SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hash
In MS PowerPoint - the outline view helps you ________ the content of your material.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
Reading through a program to make sure it is logical and free of errors is called _____ ________.
2. Divide
3. Connection
When a computer performs several tasks simultaneously - this is called ________ processing.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Second generation computers used ___________ instead of vacuum tubes.
4. Processor
One ___________ is one thousandth of a second.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
The particular operating system and _________ model on which a computer system is based is called the platform.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
5. VPNs
Private networks that are connected to remote sites via the internet are called ____.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
In a ring network - all packets flow in only one __________; there are no data collisions.
6. Drivers
System software include device ________ - operating systems - and compilers.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
A message which has been encrypted is called __________.
In a relational database - the _______ key holds a unique value for each record.
7. NAP
Trojan horses can also carry ________ and destructive instructions.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
ISPs are connected to the internet backbone via a ___.
__________ appear as colored or underlined words on a webpag
8. Business
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A message which has been encrypted is called __________.
A _________ is a graphical representation of a series of steps needed to solve a problem.
9. One
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
Syntax refers to the _______ in which computer programming commands must be entered.
NAP stands for ________________ Point.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
10. Supervisor
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Logic bombs are _______ that are set to go off at a certain time.
The kernel is also known as the ___________.
A firewall is designed to protect a computer or network from _________.
11. Telephone
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
A modem is a device that sends and receives data over __________ lines to and from computers.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
12. Design
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
13. Random
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
Second generation computers used ___________ instead of vacuum tubes.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
14. Apple I
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
In the same year - they released the ________ computer.
15. Administrators
The information on a ROM chip _____ be altered by the user.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
Database ______________ create - maintain - and supervise the day to day operation of databases.
A LAN (______ _____ Network) normally occupies a single building.
16. Mega
17. System
_______ errors can be found with a debugger.
_____________ people is one important way to protect software and data.
Programmers use assembly languages to write ______ software.
With a relational database - users _____ records to locate and display them.
18. Squiggly
DHCP is a protocol designed to automatically distribute IP _________.
______ times for PC storage devices are measured in milliseconds.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Cache speeds up _________.
19. Private
20. MYCIN
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
The process of converting cyphertext to plaintext is ___________
21. Radiation
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
All the physical equipment in a computer system is called ________.
In a star network - all computers are connected to a _______ computer.
22. Cycle
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Examples of OOP languages include C++ and _____.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A keystroke logger can be used to steal __________.
23. Third
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
Software obtained _________ is said to be pirated.
_____ generation computers used integrated circuits.
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
24. Prototype
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
A _________ is a limited working system - developed to test design concepts.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
25. Operating system
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
A ________ is a unit of measurement equaling 1024 bytes of data.
The ________ ________ is the computer software that manages the basic operation of the computer.
26. Viruses
Logic bombs are _______ that are set to go off at a certain time.
Plaintext is also called __________.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
In a star network - all computers are connected to a _______ computer.
27. Lost
This data is _____ when the computer is turned off.
________ ________ plan and implement new or improved computer services.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
Using components or labor from outside suppliers is called ___________.
28. RSI
LISP is a programming language used primarily for creating __________ _____________ programs.
Column headings are used to select an entire _______ with a mouse click.
Improper positioning of your keyboard and mouse can cause ___.
A typical computer includes the system and a variety of input - output and ______ devices.
29. 64
An ______ _______ is an interactive computer program that helps users solve problems.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
According to security experts - _________ pose the greatest threat to their company's technology infrastructure.
30. DRM
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
The instruction cycle is also often referred to as the ________ cycle.
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
31. High level
IP addresses can be changed by the network _______________.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A communications network that covers a large geographic area such as a country is called a ___.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
32. Modem
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
A ____ network has no endpoints and all computers are connected in a continuous loop.
33. Overheat
A spreadsheet ________ is a built-in formula which performs common calculations.
Secondary storage refers to devices and media that store data _____________.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
34. Network
In recent years - antivirus software has been one of the most popular categories of _______ software.
A modem is a device that sends and receives data over __________ lines to and from computers.
Common expansion cards include ________ cards - graphic cards - and memory cards.
___ allows a block of program code to be reused in other programs.
35. Internet
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
ISPs are connected to the internet backbone via a ___.
_______ errors can be found with a debugger.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
36. Binary
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
37. Services
38. Monitors
The section of code that repeats is called a _____ or an iteration.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
39. Programmable
A ___ is the smallest unit of data that a system can handle.
ENIAC was the first ____________ electronic computer in the United States.
Graphics software is designed to help users manipulate and ______ graphics.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
40. Proprietary
Analytical graphics are graphical forms that make _______ data easier to analyze.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
41. Images
The prefix '____' means a million.
In Windows - to see a list of active _________ - you must open the task manager.
Random access is much faster than ___________ access storage (tape).
A print server manages one or more printers and stores printed ______.
42. Solaris
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
_______ is a version of UNIX popular for large websites and e-commerce servers.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
One ___________ is one thousandth of a second.
43. KB
All the physical equipment in a computer system is called ________.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
Using components or labor from outside suppliers is called ___________.
A kilobyte is generally abbreviated as __.
44. Prices
Companies do this to keep _______ low.
An organization's internal _______ network is called an intranet.
________ row headings appear down the left frame of the spreadsheet.
When you install software or hardware - information is ______ in the registry.
45. Insertion
__________ uses mathematical formulas to create coded messages.
The cursor is often a blinking rectangle and its location is called the __________ point.
Software designed to solve a specific problem is called ___________ software.
Examples of OOP languages include C++ and _____.
46. Email
The most common user interface for UNIX systems is the ________ ____ interface.
The instruction cycle is also often referred to as the ________ cycle.
________ and assembly languages are low level languages.
The public key encryption software used to encrypt documents such as _____ is called PGP.
47. OOP
___ allows a block of program code to be reused in other programs.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
The more _____ in a word - the faster the computer.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
48. Binary
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A unit of measure equaling one ______ digit is a bit.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
49. Employment
The process of converting cyphertext to plaintext is ___________
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
_____ ______ cable transmits pulsating beams of light rather than electricity.
In Windows - to see a list of active _________ - you must open the task manager.
50. Hub
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
Nowadays - cash registers have been replaced by ___ terminals.
A database index can be used to _________ data in alphabetical or numerical order.
A ___ is a commonly used component that connects devices on the LAN.