SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Run
MAC addresses are set from the factory and cannot be ________ by the network admin.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
_____ generation computers used integrated circuits.
This UNIX-based kernel also contributes to stronger _________.
2. Letters
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Public key encryption uses ___ keys.
Products which are announced but are never ________ are called vaporware.
A single hard drive could be partitioned and labeled with multiple drive ________.
3. Bits per second
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
In programming - an event is defined as an ______.
Examples of an event include a key press or a mouse ______.
4. Format
DHCP stands for Dynamic Host _______________ Protocol.
Web page design software allows users to create sophisticated web pages with ___________ features.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Syntax refers to the _______ in which computer programming commands must be entered.
5. Finland
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
6. KB
_______ storage is temporary and holds data waiting to be processed.
A kilobyte is generally abbreviated as __.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
7. Meta
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
UNIX was first developed by _____ Laboratories in 1969.
Search agents and _____ search tools allow you to automate your search process across many sites.
8. Line
This can also be called a command-_____ interface.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
Examples of an event include a key press or a mouse ______.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
9. Credit card
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
_______ errors can be found with a debugger.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
One ___________ is one thousandth of a second.
10. Outcome
Data and programs waiting to be processed wait in ______ in temporary storage.
Syntax refers to the _______ in which computer programming commands must be entered.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
11. Forum
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
_____ data can be text - images - numbers - or sounds.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
12. Algorithm
________ transmission sends data via light waves at a frequency too low for human eyes to see.
In the same year - they released the ________ computer.
First generation computers used _______ _____ to store individual bits of data.
Messages are encrypted using a cryptographic _________ and a key.
13. Modern
Output is the result of ___________.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
Plaintext is also called __________.
14. Clients
A unit of measure equaling 8 bits is a ____.
Servers can store files or provide services (i.e. printing) to ________ on the network.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
15. Apple I
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
In the same year - they released the ________ computer.
Private _________ that connect internal personnel and selected vendors are called extranets.
Transferring data from a ______ computer to a local computer is called downloading.
16. Project management
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
The section of code that repeats is called a _____ or an iteration.
17. Processes
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
In Windows - to see a list of active _________ - you must open the task manager.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
Harvard Graphics and MS __________ are examples of presentation graphics software.
18. CPU
With a relational database - users _____ records to locate and display them.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
Computer resources include the ____ - RAM - storage space - and peripherals.
Zipped files are _________ as part of the installation process.
19. Macro
System software include device ________ - operating systems - and compilers.
Personal Information Management software helps users organize and manage daily ________ activities.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
Cache is ____ when the computer power is turned off.
20. Securely
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
21. Miniatures
Column headings are used to select an entire _______ with a mouse click.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
22. Backup
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
Search agents and _____ search tools allow you to automate your search process across many sites.
23. Commands
A ____ network has no endpoints and all computers are connected in a continuous loop.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
The toolbar displays menus and icons of commonly used ________ and options.
Word processing software is used to create - edit - print - format and store ____.
24. Windows
System software include device ________ - operating systems - and compilers.
A spreadsheet ________ is a built-in formula which performs common calculations.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
25. Peripheral
System software helps the computer manage internal and external _________ and enables the computer to run applications.
Such information includes information related to company finances - _________ - products and procedures.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Output is the result of ___________.
26. Cars
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
VPN stands for ________ Private Network.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
27. Quicken
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Examples of personal finance manager software include ________ and Microsoft Money.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
28. Expansion
Public domain software is not ___________ and can be copied without fear of prosecution.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
Virtual memory uses the hard disk to _____ primary storage (RAM).
In everyday life - we generally use a base ___ system - meaning that we have 10 digits to choose from when we are expressing a number (i.e. 0 through 9).
29. Secondary
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
UNIVAC was the first commercially successful _______ computer.
In programming - an event is defined as an ______.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
30. VPNs
___________ and security are MS Windows' two major weaknesses.
Private networks that are connected to remote sites via the internet are called ____.
The hub prevents packet collisions - but if the hub goes down the _____ stops.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
31. Private
32. Proprietary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Public domain software is not ___________ and can be copied without fear of prosecution.
33. Analog
This data is _____ when the computer is turned off.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
______ data can be represented as a wave.
34. Binary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
A unit of measure equaling one ______ digit is a bit.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
35. Benchmarks
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
_________ is the process of moving up - down - or sideways through the text or other screen display.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
36. Service Provider
Computer processing is the ____________ of data which transforms data into information.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
37. Input/Output
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
A spreadsheet _____ is any number used in a calculation.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
38. Debugger
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Virtual memory uses the hard disk to _____ primary storage (RAM).
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
39. Kilobyte
Examples of personal finance manager software include ________ and Microsoft Money.
The ________ ________ is the computer software that manages the basic operation of the computer.
A ________ is a unit of measurement equaling 1024 bytes of data.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
40. Operating System
This data is _____ when the computer is turned off.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
RAM usually consists of several _____ ______(chips) that plug directly into the computer's system board.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
41. Sort
Commands written for a specific CPU or microprocessor are ____ _____ languages.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
42. Copies
43. Parallel
When a computer performs several tasks simultaneously - this is called ________ processing.
In a relational database - a ___ field is used to sort data.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
44. Network interface
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
A firewall can be _________ or software-based or a combination of the two.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
45. Registers
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
Such information includes information related to company finances - _________ - products and procedures.
_______ ________ was the first to define concepts that were to be later used in modern computers.
46. Steps
In programming - a _________ is a prewritten module designed for a specific task.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
47. 64
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
Zipped files are _________ as part of the installation process.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
48. Windows
49. Memory
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Public key encryption uses ___ keys.
While the computer is running - it remains in main ______ and manages nonresident programs.
________ and assembly languages are low level languages.
50. Charles Babbage
A bus network has two endpoints and all computers are connected to a single wire or _____.
_______ ________ was the first to define concepts that were to be later used in modern computers.
______ data is data that has been converted into discrete digits such as 0s and 1s.
_________ systems were first used in second generation computers.