Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Predefined set of calculations (i.e. SUM and AVERAGE)






2. The science of designing work environments that enable people and things to interact efficiently and safely






3. The look and feel of the computing experience from a human point of view






4. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






5. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






6. To post software= or documents to an online source for availability to others






7. Software that can be distributed and modified freely by users; example: Linux






8. Software used as an introductory - teaching or transitional tool for user tasks






9. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






10. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






11. Rectangular block of selected cells






12. Multimedia that enables the user to take an active part in the experience.






13. Video clip in which one image metamorphoses into another.






14. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






15. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






16. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






17. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






18. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






19. Device for accepting input (e.g. a keyboard)






20. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






21. Custom-designed procedure program which automates tasks in an application program






22. Documentation and help available through a software company's Web site






23. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






24. Terabyte; Approximately 1 million megabytes






25. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






26. Face-to-face communication over long distances using video and computer technology.






27. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






28. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






29. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






30. The density of pixels - measured by the number of dots per inch.






31. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






32. User interface that requires the user to type text commands on a command-line to communicate with the operating system






33. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






34. Kilobyte; About 1000 bytes of information






35. Size and style of typeface






36. The storage of pictures as collections of lines - shapes and other objects.






37. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. Software help agent that walks the user through a complex process






39. Loading the non-ROM part of the operating system into memory






40. The address of a Web site. (unique)






41. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






42. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






43. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






44. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






45. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






46. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






47. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






48. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






49. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






50. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)