Login
Sign up
Categories
IT & Programming
Design & Multimedia
Writing & Translation
Sales & Marketing
Admin Support
Engineering & Manufacturing
Finance & Management
Website Designing & Development
Database Management
Networking & Troubleshooting
Aviation & Aerospace
Softwares & Applications
Stocks & Investments
Electronics & Appliances
Online Tools
General Knowledge & Aptitude
Mathematics
Educational Subjects & Courses
Business & Organization
Health & Wellbeing
Culture & Ethics
IT Field Knowledge & Experience
Languages & Communication
Entrepreneurship & Leadership
Economics & Development
Mass Communication & Media
Research Methods & Evaluation
Public Relations & Dealings
Educational Methods and Research
Educational Subjects & Techniques
Crime & Justice
Governments & Policies
Cyber Security & Ethical Hacking
Hospitality & Tourism
Soft Skills & Personal Management
Transportation & Driving Rules
Forest and Nature
Religion
Skill Assessment
MCQs
PDFs
Login
Sign up
Categories
IT & Programming
Design & Multimedia
Writing & Translation
Sales & Marketing
Admin Support
Engineering & Manufacturing
Finance & Management
Website Designing & Development
Database Management
Networking & Troubleshooting
Aviation & Aerospace
Softwares & Applications
Stocks & Investments
Electronics & Appliances
Online Tools
General Knowledge & Aptitude
Mathematics
Educational Subjects & Courses
Business & Organization
Health & Wellbeing
Culture & Ethics
IT Field Knowledge & Experience
Languages & Communication
Entrepreneurship & Leadership
Economics & Development
Mass Communication & Media
Research Methods & Evaluation
Public Relations & Dealings
Educational Methods and Research
Educational Subjects & Techniques
Crime & Justice
Governments & Policies
Cyber Security & Ethical Hacking
Hospitality & Tourism
Soft Skills & Personal Management
Transportation & Driving Rules
Forest and Nature
Religion
Skill Assessment
MCQs
PDFs
Login
Sign up
Skill Assessments
>
IT Field Knowledge & Experience
>
Introduction To Computing Skill Assessment
>
Quiz # 1
Introduction To Computing Quiz # 1
Instructions
Quiz:
Introduction To Computing Quiz # 1
Subject:
Basic Dsst Introduction To Computing
Total Questions:
30 MCQs
Time:
30 Minutes
Note
Do not refresh the page while taking the test.
Results along with correct answers will be shown at the end of the test.
Start Quiz
Introduction To Computing Quiz # 1
End Quiz
Question
1
of 30
00:00
Remote
The ______ is a marker on the monitor which indicates where the next character will appear.
In programming - a variable represents a value that can ______.
This can also be called a command-_____ interface.
Transferring data from a ______ computer to a local computer is called downloading.
High level
On a hard disk - this waiting area is called a _______.
Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.
Harvard Graphics and MS __________ are examples of presentation graphics software.
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
Web page
_______ is the operating system installed on more than 80% of the world's personal computers.
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Public key encryption uses ___ keys.
The ________ ________ is the computer software that manages the basic operation of the computer.
Machine
The monitor - speakers - and printer are examples of computer ______ devices.
A ___ ________ is software that enables a user to find and access the various parts of the Internet.
VPN stands for ________ Private Network.
The instruction cycle is also often referred to as the ________ cycle.
Passwords
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
All the physical equipment in a computer system is called ________.
Search agents and _____ search tools allow you to automate your search process across many sites.
A keystroke logger can be used to steal __________.
Security
A wiki is one or more ___ documents that can be viewed and changed by users.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
This UNIX-based kernel also contributes to stronger _________.
The compiled program is saved as object code for later __________.
Component
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
In programming - a _________ is a prewritten module designed for a specific task.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.
Network interface
Data and programs waiting to be processed wait in ______ in temporary storage.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.
This UNIX-based kernel also contributes to stronger _________.
Decryption
Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.
Plaintext is also called __________.
The process of converting cyphertext to plaintext is ___________
____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.
Meta
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.
Search agents and _____ search tools allow you to automate your search process across many sites.
Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.
Sequentially
Note that the URL starts by indicating what _________ should be used to access the page (HTTP).
A LAN (______ _____ Network) normally occupies a single building.
For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).
With serial processing - instructions are executed ______________ in the order received.
Served
With serial processing - instructions are executed ______________ in the order received.
A ______ is a small unit of data transmitted over a network.
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
In a ring network - all packets flow in only one __________; there are no data collisions.
Hypertext
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Database ______________ create - maintain - and supervise the day to day operation of databases.
The easiest way to reduce exposure to cellphone _________ is to use a headset.
On the job choices that reflect a person's values are called ____________ ethics.
Formula
_______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
MAC addresses are set from the factory and cannot be ________ by the network admin.
An algorithm is a _______ or set of steps for solving a particular problem.
E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.
Routes
Tests run by laboratories to compare the overall speed of microprocessors are called __________.
This is where the term __________ (a group edited encyclopedia) comes from.
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.
Organize
A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.
______ times for PC storage devices are measured in milliseconds.
Databases use structured files to _________ data.
A gigabyte is a unit of measurement roughly equaling one _______ bytes.
Employment
Most Information Systems departments are managed by a ___.
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Like hubs - switches have multiple ______.
The compiled program is saved as object code for later __________.
Local Area
A LAN (______ _____ Network) normally occupies a single building.
Random access storage devices are able to go _____ to the requested data
A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Three dimensional
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.
A _________ logger is a type of spyware that records each character you type.
A collection of fields make up a _______.
Cable
A bus network has two endpoints and all computers are connected to a single wire or _____.
With virtual memory - free _____ ____ space is used to extend the capacity of RAM.
Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.
System software helps the computer manage internal and external _________ and enables the computer to run applications.
Buffer
___________ programming rules are called syntax.
______________ are the most expensive and fastest computers available.
Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.
On a hard disk - this waiting area is called a _______.
Copyrighted
The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.
_________ is the process of moving up - down - or sideways through the text or other screen display.
Public domain software is not ___________ and can be copied without fear of prosecution.
A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.
Instructions
Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.
With a relational database - users _____ records to locate and display them.
A wiki is one or more ___ documents that can be viewed and changed by users.
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Com
An example of parallel processing is when several ___________ work together sharing memory on the same task.
Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).
Overheat
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Productivity software is designed to help people work more ___________.
______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.
Random access storage devices are able to go _____ to the requested data
Microcomputers
_____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.
Personal computers are also called ______________.
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.
Securely
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.
SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.
A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.
Changed
MAC addresses are set from the factory and cannot be ________ by the network admin.
Secondary storage refers to devices and media that store data _____________.
In a relational database - information is organized in rows and columns. Rows are called _______.
_____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.
Defragmentation
Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
The particular operating system and _________ model on which a computer system is based is called the platform.
A message which has been encrypted is called __________.
Windows
Examples of word size in _____ computers include 16 - 32 - and 64 bits.
Common platforms include Apple Macintosh - ________ platforms and PC platforms.
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.
Submit Test
Prev Question
ABCd
Next Question
Introduction To Computing Skill Assessment
Login to see Skill Score (It's Free)
Your Skill Level:
Poor
Retake Quizzes to improve it
Start Assessment
Introduction To Computing Skill Assessment
Login to see Skill Score (It's Free)
Your Skill Level:
Poor
Retake Quizzes to improve it
Start Assessment