SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Overheat
The ________ ________ is the computer software that manages the basic operation of the computer.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Fiber optic cable consists of dozens or hundreds of thin strands of ______ or plastic; it is more secure and can carry much more data than normal copper telephone wire.
The first microprocessor was developed in _____.
2. Cleartext
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Plaintext is also called __________.
Examples of keywords include READ - ______ - IF - and THEN
3. Cyphertext
A message which has been encrypted is called __________.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Random access storage devices are able to go _____ to the requested data
Personal Information Management software helps users organize and manage daily ________ activities.
4. Encrypted
A message that has not been _________ is called plaintext.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
5. Reliability
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Numbered
________ row headings appear down the left frame of the spreadsheet.
A firewall is designed to protect a computer or network from _________.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
While the computer is running - it remains in main ______ and manages nonresident programs.
7. Hub
A ___ is a commonly used component that connects devices on the LAN.
______ generation languages are typically used for database applications.
_________ authentication devices verify a person's identity using the person's physical characteristics.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
8. Resources
System software helps the computer manage internal and external _________ and enables the computer to run applications.
A wiki is one or more ___ documents that can be viewed and changed by users.
Meeting ___________ software is an example of groupware.
_____ ______ cable transmits pulsating beams of light rather than electricity.
9. Former
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
A _____ of adjacent cells on a spreadsheet is called a range.
Software designed to solve a specific problem is called ___________ software.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
10. Implementation
TCP/IP is an example of a network ________________ protocol.
System ______________ involves converting files - software and hardware to the new system.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
11. Hard
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
A database index can be used to _________ data in alphabetical or numerical order.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
12. Com
_______ is a version of UNIX popular for large websites and e-commerce servers.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
13. High level
Common expansion cards include ________ cards - graphic cards - and memory cards.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
When you install software or hardware - information is ______ in the registry.
14. Project management
All the physical equipment in a computer system is called ________.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
15. Preformatted
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
A template is a ____________ document often provided with word processing software.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
16. Disk drive
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Linux is an ____ _______ operating system that can be modified and freely distributed.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
17. Telephone
A modem is a device that sends and receives data over __________ lines to and from computers.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
The cursor is often a blinking rectangle and its location is called the __________ point.
________ ________ plan and implement new or improved computer services.
18. Decryption
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
The process of converting cyphertext to plaintext is ___________
The instruction cycle is also often referred to as the ________ cycle.
Using components or labor from outside suppliers is called ___________.
19. Processes
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
20. Storage
A typical computer includes the system and a variety of input - output and ______ devices.
In MS PowerPoint - the outline view helps you ________ the content of your material.
______ generation computers were microprocessor based.
A computer's ____ size is the number of bits that the processor may process at any one time.
21. Supercomputers
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
______________ are the most expensive and fastest computers available.
22. Cookies
The columns are called _______.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Lettered ______ headings appear across the top frame of the spreadsheet.
_______ are small text files left on your hard drive by websites you visit.
23. Execution
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A unit of measure equaling 8 bits is a ____.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
The compiled program is saved as object code for later __________.
24. Tape drive
A ________ is a unit of measurement equaling 1024 bytes of data.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A keystroke logger can be used to steal __________.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
25. Central
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
26. Server
The monitor - speakers - and printer are examples of computer ______ devices.
The process of converting cyphertext to plaintext is ___________
________ ________ plan and implement new or improved computer services.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
27. Cyberterrorists
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
Secondary storage refers to devices and media that store data _____________.
Telephone lines have traditionally been _______.
28. Calculations
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Spreadsheet instructions for ____________ are called formulas.
_______ is the operating system installed on more than 80% of the world's personal computers.
29. Kilobyte
Disposal of _______ is a major environmental problem caused by information technology.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
A spreadsheet _____ is any number used in a calculation.
A ________ is a unit of measurement equaling 1024 bytes of data.
30. Sender's
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. Internet
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
Alpha testing involves desk checking and _________.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
32. One
UNIX was first developed by _____ Laboratories in 1969.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
When data is ________ in one cell - data in other cells is automatically recalculated.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
33. Serial
Microsoft Windows is the world's best selling ________ __________.
___ software is used to design products - maps - structures and civil engineering drawings.
______ generation computers were microprocessor based.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
34. Trojan horse
Microsoft Windows is the world's best selling ________ __________.
The toolbar displays menus and icons of commonly used ________ and options.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
35. Decompression
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Computer resources include the ____ - RAM - storage space - and peripherals.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Such information includes information related to company finances - _________ - products and procedures.
36. Wide Area
_______ are small text files left on your hard drive by websites you visit.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
The internet is an example of a WAN (______ ____ Network).
_________ authentication devices verify a person's identity using the person's physical characteristics.
37. Sequentially
With serial processing - instructions are executed ______________ in the order received.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
________ and assembly languages are low level languages.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
38. Outcome
In programming - an event is defined as an ______.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Harvard Graphics and MS __________ are examples of presentation graphics software.
Random access is much faster than ___________ access storage (tape).
39. Vacuum tubes
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
The prefix '_____' means a thousand.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
First generation computers used _______ _____ to store individual bits of data.
40. Domain name
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Intruders
In programming - a variable represents a value that can ______.
Public key encryption uses ___ keys.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
A firewall is designed to protect a computer or network from _________.
42. Machine
________ and assembly languages are low level languages.
MAC addresses are set from the factory and cannot be ________ by the network admin.
___ - ring - and star are the three basic network topologies.
__________ appear as colored or underlined words on a webpag
43. HTTP
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
A spreadsheet _____ is any number used in a calculation.
Column headings are used to select an entire _______ with a mouse click.
___________ programming rules are called syntax.
44. CAD
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
_____ generation computers used integrated circuits.
___ software is used to design products - maps - structures and civil engineering drawings.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
45. Free
A file extension is an optional file identifier that is separated from the main file name by a ______.
Freeware is software that is copyrighted but is available for ____.
Examples of DTP software include MS __________ and PageMaker.
Data consists of ___ facts and figures that is processed to produce information.
46. Programmable
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
ENIAC was the first ____________ electronic computer in the United States.
CIO stands for _______ ____________ Officer.
First generation computers used _______ _____ to store individual bits of data.
47. JPEG
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
A ___ is a commonly used component that connects devices on the LAN.
48. Legitimate
A ___ is a commonly used component that connects devices on the LAN.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
49. Sort
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Freeware is software that is copyrighted but is available for ____.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
50. Processing
Output is the result of ___________.
Data consists of ___ facts and figures that is processed to produce information.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests