Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Anything that can be communicated






2. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






3. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






4. Terabyte; Approximately 1 million megabytes






5. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






6. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






7. Instructions that tell the hardware what to do to transform the input into out put






8. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






9. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






10. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






11. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






12. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






13. Reference to a cell in relation to the current cell; modifies when copied






14. A desktop-published document that uses a wide range of color; contrast with spot color.






15. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






16. Software packages which include several applications designed to work well together; such as Microsoft Office






17. Billions of clock cycles per second - a measurement of a computer's clock speed






18. Reference to a specific cell address; doesn't change when copied






19. Software that enables the user to manipulate photographs and other high-resolution images.






20. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






21. Using a computer to create - edit and print documents






22. A computer model of a real life situation used to see how a model operates under certain conditions






23. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






24. Bit depth; the number of bits devoted to each pixel.






25. Loading the non-ROM part of the operating system into memory






26. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






27. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






28. User Name; A one-word name that you type to identify yourself when connecting






29. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






30. Software that facilitates the arrangement of information into hierarchies or levels of ideas






31. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






32. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






33. Word-processing feature that divides long words situated at the ends of lines






34. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






35. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






36. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






37. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






38. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






39. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






40. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






41. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






42. Software for editing digital video - including titles - sound and special effects.






43. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. Software that can be distributed and modified freely by users; example: Linux






45. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






46. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






47. 1) color depth; 2) resolution






48. Multimedia that enables the user to take an active part in the experience.






49. License for multiple copies or removing restrictions on software copying and use at a network site






50. User interface that requires the user to type text commands on a command-line to communicate with the operating system