SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cell
___________ programming rules are called syntax.
The location on a spreadsheet where a row and a column intersect is called a ____.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
2. Math
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
The prefix '_____' means a thousand.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
3. Processing
DHCP stands for Dynamic Host _______________ Protocol.
In MS PowerPoint - the outline view helps you ________ the content of your material.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Cache speeds up _________.
4. Primary
In a ring network - all packets flow in only one __________; there are no data collisions.
________ row headings appear down the left frame of the spreadsheet.
_______ storage is temporary and holds data waiting to be processed.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
5. Changed
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
MAC addresses are set from the factory and cannot be ________ by the network admin.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
A ______ is a small unit of data transmitted over a network.
6. Email
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
7. Copied
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
8. Slide show
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
A bus network has two endpoints and all computers are connected to a single wire or _____.
9. Com
A bus network has two endpoints and all computers are connected to a single wire or _____.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
A spreadsheet _____ is any number used in a calculation.
Products which are announced but are never ________ are called vaporware.
10. Private
11. Disk drive
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
12. Low level
Commands written for a specific CPU or microprocessor are ____ _____ languages.
A modem is a device that sends and receives data over __________ lines to and from computers.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Analytical graphics are graphical forms that make _______ data easier to analyze.
13. GUI
Microsoft Windows is the world's best selling ________ __________.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
________ row headings appear down the left frame of the spreadsheet.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
14. Business
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
With a ______ implementation - parts of the new system are implemented separately.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
15. Encrypted
_______ is the operating system installed on more than 80% of the world's personal computers.
A message that has not been _________ is called plaintext.
When you install software or hardware - information is ______ in the registry.
Most Information Systems departments are managed by a ___.
16. PDA
Public key encryption uses ___ keys.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
17. Order
When data is ________ in one cell - data in other cells is automatically recalculated.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
Random access storage allows access to any location in any _____.
__________ appear as colored or underlined words on a webpag
18. Resetting
All the physical equipment in a computer system is called ________.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
19. Analog
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
______ data can be represented as a wave.
A message which has been encrypted is called __________.
20. Backup
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Examples of personal finance manager software include ________ and Microsoft Money.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
21. Internet
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
LISP is a programming language used primarily for creating __________ _____________ programs.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Micropayments are __________ payments for internet transactions as small as 25 cents.
22. Fraud
This act established financial reporting regulations to prevent corporate ______.
_____ generation computers used integrated circuits.
A keystroke logger can be used to steal __________.
MIDI stands for Musicial ___________ Digital Interface.
23. Key
This can also be called a command-_____ interface.
In a relational database - a ___ field is used to sort data.
Nowadays - cash registers have been replaced by ___ terminals.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
24. Changed
When data is ________ in one cell - data in other cells is automatically recalculated.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
IP addresses can be changed by the network _______________.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
25. Architecture
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Micropayments are __________ payments for internet transactions as small as 25 cents.
26. Circuit boards
27. Expansion
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
With a ______ implementation - parts of the new system are implemented separately.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
28. Viruses
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
Examples of keywords include READ - ______ - IF - and THEN
The location on a spreadsheet where a row and a column intersect is called a ____.
Trojan horses can also carry ________ and destructive instructions.
29. Professional
30. LAN
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
Public domain software is not ___________ and can be copied without fear of prosecution.
A data communications network that connects personal computers within a limited geographical area is called a ___.
MIDI stands for Musicial ___________ Digital Interface.
31. Socket
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
IP addresses can be changed by the network _______________.
32. Defragmentation
A ___ is a commonly used component that connects devices on the LAN.
In recent years - antivirus software has been one of the most popular categories of _______ software.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
33. Millisecond
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
A bus network has two endpoints and all computers are connected to a single wire or _____.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
One ___________ is one thousandth of a second.
34. Background
____ is an internet protocol used to make phone calls over the internet.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Messages are encrypted using a cryptographic _________ and a key.
35. Certification
Many employers view IT _____________ with some degree of skepticism.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
36. Cannot
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
The information on a ROM chip _____ be altered by the user.
37. Wide Area
The internet is an example of a WAN (______ ____ Network).
A typical computer includes the system and a variety of input - output and ______ devices.
Personal computers are also called ______________.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
38. Processes
In Windows - to see a list of active _________ - you must open the task manager.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
39. Configuration
DHCP stands for Dynamic Host _______________ Protocol.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
NAP stands for ________________ Point.
40. Reliability
41. Downloaded
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
____ is an internet protocol used to make phone calls over the internet.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
42. Bits
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
43. Volatile
A megabyte is a unit of measurement roughly equaling one _______ bytes.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
44. Insertion
The cursor is often a blinking rectangle and its location is called the __________ point.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
On a hard disk - this waiting area is called a _______.
The prefix '____' means a million.
45. OOP
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
A message that has not been _________ is called plaintext.
___ allows a block of program code to be reused in other programs.
In a relational database - the _______ key holds a unique value for each record.
46. Telephone
Freeware is software that is copyrighted but is available for ____.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
A modem is a device that sends and receives data over __________ lines to and from computers.
Site licenses allow software to be used on all computers at a specific ________.
47. Transistors
Analytical graphics are graphical forms that make _______ data easier to analyze.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
Second generation computers used ___________ instead of vacuum tubes.
48. Security
This UNIX-based kernel also contributes to stronger _________.
They are for ______ use only and are ignored by the compiler when it processes the code.
Freeware is software that is copyrighted but is available for ____.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
49. Network Access
DHCP is a protocol designed to automatically distribute IP _________.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
NAP stands for ________________ Point.
50. Cyberterrorists
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
The particular operating system and _________ model on which a computer system is based is called the platform.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Adware is spyware that tracks surfing and online _________.