SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating system
Search agents and _____ search tools allow you to automate your search process across many sites.
Analytical graphics are graphical forms that make _______ data easier to analyze.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
The ________ ________ is the computer software that manages the basic operation of the computer.
2. Email
The main circuit board of the computer is called the ___________.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Private networks that are connected to remote sites via the internet are called ____.
The public key encryption software used to encrypt documents such as _____ is called PGP.
3. Fragmentation
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
___________ and security are MS Windows' two major weaknesses.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
TCP/IP is an example of a network ________________ protocol.
4. Switch
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Random access storage devices are able to go _____ to the requested data
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
In Windows - to see a list of active _________ - you must open the task manager.
5. Microcomputers
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
A __________ file uses a uniform format to store data for each person or thing in the file.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Personal computers are also called ______________.
6. Binary
Search agents and _____ search tools allow you to automate your search process across many sites.
A unit of measure equaling one ______ digit is a bit.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
7. Network
Common expansion cards include ________ cards - graphic cards - and memory cards.
A ___ is the smallest unit of data that a system can handle.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Groupware is software that allows several people to collaborate on projects over a _______.
8. Column
____ is an internet protocol used to make phone calls over the internet.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
Column headings are used to select an entire _______ with a mouse click.
9. Machine
________ and assembly languages are low level languages.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
The central computer is called a ____.
Examples include _____________ identification and retina scanners.
10. One
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Plaintext is also called __________.
11. Purchases
Adware is spyware that tracks surfing and online _________.
One ___________ is one thousandth of a second.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
12. Mimic
______ data is data that has been converted into discrete digits such as 0s and 1s.
Virtual memory uses the hard disk to _____ primary storage (RAM).
A ___ is the smallest unit of data that a system can handle.
Values are the actual numbers or dates entered into ______.
13. Tables
UNIX was first developed by _____ Laboratories in 1969.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
The most common type of database used on PCs is the relational database in which data is organized into related ______.
Plaintext is also called __________.
14. Providers
Virtual memory uses the hard disk to _____ primary storage (RAM).
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
In programming - a variable represents a value that can ______.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
15. Prices
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
Companies do this to keep _______ low.
Products which are announced but are never ________ are called vaporware.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
16. Text
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
17. Viruses
Trojan horses can also carry ________ and destructive instructions.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
18. Digital
This UNIX-based kernel also contributes to stronger _________.
A ________ is a collection of interrelated files in a computer system.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
______ data is data that has been converted into discrete digits such as 0s and 1s.
19. Windows
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
______ times for PC storage devices are measured in milliseconds.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
20. ISP
Examples of personal finance manager software include ________ and Microsoft Money.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
An organization that provides internet access is called an ___.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
21. ENIAC
Database ______________ create - maintain - and supervise the day to day operation of databases.
Logic bombs are _______ that are set to go off at a certain time.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
22. Memory
The most common type of database used on PCs is the relational database in which data is organized into related ______.
Like hubs - switches have multiple ______.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Cache is ____ when the computer power is turned off.
23. Reliable
A print server manages one or more printers and stores printed ______.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A _________ logger is a type of spyware that records each character you type.
24. Peripheral
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
25. Supercomputers
______________ are the most expensive and fastest computers available.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
Public key encryption uses ___ keys.
26. Multimedia
Web page design software allows users to create sophisticated web pages with ___________ features.
Examples of an event include a key press or a mouse ______.
The prefix '____' means a million.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
27. Central
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
28. Low level
Microsoft Windows is the world's best selling ________ __________.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
________ and assembly languages are low level languages.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
29. Modem
VPN stands for ________ Private Network.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
___________ and security are MS Windows' two major weaknesses.
30. Artificial intelligence
______ generation languages are typically used for database applications.
______ generation computers were microprocessor based.
LISP is a programming language used primarily for creating __________ _____________ programs.
In MS PowerPoint - the outline view helps you ________ the content of your material.
31. Securely
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
The instruction cycle is also often referred to as the ________ cycle.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
32. Memory
33. SQL
____ and RPG-I are examples of fourth generation languages.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
When you install software or hardware - information is ______ in the registry.
34. Bell
UNIX was first developed by _____ Laboratories in 1969.
_______ ________ was the first to define concepts that were to be later used in modern computers.
Word processing software is used to create - edit - print - format and store ____.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
35. Parallel
UNIX was first developed by _____ Laboratories in 1969.
When a computer performs several tasks simultaneously - this is called ________ processing.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
36. Email
The monitor - speakers - and printer are examples of computer ______ devices.
____ and RPG-I are examples of fourth generation languages.
Spreadsheet instructions for ____________ are called formulas.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
37. Queues
Data and programs waiting to be processed wait in ______ in temporary storage.
The more _____ in a word - the faster the computer.
The main circuit board of the computer is called the ___________.
Programmers use assembly languages to write ______ software.
38. Building
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
UNIX was first developed by _____ Laboratories in 1969.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
39. Desktop
40. Networking
The compiled program is saved as object code for later __________.
This is where the term __________ (a group edited encyclopedia) comes from.
A spreadsheet ________ is a built-in formula which performs common calculations.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
41. Calculations
Spreadsheet instructions for ____________ are called formulas.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
42. Standalone
The ________ ________ is the computer software that manages the basic operation of the computer.
_______ are notes included in the program code by the programmer.
Database ______________ create - maintain - and supervise the day to day operation of databases.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
43. Security
This UNIX-based kernel also contributes to stronger _________.
______ times for PC storage devices are measured in milliseconds.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A message which has been encrypted is called __________.
44. Repeat
A file extension is an optional file identifier that is separated from the main file name by a ______.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
45. Intruders
Programmers use assembly languages to write ______ software.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
A firewall is designed to protect a computer or network from _________.
Search agents and _____ search tools allow you to automate your search process across many sites.
46. Access
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
VPN stands for ________ Private Network.
______ times for PC storage devices are measured in milliseconds.
47. Order
Word processing software is used to create - edit - print - format and store ____.
Random access storage allows access to any location in any _____.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Logic bombs are _______ that are set to go off at a certain time.
48. Radiation
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
49. 10
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
50. Hard disk
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
______________ are the most expensive and fastest computers available.
Micropayments are __________ payments for internet transactions as small as 25 cents.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.