
_______ storage is temporary and holds data waiting to be processed.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
17. Publisher
System software includes device drivers - utility programs - and the __________ system.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Examples of DTP software include MS __________ and PageMaker.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
18. Key
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Software designed to solve a specific problem is called ___________ software.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
19. Cars
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
20. Off
Lettered ______ headings appear across the top frame of the spreadsheet.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
ISPs are connected to the internet backbone via a ___.
An IP address is a series of numbers used to identify a network ______.
21. Configuration
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
A firewall is designed to protect a computer or network from _________.
A ___ is a commonly used component that connects devices on the LAN.
DHCP stands for Dynamic Host _______________ Protocol.
22. Application
TCP/IP is an example of a network ________________ protocol.
Cache speeds up _________.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Software designed to solve a specific problem is called ___________ software.
23. Transistors
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
24. Produced
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
In programming - a _________ is a prewritten module designed for a specific task.
On a hard disk - this waiting area is called a _______.
Products which are announced but are never ________ are called vaporware.
25. Driver
A device ______ is system software used by the computer to control peripheral devices.
Examples of personal finance manager software include ________ and Microsoft Money.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
26. HTTP
_______ are computer depictions of humans often found in computer games and training software.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
CSMA/CD is the Ethernet protocol that handles __________.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
27. Backup
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
When data is ________ in one cell - data in other cells is automatically recalculated.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
28. Repeat
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
29. Processes
_______ are notes included in the program code by the programmer.
A communications network that covers a large geographic area such as a country is called a ___.
In Windows - to see a list of active _________ - you must open the task manager.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
30. TCP/IP
A megabyte is often abbreviated as ___.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Public domain software is not ___________ and can be copied without fear of prosecution.
Zipped files are _________ as part of the installation process.
31. Switching
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
The location on a spreadsheet where a row and a column intersect is called a ____.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
32. Programmable
________ are used to transmit data between LANs of different network topologies or network operating systems.
ENIAC was the first ____________ electronic computer in the United States.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
CIO stands for _______ ____________ Officer.
33. Employees
34. Operating
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
System software includes device drivers - utility programs - and the __________ system.
A ____ network has no endpoints and all computers are connected in a continuous loop.
_____________ is the process of recomputing values in a spreadsheet.
35. Flight
A _________ is a limited working system - developed to test design concepts.
A browser ________ is spyware that changes browser settings without your knowledge.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
_____ generation computers used integrated circuits.
36. Value
While the computer is running - it remains in main ______ and manages nonresident programs.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
A spreadsheet _____ is any number used in a calculation.
37. Compiler
With a relational database - users _____ records to locate and display them.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Nowadays - cash registers have been replaced by ___ terminals.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
38. Disk drive
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
________ row headings appear down the left frame of the spreadsheet.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
39. Formats
Productivity software is designed to help people work more ___________.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A ___ is the smallest unit of data that a system can handle.
40. Hash
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
41. CPU
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
The ________ ________ is the computer software that manages the basic operation of the computer.
Computer resources include the ____ - RAM - storage space - and peripherals.
42. KB
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
Using components or labor from outside suppliers is called ___________.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A kilobyte is generally abbreviated as __.
43. Resetting
MAC addresses are set from the factory and cannot be ________ by the network admin.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
44. Modem
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
CIO stands for _______ ____________ Officer.
The process of converting cyphertext to plaintext is ___________
45. Service Provider
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
Examples of DTP software include MS __________ and PageMaker.
An ______ _______ is an interactive computer program that helps users solve problems.
46. Flash drives
Early computers stored ____ for calculations and programs on punched cards.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Public domain software is not ___________ and can be copied without fear of prosecution.
47. High level
Logic bombs are _______ that are set to go off at a certain time.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
In a ring network - all packets flow in only one __________; there are no data collisions.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
48. Preformatted
A template is a ____________ document often provided with word processing software.
This can also be called a command-_____ interface.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Software designed to solve a specific problem is called ___________ software.
49. Kilo
50. Processor
________ are used to transmit data between LANs of different network topologies or network operating systems.
The particular operating system and _________ model on which a computer system is based is called the platform.
Computer processing is the ____________ of data which transforms data into information.
The ________ ________ is the computer software that manages the basic operation of the computer.