SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Resetting
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
DHCP stands for Dynamic Host _______________ Protocol.
In programming - a variable represents a value that can ______.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
2. High level
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
DHCP is a protocol designed to automatically distribute IP _________.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
DHCP stands for Dynamic Host _______________ Protocol.
3. Bulletin board
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
The more _____ in a word - the faster the computer.
4. Solved
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Examples of keywords include READ - ______ - IF - and THEN
The ______ is a marker on the monitor which indicates where the next character will appear.
5. Column
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
In programming - an event is defined as an ______.
Lettered ______ headings appear across the top frame of the spreadsheet.
First generation computers used _______ _____ to store individual bits of data.
6. Miniatures
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
On a hard disk - this waiting area is called a _______.
Search agents and _____ search tools allow you to automate your search process across many sites.
7. Guide
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
On a hard disk - this waiting area is called a _______.
8. Shortcut
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
_______ is the operating system installed on more than 80% of the world's personal computers.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
While the computer is running - it remains in main ______ and manages nonresident programs.
9. Text
________ ________ plan and implement new or improved computer services.
A computer resource is any component required to perform ____.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A _________ logger is a type of spyware that records each character you type.
10. Glass
DHCP stands for Dynamic Host _______________ Protocol.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
The public key encryption software used to encrypt documents such as _____ is called PGP.
11. Web browser
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
VoIP stands for ______ over Internet Protocol.
12. Recorded
When you install software or hardware - information is ______ in the registry.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
The 1s and 0s used to represent digital data are known as _______ digits.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
13. Outcome
Like hubs - switches have multiple ______.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A spreadsheet _____ is any number used in a calculation.
An organization that provides internet access is called an ___.
14. Macro
A device ______ is system software used by the computer to control peripheral devices.
Examples of DTP software include MS __________ and PageMaker.
The information on a ROM chip _____ be altered by the user.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
15. Networking
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
16. POS
An IP address is a series of numbers used to identify a network ______.
Nowadays - cash registers have been replaced by ___ terminals.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Linux is an ____ _______ operating system that can be modified and freely distributed.
17. Served
MAC addresses are set from the factory and cannot be ________ by the network admin.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
18. Function
A spreadsheet ________ is a built-in formula which performs common calculations.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Word processing software is used to create - edit - print - format and store ____.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
19. Modern
A __________ file uses a uniform format to store data for each person or thing in the file.
Zipped files are _________ as part of the installation process.
Data consists of ___ facts and figures that is processed to produce information.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
20. Digital
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
______ data is data that has been converted into discrete digits such as 0s and 1s.
An organization's internal _______ network is called an intranet.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
21. Client/server
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
In a _____________ LAN - individual computer users share the services of a centralized computer.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
A computer resource is any component required to perform ____.
22. Securely
DHCP stands for Dynamic Host _______________ Protocol.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
First generation computers used _______ _____ to store individual bits of data.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
23. Tape drive
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
The monitor - speakers - and printer are examples of computer ______ devices.
Logic bombs are _______ that are set to go off at a certain time.
24. Column
Column headings are used to select an entire _______ with a mouse click.
Secondary storage refers to devices and media that store data _____________.
IP addresses can be changed by the network _______________.
Forging an email ______'s name is called spoofing.
25. Work
Using components or labor from outside suppliers is called ___________.
A computer resource is any component required to perform ____.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
26. Quickly
VoIP stands for ______ over Internet Protocol.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
27. Network
______ generation languages are typically used for database applications.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
_______ is a version of UNIX popular for large websites and e-commerce servers.
Groupware is software that allows several people to collaborate on projects over a _______.
28. Three dimensional
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
29. Expert system
An ______ _______ is an interactive computer program that helps users solve problems.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
The particular operating system and _________ model on which a computer system is based is called the platform.
Each connection _____ on a network is called a node.
30. Access
Trojan horses can also carry ________ and destructive instructions.
_____ generation computers used integrated circuits.
______ times for PC storage devices are measured in milliseconds.
Logic bombs are _______ that are set to go off at a certain time.
31. Stopping
A LAN (______ _____ Network) normally occupies a single building.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
In a star network - all computers are connected to a _______ computer.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
32. File names
_______ are notes included in the program code by the programmer.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
Current versions of Windows support ____ ______ up to 255 characters long.
Logic bombs are _______ that are set to go off at a certain time.
33. Query
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
With a relational database - users _____ records to locate and display them.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
34. Disk drive
Productivity software is designed to help people work more ___________.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
A communications network that covers a large geographic area such as a country is called a ___.
35. Switch
Software obtained _________ is said to be pirated.
Settings automatically used by a program unless changed by the user are called _______ settings.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
36. Apple I
DHCP stands for Dynamic Host _______________ Protocol.
They are for ______ use only and are ignored by the compiler when it processes the code.
Plaintext is also called __________.
In the same year - they released the ________ computer.
37. Hard disk
____ is an internet protocol used to make phone calls over the internet.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
A collection of fields make up a _______.
38. Record
A collection of fields make up a _______.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
A megabyte is often abbreviated as ___.
39. Quicken
A ________ is a unit of measurement equaling 1024 bytes of data.
All the physical equipment in a computer system is called ________.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Examples of personal finance manager software include ________ and Microsoft Money.
40. Clients
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
_______ is the operating system installed on more than 80% of the world's personal computers.
41. Parallel
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Forging an email ______'s name is called spoofing.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
When a computer performs several tasks simultaneously - this is called ________ processing.
42. Kilo
43. Difference
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Web page design software allows users to create sophisticated web pages with ___________ features.
LISP is a programming language used primarily for creating __________ _____________ programs.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
44. Machine
An IP address is a series of numbers used to identify a network ______.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
________ and assembly languages are low level languages.
Productivity software is designed to help people work more ___________.
45. Keystroke
Output is the result of ___________.
A _________ logger is a type of spyware that records each character you type.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
46. Binary
In Windows - to see a list of active _________ - you must open the task manager.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Cache is ____ when the computer power is turned off.
In a ring network - all packets flow in only one __________; there are no data collisions.
47. Email
Random access storage devices are able to go _____ to the requested data
Meeting ___________ software is an example of groupware.
The public key encryption software used to encrypt documents such as _____ is called PGP.
The information on a ROM chip _____ be altered by the user.
48. Reliability
49. Analog
______ data can be represented as a wave.
Database ______________ create - maintain - and supervise the day to day operation of databases.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
_________ authentication devices verify a person's identity using the person's physical characteristics.
50. Application
VPN stands for ________ Private Network.
Software designed to solve a specific problem is called ___________ software.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
The kernel is also known as the ___________.