SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transmit
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
For a computer to be able to take advantage of dual core or quad core technology - the installed ________ __________ has to support it.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
The process of converting cyphertext to plaintext is ___________
2. Checkbooks
Financial software allows users to track income and expenses - manage __________ - create reports - and record tax information.
Freeware is software that is copyrighted but is available for ____.
Individual computers (PCs - workstations) are called ________ and the centralized computer is called a server.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
3. Communications
A collection of fields make up a _______.
__________ uses mathematical formulas to create coded messages.
Paint - photo _______ - and drawing software are all examples of graphics software.
TCP/IP is an example of a network ________________ protocol.
4. Input
In a relational database - a ___ field is used to sort data.
__________ uses mathematical formulas to create coded messages.
Data and programs waiting to be processed wait in ______ in temporary storage.
_____ data can be text - images - numbers - or sounds.
5. Fragmentation
A hard drive - on the other hand - is a _______ access device - which allows it to go directly to the requested data.
________ row headings appear down the left frame of the spreadsheet.
Software designed to solve a specific problem is called ___________ software.
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
6. Overclocking
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
The primary key could be a unique series of numbers or characters; it doesn't have to be meaningful--just _______.
A device ______ is system software used by the computer to control peripheral devices.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
7. Passwords
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
When a computer performs several tasks simultaneously - this is called ________ processing.
A keystroke logger can be used to steal __________.
8. Debugging
IP addresses can be changed by the network _______________.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
Alpha testing involves desk checking and _________.
Transistors were smaller - cheaper - and more _________ than vacuum tubes.
9. Resources
________ ________ plan and implement new or improved computer services.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
____ and RPG-I are examples of fourth generation languages.
10. Command line
The most common user interface for UNIX systems is the ________ ____ interface.
Harvard Graphics and MS __________ are examples of presentation graphics software.
Paint - photo _______ - and drawing software are all examples of graphics software.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
11. Dashboard
LISP is a programming language used primarily for creating __________ _____________ programs.
Freeware is software that is copyrighted but is available for ____.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
12. Before
A file server is a centralized computer that acts like a __________ - storing programs and data shared by users on the LAN.
Most Information Systems departments are managed by a ___.
NAP stands for ________________ Point.
Using a technology called pipelining - the processor can start executing an instruction ______ the previous instruction completes.
13. Professional
14. Remote
In 1976 - Steve Jobs and Steve _______ founded Apple Computer Corporation.
_________ is the process of moving up - down - or sideways through the text or other screen display.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Transferring data from a ______ computer to a local computer is called downloading.
15. Print
A device ______ is system software used by the computer to control peripheral devices.
In MS PowerPoint - the outline view helps you ________ the content of your material.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Graphics software is designed to help users manipulate and ______ graphics.
16. Numeric
Analytical graphics are graphical forms that make _______ data easier to analyze.
ENIAC was the first ____________ electronic computer in the United States.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
With a ______ implementation - parts of the new system are implemented separately.
17. Preformatted
The internet is an example of a WAN (______ ____ Network).
A template is a ____________ document often provided with word processing software.
_______ are computer depictions of humans often found in computer games and training software.
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
18. Syntax
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
A unit of measure equaling one ______ digit is a bit.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
CIO stands for _______ ____________ Officer.
19. Period
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
__________ uses mathematical formulas to create coded messages.
Site licenses allow software to be used on all computers at a specific ________.
A file extension is an optional file identifier that is separated from the main file name by a ______.
20. Registers
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
Virtual machine technology allows users to simulate the hardware and software of one computer ____________ on another.
Private _________ that connect internal personnel and selected vendors are called extranets.
21. Intruders
The toolbar displays menus and icons of commonly used ________ and options.
A firewall is designed to protect a computer or network from _________.
TCP/IP is an example of a network ________________ protocol.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
22. Processes
In Windows - to see a list of active _________ - you must open the task manager.
Integrated circuits were able to do the work of thousands of _____________ or vacuum tubes on a single miniature chip.
Software obtained _________ is said to be pirated.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
23. Line
Groupware is software that allows several people to collaborate on projects over a _______.
The CPU consists of the control unit - the arithmetic/logic unit (ALU) and the _________ (high speed storage areas).
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
This can also be called a command-_____ interface.
24. Backup
________ are used to transmit data between LANs of different network topologies or network operating systems.
System ______________ involves converting files - software and hardware to the new system.
Examples of utility programs include _______ and data recovery software - antivirus software - disk cleanup - etc.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
25. Cyberterrorists
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Examples of information managed by ____ software include addresses - phone numbers - appointments - and to-do lists.
A device ______ is system software used by the computer to control peripheral devices.
26. Benchmarks
A message that has not been _________ is called plaintext.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
The most common type of database used on PCs is the relational database in which data is organized into related ______.
27. Low level
Commands written for a specific CPU or microprocessor are ____ _____ languages.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
28. Scheduling
Virtual reality is used in arcade games and in training simulators (example: _______ simulators).
Meeting ___________ software is an example of groupware.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
A message that has not been _________ is called plaintext.
29. Artificial intelligence
To convert from word size to bytes - you must ______ by 8 because there are 8 bits in a byte. Therefore - when we're dealing with a 64 bit word size - we divide by 8 and the result is 8 bytes.
A file extension is an optional file identifier that is separated from the main file name by a ______.
____ is a graphics file format used on both PCs and Macs for high quality printable files.
LISP is a programming language used primarily for creating __________ _____________ programs.
30. Network Access
NAP stands for ________________ Point.
An ______ _______ is an interactive computer program that helps users solve problems.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
______ data can be represented as a wave.
31. Kilobyte
_______ is a version of UNIX popular for large websites and e-commerce servers.
A ________ is a unit of measurement equaling 1024 bytes of data.
UNIX was first developed by _____ Laboratories in 1969.
While the computer is running - it remains in main ______ and manages nonresident programs.
32. Parallel
Software obtained _________ is said to be pirated.
Word processing software is used to create - edit - print - format and store ____.
When a computer performs several tasks simultaneously - this is called ________ processing.
Private _________ that connect internal personnel and selected vendors are called extranets.
33. Software
_______ are small text files left on your hard drive by websites you visit.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
____ testing involves checking a program by running it with real world data.
A ___ is a commonly used component that connects devices on the LAN.
34. Loop
First generation computers used _______ _____ to store individual bits of data.
In Windows - to see a list of active _________ - you must open the task manager.
The section of code that repeats is called a _____ or an iteration.
System software includes device drivers - utility programs - and the __________ system.
35. Cycle
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
A ___ is the smallest unit of data that a system can handle.
Cache is ____ when the computer power is turned off.
Desktop publishing software has reduced the time needed to create professional looking _______ projects.
36. Certification
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Many employers view IT _____________ with some degree of skepticism.
Paint - photo _______ - and drawing software are all examples of graphics software.
The more _____ in a word - the faster the computer.
37. Vacuum tubes
A spreadsheet ________ is a built-in formula which performs common calculations.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
In a relational database - information is organized in rows and columns. Rows are called _______.
First generation computers used _______ _____ to store individual bits of data.
38. Internet
Cyberspace is the world of communications in general; it includes wired and wireless communications - as well as the _________.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
A ___ is the smallest unit of data that a system can handle.
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
39. Finland
Linux was created in 1991 by Linus Torvalds - a programmer from ________.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
The particular operating system and _________ model on which a computer system is based is called the platform.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
40. Nonvolatile
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Improper positioning of your keyboard and mouse can cause ___.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
41. 1971
The first microprocessor was developed in _____.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Public key encryption uses ___ keys.
42. Punctuation
___________ programming rules are called syntax.
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the _________ engine.
43. Changed
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
The columns are called _______.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
MAC addresses are set from the factory and cannot be ________ by the network admin.
44. Disk drive
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
Values are the actual numbers or dates entered into ______.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
A disk _________ is a section of a hard drive that is treated as a separate storage unit.
45. Email
_____________ occurs when stored files on a hard drive are scattered across noncontiguous sectors.
The public key encryption software used to encrypt documents such as _____ is called PGP.
A print server manages one or more printers and stores printed ______.
___ - ring - and star are the three basic network topologies.
46. Binary
Zipped files are _________ as part of the installation process.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
__________ includes the Web - chat rooms - blogs - member based services - conference calls and automatic teller machines (ATMs).
The number of bits limits how big of a number can be expressed. To calculate this limit - simply do 2n - where n is the number of ____.
47. Byte
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.
____ and RPG-I are examples of fourth generation languages.
A unit of measure equaling 8 bits is a ____.
48. Former
The compiled program is saved as object code for later __________.
One survey indicated that 75 to 80% of computer crimes are committed by current or _______ employees.
They are small programs which run in the ___________ and are used by devices such as modems - storage devices - mice - keyboards - monitors - printers - sound cards - network cards.
The toolbar displays menus and icons of commonly used ________ and options.
49. LAN
A data communications network that connects personal computers within a limited geographical area is called a ___.
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
Like hubs - switches have multiple ______.
A template is a ____________ document often provided with word processing software.
50. Java
In a relational database - information is organized in rows and columns. Rows are called _______.
Examples of OOP languages include C++ and _____.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
File compression is a method of removing __________ elements of a file causing the file to require less storage space and less time to transmit.
Sorry, Topic not found.:)
Seach or Brouse Basicversity:
Search
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests
//
//