SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Flowchart
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
A _________ is a graphical representation of a series of steps needed to solve a problem.
_______ storage is temporary and holds data waiting to be processed.
2. Sender's
3. Syntax
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
Using components or labor from outside suppliers is called ___________.
_______ errors can be found with a debugger.
A database index can be used to _________ data in alphabetical or numerical order.
4. Cyberspace
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
In recent years - antivirus software has been one of the most popular categories of _______ software.
Graphics software is designed to help users manipulate and ______ graphics.
5. Overclocking
________ transmission sends data via light waves at a frequency too low for human eyes to see.
DHCP is a protocol designed to automatically distribute IP _________.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
6. Forum
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
7. Solaris
A browser ________ is spyware that changes browser settings without your knowledge.
_______ is a version of UNIX popular for large websites and e-commerce servers.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
This UNIX-based kernel also contributes to stronger _________.
8. Packet
A ______ is a small unit of data transmitted over a network.
DHCP stands for Dynamic Host _______________ Protocol.
They are for ______ use only and are ignored by the compiler when it processes the code.
The ______ is a marker on the monitor which indicates where the next character will appear.
9. HTTP
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Search agents and _____ search tools allow you to automate your search process across many sites.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
10. OOP
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
___ allows a block of program code to be reused in other programs.
Random access is much faster than ___________ access storage (tape).
11. Hypertext Transfer
Graphics software is designed to help users manipulate and ______ graphics.
__________ is the study of safe and efficient work environments.
Most Information Systems departments are managed by a ___.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
12. Preformatted
In a relational database - information is organized in rows and columns. Rows are called _______.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
___ software is used to design products - maps - structures and civil engineering drawings.
A template is a ____________ document often provided with word processing software.
13. Fraud
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
This act established financial reporting regulations to prevent corporate ______.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
14. Keystroke
Random access is much faster than ___________ access storage (tape).
___ allows a block of program code to be reused in other programs.
A _________ logger is a type of spyware that records each character you type.
Critics of certification exams maintain that a multiple choice test can't accurately measure a person's ability to deal with _____ ______ software and equipment.
15. Copyrighted
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Public domain software is not ___________ and can be copied without fear of prosecution.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
Adware is spyware that tracks surfing and online _________.
16. Web pages
HTML is a set of special instructions used to create ____ _____.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
A system of interconnected telephones - computers - or other communication devices that can communicate and share data is called a _______.
Random access storage allows access to any location in any _____.
17. Charles Babbage
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
_______ ________ was the first to define concepts that were to be later used in modern computers.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
18. Formula
When you install software or hardware - information is ______ in the registry.
In a relational database - a ___ field is used to sort data.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
An algorithm is a _______ or set of steps for solving a particular problem.
19. Dashboard
Second generation computers used ___________ instead of vacuum tubes.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
IP addresses can be changed by the network _______________.
20. Bus
System software helps the computer manage internal and external _________ and enables the computer to run applications.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
Computer processing is the ____________ of data which transforms data into information.
___ - ring - and star are the three basic network topologies.
21. Fil
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
A ______ is a small unit of data transmitted over a network.
22. Run
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
The JPEG graphics format has built-in _____________ that can be adjusted by the user.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
The system's main interface screen is called the _______ and displays icons which provide fast access to information and programs.
23. Motherboard
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
_______ errors can be found with a debugger.
The main circuit board of the computer is called the ___________.
In a relational database - information is organized in rows and columns. Rows are called _______.
24. Millisecond
Personal computers are also called ______________.
One reason a tape drive takes longer to access data than a ____ drive is that tape drives use sequential access.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
One ___________ is one thousandth of a second.
25. Purchases
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Adware is spyware that tracks surfing and online _________.
A spreadsheet _____ is any number used in a calculation.
Web page design software allows users to create sophisticated web pages with ___________ features.
26. Cell
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
Public domain software is not ___________ and can be copied without fear of prosecution.
The location on a spreadsheet where a row and a column intersect is called a ____.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
27. Binary
A template is a ____________ document often provided with word processing software.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Personal Information Management software helps users organize and manage daily ________ activities.
The 1s and 0s used to represent digital data are known as _______ digits.
28. Processor
The kernel is also known as the ___________.
_____ ______ cable transmits pulsating beams of light rather than electricity.
In MS PowerPoint - the outline view helps you ________ the content of your material.
The particular operating system and _________ model on which a computer system is based is called the platform.
29. Internet
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
Examples of DTP software include MS __________ and PageMaker.
30. Files
A kilobyte is generally abbreviated as __.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
UNIX was first developed by _____ Laboratories in 1969.
31. Million
Personal computers are also called ______________.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
32. Disk scanner
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
Data consists of ___ facts and figures that is processed to produce information.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
33. Processes
All the physical equipment in a computer system is called ________.
_________ systems were first used in second generation computers.
In Windows - to see a list of active _________ - you must open the task manager.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
34. Time
This act established financial reporting regulations to prevent corporate ______.
Open source software projects promote user modification - peer review - _____ distribution - and copying.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
35. MB
Telephone lines have traditionally been _______.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
A megabyte is often abbreviated as ___.
36. Local Area
A LAN (______ _____ Network) normally occupies a single building.
Secondary storage refers to devices and media that store data _____________.
Zipped files are _________ as part of the installation process.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
37. CPU
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
Computer resources include the ____ - RAM - storage space - and peripherals.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
38. Permission
39. Operating
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Database ______________ create - maintain - and supervise the day to day operation of databases.
_________ systems were first used in second generation computers.
Commands written for a specific CPU or microprocessor are ____ _____ languages.
40. Text
Mac OS X was rewritten for _____ architecture in 2006 and has a reputation for being an easy to use - reliable - and secure operating system.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Current versions of Windows support ____ ______ up to 255 characters long.
41. Addresses
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
DHCP is a protocol designed to automatically distribute IP _________.
In MS PowerPoint - the slide sorter view displays __________ of each slide - allowing you to change the order of your presentation.
42. Analog
A bus network has two endpoints and all computers are connected to a single wire or _____.
Telephone lines have traditionally been _______.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
DHCP is a protocol designed to automatically distribute IP _________.
43. Com
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
The section of code that repeats is called a _____ or an iteration.
44. Buffer
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Software designed to solve a specific problem is called ___________ software.
On a hard disk - this waiting area is called a _______.
______ data can be represented as a wave.
45. Importing
The monitor - speakers - and printer are examples of computer ______ devices.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
In a _____________ LAN - individual computer users share the services of a centralized computer.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
46. Operating System
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
Groupware is software that allows several people to collaborate on projects over a _______.
In a relational database - a ___ field is used to sort data.
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
47. High level
Micropayments are __________ payments for internet transactions as small as 25 cents.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
48. Windows
MAC addresses are set from the factory and cannot be ________ by the network admin.
Productivity software is designed to help people work more ___________.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
By holding down the ctrl - alt - and del keys - ________ OS will open the task manager which displays a list of active processes.
49. Remarks
In a relational database - information is organized in rows and columns. Rows are called _______.
A named collection of data that exists on a storage medium such as a hard disk - floppy disk - or CD is called a ____.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
_______ are notes included in the program code by the programmer.
50. Peripheral
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
The central computer is called a ____.
This can also be called a command-_____ interface.