SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
DSST Introduction To Computing
Start Test
Study First
Subjects
:
dsst
,
it-skills
,
bvat
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remarks
System ______________ involves converting files - software and hardware to the new system.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
_______ are notes included in the program code by the programmer.
The location on a spreadsheet where a row and a column intersect is called a ____.
2. Data
Random access is much faster than ___________ access storage (tape).
With serial processing - instructions are executed ______________ in the order received.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
3. Processes
With serial processing - instructions are executed ______________ in the order received.
The toolbar displays menus and icons of commonly used ________ and options.
Trojan horses can also carry ________ and destructive instructions.
Relocating business _________ to lower cost locations in foreign countries is called offshoring.
4. Charles Babbage
_______ ________ was the first to define concepts that were to be later used in modern computers.
In recent years - antivirus software has been one of the most popular categories of _______ software.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
5. Command line
______ generation languages are typically used for database applications.
In a star network - all computers are connected to a _______ computer.
The most common user interface for UNIX systems is the ________ ____ interface.
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
6. File names
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
A floppy disk - hard disk - and USB drive are all examples of _________ storage.
The desktop is a feature of the ____ (graphic user interface) and is found in OS software like MAC OS and MS Windows.
Current versions of Windows support ____ ______ up to 255 characters long.
7. Processes
Hubs have multiple ports. When a packet arrives at one port it is _______ to all other ports on the hub.
The main circuit board of the computer is called the ___________.
A message that has not been _________ is called plaintext.
In Windows - to see a list of active _________ - you must open the task manager.
8. Standalone
Multimedia authoring software combines video - text - animation - graphics and sound to create __________ multimedia applications.
Public key encryption uses ___ keys.
A _______ __________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.
A ________ - mouse - microphone - scanner - and camera are all examples of computer input devices.
9. WAN
A ___ is a string of characters that points to a specific piece of information anywhere on the web.
RAM - which stands for Random Access Memory - stores __________ data which is waiting to be stored - processed - or output - and this data is lost if the computer is turned off.
The ___ allows a user to operate the computer by using a mouse or keystrokes to select icons and commands from menus.
A communications network that covers a large geographic area such as a country is called a ___.
10. Drivers
A ______ is a small unit of data transmitted over a network.
Such information includes information related to company finances - _________ - products and procedures.
System software include device ________ - operating systems - and compilers.
Common syntax errors include incorrect or missing punctuation - _________ errors - and omitting keywords.
11. Certification
_______ are notes included in the program code by the programmer.
Many employers view IT _____________ with some degree of skepticism.
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
12. Central
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
When talking about personal computers - the CPU (________ Processing Unit) is synonymous with the silicon chip known as the microprocessor - which is programmed to perform various tasks on the data it receives.
If an operating system attaches a special significance to a symbol - you won't be able to use it in a ________.
Site licenses allow software to be used on all computers at a specific ________.
13. Fourth
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
______ generation languages are typically used for database applications.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
_____________ is the process of recomputing values in a spreadsheet.
14. Inference
15. Device
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
An IP address is a series of numbers used to identify a network ______.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Screening job applicants and limiting employee ______ to only information needed to do a specific job are examples of people controls.
16. Viruses
Logic bombs are _______ that are set to go off at a certain time.
In programming - an event is defined as an ______.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
Reading through a program to make sure it is logical and free of errors is called _____ ________.
17. Security
Any electronic system that uses a ___ but is not a general purpose computer is called an embedded system.
This UNIX-based kernel also contributes to stronger _________.
VoIP stands for ______ over Internet Protocol.
__________ is widely supported by web browsers and adds interactive functions to HTML pages.
18. Images
When data is ________ in one cell - data in other cells is automatically recalculated.
IP addresses can be changed by the network _______________.
A print server manages one or more printers and stores printed ______.
Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _______ __ ________ attack.
19. Project management
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.
Lettered ______ headings appear across the top frame of the spreadsheet.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
20. Source
A compiler converts ______ code (the original code written by the programmer) into object code (an executable file).
___ allows a block of program code to be reused in other programs.
When you install software or hardware - information is ______ in the registry.
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
21. Machine
A ________ is a set of rules governing the exchange of data between hardware and software on a communications network.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Personal Information Management software helps users organize and manage daily ________ activities.
________ and assembly languages are low level languages.
22. Organize
An example of parallel processing is when several ___________ work together sharing memory on the same task.
In MS PowerPoint - the outline view helps you ________ the content of your material.
Read-Only Memory chips contain fixed computer start up instructions - are loaded at the factory - and are ___________.
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
23. Cycle
Primary storage - also known as RAM or _______ - is temporary data held in computer circuitry.
The series of events which takes place in a set order and at specified intervals - that occurs when the processor retrieves an instruction from storage and executes it - is called the instruction _____.
The Windows registry is a database that maintains a record of installed ________ and peripheral devices - preferences - and settings.
Personal Information Management software helps users organize and manage daily ________ activities.
24. Sequential
Linux is a non-___________ version of UNIX and is maintained by thousands of volunteer programmers around the world.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
Random access is much faster than ___________ access storage (tape).
The ________ ________ is the computer software that manages the basic operation of the computer.
25. Beta
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
The more _____ in a word - the faster the computer.
____ testing involves checking a program by running it with real world data.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
26. Sender's
27. Clients
Plaintext is also called __________.
Early computers stored ____ for calculations and programs on punched cards.
A wiki is one or more ___ documents that can be viewed and changed by users.
Servers can store files or provide services (i.e. printing) to ________ on the network.
28. Fraud
Site licenses allow software to be used on all computers at a specific ________.
When plugged into a USB port - flash memory drives show up as an external drive and are a convenient way to transport and transfer _____.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
A computer with a __ bit word size will transfer data within the microprocessor at 8 bytes at a time.
29. Windows
30. Collisions
Like hubs - switches have multiple ______.
Data and programs waiting to be processed wait in ______ in temporary storage.
CSMA/CD is the Ethernet protocol that handles __________.
A field contains the smallest unit of meaningful data and can therefore be called the basic ________ block for a structured file or database.
31. Top
CSMA/CD manages collisions on the network by deleting colliding signals and __________ the network.
In addition to displaying information in rows and columns - spreadsheet software can perform ______________ on inputted data.
In MS Windows - the toolbar is located at the ____ of the window below the menu bar.
Most computer manufacturers use components (hard drives - processors - memory - etc.) supplied by other __________; this is called outsourcing.
32. Instructions
The columns are called _______.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
A macro - or keyboard _________ - is useful when a user has to type the same pattern of keystrokes over and over.
VPN stands for ________ Private Network.
33. Apple I
_______ is a version of UNIX popular for large websites and e-commerce servers.
In the same year - they released the ________ computer.
On the job choices that reflect a person's values are called ____________ ethics.
A unit of measure equaling one ______ digit is a bit.
34. Repeat
______ - PROSPECTOR - CARES - CLUES and CLIPS are all examples of expert systems.
Linux is an ____ _______ operating system that can be modified and freely distributed.
_________ data is defined as converting data from one format to a format compatible with the program you are currently using.
An iteration control structure directs the computer to ______ one or more instructions until a certain condition is met.
35. Dashboard
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
______ times for PC storage devices are measured in milliseconds.
The GUI (Graphic User Interface) is sometimes called a computer __________ and Microsoft Windows is an example of an operating system that uses a GUI.
A firewall can be _________ or software-based or a combination of the two.
36. Debugger
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
When troubleshooting a computer program - ________ software is used to help identify and solve problems.
A firewall is designed to protect a computer or network from _________.
37. Processors
_______ are small text files left on your hard drive by websites you visit.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
An example of parallel processing is when several ___________ work together sharing memory on the same task.
The BIOS (Basic ______________ System) also enables the computer to interpret keyboard commands and display characters on the monitor.
38. Monitors
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
Software obtained _________ is said to be pirated.
A unit of measure equaling 8 bits is a ____.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
39. Text
A ___ is the smallest unit of data that a system can handle.
This data is _____ when the computer is turned off.
The motherboard contains the CPU and _______ chips as well as connections for the keyboard - mouse - and printer.
Word processing software is used to create - edit - print - format and store ____.
40. Intruders
Multimedia technology presents information in a format which includes ____ - graphics - video and sound.
A firewall is designed to protect a computer or network from _________.
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music - movies and computer games.
41. SQL
Paint - photo _______ - and drawing software are all examples of graphics software.
Programmers use assembly languages to write ______ software.
____ and RPG-I are examples of fourth generation languages.
____ is a popular graphics file format used in applications such as web pages where flexibility in file size is important.
42. Defragmentation
DHCP stands for Dynamic Host _______________ Protocol.
Random access storage devices are able to go _____ to the requested data
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
43. Flowchart
A _________ is a graphical representation of a series of steps needed to solve a problem.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
A data communications network that connects personal computers within a limited geographical area is called a ___.
____ and RPG-I are examples of fourth generation languages.
44. Restore
The ______ is a marker on the monitor which indicates where the next character will appear.
Backups are used to ________ files lost by operator error - viruses - or hardware failures.
This is where the term __________ (a group edited encyclopedia) comes from.
In PowerPoint - the _____ _____ view presents the slides in the order in which the audience will view them.
45. 255
An algorithm is a _______ or set of steps for solving a particular problem.
__________ uses mathematical formulas to create coded messages.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
An ______ _______ is an interactive computer program that helps users solve problems.
46. Communications
The first microprocessor was developed in _____.
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
TCP/IP is an example of a network ________________ protocol.
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
47. Records
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
To prevent unauthorized access to sensitive data - you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
In a relational database - information is organized in rows and columns. Rows are called _______.
48. Primary
This can also be called a _____ key - index - or keyword. Most database applications allow for multiple keys so that users can sort records in different ways.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
In a relational database - the _______ key holds a unique value for each record.
CIO stands for _______ ____________ Officer.
49. Office
Access (included with Microsoft _______) is an example of a popular Windows-based relational database application.
Examples of OOP languages include C++ and _____.
The _______ ______ would be 'instantcert.com'; the top level domain just refers to the part after the period.
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM.
50. Networking
Virtual memory uses the hard disk to _____ primary storage (RAM).
UNIX is a proprietary multitasking operating system with built-in __________ capabilities that supports multiple users.
Transferring data from a ______ computer to a local computer is called downloading.
ROM chips contain data that is nonvolatile - meaning that this data is not lost when the computer is turned ____.