SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Location
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Companies do this to keep _______ low.
The first microprocessor was developed in _____.
Site licenses allow software to be used on all computers at a specific ________.
2. Flash drives
Word processing software is used to create - edit - print - format and store ____.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
UNIVAC was the first commercially successful _______ computer.
3. Hard disk
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
_________ is the process of moving up - down - or sideways through the text or other screen display.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
4. Resetting
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Random access storage devices are able to go _____ to the requested data
System software helps the computer manage internal and external _________ and enables the computer to run applications.
Secondary storage refers to devices and media that store data _____________.
5. Run
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
Examples of keywords include READ - ______ - IF - and THEN
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
6. Partition
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Trojan horses can also carry ________ and destructive instructions.
VoIP stands for ______ over Internet Protocol.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
7. Tape drive
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A _________ logger is a type of spyware that records each character you type.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
8. Squiggly
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
On a hard disk - this waiting area is called a _______.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
9. Stress
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
An IP address is a series of numbers used to identify a network ______.
10. Client/server
A megabyte is often abbreviated as ___.
UNIX was first developed by _____ Laboratories in 1969.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
In a _____________ LAN - individual computer users share the services of a centralized computer.
11. Cannot
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
The information on a ROM chip _____ be altered by the user.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
12. Human
They are for ______ use only and are ignored by the compiler when it processes the code.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
NAP stands for ________________ Point.
The first microprocessor was developed in _____.
13. Fingerprint
Graphics software is designed to help users manipulate and ______ graphics.
Analytical graphics are graphical forms that make _______ data easier to analyze.
Examples include _____________ identification and retina scanners.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
14. Driver
With serial processing - instructions are executed ______________ in the order received.
A device ______ is system software used by the computer to control peripheral devices.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
A file extension is an optional file identifier that is separated from the main file name by a ______.
15. Fourth
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Plaintext is also called __________.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
______ generation languages are typically used for database applications.
16. Background
______ data can be represented as a wave.
A computer's ____ size is the number of bits that the processor may process at any one time.
The toolbar displays menus and icons of commonly used ________ and options.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
17. Access
MIDI stands for Musicial ___________ Digital Interface.
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
Personal computers are also called ______________.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
18. Free
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
19. Divide
20. Connection
_____________ is the process of recomputing values in a spreadsheet.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
One ___________ is one thousandth of a second.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
21. Quicken
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
A unit of measure equaling one ______ digit is a bit.
Examples of personal finance manager software include ________ and Microsoft Money.
VoIP stands for ______ over Internet Protocol.
22. Recorded
When you install software or hardware - information is ______ in the registry.
Logic bombs are _______ that are set to go off at a certain time.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
23. PDA
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Cache is ____ when the computer power is turned off.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
A data communications network that connects personal computers within a limited geographical area is called a ___.
24. CIO
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Most Information Systems departments are managed by a ___.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
___ software is used to design products - maps - structures and civil engineering drawings.
25. Processes
System software helps the computer manage internal and external _________ and enables the computer to run applications.
In Windows - to see a list of active _________ - you must open the task manager.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
A _________ logger is a type of spyware that records each character you type.
26. Debugger
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
VPN stands for ________ Private Network.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
27. Short
Random access storage devices are able to go _____ to the requested data
Examples of an event include a key press or a mouse ______.
The monitor - speakers - and printer are examples of computer ______ devices.
Transmission is limited to ______ range.
28. Numbered
________ row headings appear down the left frame of the spreadsheet.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Forging an email ______'s name is called spoofing.
29. CAD
Random access is much faster than ___________ access storage (tape).
___ software is used to design products - maps - structures and civil engineering drawings.
A _________ logger is a type of spyware that records each character you type.
The section of code that repeats is called a _____ or an iteration.
30. Email
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
Plaintext is also called __________.
The public key encryption software used to encrypt documents such as _____ is called PGP.
31. WRITE
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
On a hard disk - this waiting area is called a _______.
Examples of keywords include READ - ______ - IF - and THEN
When data is ________ in one cell - data in other cells is automatically recalculated.
32. Icons
The central computer is called a ____.
________ ________ plan and implement new or improved computer services.
An ______ _______ is an interactive computer program that helps users solve problems.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
33. Pretty Good
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
Adware is spyware that tracks surfing and online _________.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
34. Web
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
Freeware is software that is copyrighted but is available for ____.
Software designed to solve a specific problem is called ___________ software.
A wiki is one or more ___ documents that can be viewed and changed by users.
35. VPNs
The main circuit board of the computer is called the ___________.
Analytical graphics are graphical forms that make _______ data easier to analyze.
Site licenses allow software to be used on all computers at a specific ________.
Private networks that are connected to remote sites via the internet are called ____.
36. Word wrap
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Computer processing is the ____________ of data which transforms data into information.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
37. Dashboard
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
A unit of measure equaling 8 bits is a ____.
A spreadsheet ________ is a built-in formula which performs common calculations.
38. Email
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
39. Backup
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
_____ generation computers used integrated circuits.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
40. Cycle
The prefix '_____' means a thousand.
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
41. Million
A megabyte is a unit of measurement roughly equaling one _______ bytes.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
A single hard drive could be partitioned and labeled with multiple drive ________.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
42. Network
With a relational database - users _____ records to locate and display them.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
43. RSI
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
Improper positioning of your keyboard and mouse can cause ___.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
They are for ______ use only and are ignored by the compiler when it processes the code.
44. Copies
45. Click
Examples include _____________ identification and retina scanners.
Syntax refers to the _______ in which computer programming commands must be entered.
Examples of an event include a key press or a mouse ______.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
46. Viruses
Trojan horses can also carry ________ and destructive instructions.
An ______ _______ is an interactive computer program that helps users solve problems.
Random access storage devices are able to go _____ to the requested data
A modem is a device that sends and receives data over __________ lines to and from computers.
47. Command line
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
Forging an email ______'s name is called spoofing.
The most common user interface for UNIX systems is the ________ ____ interface.
While the computer is running - it remains in main ______ and manages nonresident programs.
48. Utility
In recent years - antivirus software has been one of the most popular categories of _______ software.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
49. Data
HTML is a set of special instructions used to create ____ _____.
While the computer is running - it remains in main ______ and manages nonresident programs.
Many employers view IT _____________ with some degree of skepticism.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
50. Printed
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.