SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Disk drive
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
_______ storage is temporary and holds data waiting to be processed.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
2. Recorded
When you install software or hardware - information is ______ in the registry.
Spreadsheet instructions for ____________ are called formulas.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
___ allows a block of program code to be reused in other programs.
3. Phased
Linux is an ____ _______ operating system that can be modified and freely distributed.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
With a ______ implementation - parts of the new system are implemented separately.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
4. Bulletin board
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Data consists of ___ facts and figures that is processed to produce information.
5. Commands
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
A communications network that covers a large geographic area such as a country is called a ___.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
MIDI stands for Musicial ___________ Digital Interface.
6. Serial
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
7. Cursor
With a ______ implementation - parts of the new system are implemented separately.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
Virtual memory uses the hard disk to _____ primary storage (RAM).
The ______ is a marker on the monitor which indicates where the next character will appear.
8. Dashboard
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
_____________ people is one important way to protect software and data.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
9. Instructions
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
The prefix '____' means a million.
10. Queues
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
A _________ logger is a type of spyware that records each character you type.
Web page design software allows users to create sophisticated web pages with ___________ features.
Data and programs waiting to be processed wait in ______ in temporary storage.
11. Function
Disposal of _______ is a major environmental problem caused by information technology.
A spreadsheet ________ is a built-in formula which performs common calculations.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
12. Time
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Output is the result of ___________.
13. Copies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. CAD
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
___ software is used to design products - maps - structures and civil engineering drawings.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
15. Network
With a ______ implementation - parts of the new system are implemented separately.
Groupware is software that allows several people to collaborate on projects over a _______.
On the job choices that reflect a person's values are called ____________ ethics.
Harvard Graphics and MS __________ are examples of presentation graphics software.
16. Timeline
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
_______ are computer depictions of humans often found in computer games and training software.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
17. Multimedia
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Web page design software allows users to create sophisticated web pages with ___________ features.
18. Sequentially
________ ________ plan and implement new or improved computer services.
Harvard Graphics and MS __________ are examples of presentation graphics software.
With serial processing - instructions are executed ______________ in the order received.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
19. Com
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
________ transmission sends data via light waves at a frequency too low for human eyes to see.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
System ______________ involves converting files - software and hardware to the new system.
20. File names
Lettered ______ headings appear across the top frame of the spreadsheet.
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
Proprietary information about a company concerns information a __________ might find valuable.
Current versions of Windows support ____ ______ up to 255 characters long.
21. Network
The hub prevents packet collisions - but if the hub goes down the _____ stops.
A computer resource is any component required to perform ____.
The instruction cycle is also often referred to as the ________ cycle.
The location on a spreadsheet where a row and a column intersect is called a ____.
22. Central
Servers can store files or provide services (i.e. printing) to ________ on the network.
A __________ file uses a uniform format to store data for each person or thing in the file.
A _______ computer that holds a collection of data and/or applications for providing services to workstations or PCs is called a server.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
23. Processes
A _____ is a single keystroke or command used to automatically issue a longer - predefined series of keystrokes or commands.
Column headings are used to select an entire _______ with a mouse click.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
In Windows - to see a list of active _________ - you must open the task manager.
24. Business
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
25. TCP/IP
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
With a relational database - users _____ records to locate and display them.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
26. Network interface
Using components or labor from outside suppliers is called ___________.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Data consists of ___ facts and figures that is processed to produce information.
27. Research
A modem is a device that sends and receives data over __________ lines to and from computers.
Such information includes information related to company finances - _________ - products and procedures.
A bus network has two endpoints and all computers are connected to a single wire or _____.
Using components or labor from outside suppliers is called ___________.
28. Fraud
__________ uses mathematical formulas to create coded messages.
This act established financial reporting regulations to prevent corporate ______.
Productivity software is designed to help people work more ___________.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
29. Central
An organization that provides internet access is called an ___.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Column headings are used to select an entire _______ with a mouse click.
30. High level
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Private _________ that connect internal personnel and selected vendors are called extranets.
_____ ______ cable transmits pulsating beams of light rather than electricity.
31. Packet
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
A ______ is a small unit of data transmitted over a network.
In a ring network - all packets flow in only one __________; there are no data collisions.
32. Volatile
_______ are computer depictions of humans often found in computer games and training software.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
In programming - a variable represents a value that can ______.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
33. Peripheral
DHCP stands for Dynamic Host _______________ Protocol.
Random access is much faster than ___________ access storage (tape).
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
34. Organize
Syntax refers to the _______ in which computer programming commands must be entered.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
In MS PowerPoint - the outline view helps you ________ the content of your material.
A ________ is a unit of measurement equaling 1024 bytes of data.
35. Windows
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Column headings are used to select an entire _______ with a mouse click.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
36. CPU
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
First generation computers used _______ _____ to store individual bits of data.
Most computer processing takes place in a component called the ___.
37. Intruders
A firewall is designed to protect a computer or network from _________.
____ testing involves checking a program by running it with real world data.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Many employers view IT _____________ with some degree of skepticism.
38. Memory
Zipped files are _________ as part of the installation process.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
They are for ______ use only and are ignored by the compiler when it processes the code.
39. VPNs
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Products which are announced but are never ________ are called vaporware.
Private networks that are connected to remote sites via the internet are called ____.
40. Configuration
_____ data can be text - images - numbers - or sounds.
DHCP stands for Dynamic Host _______________ Protocol.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
41. Encrypted
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
A message that has not been _________ is called plaintext.
They are for ______ use only and are ignored by the compiler when it processes the code.
MIDI stands for Musicial ___________ Digital Interface.
42. Credit card
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
__________ is the study of safe and efficient work environments.
ISPs are connected to the internet backbone via a ___.
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
43. Record
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
First generation computers used _______ _____ to store individual bits of data.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
A collection of fields make up a _______.
44. Security
Examples of an event include a key press or a mouse ______.
The prefix '_____' means a thousand.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
45. CIO
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Most Information Systems departments are managed by a ___.
The process of converting cyphertext to plaintext is ___________
NAP stands for ________________ Point.
46. Security
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
This UNIX-based kernel also contributes to stronger _________.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
47. Line
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
This can also be called a command-_____ interface.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
All the physical equipment in a computer system is called ________.
48. Execution
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
The compiled program is saved as object code for later __________.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
49. Connection
When you click the link - it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the _________ have your username and password.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
50. NAP
Trojan horses can also carry ________ and destructive instructions.
ISPs are connected to the internet backbone via a ___.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.