SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Lost
_______ errors can be found with a debugger.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Cache is ____ when the computer power is turned off.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
2. Sort
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
_____________ people is one important way to protect software and data.
An ______ _______ is an interactive computer program that helps users solve problems.
Public domain software is not ___________ and can be copied without fear of prosecution.
3. Web
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
A wiki is one or more ___ documents that can be viewed and changed by users.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
Virtual memory uses the hard disk to _____ primary storage (RAM).
4. Binary
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
The particular operating system and _________ model on which a computer system is based is called the platform.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
5. Multimedia
Web page design software allows users to create sophisticated web pages with ___________ features.
Telephone lines have traditionally been _______.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
6. Windows
7. Primary
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
In a relational database - the _______ key holds a unique value for each record.
____ and RPG-I are examples of fourth generation languages.
8. Infrared
________ transmission sends data via light waves at a frequency too low for human eyes to see.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Meeting ___________ software is an example of groupware.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
9. Processors
An example of parallel processing is when several ___________ work together sharing memory on the same task.
_______ ________ was the first to define concepts that were to be later used in modern computers.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
10. Network
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
A ____ network has no endpoints and all computers are connected in a continuous loop.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
11. Keyboard
System software helps the computer manage internal and external _________ and enables the computer to run applications.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Like hubs - switches have multiple ______.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
12. Single
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
In programming - a _________ is a prewritten module designed for a specific task.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
13. Com
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
_______ ________ was the first to define concepts that were to be later used in modern computers.
In a star network - all computers are connected to a _______ computer.
14. Implementation
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
System ______________ involves converting files - software and hardware to the new system.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Such information includes information related to company finances - _________ - products and procedures.
15. MB
Each connection _____ on a network is called a node.
A megabyte is often abbreviated as ___.
A message that has not been _________ is called plaintext.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
16. Numeric
In a ring network - all packets flow in only one __________; there are no data collisions.
Analytical graphics are graphical forms that make _______ data easier to analyze.
The first microprocessor was developed in _____.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
17. Modern
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
The cursor is often a blinking rectangle and its location is called the __________ point.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
18. Sequential
Like hubs - switches have multiple ______.
Random access is much faster than ___________ access storage (tape).
A firewall can be _________ or software-based or a combination of the two.
The compiled program is saved as object code for later __________.
19. Providers
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
NAP stands for ________________ Point.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
20. Passwords
Second generation computers used ___________ instead of vacuum tubes.
A keystroke logger can be used to steal __________.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
21. Gateways
______ generation languages are typically used for database applications.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
NAP stands for ________________ Point.
________ are used to transmit data between LANs of different network topologies or network operating systems.
22. Hyperlinks
A __________ file uses a uniform format to store data for each person or thing in the file.
Nowadays - cash registers have been replaced by ___ terminals.
__________ appear as colored or underlined words on a webpag
Current versions of Windows support ____ ______ up to 255 characters long.
23. POS
Nowadays - cash registers have been replaced by ___ terminals.
_______ are small text files left on your hard drive by websites you visit.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
24. VPNs
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Private networks that are connected to remote sites via the internet are called ____.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
When you install software or hardware - information is ______ in the registry.
25. Java
A spreadsheet ________ is a built-in formula which performs common calculations.
Such information includes information related to company finances - _________ - products and procedures.
When a computer performs several tasks simultaneously - this is called ________ processing.
Examples of OOP languages include C++ and _____.
26. Stress
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
The main circuit board of the computer is called the ___________.
Proprietary information about a company concerns information a __________ might find valuable.
27. Building
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
28. Memory
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
While the computer is running - it remains in main ______ and manages nonresident programs.
Programmers use assembly languages to write ______ software.
29. Fields
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
A kilobyte is generally abbreviated as __.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
The columns are called _______.
30. Downloaded
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Many employers view IT _____________ with some degree of skepticism.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
31. Third
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
A computer resource is any component required to perform ____.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
_____ generation computers used integrated circuits.
32. Unzipped
Common expansion cards include ________ cards - graphic cards - and memory cards.
Data and programs waiting to be processed wait in ______ in temporary storage.
This data is _____ when the computer is turned off.
Zipped files are _________ as part of the installation process.
33. Inference
34. Intel
HTML is a set of special instructions used to create ____ _____.
TCP/IP is an example of a network ________________ protocol.
Microsoft Windows is the world's best selling ________ __________.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
35. Supervisor
Software obtained _________ is said to be pirated.
The kernel is also known as the ___________.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Like hubs - switches have multiple ______.
36. Raw
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
Data consists of ___ facts and figures that is processed to produce information.
The instruction cycle is also often referred to as the ________ cycle.
Secondary storage refers to devices and media that store data _____________.
37. Security
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A bus network has two endpoints and all computers are connected to a single wire or _____.
An organization that provides internet access is called an ___.
38. Windows
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
An IP address is a series of numbers used to identify a network ______.
39. Unique
40. Proprietary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Each connection _____ on a network is called a node.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
41. Input/Output
UNIX was first developed by _____ Laboratories in 1969.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
42. Javascript
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
UNIVAC was the first commercially successful _______ computer.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Column headings are used to select an entire _______ with a mouse click.
43. Stopping
______ times for PC storage devices are measured in milliseconds.
Linux is an ____ _______ operating system that can be modified and freely distributed.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
A message which has been encrypted is called __________.
44. Former
The hub prevents packet collisions - but if the hub goes down the _____ stops.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
45. Processes
Graphics software is designed to help users manipulate and ______ graphics.
Lettered ______ headings appear across the top frame of the spreadsheet.
________ and assembly languages are low level languages.
In Windows - to see a list of active _________ - you must open the task manager.
46. Cyberterrorists
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Forging an email ______'s name is called spoofing.
47. Bell
UNIX was first developed by _____ Laboratories in 1969.
Examples include _____________ identification and retina scanners.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Companies do this to keep _______ low.
48. Configuration
A ________ is a collection of interrelated files in a computer system.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
DHCP stands for Dynamic Host _______________ Protocol.
Harvard Graphics and MS __________ are examples of presentation graphics software.
49. Network
LISP is a programming language used primarily for creating __________ _____________ programs.
Groupware is software that allows several people to collaborate on projects over a _______.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
50. Command line
In MS PowerPoint - the outline view helps you ________ the content of your material.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
The most common user interface for UNIX systems is the ________ ____ interface.
A computer resource is any component required to perform ____.