SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wikipedia
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
This is where the term __________ (a group edited encyclopedia) comes from.
A bus network has two endpoints and all computers are connected to a single wire or _____.
2. Sender's
3. Expansion
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
In a star network - all computers are connected to a _______ computer.
A file extension is an optional file identifier that is separated from the main file name by a ______.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
4. Cyphertext
A print server manages one or more printers and stores printed ______.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
A message which has been encrypted is called __________.
A _________ is a limited working system - developed to test design concepts.
5. Packet
Virtual memory uses the hard disk to _____ primary storage (RAM).
Alpha testing involves desk checking and _________.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
A ______ is a small unit of data transmitted over a network.
6. Network Access
Computer resources include the ____ - RAM - storage space - and peripherals.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
NAP stands for ________________ Point.
7. Manipulation
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
_______ is a version of UNIX popular for large websites and e-commerce servers.
Computer processing is the ____________ of data which transforms data into information.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
8. Requests
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
The process of converting cyphertext to plaintext is ___________
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
9. Scheduling
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Meeting ___________ software is an example of groupware.
DHCP is a protocol designed to automatically distribute IP _________.
10. Icons
Small pictures on the desktop that represent documents - procedures and programs are called _____.
Examples of an event include a key press or a mouse ______.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
In a relational database - information is organized in rows and columns. Rows are called _______.
11. Com
A megabyte is a unit of measurement roughly equaling one _______ bytes.
A _________ is a graphical representation of a series of steps needed to solve a problem.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
12. Network
System software helps the computer manage internal and external _________ and enables the computer to run applications.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
13. Registers
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
The process of converting cyphertext to plaintext is ___________
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
Productivity software is designed to help people work more ___________.
14. Security
This UNIX-based kernel also contributes to stronger _________.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
15. Access
VPN stands for ________ Private Network.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
They are for ______ use only and are ignored by the compiler when it processes the code.
A firewall can be _________ or software-based or a combination of the two.
16. Input/Output
A megabyte is often abbreviated as ___.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
17. Instruction
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
A _________ is a graphical representation of a series of steps needed to solve a problem.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
18. Point
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Column headings are used to select an entire _______ with a mouse click.
LISP is a programming language used primarily for creating __________ _____________ programs.
Each connection _____ on a network is called a node.
19. Utility
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Analytical graphics are graphical forms that make _______ data easier to analyze.
In recent years - antivirus software has been one of the most popular categories of _______ software.
____ is an internet protocol used to make phone calls over the internet.
20. Intranets
Private _________ that connect internal personnel and selected vendors are called extranets.
__________ appear as colored or underlined words on a webpag
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A computer resource is any component required to perform ____.
21. Kilo
22. Trojan horse
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
MAC addresses are set from the factory and cannot be ________ by the network admin.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
23. Cache
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
___ allows a block of program code to be reused in other programs.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
24. Professional
25. Mimic
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
Virtual memory uses the hard disk to _____ primary storage (RAM).
Software designed to solve a specific problem is called ___________ software.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
26. JPEG
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
27. Function
A spreadsheet ________ is a built-in formula which performs common calculations.
Nowadays - cash registers have been replaced by ___ terminals.
___ software is used to design products - maps - structures and civil engineering drawings.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
28. Compiler
Public key encryption uses ___ keys.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
29. Organize
In MS PowerPoint - the outline view helps you ________ the content of your material.
__________ uses mathematical formulas to create coded messages.
A typical computer includes the system and a variety of input - output and ______ devices.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
30. Peripheral
Small pictures on the desktop that represent documents - procedures and programs are called _____.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Adware is spyware that tracks surfing and online _________.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
31. PIM
An ______ _______ is an interactive computer program that helps users solve problems.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
HTML is a set of special instructions used to create ____ _____.
32. High level
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
33. Period
Analytical graphics are graphical forms that make _______ data easier to analyze.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
A file extension is an optional file identifier that is separated from the main file name by a ______.
34. Operating system
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
The ________ ________ is the computer software that manages the basic operation of the computer.
One ___________ is one thousandth of a second.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
35. Divide
36. Switching
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Zipped files are _________ as part of the installation process.
Telephone lines have traditionally been _______.
37. Securely
____ is a graphics file format used on both PCs and Macs for high quality printable files.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
DHCP is a protocol designed to automatically distribute IP _________.
Examples of personal finance manager software include ________ and Microsoft Money.
38. Encrypted
A message that has not been _________ is called plaintext.
__________ uses mathematical formulas to create coded messages.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
39. Gateways
________ are used to transmit data between LANs of different network topologies or network operating systems.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
A keystroke logger can be used to steal __________.
40. Sort
Transmission is limited to ______ range.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
41. Design
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Settings automatically used by a program unless changed by the user are called _______ settings.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
42. Chief Information
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
CIO stands for _______ ____________ Officer.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
A firewall can be _________ or software-based or a combination of the two.
43. Research
Alpha testing involves desk checking and _________.
Paint - photo _______ - and drawing software are all examples of graphics software.
Such information includes information related to company finances - _________ - products and procedures.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
44. Action
In programming - an event is defined as an ______.
A message which has been encrypted is called __________.
The 1s and 0s used to represent digital data are known as _______ digits.
Public domain software is not ___________ and can be copied without fear of prosecution.
45. Inference
46. Low level
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
VPN stands for ________ Private Network.
___ software is used to design products - maps - structures and civil engineering drawings.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
47. Data
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
The monitor - speakers - and printer are examples of computer ______ devices.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
48. Cyberterrorists
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
An organization that provides internet access is called an ___.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Search agents and _____ search tools allow you to automate your search process across many sites.
49. Stopping
_______ storage is temporary and holds data waiting to be processed.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
50. Implementation
____ is an internet protocol used to make phone calls over the internet.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
System ______________ involves converting files - software and hardware to the new system.