SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Stress
_____ data can be text - images - numbers - or sounds.
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Random access storage allows access to any location in any _____.
RSI (Repetitive _______ Injury) affects tendons - muscles and nerves in the hands - wrists - arms and shoulders.
2. Circuit boards
3. Trojan horse
Examples of cache include L1 - L2 - and L3. In all cases - cache is storage located closer to the processor than RAM and therefore can be accessed much more ________.
A _____ _______ is a program that is disguised as an innocent program to gain control of your computer.
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
______ times for PC storage devices are measured in milliseconds.
4. Word
5. Email
_____________ people is one important way to protect software and data.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Column headings are used to select an entire _______ with a mouse click.
The public key encryption software used to encrypt documents such as _____ is called PGP.
6. Proprietary
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
System ______________ involves converting files - software and hardware to the new system.
An organization's internal _______ network is called an intranet.
The toolbar displays menus and icons of commonly used ________ and options.
7. Device
A ___________ allows users to enter data in rows and columns to create financial schedules and tables arranged as a grid on a display.
A newsgroup is also known as a ______ and there are thousands of them on the Internet.
This act established financial reporting regulations to prevent corporate ______.
An IP address is a series of numbers used to identify a network ______.
8. Directly
Random access storage devices are able to go _____ to the requested data
In programming - a _________ is a prewritten module designed for a specific task.
___ - ring - and star are the three basic network topologies.
A program that ______ itself repeatedly on to the computer's hard disk or into the computer's memory is called a worm.
9. Machine
The compiled program is saved as object code for later __________.
________ and assembly languages are low level languages.
A modem is a device that sends and receives data over __________ lines to and from computers.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
10. CAD
The section of code that repeats is called a _____ or an iteration.
__________ uses mathematical formulas to create coded messages.
___ software is used to design products - maps - structures and civil engineering drawings.
Microsoft Windows is the world's best selling ________ __________.
11. Component
Forging an email ______'s name is called spoofing.
Software obtained _________ is said to be pirated.
In programming - a _________ is a prewritten module designed for a specific task.
Second generation computers used ___________ instead of vacuum tubes.
12. Sort
Second generation computers used ___________ instead of vacuum tubes.
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
Most Information Systems departments are managed by a ___.
13. Order
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
Meeting ___________ software is an example of groupware.
Random access storage allows access to any location in any _____.
Alpha testing involves desk checking and _________.
14. Recalculation
Software obtained _________ is said to be pirated.
_________ authentication devices verify a person's identity using the person's physical characteristics.
A virus is a program that __________ itself - either by making copies of itself or by attaching to another program.
_____________ is the process of recomputing values in a spreadsheet.
15. Output
The monitor - speakers - and printer are examples of computer ______ devices.
PGP (_______ ______ Privacy) encryption software is available for free download on the web.
With a parallel implementation - the old and new systems are operated side by side until the new system is proven to be ________.
If a ___________ on the bus is broken (i.e. one of the computers in the chain crashes) - the network may go down.
16. Local Area
In a relational database - information is organized in rows and columns. Rows are called _______.
White hat hackers are computer professionals who break into computer systems with the owner's __________ to identify security flaws.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
A LAN (______ _____ Network) normally occupies a single building.
17. Intruders
A firewall is designed to protect a computer or network from _________.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Secondary storage refers to devices and media that store data _____________.
18. Syntax
Data and programs waiting to be processed wait in ______ in temporary storage.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
Memory - a programmable processor - an output device - and user-defined input were all concepts Babbage conceived for a calculating device he called a ___________ Engine in 1834.
19. Key
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
Messages are encrypted using a cryptographic _________ and a key.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
Pirated software can be ___________ from the web - illegally copied by a friend - or purchased in a foreign country.
20. Web page
ENIAC was the first ____________ electronic computer in the United States.
A computer uses a ____ system (base 2). That means that it only has 2 digits to choose from (i.e. 0 and 1).
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Many common viruses attach themselves to an existing executable program - and when that program is copied to and ____ on other computers - the virus infects those computers.
21. Dashboard
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
_____ generation computers used integrated circuits.
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A collection of fields make up a _______.
22. Open source
Linux is an ____ _______ operating system that can be modified and freely distributed.
_____ data can be text - images - numbers - or sounds.
Floppy disk - external hard drive - CD-RW - tape - and USB flash drive are all examples of ______ media.
___ - ring - and star are the three basic network topologies.
23. Fourth
______ generation computers were microprocessor based.
_____________ people is one important way to protect software and data.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
DHCP is a protocol designed to automatically distribute IP _________.
24. Web pages
Software obtained _________ is said to be pirated.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
HTML is a set of special instructions used to create ____ _____.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
25. Systems analysts
A _________ is a graphical representation of a series of steps needed to solve a problem.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
A __________ file uses a uniform format to store data for each person or thing in the file.
________ ________ plan and implement new or improved computer services.
26. Software
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
VoIP stands for ______ over Internet Protocol.
_____ generation computers used integrated circuits.
27. Work
A computer resource is any component required to perform ____.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
A computer's ____ size is the number of bits that the processor may process at any one time.
28. Cable
Public domain software is not ___________ and can be copied without fear of prosecution.
When data is ________ in one cell - data in other cells is automatically recalculated.
A bus network has two endpoints and all computers are connected to a single wire or _____.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
29. Divide
30. Copies
31. Hardware
A firewall can be _________ or software-based or a combination of the two.
Analytical graphics are also called _________ graphics and make sales figures and economic trends easier to understand.
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
Sending out __________ looking emails which attempt to solicit passwords or financial information is known as phishing.
32. RSI
Improper positioning of your keyboard and mouse can cause ___.
Virtual memory uses the hard disk to _____ primary storage (RAM).
______ generation languages are typically used for database applications.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
33. Math
Software obtained _________ is said to be pirated.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
_____________ is the process of recomputing values in a spreadsheet.
The ALU is an area of the CPU optimized to handle _____ calculations (i.e. Add and Subtract) as well as logic comparisons (i.e. AND - NOT - and OR).
34. Apple I
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
______ generation computers were microprocessor based.
In the same year - they released the ________ computer.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
35. Controlling
_____________ people is one important way to protect software and data.
A ______ is a small unit of data transmitted over a network.
Examples of personal finance manager software include ________ and Microsoft Money.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
36. Source
VoIP stands for ______ over Internet Protocol.
Passwords are often encrypted using a hash function - which is a function that takes a string of characters of any length and converts it into a string of a ________ length.
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
Messages are encrypted using a cryptographic _________ and a key.
37. POS
LISP is a programming language used primarily for creating __________ _____________ programs.
Nowadays - cash registers have been replaced by ___ terminals.
An example of importing data would be taking a column of numbers from a spreadsheet and importing it into a ______ __________.
A typical computer includes the system and a variety of input - output and ______ devices.
38. Server
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
System software include device ________ - operating systems - and compilers.
An electronic ______ ________ on the Internet where users conduct written discussions about a specific topic is called a newsgroup.
In a peer to peer network - workstations share responsibility for processing - storage - printing - and communications tasks without a ______.
39. Operating system
Private networks that are connected to remote sites via the internet are called ____.
In the same year - they released the ________ computer.
While the computer is running - it remains in main ______ and manages nonresident programs.
The ________ ________ is the computer software that manages the basic operation of the computer.
40. Location
_____ data can be text - images - numbers - or sounds.
Site licenses allow software to be used on all computers at a specific ________.
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
41. Peripheral
An advantage of a network is that it allows for the sharing of ___________ devices; users on a network can share devices such as printers and modems.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
The compiled program is saved as object code for later __________.
A ________ is a collection of interrelated files in a computer system.
42. Intranets
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Private _________ that connect internal personnel and selected vendors are called extranets.
The web protocol HTTP (__________ __________ Protocol) is a set of rules for exchanging information over the web.
Settings automatically used by a program unless changed by the user are called _______ settings.
43. Debugging
The process of converting cyphertext to plaintext is ___________
System software includes device drivers - utility programs - and the __________ system.
________ ________ plan and implement new or improved computer services.
Alpha testing involves desk checking and _________.
44. Disk drive
__________ is the study of safe and efficient work environments.
Examples of operating systems include ________ - Linux - Unix - and Macintosh OS.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Defragmentation can improve _____ ______ performance by helping the computer operate more efficiently.
45. SQL
Input - output - and storage equipment that can be added to a computer to enhance its functionality are called __________ devices.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
___________ and security are MS Windows' two major weaknesses.
____ and RPG-I are examples of fourth generation languages.
46. Email
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure ______.
The bandwidth of a channel which carries digital data is typically measured in ____ ____ _________ (bps).
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
_____ ___ is a collection of photos and drawings designed to be inserted in documents.
47. Bits
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Second generation computers used ___________ instead of vacuum tubes.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
The more _____ in a word - the faster the computer.
48. Change
In programming - a variable represents a value that can ______.
A keyword has a predefined meaning for the ________ which translates each line of programming code into the machine language that the computer can understand.
__________ appear as colored or underlined words on a webpag
Forging an email ______'s name is called spoofing.
49. Beta
In a star network - all computers are connected to a _______ computer.
A device ______ is system software used by the computer to control peripheral devices.
CSMA/CD is the Ethernet protocol that handles __________.
____ testing involves checking a program by running it with real world data.
50. MB
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
ENIAC was the first ____________ electronic computer in the United States.
A megabyte is often abbreviated as ___.
In programming - a variable represents a value that can ______.