SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Organize
Database ______________ create - maintain - and supervise the day to day operation of databases.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
A database index can be used to _________ data in alphabetical or numerical order.
2. Restore
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
3. Disk scanner
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
The columns are called _______.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
4. VPNs
Most computer processing takes place in a component called the ___.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Private networks that are connected to remote sites via the internet are called ____.
5. Processes
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
A what-if analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the _______ of the calculation.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
___ allows a block of program code to be reused in other programs.
6. Type
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Data and programs waiting to be processed wait in ______ in temporary storage.
Products which are announced but are never ________ are called vaporware.
7. Data
___ allows a block of program code to be reused in other programs.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Early computers stored ____ for calculations and programs on punched cards.
Examples of personal finance manager software include ________ and Microsoft Money.
8. Inference
9. Fragmentation
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
________ are used to transmit data between LANs of different network topologies or network operating systems.
The ________ ________ is the computer software that manages the basic operation of the computer.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
10. Icons
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A wizard is an interactive computer utility that asks a user questions to _____ the user through a task.
Companies do this to keep _______ low.
11. 64
This is where the term __________ (a group edited encyclopedia) comes from.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
The particular operating system and _________ model on which a computer system is based is called the platform.
12. WAN
Most Information Systems departments are managed by a ___.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
A communications network that covers a large geographic area such as a country is called a ___.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
13. TCP/IP
Improper positioning of your keyboard and mouse can cause ___.
A _____ of adjacent cells on a spreadsheet is called a range.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
Examples of DTP software include MS __________ and PageMaker.
14. Group
Companies do this to keep _______ low.
A _____ of adjacent cells on a spreadsheet is called a range.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
Forging an email ______'s name is called spoofing.
15. Random
Lettered ______ headings appear across the top frame of the spreadsheet.
This data is _____ when the computer is turned off.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
16. Avatars
_____ ______ cable transmits pulsating beams of light rather than electricity.
When a computer performs several tasks simultaneously - this is called ________ processing.
_______ are computer depictions of humans often found in computer games and training software.
System ______________ involves converting files - software and hardware to the new system.
17. Routes
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
18. Change
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
The prefix '_____' means a thousand.
In programming - a variable represents a value that can ______.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
19. Kilobyte
A ________ is a unit of measurement equaling 1024 bytes of data.
In programming - a variable represents a value that can ______.
_________ is the process of moving up - down - or sideways through the text or other screen display.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
20. Processing
Output is the result of ___________.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Analytical graphics are graphical forms that make _______ data easier to analyze.
CIO stands for _______ ____________ Officer.
21. Binary
In a relational database - the _______ key holds a unique value for each record.
The process of converting cyphertext to plaintext is ___________
In MS PowerPoint - the outline view helps you ________ the content of your material.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
22. Background
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
Data consists of ___ facts and figures that is processed to produce information.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
23. Work
A spreadsheet _____ is any number used in a calculation.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
______ data is data that has been converted into discrete digits such as 0s and 1s.
A computer resource is any component required to perform ____.
24. Served
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Computer resources include the ____ - RAM - storage space - and peripherals.
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
25. Communications
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
Random access storage devices are able to go _____ to the requested data
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
TCP/IP is an example of a network ________________ protocol.
26. Default
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
In a _____________ LAN - individual computer users share the services of a centralized computer.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Settings automatically used by a program unless changed by the user are called _______ settings.
27. Bits per second
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
When an employee uses their employer's computer time for non-work activities - this is called theft of time and ________.
_____ ______ cable transmits pulsating beams of light rather than electricity.
28. Competitor
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
Proprietary information about a company concerns information a __________ might find valuable.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
29. Decryption
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
________ and assembly languages are low level languages.
The process of converting cyphertext to plaintext is ___________
30. Transistors
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Some computers have a ______ chip containing the circuits for two microprocessors; this is called a dual core processor.
Second generation computers used ___________ instead of vacuum tubes.
31. Debugging
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
Servers can store files or provide services (i.e. printing) to ________ on the network.
The particular operating system and _________ model on which a computer system is based is called the platform.
Alpha testing involves desk checking and _________.
32. Top
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Groupware is software that allows several people to collaborate on projects over a _______.
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
Common expansion cards include ________ cards - graphic cards - and memory cards.
33. Security
This UNIX-based kernel also contributes to stronger _________.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
The Internet is a worldwide computer _______ that connects hundreds of thousands of smaller networks.
_______ ________ was the first to define concepts that were to be later used in modern computers.
34. Solved
________ row headings appear down the left frame of the spreadsheet.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
35. Web
A wiki is one or more ___ documents that can be viewed and changed by users.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
The compiled program is saved as object code for later __________.
36. Modem
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
37. Employees
38. Network
This act established financial reporting regulations to prevent corporate ______.
In Windows - to see a list of active _________ - you must open the task manager.
A data communications network that connects personal computers within a limited geographical area is called a ___.
Common expansion cards include ________ cards - graphic cards - and memory cards.
39. Specific
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
Column headings are used to select an entire _______ with a mouse click.
____ and RPG-I are examples of fourth generation languages.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
40. Open source
Linux is an ____ _______ operating system that can be modified and freely distributed.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
FTP can be used on any _______ network such as a LAN or the Internet and is compatible with any operating system.
41. Companies
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
TCP/IP is an example of a network ________________ protocol.
The more _____ in a word - the faster the computer.
42. Trojan horse
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
NAP stands for ________________ Point.
The prefix '____' means a million.
43. Pretty Good
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
Products which are announced but are never ________ are called vaporware.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
______ generation computers were microprocessor based.
44. Operating system
Most Information Systems departments are managed by a ___.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
The ________ ________ is the computer software that manages the basic operation of the computer.
45. Client/server
In a _____________ LAN - individual computer users share the services of a centralized computer.
A computer's ____ size is the number of bits that the processor may process at any one time.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
46. HTTP
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
Private networks that are connected to remote sites via the internet are called ____.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
47. Keystroke
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
In a relational database - a ___ field is used to sort data.
A _________ logger is a type of spyware that records each character you type.
48. Cycle
___________ programming rules are called syntax.
When data is ________ in one cell - data in other cells is automatically recalculated.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
49. Column
Early computers stored ____ for calculations and programs on punched cards.
Lettered ______ headings appear across the top frame of the spreadsheet.
_______ are computer depictions of humans often found in computer games and training software.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
50. Byte
A unit of measure equaling 8 bits is a ____.
A computer's ____ size is the number of bits that the processor may process at any one time.
A kilobyte is generally abbreviated as __.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.