SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Web pages
HTML is a set of special instructions used to create ____ _____.
Programmers use assembly languages to write ______ software.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Freeware is software that is copyrighted but is available for ____.
2. Keyboard
A bus network has two endpoints and all computers are connected to a single wire or _____.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
3. Network interface
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
A typical computer includes the system and a variety of input - output and ______ devices.
Computer processing is the ____________ of data which transforms data into information.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
4. Com
________ ________ plan and implement new or improved computer services.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
A data communications network that connects personal computers within a limited geographical area is called a ___.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
5. Hard
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
In programming - a variable represents a value that can ______.
A database index can be used to _________ data in alphabetical or numerical order.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
6. Instructions
Meeting ___________ software is an example of groupware.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
7. Before
A message which has been encrypted is called __________.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
____ and RPG-I are examples of fourth generation languages.
Examples of DTP software include MS __________ and PageMaker.
8. Action
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
All the physical equipment in a computer system is called ________.
In programming - an event is defined as an ______.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
9. Record
A template is a ____________ document often provided with word processing software.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
A unit of measure equaling one ______ digit is a bit.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
10. Microcomputers
Common expansion cards include ________ cards - graphic cards - and memory cards.
Products which are announced but are never ________ are called vaporware.
Personal computers are also called ______________.
Cache is ____ when the computer power is turned off.
11. Organize
___ allows a block of program code to be reused in other programs.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
A database index can be used to _________ data in alphabetical or numerical order.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
12. Repeat
_______ are notes included in the program code by the programmer.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
System software includes device drivers - utility programs - and the __________ system.
Spreadsheet instructions for ____________ are called formulas.
13. Data
Early computers stored ____ for calculations and programs on punched cards.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
UNIX was first developed by _____ Laboratories in 1969.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
14. Unique
15. Low level
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Each connection _____ on a network is called a node.
16. Windows
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Examples of keywords include READ - ______ - IF - and THEN
___________ programming rules are called syntax.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
17. Transistors
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
18. Icons
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
A spreadsheet ________ is a built-in formula which performs common calculations.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
ENIAC was the first ____________ electronic computer in the United States.
19. Inference
20. WRITE
Telephone lines have traditionally been _______.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
A message which has been encrypted is called __________.
Examples of keywords include READ - ______ - IF - and THEN
21. Primary
In a relational database - the _______ key holds a unique value for each record.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
With serial processing - instructions are executed ______________ in the order received.
The section of code that repeats is called a _____ or an iteration.
22. Fragmentation
The easiest way to reduce exposure to cellphone _________ is to use a headset.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
A ________ is a unit of measurement equaling 1024 bytes of data.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
23. Network
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
Common expansion cards include ________ cards - graphic cards - and memory cards.
A _____ of adjacent cells on a spreadsheet is called a range.
Micropayments are __________ payments for internet transactions as small as 25 cents.
24. Group
A _____ of adjacent cells on a spreadsheet is called a range.
Examples of OOP languages include C++ and _____.
Common expansion cards include ________ cards - graphic cards - and memory cards.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
25. Million
Current versions of Windows support ____ ______ up to 255 characters long.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
__________ appear as colored or underlined words on a webpag
26. Punctuation
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
___________ programming rules are called syntax.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
A spreadsheet ________ is a built-in formula which performs common calculations.
27. Security
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
Software designed to solve a specific problem is called ___________ software.
28. Change
______________ are the most expensive and fastest computers available.
In programming - a variable represents a value that can ______.
Output is the result of ___________.
CSMA/CD is the Ethernet protocol that handles __________.
29. Sort
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
In programming - an event is defined as an ______.
Word processing software is used to create - edit - print - format and store ____.
Cache is ____ when the computer power is turned off.
30. Records
The prefix '_____' means a thousand.
A megabyte is often abbreviated as ___.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
In a relational database - information is organized in rows and columns. Rows are called _______.
31. Flowchart
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
A _________ is a graphical representation of a series of steps needed to solve a problem.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
32. CAD
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
___ software is used to design products - maps - structures and civil engineering drawings.
Forging an email ______'s name is called spoofing.
33. Passwords
A keystroke logger can be used to steal __________.
_______ are notes included in the program code by the programmer.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
This act established financial reporting regulations to prevent corporate ______.
34. Whistleblowers
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
________ ________ plan and implement new or improved computer services.
Personal computers are also called ______________.
35. Fourth
Word processing software is used to create - edit - print - format and store ____.
______ generation languages are typically used for database applications.
One ___________ is one thousandth of a second.
Computer processing is the ____________ of data which transforms data into information.
36. Backup
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
_________ authentication devices verify a person's identity using the person's physical characteristics.
37. Syntax
____ is an internet protocol used to make phone calls over the internet.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
________ ________ plan and implement new or improved computer services.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
38. Formula
An algorithm is a _______ or set of steps for solving a particular problem.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
_____________ is the process of recomputing values in a spreadsheet.
39. Application
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
The main circuit board of the computer is called the ___________.
Software designed to solve a specific problem is called ___________ software.
The central computer is called a ____.
40. Telephone
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A modem is a device that sends and receives data over __________ lines to and from computers.
A megabyte is often abbreviated as ___.
______________ are the most expensive and fastest computers available.
41. Point of Sale
POS (______ __ _______) terminals are computer-based devices or systems that allow the merchant to process credit cards - track customer purchase habits - and manage inventory.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Disposal of _______ is a major environmental problem caused by information technology.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
42. Cannot
Current versions of Windows support ____ ______ up to 255 characters long.
_____ data can be text - images - numbers - or sounds.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
The information on a ROM chip _____ be altered by the user.
43. WAN
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
A communications network that covers a large geographic area such as a country is called a ___.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
Syntax refers to the _______ in which computer programming commands must be entered.
44. Windows
45. Macro
______ generation computers were microprocessor based.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
NAP stands for ________________ Point.
46. Third
_____ generation computers used integrated circuits.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Plaintext is also called __________.
Most computer processing takes place in a component called the ___.
47. Disaster recovery
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A computer resource is any component required to perform ____.
Early computers stored ____ for calculations and programs on punched cards.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
48. Windows
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Computer resources include the ____ - RAM - storage space - and peripherals.
_________ authentication devices verify a person's identity using the person's physical characteristics.
49. Publisher
Examples of DTP software include MS __________ and PageMaker.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
50. Fraud
This act established financial reporting regulations to prevent corporate ______.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.