Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






2. The use of computers to draw products or process designs on the screen.






3. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






4. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






5. Grouping of 8 bits






6. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






7. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






8. The density of pixels - measured by the number of dots per inch.






9. Video clip in which one image metamorphoses into another.






10. A computer especially designed to provide software and other resources to other computers over a network






11. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






12. Enables you to 'paint' pixels on the screen with a pointing device.






13. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






14. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






15. Computer controlled machines designed to perform specific manual tasks ('forced labor')






16. The science of designing work environments that enable people and things to interact efficiently and safely






17. Text entry providing information of the contents of a row/column






18. Provides direct instruction in a clearly specified skill of subject






19. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






20. Television that processes information through a binary code rather than an analog signal.






21. To post software= or documents to an online source for availability to others






22. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






23. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






24. License for multiple copies or removing restrictions on software copying and use at a network site






25. Instructions that tell the hardware what to do to transform the input into out put






26. A software help agent that walks the user through a complex process






27. Anything that can be communicated






28. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






29. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






30. Someone who uses computer skills to gain unauthorized access to computer systems.






31. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






32. Software help agent that walks the user through a complex process






33. Most common security tools used to restrict access to computer systems.






34. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






35. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






36. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






37. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






38. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






39. The illegal duplication of copyrighted software






40. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






41. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






42. Bit depth; the number of bits devoted to each pixel.






43. An individual responsible for maintaining a multi-user computer system






44. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






45. Word-processing feature that divides long words situated at the ends of lines






46. Software that can be distributed and modified freely by users; example: Linux






47. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






48. Loading the non-ROM part of the operating system into memory






49. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






50. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)