SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Radiation
The easiest way to reduce exposure to cellphone _________ is to use a headset.
The section of code that repeats is called a _____ or an iteration.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
In the same year - they released the ________ computer.
2. Key
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
In a relational database - a ___ field is used to sort data.
Random access storage allows access to any location in any _____.
3. Type
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Random access storage devices are able to go _____ to the requested data
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
First generation computers used _______ _____ to store individual bits of data.
4. LAN
A data communications network that connects personal computers within a limited geographical area is called a ___.
Databases use structured files to _________ data.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
5. Ergonomics
__________ is the study of safe and efficient work environments.
______ data can be represented as a wave.
_______ is a version of UNIX popular for large websites and e-commerce servers.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
6. Central
Site licenses allow software to be used on all computers at a specific ________.
Adware is spyware that tracks surfing and online _________.
In a star network - all computers are connected to a _______ computer.
Graphics software is designed to help users manipulate and ______ graphics.
7. Employment
_________ authentication devices verify a person's identity using the person's physical characteristics.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
8. Background
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Servers can store files or provide services (i.e. printing) to ________ on the network.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
9. Bits
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
__________ uses mathematical formulas to create coded messages.
10. Cell
A unit of measure equaling one ______ digit is a bit.
The central computer is called a ____.
The location on a spreadsheet where a row and a column intersect is called a ____.
Forging an email ______'s name is called spoofing.
11. Intel
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
A device ______ is system software used by the computer to control peripheral devices.
In a relational database - information is organized in rows and columns. Rows are called _______.
Transmission is limited to ______ range.
12. Web pages
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
ENIAC was the first ____________ electronic computer in the United States.
HTML is a set of special instructions used to create ____ _____.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
13. Communications
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
The central computer is called a ____.
TCP/IP is an example of a network ________________ protocol.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
14. Bits
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
The main circuit board of the computer is called the ___________.
Syntax refers to the _______ in which computer programming commands must be entered.
The more _____ in a word - the faster the computer.
15. Miniatures
A ________ is a collection of interrelated files in a computer system.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
The information on a ROM chip _____ be altered by the user.
16. TIFF
____ is a graphics file format used on both PCs and Macs for high quality printable files.
The toolbar displays menus and icons of commonly used ________ and options.
Cache speeds up _________.
Common expansion cards include ________ cards - graphic cards - and memory cards.
17. Certification
A ___ is a commonly used component that connects devices on the LAN.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
___________ programming rules are called syntax.
Many employers view IT _____________ with some degree of skepticism.
18. Analog
Telephone lines have traditionally been _______.
The process of converting cyphertext to plaintext is ___________
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
19. Defragmentation
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
System software include device ________ - operating systems - and compilers.
20. Analog
Cache is ____ when the computer power is turned off.
A browser ________ is spyware that changes browser settings without your knowledge.
______ data can be represented as a wave.
Virtual memory uses the hard disk to _____ primary storage (RAM).
21. Bits per second
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Settings automatically used by a program unless changed by the user are called _______ settings.
22. Structured
In MS PowerPoint - the outline view helps you ________ the content of your material.
Cache speeds up _________.
Telephone lines have traditionally been _______.
A __________ file uses a uniform format to store data for each person or thing in the file.
23. Calculations
A wiki is one or more ___ documents that can be viewed and changed by users.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
Spreadsheet instructions for ____________ are called formulas.
Companies do this to keep _______ low.
24. Artificial intelligence
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
LISP is a programming language used primarily for creating __________ _____________ programs.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
Public domain software is not ___________ and can be copied without fear of prosecution.
25. Direction
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
In a ring network - all packets flow in only one __________; there are no data collisions.
The 1s and 0s used to represent digital data are known as _______ digits.
On a hard disk - this waiting area is called a _______.
26. Flash
27. Editing
_______ errors can be found with a debugger.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
In a relational database - a ___ field is used to sort data.
Paint - photo _______ - and drawing software are all examples of graphics software.
28. Timeline
Common expansion cards include ________ cards - graphic cards - and memory cards.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
A computer's ____ size is the number of bits that the processor may process at any one time.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
29. Column
Column headings are used to select an entire _______ with a mouse click.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
The more _____ in a word - the faster the computer.
30. Digital
______ data is data that has been converted into discrete digits such as 0s and 1s.
Products which are announced but are never ________ are called vaporware.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
This UNIX-based kernel also contributes to stronger _________.
31. Raw
In MS PowerPoint - the outline view helps you ________ the content of your material.
The kernel is also known as the ___________.
_________ authentication devices verify a person's identity using the person's physical characteristics.
Data consists of ___ facts and figures that is processed to produce information.
32. Numeric
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
In a relational database - a ___ field is used to sort data.
Analytical graphics are graphical forms that make _______ data easier to analyze.
_____________ is the process of recomputing values in a spreadsheet.
33. Access
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
34. Order
The ________ ________ is the computer software that manages the basic operation of the computer.
Random access storage allows access to any location in any _____.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Syntax refers to the _______ in which computer programming commands must be entered.
35. Programmable
HTML is a set of special instructions used to create ____ _____.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
ENIAC was the first ____________ electronic computer in the United States.
36. Billion
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
37. Ring
A ____ network has no endpoints and all computers are connected in a continuous loop.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Programmers use assembly languages to write ______ software.
A single hard drive could be partitioned and labeled with multiple drive ________.
38. Cursor
HTML is a set of special instructions used to create ____ _____.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
The ______ is a marker on the monitor which indicates where the next character will appear.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
39. Kilo
40. Inference
41. Changed
An example of parallel processing is when several ___________ work together sharing memory on the same task.
The most common user interface for UNIX systems is the ________ ____ interface.
MAC addresses are set from the factory and cannot be ________ by the network admin.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
42. Settings
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Common expansion cards include ________ cards - graphic cards - and memory cards.
Cache speeds up _________.
43. Algorithm
_______ are small text files left on your hard drive by websites you visit.
Nowadays - cash registers have been replaced by ___ terminals.
Messages are encrypted using a cryptographic _________ and a key.
_______ is the operating system installed on more than 80% of the world's personal computers.
44. Software
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
An organization that provides internet access is called an ___.
ENIAC was the first ____________ electronic computer in the United States.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
45. Reliable
When you install software or hardware - information is ______ in the registry.
IP addresses can be changed by the network _______________.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
46. Intranets
Private _________ that connect internal personnel and selected vendors are called extranets.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
On the job choices that reflect a person's values are called ____________ ethics.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
47. Network interface
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
Site licenses allow software to be used on all computers at a specific ________.
48. Fourth
______ generation languages are typically used for database applications.
Examples of an event include a key press or a mouse ______.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
49. Retype
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Computer resources include the ____ - RAM - storage space - and peripherals.
50. Files
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Search agents and _____ search tools allow you to automate your search process across many sites.
The columns are called _______.