Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






2. The narrow (but deep) knowledge base of an expert system.






3. Predefined set of calculations (i.e. SUM and AVERAGE)






4. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






5. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






6. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






7. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






8. Grouping of 8 bits






9. The address of a Web site. (unique)






10. Documentation file that appears onscreen at the user's request






11. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






12. User interface that requires the user to type text commands on a command-line to communicate with the operating system






13. Word-processing feature that divides long words situated at the ends of lines






14. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






15. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






16. Information systems or software programs designed to replicate the decision-making process of a human expert.






17. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






18. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






19. Information in a form that can be read - used and manipulated by a computer






20. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






21. Using a computer to create - edit and print documents






22. Reference to a cell in relation to the current cell; modifies when copied






23. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






24. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






25. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






26. User Name; A one-word name that you type to identify yourself when connecting






27. Device for accepting input (e.g. a keyboard)






28. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






29. Most common security tools used to restrict access to computer systems.






30. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






31. Reference to a specific cell address; doesn't change when copied






32. Someone who uses computer skills to gain unauthorized access to computer systems.






33. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






34. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






35. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






36. Numbers which are the raw material used to perform calculations






37. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






38. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






39. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






40. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






41. The look and feel of the computing experience from a human point of view






42. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






43. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






44. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






45. Rules of etiquette that apply to Internet communication.






46. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






47. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






48. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






49. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






50. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests