SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Printed
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
2. GUI
The location on a spreadsheet where a row and a column intersect is called a ____.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
Private networks that are connected to remote sites via the internet are called ____.
3. Service Provider
A bus network has two endpoints and all computers are connected to a single wire or _____.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
In Windows - to see a list of active _________ - you must open the task manager.
In a ring network - all packets flow in only one __________; there are no data collisions.
4. Files
FTP is a protocol used to copy _____ from one computer to another over the Internet.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
A browser ________ is spyware that changes browser settings without your knowledge.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
5. Whistleblowers
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
_________ is the process of moving up - down - or sideways through the text or other screen display.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
6. Changed
The prefix '_____' means a thousand.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
MAC addresses are set from the factory and cannot be ________ by the network admin.
A ____ network has no endpoints and all computers are connected in a continuous loop.
7. Copies
8. Hash
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
___________ programming rules are called syntax.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
9. Network interface
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
10. Transistors
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Personal Information Management software helps users organize and manage daily ________ activities.
_______ are notes included in the program code by the programmer.
The central computer is called a ____.
11. Access
____ is an internet protocol used to make phone calls over the internet.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
In a relational database - a ___ field is used to sort data.
______ times for PC storage devices are measured in milliseconds.
12. Run
The most common user interface for UNIX systems is the ________ ____ interface.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
13. Scheduling
A ___ is a commonly used component that connects devices on the LAN.
Meeting ___________ software is an example of groupware.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
14. Hard
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
Graphics software is designed to help users manipulate and ______ graphics.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
15. Restore
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
16. Clients
Data and programs waiting to be processed wait in ______ in temporary storage.
Servers can store files or provide services (i.e. printing) to ________ on the network.
Secondary storage refers to devices and media that store data _____________.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
17. Employment
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
A firewall is designed to protect a computer or network from _________.
18. Raw
Data consists of ___ facts and figures that is processed to produce information.
Meeting ___________ software is an example of groupware.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
19. Java
Examples of OOP languages include C++ and _____.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
20. Transmit
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
The most common user interface for UNIX systems is the ________ ____ interface.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
A LAN (______ _____ Network) normally occupies a single building.
21. Byte
Cache is ____ when the computer power is turned off.
_____________ people is one important way to protect software and data.
A unit of measure equaling 8 bits is a ____.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
22. Millisecond
Cache speeds up _________.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
__________ appear as colored or underlined words on a webpag
One ___________ is one thousandth of a second.
23. Records
Private networks that are connected to remote sites via the internet are called ____.
______ generation languages are typically used for database applications.
In a relational database - information is organized in rows and columns. Rows are called _______.
LISP is a programming language used primarily for creating __________ _____________ programs.
24. Radiation
Lettered ______ headings appear across the top frame of the spreadsheet.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
One ___________ is one thousandth of a second.
A spreadsheet ________ is a built-in formula which performs common calculations.
25. Compression
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
26. Protocol
_______ is the operating system installed on more than 80% of the world's personal computers.
______ generation languages are typically used for database applications.
Public key encryption uses ___ keys.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
27. Keystroke
A ____ network has no endpoints and all computers are connected in a continuous loop.
In programming - a variable represents a value that can ______.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
A _________ logger is a type of spyware that records each character you type.
28. Volatile
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
On a hard disk - this waiting area is called a _______.
29. Formula
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
An algorithm is a _______ or set of steps for solving a particular problem.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
30. Real world
31. Solved
Databases use structured files to _________ data.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Plaintext is also called __________.
Data consists of ___ facts and figures that is processed to produce information.
32. Filename
33. Flash drives
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
System software includes device drivers - utility programs - and the __________ system.
A LAN (______ _____ Network) normally occupies a single building.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
34. Buffer
On a hard disk - this waiting area is called a _______.
_______ is a version of UNIX popular for large websites and e-commerce servers.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
35. One
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
The columns are called _______.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
36. Desktop
37. Numeric
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
___ allows a block of program code to be reused in other programs.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Analytical graphics are graphical forms that make _______ data easier to analyze.
38. Com
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
39. Apple I
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
In the same year - they released the ________ computer.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
40. Work
A computer resource is any component required to perform ____.
A ________ is a collection of interrelated files in a computer system.
While the computer is running - it remains in main ______ and manages nonresident programs.
Random access storage devices are able to go _____ to the requested data
41. Operating
In programming - a variable represents a value that can ______.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
System software includes device drivers - utility programs - and the __________ system.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
42. Text
The public key encryption software used to encrypt documents such as _____ is called PGP.
System ______________ involves converting files - software and hardware to the new system.
VoIP stands for ______ over Internet Protocol.
Word processing software is used to create - edit - print - format and store ____.
43. Supercomputers
A print server manages one or more printers and stores printed ______.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
______________ are the most expensive and fastest computers available.
Random access is much faster than ___________ access storage (tape).
44. RSI
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
Data and programs waiting to be processed wait in ______ in temporary storage.
___ allows a block of program code to be reused in other programs.
Improper positioning of your keyboard and mouse can cause ___.
45. Two
Private _________ that connect internal personnel and selected vendors are called extranets.
Public key encryption uses ___ keys.
A computer resource is any component required to perform ____.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
46. Project management
A typical computer includes the system and a variety of input - output and ______ devices.
Transmission is limited to ______ range.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
47. Input/Output
Random access is much faster than ___________ access storage (tape).
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Examples of personal finance manager software include ________ and Microsoft Money.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
48. Tape drive
A template is a ____________ document often provided with word processing software.
Examples of personal finance manager software include ________ and Microsoft Money.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
49. Central
With a relational database - users _____ records to locate and display them.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
When data is ________ in one cell - data in other cells is automatically recalculated.
The prefix '_____' means a thousand.
50. Settings
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
A LAN (______ _____ Network) normally occupies a single building.