SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Backdoor
Kerning
IP address
Image Processing Software
2. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Wizard
Musical Instrument Digital Interface (MIDI)
range
Output Devices
3. Someone who uses computer skills to gain unauthorized access to computer systems.
Compatibility
Robot
Hacker
Model
4. Instructions that tell the hardware what to do to transform the input into out put
Knowledge engineer
Rules of Thumb for DTP
Software
Morph
5. A desktop-published document that uses a wide range of color; contrast with spot color.
Trojan Horse
Teleconference
GUI
Full-Color
6. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
Defragmenting
Painting Software
Software Piracy
absolute reference
7. Using a computer to create - edit and print documents
value
word processing
Source Document
Page-Layout Software
8. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
Biometrics
System Administrator
Public Domain Software
ASCII
9. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter
Interactive Multimedia
MB
spell check
Trojan Horse
10. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge
Feedback Loop
column
Command-Line Interface
Disadvantages of Expert Systems (2)
11. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
Rules of Netiquette (6)
Biometrics
Logic Bomb
Bandwidth
12. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.
formatting
word wrap
Agent
Camera-Ready
13. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;
Shareware
Vector Graphics
Telecommuting
Utility Program
14. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
Simulation
Hypertext
Shareware
Backdoor
15. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry
Unicode
OCR
IP address
Video teleconference
16. Rectangular block of selected cells
Compatibility
Domain
Domains
range
17. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
RAM
Domain
Packet-switching
Trojan Horse
18. Software or hardware that guards against unauthorized access to an internal network
Rules of Thumb for DTP
Backdoor
Firewall
Advantages of Robots (3)
19. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
Server
Training software
font
PDF (Portable Document Format)
20. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
Site License
Musical Instrument Digital Interface (MIDI)
Resolution
Convergence
21. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
Humans < Computers (3)
footer
Backup
Wizard
22. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Backup
Intranet
ebook (Electronic Book)
Trojan Horse
23. Device for accepting input (e.g. a keyboard)
HTTP (hypertext transfer protocol)
Input Devices
Wizard
Login Name
24. To copy software from an online source to a local computer
DTP (Desktop Publishing)
cell
Download
Defragmenting
25. Software help agent that walks the user through a complex process
OMR
Advantages of digital television (3)
Wizard
cell format
26. The Internet protocol used to transfer Web pages.
Image analysis
Pixel
HTTP (hypertext transfer protocol)
Rules of Thumb for DTP
27. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
Password
Peer-to-Peer File Sharing (P2P)
Pull technology
Convergence
28. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
cell
justification
Software
Telecommuting
29. A computer model of a real life situation used to see how a model operates under certain conditions
Simulation
Compatibility
ISP (Internet service provider)
TCP/IP (transmission control protocol / Internet protocol)
30. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.
Template
Hypermedia
Knowledge engineer
footer
31. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.
Rules of Thumb for DTP
automatic hyphenation
Teleconference
Image analysis
32. The density of pixels - measured by the number of dots per inch.
Gigahertz
cell format
Resolution
Intranet
33. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)
Hyperlink
Advantages of digital television (3)
Camera-Ready
typeface
34. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Domain
serif fonts
Server
Virus
35. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars
Bar Code Reader
replication
justification
FTP (file transfer protocol)
36. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Intranet
header
'Read-me' file
Web crawlers
37. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
Machine learning
Hypermedia
Resolution
Compatibility
38. Spreadsheet document which appears on the screen as a grid or numbered rows/columns
Netiquette
Vector Graphics
Open-Source Software
worksheet
39. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
font
Hacker
Trojan Horse
An example of presentation-graphics software
40. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Operating System Advantages
Logic Bomb
Software Piracy
function
41. The look and feel of the computing experience from a human point of view
Operating System
Memory
User Interface
Telecommuting
42. License for multiple copies or removing restrictions on software copying and use at a network site
Site License
cell
Processor
Hacker
43. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values
Processor
URL (uniform resource locator)
Ergonomics
Output Devices
44. The process of simulation motion with a series of still pictures.
Netiquette
template
Animation
Augmented Reality
45. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
Motion Picture Audio Layer (MP3)
Command-Line Interface
Data
MB
46. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1
point size
Defragmenting
Bit
Disadvantages of hypertext (4)
47. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Compatibility
Help file
Encryption
Cracking
48. Reference to a cell in relation to the current cell; modifies when copied
Login Name
Source Document
Common-sense knowledge
relative reference
49. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive
Template
Trojan Horse
Operating System Advantages
Search engine
50. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -
Sensor
Personal digital assistant (PDA)
Parallel processing
Disadvantages of ebooks