SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small text file that comes with many software packages - and contains information not included in the official documentation
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. A continuous wave
Newsgroups
Analog Signal
Common-sense knowledge
Model
3. Most common security tools used to restrict access to computer systems.
Parallel processing
Password
Training software
Advantages of teleconferencing (3)
4. An individual responsible for maintaining a multi-user computer system
Download
Hypertext
System Administrator
Rules of thumb for using Powerpoint (6)
5. Software that can be distributed and modified freely by users; example: Linux
RAM
Responsibilities of System Admin
OCR
Open-Source Software
6. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
Morph
ISP (Internet service provider)
PDF (Portable Document Format)
Image analysis
7. Reference to a cell in relation to the current cell; modifies when copied
Feedback Loop
Digital Video
WAN
relative reference
8. Spreadsheet document which appears on the screen as a grid or numbered rows/columns
Upload
Integrated Software
Artificial Intelligence (AI)
worksheet
9. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.
Hyperlink
RAM
Rules of Thumb for DTP
ISP (Internet service provider)
10. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)
GB
Drawing Software
footer
Rules of Netiquette (6)
11. Multimedia that enables the user to take an active part in the experience.
Interactive Multimedia
Knowledge base
Commercial Software
Defragmenting
12. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.
Morph
Spot Color
Newsgroups
Parallel processing
13. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Full-Color
WYSIWYG
cell
DTP (Desktop Publishing)
14. The use of computers to draw products or process designs on the screen.
Bit
Computer Aided Design (CAD)
Image Processing Software
Robot
15. A desktop-published document that uses a wide range of color; contrast with spot color.
Operating System Advantages
Full-Color
Wizard
Backdoor
16. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.
Augmented Reality
PDF (Portable Document Format)
Drawing Software
Input Devices
17. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
Hypertext
Morph
Convergence
Humans < Computers (3)
18. The illegal duplication of copyrighted software
Backdoor
spell check
Software Piracy
Hyperlink
19. Megabyte; Approximately 1000K or 1 million bytes
Biometrics
Hyperlink
MB
Disadvantages of telecommuting (3)
20. A special type of communications software designed to access and display information at Internet Web sites.
Software Piracy
Push technology
Factors of a good pw...
Browser
21. The storage of pictures as collections of lines - shapes and other objects.
column
automatic hyphenation
header
Vector Graphics
22. Predefined set of calculations (i.e. SUM and AVERAGE)
UPS
Bar Code Reader
range
function
23. Software that is free to try with a send-payment-to-keep honor system
Password
Shareware
Memory
Page-Layout Software
24. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.
Browser
Pull technology
Virtual Reality (VR)
function
25. To copy software from an online source to a local computer
Download
Packet-switching
Push technology
Login Name
26. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.
Tim Burners-Lee (4)
Public Domain Software
Artificial Intelligence (AI)
thesaurus
27. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
Bug
Motion Picture Audio Layer (MP3)
Access-Control Software
Domain
28. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.
Natural language
Peer-to-Peer File Sharing (P2P)
FTP (file transfer protocol)
Advantages of digital television (3)
29. Video clip in which one image metamorphoses into another.
Video Editing Software
Morph
automatic hyphenation
Disadvantages of telecommuting (3)
30. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)
Machine learning
Fuzzy logic
Drawing Software
Digital Video
31. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Video teleconference
Commercial Software
WYSIWYG
Worm
32. Software or hardware that guards against unauthorized access to an internal network
Firewall
Expert system
Booting
worksheet
33. Loading the non-ROM part of the operating system into memory
Booting
MB
Computer Aided Design (CAD)
typeface
34. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)
Morph
HTML (hypertext markup language)
Peripheral
monospaced fonts
35. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
Advantages of Computer Aided Design (CAD) (4)
Server
Rules of Thumb for DTP
Browser
36. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
grammar and style checker
Multimedia
Fuzzy logic
Integrated Software
37. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
User Interface
automatic hyphenation
Convergence
thesaurus
38. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software
Compatibility
GUI Advantages
thesaurus
'what if?' questions
39. Typeset-quality pages - ready to be photographed and printed.
Convergence
OMR
Camera-Ready
ROM
40. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.
Knowledge base
KB
Bluetooth
Laws of Robots (3) (Asimov)
41. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
Utility Program Features
Virus
serif fonts
Bluetooth
42. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Byte
Protocol
Bitmapped Graphics
serif fonts
43. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans
Download
Ethernet
Advantages of Robots (3)
Peripheral
44. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')
Bluetooth
Arpanet
Humans < Computers (3)
Utility Program Features
45. Software for editing digital video - including titles - sound and special effects.
Bug
Domains
Video Editing Software
Command-Line Interface
46. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
macro
GUI Advantages
Hypertext
Data
47. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Bitmapped Graphics
Augmented Reality
Source Document
Laws of Robots (3) (Asimov)
48. User Name; A one-word name that you type to identify yourself when connecting
Login Name
Virus
Server
word wrap
49. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
WAN
Drawing Software
Spot Color
cell
50. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
Digital television
Trojan Horse
row
RAM