SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Preformatted
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
A template is a ____________ document often provided with word processing software.
2. Expert system
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
While the computer is running - it remains in main ______ and manages nonresident programs.
An ______ _______ is an interactive computer program that helps users solve problems.
DHCP is a protocol designed to automatically distribute IP _________.
3. Keyboard
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Spreadsheet instructions for ____________ are called formulas.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
4. Multiply
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
NAP stands for ________________ Point.
5. Companies
The main circuit board of the computer is called the ___________.
In a relational database - a ___ field is used to sort data.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
6. Icons
A template is a ____________ document often provided with word processing software.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
One ___________ is one thousandth of a second.
7. Key
A modem is a device that sends and receives data over __________ lines to and from computers.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
8. Run
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
The instruction cycle is also often referred to as the ________ cycle.
9. Configuration
_______ are notes included in the program code by the programmer.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
CSMA/CD is the Ethernet protocol that handles __________.
DHCP stands for Dynamic Host _______________ Protocol.
10. Transistors
Second generation computers used ___________ instead of vacuum tubes.
______ data is data that has been converted into discrete digits such as 0s and 1s.
_______ errors can be found with a debugger.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
11. Desk checking
Most computer processing takes place in a component called the ___.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
Groupware is software that allows several people to collaborate on projects over a _______.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
12. Binary
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
A LAN (______ _____ Network) normally occupies a single building.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
13. Machine
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
_____ data can be text - images - numbers - or sounds.
___________ and security are MS Windows' two major weaknesses.
________ and assembly languages are low level languages.
14. Bits
The more _____ in a word - the faster the computer.
Microsoft Windows is the world's best selling ________ __________.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A device ______ is system software used by the computer to control peripheral devices.
15. Building
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
16. Peripheral
An organization's internal _______ network is called an intranet.
This data is _____ when the computer is turned off.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
_______ is a version of UNIX popular for large websites and e-commerce servers.
17. Period
Plaintext is also called __________.
________ ________ plan and implement new or improved computer services.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
A file extension is an optional file identifier that is separated from the main file name by a ______.
18. Cookies
A spreadsheet _____ is any number used in a calculation.
Groupware is software that allows several people to collaborate on projects over a _______.
_______ are small text files left on your hard drive by websites you visit.
The particular operating system and _________ model on which a computer system is based is called the platform.
19. Real world
20. Instrument
Programmers use assembly languages to write ______ software.
A _________ is a limited working system - developed to test design concepts.
MIDI stands for Musicial ___________ Digital Interface.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
21. Project management
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
The prefix '____' means a million.
The most common user interface for UNIX systems is the ________ ____ interface.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
22. Peripheral
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
_________ is the process of moving up - down - or sideways through the text or other screen display.
23. Divide
24. Fil
ISPs are connected to the internet backbone via a ___.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
In programming - a _________ is a prewritten module designed for a specific task.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
25. Transistors
____ and RPG-I are examples of fourth generation languages.
The monitor - speakers - and printer are examples of computer ______ devices.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
26. Value
A communications network that covers a large geographic area such as a country is called a ___.
A spreadsheet _____ is any number used in a calculation.
Examples include _____________ identification and retina scanners.
A single hard drive could be partitioned and labeled with multiple drive ________.
27. Network Access
NAP stands for ________________ Point.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
28. Employment
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
Many employers view IT _____________ with some degree of skepticism.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
29. Kilobyte
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
A ________ is a unit of measurement equaling 1024 bytes of data.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
30. Digital
The columns are called _______.
______ data is data that has been converted into discrete digits such as 0s and 1s.
Examples of an event include a key press or a mouse ______.
MAC addresses are set from the factory and cannot be ________ by the network admin.
31. CPU
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
32. Work
This UNIX-based kernel also contributes to stronger _________.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Cache is ____ when the computer power is turned off.
A computer resource is any component required to perform ____.
33. Cars
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Examples of an event include a key press or a mouse ______.
Spreadsheet instructions for ____________ are called formulas.
Early computers stored ____ for calculations and programs on punched cards.
34. Intruders
A firewall is designed to protect a computer or network from _________.
The internet is an example of a WAN (______ ____ Network).
______ data can be represented as a wave.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
35. Remote
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Transferring data from a ______ computer to a local computer is called downloading.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
36. Before
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
37. WRITE
Logic bombs are _______ that are set to go off at a certain time.
Output is the result of ___________.
Examples of keywords include READ - ______ - IF - and THEN
A keystroke logger can be used to steal __________.
38. LAN
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
With serial processing - instructions are executed ______________ in the order received.
A data communications network that connects personal computers within a limited geographical area is called a ___.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
39. Word
40. Binary
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
A unit of measure equaling one ______ digit is a bit.
41. Debugging
A _________ is a graphical representation of a series of steps needed to solve a problem.
Alpha testing involves desk checking and _________.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
42. Com
DHCP stands for Dynamic Host _______________ Protocol.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
43. 64
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
The ______ is a marker on the monitor which indicates where the next character will appear.
The cursor is often a blinking rectangle and its location is called the __________ point.
44. Multimedia
A spreadsheet _____ is any number used in a calculation.
Web page design software allows users to create sophisticated web pages with ___________ features.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
45. Compiler
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
46. Design
UNIVAC was the first commercially successful _______ computer.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Each connection _____ on a network is called a node.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
47. Internet
While the computer is running - it remains in main ______ and manages nonresident programs.
They are for ______ use only and are ignored by the compiler when it processes the code.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
A typical computer includes the system and a variety of input - output and ______ devices.
48. Bus
Secondary storage refers to devices and media that store data _____________.
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
___ - ring - and star are the three basic network topologies.
49. Record
The 1s and 0s used to represent digital data are known as _______ digits.
A collection of fields make up a _______.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
A ___ is a commonly used component that connects devices on the LAN.
50. Network
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
On the job choices that reflect a person's values are called ____________ ethics.
The process of converting cyphertext to plaintext is ___________
_______ are notes included in the program code by the programmer.