SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hyperlinks
__________ appear as colored or underlined words on a webpag
____ testing involves checking a program by running it with real world data.
The prefix '_____' means a thousand.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
2. Analog
_______ is the operating system installed on more than 80% of the world's personal computers.
______ data can be represented as a wave.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Common expansion cards include ________ cards - graphic cards - and memory cards.
3. Copies
4. Design
A wiki is one or more ___ documents that can be viewed and changed by users.
Secondary storage refers to devices and media that store data _____________.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
5. CPU
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
Examples of DTP software include MS __________ and PageMaker.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
______ generation computers were microprocessor based.
6. Avatars
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
_______ are computer depictions of humans often found in computer games and training software.
In the same year - they released the ________ computer.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
7. Data
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
8. Format
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Syntax refers to the _______ in which computer programming commands must be entered.
UNIVAC was the first commercially successful _______ computer.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
9. Instrument
The kernel is also known as the ___________.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
MIDI stands for Musicial ___________ Digital Interface.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
10. Kilo
11. Direction
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
In a ring network - all packets flow in only one __________; there are no data collisions.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
12. Real world
13. Voice
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
VoIP stands for ______ over Internet Protocol.
14. Organize
The opposite of a variable is a _________ - which is a factor that remains the same throughout the program.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Transmission is limited to ______ range.
15. Word
16. Purchases
System software includes device drivers - utility programs - and the __________ system.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Adware is spyware that tracks surfing and online _________.
A ___ is a commonly used component that connects devices on the LAN.
17. Sequential
Common expansion cards include ________ cards - graphic cards - and memory cards.
________ are used to transmit data between LANs of different network topologies or network operating systems.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Random access is much faster than ___________ access storage (tape).
18. Disk drive
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
Public key encryption uses ___ keys.
19. Credit card
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
20. Restore
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
IP addresses can be changed by the network _______________.
21. Location
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
When data is ________ in one cell - data in other cells is automatically recalculated.
Site licenses allow software to be used on all computers at a specific ________.
___ - ring - and star are the three basic network topologies.
22. Former
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
Second generation computers used ___________ instead of vacuum tubes.
Search agents and _____ search tools allow you to automate your search process across many sites.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
23. CPU
_________ authentication devices verify a person's identity using the person's physical characteristics.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Most computer processing takes place in a component called the ___.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
24. Machine
A browser ________ is spyware that changes browser settings without your knowledge.
A ________ is a collection of interrelated files in a computer system.
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
The instruction cycle is also often referred to as the ________ cycle.
25. Permanently
The columns are called _______.
Secondary storage refers to devices and media that store data _____________.
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
______ generation computers were microprocessor based.
26. Icons
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
TCP/IP is an example of a network ________________ protocol.
27. Short
In the same year - they released the ________ computer.
Many employers view IT _____________ with some degree of skepticism.
Transmission is limited to ______ range.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
28. Checkbooks
A LAN (______ _____ Network) normally occupies a single building.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
Second generation computers used ___________ instead of vacuum tubes.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
29. Numeric
In a ring network - all packets flow in only one __________; there are no data collisions.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A message that has not been _________ is called plaintext.
Analytical graphics are graphical forms that make _______ data easier to analyze.
30. Wozniak
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Random access storage allows access to any location in any _____.
31. Digital
______ data is data that has been converted into discrete digits such as 0s and 1s.
Virtual memory uses the hard disk to _____ primary storage (RAM).
_______ are computer depictions of humans often found in computer games and training software.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
32. Letters
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
A typical computer includes the system and a variety of input - output and ______ devices.
A single hard drive could be partitioned and labeled with multiple drive ________.
Examples of OOP languages include C++ and _____.
33. Instruction
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
Data and programs waiting to be processed wait in ______ in temporary storage.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
34. File names
The toolbar displays menus and icons of commonly used ________ and options.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
While the computer is running - it remains in main ______ and manages nonresident programs.
Current versions of Windows support ____ ______ up to 255 characters long.
35. Word wrap
A ________ is a unit of measurement equaling 1024 bytes of data.
Analytical graphics are graphical forms that make _______ data easier to analyze.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Lettered ______ headings appear across the top frame of the spreadsheet.
36. MB
A megabyte is often abbreviated as ___.
Databases use structured files to _________ data.
______ times for PC storage devices are measured in milliseconds.
UNIVAC was the first commercially successful _______ computer.
37. Partition
_______ are computer depictions of humans often found in computer games and training software.
A keystroke logger can be used to steal __________.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
38. Byte
A unit of measure equaling 8 bits is a ____.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
39. Background
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
The computer's main ______ typically consists of high speed RAM which stores instructions and data.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
40. Text
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
VPN stands for ________ Private Network.
Random access storage devices are able to go _____ to the requested data
Word processing software is used to create - edit - print - format and store ____.
41. Organize
A database index can be used to _________ data in alphabetical or numerical order.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
____ testing involves checking a program by running it with real world data.
42. Hypertext Transfer
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
_______ is the operating system installed on more than 80% of the world's personal computers.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
43. Secondary
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
_____ ______ cable transmits pulsating beams of light rather than electricity.
DHCP stands for Dynamic Host _______________ Protocol.
44. Hub
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
This can also be called a command-_____ interface.
One ___________ is one thousandth of a second.
A ___ is a commonly used component that connects devices on the LAN.
45. Operating System
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Products which are announced but are never ________ are called vaporware.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
Random access storage devices are able to go _____ to the requested data
46. Group
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
A _____ of adjacent cells on a spreadsheet is called a range.
47. Routes
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
Meeting ___________ software is an example of groupware.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
48. Bell
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Improper positioning of your keyboard and mouse can cause ___.
UNIX was first developed by _____ Laboratories in 1969.
A megabyte is often abbreviated as ___.
49. Standalone
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Output is the result of ___________.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Cache is ____ when the computer power is turned off.
50. Fourth
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
______ generation languages are typically used for database applications.
Spreadsheet instructions for ____________ are called formulas.