SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Million
Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by _________.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
One ___________ is one thousandth of a second.
The prefix '____' means a million.
2. One
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
Multiple files which have been consolidated into ___ file and compressed to reduce size and download time are said to be zipped.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Virtual memory uses the hard disk to _____ primary storage (RAM).
3. Operating
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
_______ ________ was the first to define concepts that were to be later used in modern computers.
System software includes device drivers - utility programs - and the __________ system.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
4. Sender's
5. Intranets
Private _________ that connect internal personnel and selected vendors are called extranets.
________ are used to transmit data between LANs of different network topologies or network operating systems.
An _________ slot is a slot on the motherboard where the user can plug in an expansion card.
Most Information Systems departments are managed by a ___.
6. Changed
Zipped files are _________ as part of the installation process.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
MAC addresses are set from the factory and cannot be ________ by the network admin.
A database index contains a list of keys and each key provides a pointer to the ______ that contains the rest of the fields related to that key.
7. Parallel
When a computer performs several tasks simultaneously - this is called ________ processing.
This is where the term __________ (a group edited encyclopedia) comes from.
Virtual memory uses the hard disk to _____ primary storage (RAM).
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
8. Key
____ is an internet protocol used to make phone calls over the internet.
In a relational database - a ___ field is used to sort data.
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
9. Purchases
Software designed to solve a specific problem is called ___________ software.
Column headings are used to select an entire _______ with a mouse click.
Adware is spyware that tracks surfing and online _________.
To be an algorithm - a set of rules must be unambiguous and have a clear _________ point.
10. Reliability
11. Printed
____ and RPG-I are examples of fourth generation languages.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
12. Windows
VoIP stands for ______ over Internet Protocol.
A single hard drive could be partitioned and labeled with multiple drive ________.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
13. Two
A firewall can be _________ or software-based or a combination of the two.
Logic bombs are _______ that are set to go off at a certain time.
Public key encryption uses ___ keys.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
14. Disk scanner
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
The monitor - speakers - and printer are examples of computer ______ devices.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Products which are announced but are never ________ are called vaporware.
15. Bus
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
___ - ring - and star are the three basic network topologies.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
Harvard Graphics and MS __________ are examples of presentation graphics software.
16. Cars
NAP stands for ________________ Point.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
______ generation languages are typically used for database applications.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
17. Numeric
Analytical graphics are graphical forms that make _______ data easier to analyze.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
This is where the term __________ (a group edited encyclopedia) comes from.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
18. Operating system
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
A ____ network has no endpoints and all computers are connected in a continuous loop.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
Groupware is software that allows several people to collaborate on projects over a _______.
19. Security
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
A service pack is a collection of Microsoft files for ________ improvements - bug fixes - and software updates.
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
Lettered ______ headings appear across the top frame of the spreadsheet.
20. Volatile
Examples of random access storage include computer hard disk drives - RAM - ____ _____ - floppy drives and CD-ROM drives.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
___ - ring - and star are the three basic network topologies.
The contents of ________ memory - which includes RAM - are lost when the power is turned off.
21. URL
Paint - photo _______ - and drawing software are all examples of graphics software.
Servers can store files or provide services (i.e. printing) to ________ on the network.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
22. Internet
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
____ ________ software detects and corrects certain types of common problems on hard disks - floppies - and CDs.
Paint - photo _______ - and drawing software are all examples of graphics software.
23. Group
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
A _____ of adjacent cells on a spreadsheet is called a range.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
24. Specific
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
A spreadsheet ________ is a built-in formula which performs common calculations.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
25. Office
A _________ is a limited working system - developed to test design concepts.
___ allows a block of program code to be reused in other programs.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
26. Unzipped
Zipped files are _________ as part of the installation process.
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized _________.
EarthLink - AT&T - and Road Runner are all examples of ISPs (Internet __________________).
27. Data
Messages are encrypted using a cryptographic _________ and a key.
Most computer processing takes place in a component called the ___.
Microsoft Windows is the world's best selling ________ __________.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
28. Bit
Packet _________ technology divides a message into packets that can be independently routed to their destination and then reassembled.
A ___ is the smallest unit of data that a system can handle.
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
____ is the communications protocol used by your browser to connect with web servers and display web pages on your computer.
29. 1971
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
MIDI is a protocol used to communicate between electronic _______ instruments and the devices that control and manage them.
The first microprocessor was developed in _____.
___ - ring - and star are the three basic network topologies.
30. Clip art
_________ systems were first used in second generation computers.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
Computer processing is the ____________ of data which transforms data into information.
31. Flight
Software designed to solve a specific problem is called ___________ software.
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
Proprietary information about a company concerns information a __________ might find valuable.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
32. Implementation
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
In programming - an event is defined as an ______.
_____________ is the process of recomputing values in a spreadsheet.
System ______________ involves converting files - software and hardware to the new system.
33. Click
Virtual memory uses the hard disk to _____ primary storage (RAM).
Examples of an event include a key press or a mouse ______.
Analytical graphics are graphical forms that make _______ data easier to analyze.
UNIX was first developed by _____ Laboratories in 1969.
34. Serial
A device ______ is system software used by the computer to control peripheral devices.
With ______ processing - the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
Alpha testing involves desk checking and _________.
35. Hypertext
Spelling and grammar checkers flag unrecognized words - misspelled words - and incorrect grammar with different color ________ lines.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
DHCP stands for Dynamic Host _______________ Protocol.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
36. Flash
37. Sort
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Examples of an event include a key press or a mouse ______.
A cryptographic key is a number - word - or phrase that must be used to ________ a message.
Like hubs - switches have multiple ______.
38. Produced
Examples of OOP languages include C++ and _____.
Examples of graphics file _______ include BMP - GIF - JPEG - TIFF - and PNG.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
Products which are announced but are never ________ are called vaporware.
39. Nonvolatile
Examples of an event include a key press or a mouse ______.
_________ authentication devices verify a person's identity using the person's physical characteristics.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
__________ uses mathematical formulas to create coded messages.
40. Hash
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
A hash function uses an algorithm to transform a given string of letters into a string that represents the original string (known as a _____).
If a program exceeds its available RAM - the _________ _________ can use an area of hard disk called virtual memory to store parts of data files or programs until needed - thereby gaining almost unlimited memory capacity.
A keystroke logger can be used to steal __________.
41. Loop
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
A LAN (______ _____ Network) normally occupies a single building.
The section of code that repeats is called a _____ or an iteration.
Drawings created with CAD (Computer Aided _______) software are 3D and can be rotated to view all sides.
42. Spelling
The section of code that repeats is called a _____ or an iteration.
A communications network that covers a large geographic area such as a country is called a ___.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
MIDI stands for Musicial ___________ Digital Interface.
43. Backup
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Linux is an ____ _______ operating system that can be modified and freely distributed.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
44. Addresses
DHCP is a protocol designed to automatically distribute IP _________.
Transferring data from a ______ computer to a local computer is called downloading.
Messages are encrypted using a cryptographic _________ and a key.
A message that has not been _________ is called plaintext.
45. Mimic
Virtual memory uses the hard disk to _____ primary storage (RAM).
Current versions of Windows support ____ ______ up to 255 characters long.
FTP is a protocol used to copy _____ from one computer to another over the Internet.
In a relational database - the _______ key holds a unique value for each record.
46. PIM
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
A megabyte is a unit of measurement roughly equaling one _______ bytes.
Early personal computers featured command-driven interfaces which required the user to ____ complicated instructions to operate the computer.
A database index can be used to _________ data in alphabetical or numerical order.
47. Processors
An example of parallel processing is when several ___________ work together sharing memory on the same task.
The toolbar displays menus and icons of commonly used ________ and options.
Small pictures on the desktop that represent documents - procedures and programs are called _____.
A ______ is a small unit of data transmitted over a network.
48. Multiply
In a relational database - a ___ field is used to sort data.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
This act established financial reporting regulations to prevent corporate ______.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
49. Requests
The compiled program is saved as object code for later __________.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of _________ - making it unable to respond to requests from legitimate users.
On a hard disk - this waiting area is called a _______.
50. Digital
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
In programming - a _________ is a prewritten module designed for a specific task.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
UNIVAC was the first commercially successful _______ computer.