SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Finland
____ and RPG-I are examples of fourth generation languages.
This data is _____ when the computer is turned off.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
2. Permission
3. Icons
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
Public domain software is not ___________ and can be copied without fear of prosecution.
4. Administrator
This is where the term __________ (a group edited encyclopedia) comes from.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
IP addresses can be changed by the network _______________.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
5. Networking
A unit of measure equaling 8 bits is a ____.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Like hubs - switches have multiple ______.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
6. Input
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
The information on a ROM chip _____ be altered by the user.
_____ data can be text - images - numbers - or sounds.
MAC addresses are set from the factory and cannot be ________ by the network admin.
7. Programmable
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
ENIAC was the first ____________ electronic computer in the United States.
With a relational database - users _____ records to locate and display them.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
8. Transistors
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
A ________ is a collection of interrelated files in a computer system.
The toolbar displays menus and icons of commonly used ________ and options.
9. 64
In MS PowerPoint - the outline view helps you ________ the content of your material.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
10. Employment
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
11. Digital
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
VoIP stands for ______ over Internet Protocol.
UNIVAC was the first commercially successful _______ computer.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
12. CPU
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
Adware is spyware that tracks surfing and online _________.
When a computer performs several tasks simultaneously - this is called ________ processing.
Most computer processing takes place in a component called the ___.
13. Bus
___ - ring - and star are the three basic network topologies.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Disposal of _______ is a major environmental problem caused by information technology.
14. Solaris
ISPs are connected to the internet backbone via a ___.
_______ is a version of UNIX popular for large websites and e-commerce servers.
Database ______________ create - maintain - and supervise the day to day operation of databases.
Most Information Systems departments are managed by a ___.
15. Office
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A print server manages one or more printers and stores printed ______.
A data communications network that connects personal computers within a limited geographical area is called a ___.
16. Analog
Random access storage devices are able to go _____ to the requested data
______ data can be represented as a wave.
_______ are notes included in the program code by the programmer.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
17. Hard
_____________ people is one important way to protect software and data.
Forging an email ______'s name is called spoofing.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
18. Ring
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
A ____ network has no endpoints and all computers are connected in a continuous loop.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
_______ storage is temporary and holds data waiting to be processed.
19. Com
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
This is where the term __________ (a group edited encyclopedia) comes from.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
20. Supervisor
Such information includes information related to company finances - _________ - products and procedures.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
The kernel is also known as the ___________.
21. Real world
22. Pretty Good
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
_______ are notes included in the program code by the programmer.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
23. Resetting
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
Linux is an ____ _______ operating system that can be modified and freely distributed.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
________ ________ plan and implement new or improved computer services.
24. Private
25. Transmit
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
The section of code that repeats is called a _____ or an iteration.
This UNIX-based kernel also contributes to stronger _________.
_________ systems were first used in second generation computers.
26. Free
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
Random access storage devices are able to go _____ to the requested data
On a hard disk - this waiting area is called a _______.
Freeware is software that is copyrighted but is available for ____.
27. Operating
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
System software includes device drivers - utility programs - and the __________ system.
Microsoft Windows is the world's best selling ________ __________.
28. Binary
The instruction cycle is also often referred to as the ________ cycle.
The 1s and 0s used to represent digital data are known as _______ digits.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
29. Two
The columns are called _______.
_______ is a version of UNIX popular for large websites and e-commerce servers.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Public key encryption uses ___ keys.
30. Dashboard
Logic bombs are _______ that are set to go off at a certain time.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
31. Fourth
Personal Information Management software helps users organize and manage daily ________ activities.
______ generation languages are typically used for database applications.
___ - ring - and star are the three basic network topologies.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
32. Backup
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Random access storage devices are able to go _____ to the requested data
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
33. Commands
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
The toolbar displays menus and icons of commonly used ________ and options.
Adware is spyware that tracks surfing and online _________.
34. Encrypted
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
A message that has not been _________ is called plaintext.
_____ ______ cable transmits pulsating beams of light rather than electricity.
35. Hard disk
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Public key encryption uses ___ keys.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
A computer's ____ size is the number of bits that the processor may process at any one time.
36. Tables
The most common type of database used on PCs is the relational database in which data is organized into related ______.
A message that has not been _________ is called plaintext.
Site licenses allow software to be used on all computers at a specific ________.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
37. Utility
The 1s and 0s used to represent digital data are known as _______ digits.
______________ are the most expensive and fastest computers available.
In recent years - antivirus software has been one of the most popular categories of _______ software.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
38. Access
This UNIX-based kernel also contributes to stronger _________.
Secondary storage refers to devices and media that store data _____________.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
______ times for PC storage devices are measured in milliseconds.
39. RSI
System software include device ________ - operating systems - and compilers.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Improper positioning of your keyboard and mouse can cause ___.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
40. Files
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
__________ appear as colored or underlined words on a webpag
Settings automatically used by a program unless changed by the user are called _______ settings.
41. Fiber optic
_____ ______ cable transmits pulsating beams of light rather than electricity.
While the computer is running - it remains in main ______ and manages nonresident programs.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
Each connection _____ on a network is called a node.
42. TIFF
Disposal of _______ is a major environmental problem caused by information technology.
A firewall is designed to protect a computer or network from _________.
The ______ is a marker on the monitor which indicates where the next character will appear.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
43. Domain name
44. ISP
An organization that provides internet access is called an ___.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
With serial processing - instructions are executed ______________ in the order received.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
45. Network interface
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
When you install software or hardware - information is ______ in the registry.
46. Served
This can also be called a command-_____ interface.
A kilobyte is generally abbreviated as __.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
47. Glass
A computer resource is any component required to perform ____.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
48. ENIAC
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
___ software is used to design products - maps - structures and civil engineering drawings.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
First generation computers used _______ _____ to store individual bits of data.
49. Purchases
Adware is spyware that tracks surfing and online _________.
The central computer is called a ____.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
50. Configuration
DHCP stands for Dynamic Host _______________ Protocol.
Alpha testing involves desk checking and _________.
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
_________ authentication devices verify a person's identity using the person's physical characteristics.