SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Partition
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
2. Prototype
A _________ is a limited working system - developed to test design concepts.
VoIP stands for ______ over Internet Protocol.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
_______ errors can be found with a debugger.
3. Widget
System software includes device drivers - utility programs - and the __________ system.
Plaintext is also called __________.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
4. Component
DHCP is a protocol designed to automatically distribute IP _________.
In programming - a _________ is a prewritten module designed for a specific task.
Values are the actual numbers or dates entered into ______.
A spreadsheet ________ is a built-in formula which performs common calculations.
5. Importing
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
IP addresses can be changed by the network _______________.
6. Inference
7. Vacuum tubes
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
First generation computers used _______ _____ to store individual bits of data.
______ generation computers were microprocessor based.
8. 64
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Nowadays - cash registers have been replaced by ___ terminals.
An ______ _______ is an interactive computer program that helps users solve problems.
9. Sequentially
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
UNIX was first developed by _____ Laboratories in 1969.
With serial processing - instructions are executed ______________ in the order received.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
10. Networking
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Harvard Graphics and MS __________ are examples of presentation graphics software.
VoIP stands for ______ over Internet Protocol.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
11. Services
12. Direction
In a ring network - all packets flow in only one __________; there are no data collisions.
Productivity software is designed to help people work more ___________.
Graphics software is designed to help users manipulate and ______ graphics.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
13. Cells
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
VoIP stands for ______ over Internet Protocol.
A wiki is one or more ___ documents that can be viewed and changed by users.
Values are the actual numbers or dates entered into ______.
14. Systems analysts
_____________ is the process of recomputing values in a spreadsheet.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
A _________ is a limited working system - developed to test design concepts.
________ ________ plan and implement new or improved computer services.
15. Nonvolatile
The toolbar displays menus and icons of commonly used ________ and options.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
An ______ _______ is an interactive computer program that helps users solve problems.
______ generation languages are typically used for database applications.
16. Record
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
17. Top
Data and programs waiting to be processed wait in ______ in temporary storage.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Improper positioning of your keyboard and mouse can cause ___.
18. Memory
Harvard Graphics and MS __________ are examples of presentation graphics software.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
19. Building
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
20. Phishers
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Common expansion cards include ________ cards - graphic cards - and memory cards.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
______ data can be represented as a wave.
21. Cursor
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
The ______ is a marker on the monitor which indicates where the next character will appear.
22. Cyberterrorists
Plaintext is also called __________.
Cache speeds up _________.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
MIDI stands for Musicial ___________ Digital Interface.
23. Charles Babbage
_______ ________ was the first to define concepts that were to be later used in modern computers.
The internet is an example of a WAN (______ ____ Network).
____ and RPG-I are examples of fourth generation languages.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
24. High level
A unit of measure equaling 8 bits is a ____.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
25. Apple I
On the job choices that reflect a person's values are called ____________ ethics.
In the same year - they released the ________ computer.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
26. Produced
_______ are notes included in the program code by the programmer.
Products which are announced but are never ________ are called vaporware.
Computer processing is the ____________ of data which transforms data into information.
In MS PowerPoint - the outline view helps you ________ the content of your material.
27. Microcomputers
Personal computers are also called ______________.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
28. Peripheral
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
___________ and security are MS Windows' two major weaknesses.
In Windows - to see a list of active _________ - you must open the task manager.
29. Cookies
System software include device ________ - operating systems - and compilers.
Lettered ______ headings appear across the top frame of the spreadsheet.
_______ are small text files left on your hard drive by websites you visit.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
30. Change
In programming - a variable represents a value that can ______.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
In a relational database - the _______ key holds a unique value for each record.
31. Fourth
With a ______ implementation - parts of the new system are implemented separately.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
______ generation computers were microprocessor based.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
32. Administrators
Telephone lines have traditionally been _______.
Database ______________ create - maintain - and supervise the day to day operation of databases.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
The public key encryption software used to encrypt documents such as _____ is called PGP.
33. Central
A wiki is one or more ___ documents that can be viewed and changed by users.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
Paint - photo _______ - and drawing software are all examples of graphics software.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
34. Memory
While the computer is running - it remains in main ______ and manages nonresident programs.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
CIO stands for _______ ____________ Officer.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
35. DRM
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A message which has been encrypted is called __________.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
36. Pretty Good
ISPs are connected to the internet backbone via a ___.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
37. Buffer
On a hard disk - this waiting area is called a _______.
________ row headings appear down the left frame of the spreadsheet.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
Software obtained _________ is said to be pirated.
38. Hyperlinks
__________ appear as colored or underlined words on a webpag
Virtual memory uses the hard disk to _____ primary storage (RAM).
Secondary storage refers to devices and media that store data _____________.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
39. CPU
Most computer processing takes place in a component called the ___.
A _________ is a limited working system - developed to test design concepts.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
40. Quicken
Random access storage devices are able to go _____ to the requested data
Examples of personal finance manager software include ________ and Microsoft Money.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
41. Before
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
An ______ _______ is an interactive computer program that helps users solve problems.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
The 1s and 0s used to represent digital data are known as _______ digits.
42. Instructions
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
_____ generation computers used integrated circuits.
A spreadsheet _____ is any number used in a calculation.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
43. Registers
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
_______ is a version of UNIX popular for large websites and e-commerce servers.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
A single hard drive could be partitioned and labeled with multiple drive ________.
44. Machine
While the computer is running - it remains in main ______ and manages nonresident programs.
________ and assembly languages are low level languages.
ENIAC was the first ____________ electronic computer in the United States.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
45. Transistors
ENIAC was the first ____________ electronic computer in the United States.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Second generation computers used ___________ instead of vacuum tubes.
46. Cycle
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
47. Repeat
Trojan horses can also carry ________ and destructive instructions.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
Computer processing is the ____________ of data which transforms data into information.
48. Cable
A bus network has two endpoints and all computers are connected to a single wire or _____.
In programming - a _________ is a prewritten module designed for a specific task.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
49. Internet
Values are the actual numbers or dates entered into ______.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
50. Open source
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
One ___________ is one thousandth of a second.
Linux is an ____ _______ operating system that can be modified and freely distributed.