SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Secondary
Examples of an event include a key press or a mouse ______.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
Examples of keywords include READ - ______ - IF - and THEN
VoIP stands for ______ over Internet Protocol.
2. Organize
In MS PowerPoint - the outline view helps you ________ the content of your material.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
A ________ is a collection of interrelated files in a computer system.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
3. Command line
The most common user interface for UNIX systems is the ________ ____ interface.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
A firewall can be _________ or software-based or a combination of the two.
_____ ______ cable transmits pulsating beams of light rather than electricity.
4. Scheduling
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Meeting ___________ software is an example of groupware.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
A message which has been encrypted is called __________.
5. Hardware
A firewall can be _________ or software-based or a combination of the two.
With a ______ implementation - parts of the new system are implemented separately.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
6. Line
This can also be called a command-_____ interface.
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
Examples include _____________ identification and retina scanners.
7. Operating system
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
The ________ ________ is the computer software that manages the basic operation of the computer.
8. Miniatures
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
_____________ people is one important way to protect software and data.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
9. Solved
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Web page design software allows users to create sophisticated web pages with ___________ features.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Examples of DTP software include MS __________ and PageMaker.
10. Click
___________ programming rules are called syntax.
Examples of an event include a key press or a mouse ______.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
In recent years - antivirus software has been one of the most popular categories of _______ software.
11. Changed
The main circuit board of the computer is called the ___________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
A ___ is the smallest unit of data that a system can handle.
A keystroke logger can be used to steal __________.
12. 1971
_________ is the process of moving up - down - or sideways through the text or other screen display.
The first microprocessor was developed in _____.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
13. Formula
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
The columns are called _______.
An algorithm is a _______ or set of steps for solving a particular problem.
In a star network - all computers are connected to a _______ computer.
14. Operating
FTP is a protocol used to copy _____ from one computer to another over the Internet.
_________ systems were first used in second generation computers.
Productivity software is designed to help people work more ___________.
Handheld computers and ____s are examples of embedded systems because the operating system resides on a single chip.
15. Reliable
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
A browser ________ is spyware that changes browser settings without your knowledge.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
16. Prices
Companies do this to keep _______ low.
Random access is much faster than ___________ access storage (tape).
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
17. Phishers
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
______ generation languages are typically used for database applications.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
______________ are the most expensive and fastest computers available.
18. Run
_______ are computer depictions of humans often found in computer games and training software.
Current versions of Windows support ____ ______ up to 255 characters long.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
19. Record
Cache is ____ when the computer power is turned off.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
20. Commands
______ data can be represented as a wave.
A ______ is a small unit of data transmitted over a network.
Computer resources include the ____ - RAM - storage space - and peripherals.
The toolbar displays menus and icons of commonly used ________ and options.
21. TIFF
_______ is a version of UNIX popular for large websites and e-commerce servers.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
22. Artificial intelligence
LISP is a programming language used primarily for creating __________ _____________ programs.
_____________ is the process of recomputing values in a spreadsheet.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
23. LAN
A data communications network that connects personal computers within a limited geographical area is called a ___.
_______ errors can be found with a debugger.
A computer's ____ size is the number of bits that the processor may process at any one time.
System ______________ involves converting files - software and hardware to the new system.
24. Calculations
A wiki is one or more ___ documents that can be viewed and changed by users.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
UNIX was first developed by _____ Laboratories in 1969.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
25. Infrared
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
___________ and security are MS Windows' two major weaknesses.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
________ transmission sends data via light waves at a frequency too low for human eyes to see.
26. Point
Each connection _____ on a network is called a node.
A program or instruction book that helps users learn how to use a product by taking the user through a series of _____ is called a tutorial.
______________ are the most expensive and fastest computers available.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
27. Binary
____ and RPG-I are examples of fourth generation languages.
A database index can be used to _________ data in alphabetical or numerical order.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
28. Cursor
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
The ______ is a marker on the monitor which indicates where the next character will appear.
Personal Information Management software helps users organize and manage daily ________ activities.
Analytical graphics are graphical forms that make _______ data easier to analyze.
29. Supervisor
CIO stands for _______ ____________ Officer.
The kernel is also known as the ___________.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
___ software is used to design products - maps - structures and civil engineering drawings.
30. Lost
This data is _____ when the computer is turned off.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
31. Compiler
A wiki is one or more ___ documents that can be viewed and changed by users.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
A spreadsheet ________ is a built-in formula which performs common calculations.
32. Protocol
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
_____ generation computers used integrated circuits.
Web page design software allows users to create sophisticated web pages with ___________ features.
33. Bus
___ - ring - and star are the three basic network topologies.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
Examples include _____________ identification and retina scanners.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
34. Processors
An example of parallel processing is when several ___________ work together sharing memory on the same task.
In the same year - they released the ________ computer.
_____ generation computers used integrated circuits.
The process of converting cyphertext to plaintext is ___________
35. Function
A spreadsheet ________ is a built-in formula which performs common calculations.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
Fetch - ______ - execute and store are the four basic operations of the machine cycle.
36. Slide show
DHCP stands for Dynamic Host _______________ Protocol.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
A wiki is one or more ___ documents that can be viewed and changed by users.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
37. Credit card
Personal Information Management software helps users organize and manage daily ________ activities.
________ are used to transmit data between LANs of different network topologies or network operating systems.
Proprietary information about a company concerns information a __________ might find valuable.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
38. Ergonomics
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A data communications network that connects personal computers within a limited geographical area is called a ___.
__________ is the study of safe and efficient work environments.
Linux is an ____ _______ operating system that can be modified and freely distributed.
39. Processes
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
40. MYCIN
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
41. Illegally
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
This data is _____ when the computer is turned off.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Software obtained _________ is said to be pirated.
42. Temporary
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
This can also be called a command-_____ interface.
43. Location
Private _________ that connect internal personnel and selected vendors are called extranets.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
Site licenses allow software to be used on all computers at a specific ________.
44. Desktop
45. NAP
Values are the actual numbers or dates entered into ______.
ISPs are connected to the internet backbone via a ___.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
46. Spreadsheet
CSMA/CD is the Ethernet protocol that handles __________.
___ software is used to design products - maps - structures and civil engineering drawings.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
47. Structured
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A __________ file uses a uniform format to store data for each person or thing in the file.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
System software include device ________ - operating systems - and compilers.
48. Clip art
A message that has not been _________ is called plaintext.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
MAC addresses are set from the factory and cannot be ________ by the network admin.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
49. Organize
A computer resource is any component required to perform ____.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
The instruction cycle is also often referred to as the ________ cycle.
A database index can be used to _________ data in alphabetical or numerical order.
50. Keystroke
A ____ network has no endpoints and all computers are connected in a continuous loop.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
A _________ logger is a type of spyware that records each character you type.
A _____ of adjacent cells on a spreadsheet is called a range.