SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cursor
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
The ______ is a marker on the monitor which indicates where the next character will appear.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
2. Human
They are for ______ use only and are ignored by the compiler when it processes the code.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
________ ________ plan and implement new or improved computer services.
3. Flash
4. Widget
A desktop ______ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
A spreadsheet ________ is a built-in formula which performs common calculations.
Most Information Systems departments are managed by a ___.
5. Hardware
_____________ is the process of recomputing values in a spreadsheet.
Personal computers are also called ______________.
A single hard drive could be partitioned and labeled with multiple drive ________.
All the physical equipment in a computer system is called ________.
6. Clip art
The columns are called _______.
A LAN (______ _____ Network) normally occupies a single building.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
In programming - an event is defined as an ______.
7. Providers
In programming - an event is defined as an ______.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
8. URL
The central computer is called a ____.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Current versions of Windows support ____ ______ up to 255 characters long.
______ generation computers were microprocessor based.
9. Ports
The easiest way to reduce exposure to cellphone _________ is to use a headset.
_____ ______ cable transmits pulsating beams of light rather than electricity.
Like hubs - switches have multiple ______.
VPN stands for ________ Private Network.
10. Changed
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
MAC addresses are set from the factory and cannot be ________ by the network admin.
Adware is spyware that tracks surfing and online _________.
11. Nonvolatile
___ - ring - and star are the three basic network topologies.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
12. Passwords
Secondary storage refers to devices and media that store data _____________.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
In a _____________ LAN - individual computer users share the services of a centralized computer.
A keystroke logger can be used to steal __________.
13. Prototype
CSMA/CD is the Ethernet protocol that handles __________.
The main circuit board of the computer is called the ___________.
A _________ is a limited working system - developed to test design concepts.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
14. Whistleblowers
A unit of measure equaling 8 bits is a ____.
An ______ _______ is an interactive computer program that helps users solve problems.
The prefix '_____' means a thousand.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
15. Free
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
___ allows a block of program code to be reused in other programs.
Freeware is software that is copyrighted but is available for ____.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
16. Intruders
A firewall is designed to protect a computer or network from _________.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Private networks that are connected to remote sites via the internet are called ____.
In a relational database - information is organized in rows and columns. Rows are called _______.
17. Location
_________ is the process of moving up - down - or sideways through the text or other screen display.
Site licenses allow software to be used on all computers at a specific ________.
System ______________ involves converting files - software and hardware to the new system.
_______ is a version of UNIX popular for large websites and e-commerce servers.
18. Purchases
The internet is an example of a WAN (______ ____ Network).
One ___________ is one thousandth of a second.
Adware is spyware that tracks surfing and online _________.
HTML is a set of special instructions used to create ____ _____.
19. Modern
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
20. VoIP
____ is an internet protocol used to make phone calls over the internet.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
When you install software or hardware - information is ______ in the registry.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
21. Lost
This data is _____ when the computer is turned off.
For every software _____________ - the CPU control unit carries out four basic operations known as the machine cycle.
The internet is an example of a WAN (______ ____ Network).
_______ are small text files left on your hard drive by websites you visit.
22. Digital
Column headings are used to select an entire _______ with a mouse click.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
______ data is data that has been converted into discrete digits such as 0s and 1s.
23. Record
A collection of fields make up a _______.
Personal computers are also called ______________.
VoIP stands for ______ over Internet Protocol.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
24. HTTP
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
With a relational database - users _____ records to locate and display them.
25. Monitors
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
In Windows - to see a list of active _________ - you must open the task manager.
Products which are announced but are never ________ are called vaporware.
26. Punctuation
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
___________ programming rules are called syntax.
27. Instructions
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
Early computers stored ____ for calculations and programs on punched cards.
28. Local Area
___ - ring - and star are the three basic network topologies.
Software designed to solve a specific problem is called ___________ software.
A print server manages one or more printers and stores printed ______.
A LAN (______ _____ Network) normally occupies a single building.
29. Primary
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
_______ storage is temporary and holds data waiting to be processed.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
30. Run
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
Random access is much faster than ___________ access storage (tape).
______ data can be represented as a wave.
31. Cyphertext
A template is a ____________ document often provided with word processing software.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
In a ring network - all packets flow in only one __________; there are no data collisions.
A message which has been encrypted is called __________.
32. Machine
________ ________ plan and implement new or improved computer services.
The instruction cycle is also often referred to as the ________ cycle.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
Site licenses allow software to be used on all computers at a specific ________.
33. Manipulation
Computer processing is the ____________ of data which transforms data into information.
Output is the result of ___________.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
34. Repeat
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Current versions of Windows support ____ ______ up to 255 characters long.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
35. Peripheral
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Productivity software is designed to help people work more ___________.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
______ times for PC storage devices are measured in milliseconds.
36. Javascript
Microsoft Windows is the world's best selling ________ __________.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
A ___ is a commonly used component that connects devices on the LAN.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
37. Defragmentation
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
Most Information Systems departments are managed by a ___.
An organization that provides internet access is called an ___.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
38. Numeric
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
Most Information Systems departments are managed by a ___.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
Analytical graphics are graphical forms that make _______ data easier to analyze.
39. Transistors
Random access storage allows access to any location in any _____.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
Such information includes information related to company finances - _________ - products and procedures.
40. Bits
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
Settings automatically used by a program unless changed by the user are called _______ settings.
Column headings are used to select an entire _______ with a mouse click.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
41. Configuration
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
DHCP stands for Dynamic Host _______________ Protocol.
_____ generation computers used integrated circuits.
A template is a ____________ document often provided with word processing software.
42. Wozniak
Messages are encrypted using a cryptographic _________ and a key.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
43. Research
Such information includes information related to company finances - _________ - products and procedures.
Spreadsheet instructions for ____________ are called formulas.
A collection of fields make up a _______.
Values are the actual numbers or dates entered into ______.
44. Bits per second
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
A computer's ____ size is the number of bits that the processor may process at any one time.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
45. Output
The instruction cycle is also often referred to as the ________ cycle.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
The monitor - speakers - and printer are examples of computer ______ devices.
Programmers use assembly languages to write ______ software.
46. Cyberterrorists
CIO stands for _______ ____________ Officer.
Private networks that are connected to remote sites via the internet are called ____.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Freeware is software that is copyrighted but is available for ____.
47. Served
_______ errors can be found with a debugger.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
______________ are the most expensive and fastest computers available.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
48. ENIAC
They are for ______ use only and are ignored by the compiler when it processes the code.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
_________ is the process of moving up - down - or sideways through the text or other screen display.
49. Illegally
_____________ people is one important way to protect software and data.
A firewall can be _________ or software-based or a combination of the two.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Software obtained _________ is said to be pirated.
50. Word processor
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
LISP is a programming language used primarily for creating __________ _____________ programs.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.