SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Column
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Lettered ______ headings appear across the top frame of the spreadsheet.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
2. Implementation
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
System ______________ involves converting files - software and hardware to the new system.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
3. Unique
4. Hypertext Transfer
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
5. Building
__________ appear as colored or underlined words on a webpag
_________ is the process of moving up - down - or sideways through the text or other screen display.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
6. WAN
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
______ generation languages are typically used for database applications.
A communications network that covers a large geographic area such as a country is called a ___.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
7. Server
First generation computers used _______ _____ to store individual bits of data.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
Column headings are used to select an entire _______ with a mouse click.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
8. Clip art
Using components or labor from outside suppliers is called ___________.
Proprietary information about a company concerns information a __________ might find valuable.
Messages are encrypted using a cryptographic _________ and a key.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
9. Transmit
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
10. NAP
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
VPN stands for ________ Private Network.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
ISPs are connected to the internet backbone via a ___.
11. Operating system
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
12. Dashboard
A collection of fields make up a _______.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
13. Com
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
System software includes device drivers - utility programs - and the __________ system.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
On a hard disk - this waiting area is called a _______.
14. Manipulation
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Computer processing is the ____________ of data which transforms data into information.
A unit of measure equaling 8 bits is a ____.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
15. Source
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
Messages are encrypted using a cryptographic _________ and a key.
16. Socket
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
Settings automatically used by a program unless changed by the user are called _______ settings.
______ generation languages are typically used for database applications.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
17. Formats
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
Most Information Systems departments are managed by a ___.
18. Column
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
VoIP stands for ______ over Internet Protocol.
Column headings are used to select an entire _______ with a mouse click.
Disposal of _______ is a major environmental problem caused by information technology.
19. Remote
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Transferring data from a ______ computer to a local computer is called downloading.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
A unit of measure equaling one ______ digit is a bit.
20. Hijacker
A browser ________ is spyware that changes browser settings without your knowledge.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Random access is much faster than ___________ access storage (tape).
_________ authentication devices verify a person's identity using the person's physical characteristics.
21. CPU
A ___ is the smallest unit of data that a system can handle.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
A LAN (______ _____ Network) normally occupies a single building.
Computer resources include the ____ - RAM - storage space - and peripherals.
22. Routes
UNIX was first developed by _____ Laboratories in 1969.
A computer resource is any component required to perform ____.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
A spreadsheet ________ is a built-in formula which performs common calculations.
23. Text
______ generation computers were microprocessor based.
Settings automatically used by a program unless changed by the user are called _______ settings.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Word processing software is used to create - edit - print - format and store ____.
24. Companies
________ transmission sends data via light waves at a frequency too low for human eyes to see.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
___________ and security are MS Windows' two major weaknesses.
25. Email
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
A firewall is designed to protect a computer or network from _________.
26. Chief Information
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
Like hubs - switches have multiple ______.
CIO stands for _______ ____________ Officer.
A ________ is a unit of measurement equaling 1024 bytes of data.
27. DRM
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Personal Information Management software helps users organize and manage daily ________ activities.
Cache speeds up _________.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
28. Sequential
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
Random access is much faster than ___________ access storage (tape).
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
29. Cars
The most common user interface for UNIX systems is the ________ ____ interface.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
UNIVAC was the first commercially successful _______ computer.
30. Competitor
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
NAP stands for ________________ Point.
_____________ people is one important way to protect software and data.
Proprietary information about a company concerns information a __________ might find valuable.
31. Digital
Adware is spyware that tracks surfing and online _________.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
With a relational database - users _____ records to locate and display them.
______ data is data that has been converted into discrete digits such as 0s and 1s.
32. Modern
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
Disposal of _______ is a major environmental problem caused by information technology.
In a _____________ LAN - individual computer users share the services of a centralized computer.
A ___ is a commonly used component that connects devices on the LAN.
33. Key
A message that has not been _________ is called plaintext.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
__________ appear as colored or underlined words on a webpag
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
34. RSI
When data is ________ in one cell - data in other cells is automatically recalculated.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
In programming - an event is defined as an ______.
Improper positioning of your keyboard and mouse can cause ___.
35. Encrypted
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Forging an email ______'s name is called spoofing.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
A message that has not been _________ is called plaintext.
36. Word processor
On the job choices that reflect a person's values are called ____________ ethics.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
In MS PowerPoint - the outline view helps you ________ the content of your material.
37. Debugging
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
Alpha testing involves desk checking and _________.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
The prefix '____' means a million.
38. Driver
Groupware is software that allows several people to collaborate on projects over a _______.
When you install software or hardware - information is ______ in the registry.
A bus network has two endpoints and all computers are connected to a single wire or _____.
A device ______ is system software used by the computer to control peripheral devices.
39. Structured
The internet is an example of a WAN (______ ____ Network).
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
A __________ file uses a uniform format to store data for each person or thing in the file.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
40. Resetting
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Software obtained _________ is said to be pirated.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
41. Disaster recovery
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Second generation computers used ___________ instead of vacuum tubes.
42. Benchmarks
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Most computer processing takes place in a component called the ___.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
43. Meta
Search agents and _____ search tools allow you to automate your search process across many sites.
A collection of fields make up a _______.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
When a computer performs several tasks simultaneously - this is called ________ processing.
44. GUI
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
45. Beta
A computer resource is any component required to perform ____.
____ testing involves checking a program by running it with real world data.
___________ and security are MS Windows' two major weaknesses.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
46. Spreadsheet
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
The first microprocessor was developed in _____.
_______ are notes included in the program code by the programmer.
47. Instructions
________ ________ plan and implement new or improved computer services.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
______ times for PC storage devices are measured in milliseconds.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
48. 1971
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
The first microprocessor was developed in _____.
This UNIX-based kernel also contributes to stronger _________.
49. Intranets
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Values are the actual numbers or dates entered into ______.
Private _________ that connect internal personnel and selected vendors are called extranets.
50. Work
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
A computer resource is any component required to perform ____.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Products which are announced but are never ________ are called vaporware.