Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






2. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






3. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






4. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






5. Software used as an introductory - teaching or transitional tool for user tasks






6. The address of a Web site. (unique)






7. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






8. The density of pixels - measured by the number of dots per inch.






9. A desktop-published document that uses a wide range of color; contrast with spot color.






10. The narrow (but deep) knowledge base of an expert system.






11. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






12. Knowledge acquired from living in the world.






13. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






14. Vertical






15. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






16. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






17. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






18. Rules of etiquette that apply to Internet communication.






19. An error in programming






20. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






21. Local Area Network; Multiple personal computers connected on a network






22. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






23. Software that is free to try with a send-payment-to-keep honor system






24. The science of designing work environments that enable people and things to interact efficiently and safely






25. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






26. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






27. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






28. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






29. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






30. Gigabyte; Approximately 1000 MB






31. A special type of communications software designed to access and display information at Internet Web sites.






32. The illegal duplication of copyrighted software






33. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






34. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






35. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






36. Device for accepting input (e.g. a keyboard)






37. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






38. The spacing between lines of text.






39. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






40. Random Access Memory; Memory that stores program instructions and data temporarily






41. Software that facilitates the arrangement of information into hierarchies or levels of ideas






42. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






43. Step-by-step procedure for calculating a number






44. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






45. Most common security tools used to restrict access to computer systems.






46. Synonym finder






47. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






48. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






49. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






50. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)