Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intersection of row and column






2. Spreadsheet software function enabling users to change the appearance of cell contents






3. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






4. In a computer simulation - the user and the computer responding to data from each other






5. Information in a form that can be read - used and manipulated by a computer






6. A computer model of a real life situation used to see how a model operates under certain conditions






7. Horizontal






8. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






9. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






10. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






11. Television that processes information through a binary code rather than an analog signal.






12. Size and style of typeface






13. Anything that can be communicated






14. User Name; A one-word name that you type to identify yourself when connecting






15. The process of simulation motion with a series of still pictures.






16. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






17. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






18. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






19. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






20. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






21. Vertical






22. A computer especially designed to provide software and other resources to other computers over a network






23. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






24. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






25. Software that can be distributed and modified freely by users; example: Linux






26. Software that is free to try with a send-payment-to-keep honor system






27. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






28. Measure of character size (one point equals 1/72 inch)






29. Instructions that tell the hardware what to do to transform the input into out put






30. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






31. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






32. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






33. Numbers which are the raw material used to perform calculations






34. Most common security tools used to restrict access to computer systems.






35. Device for accepting input (e.g. a keyboard)






36. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






37. To copy software from an online source to a local computer






38. Software that facilitates the arrangement of information into hierarchies or levels of ideas






39. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






40. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






41. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






42. The science of designing work environments that enable people and things to interact efficiently and safely






43. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






44. Information systems or software programs designed to replicate the decision-making process of a human expert.






45. Loading the non-ROM part of the operating system into memory






46. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






47. A software help agent that walks the user through a complex process






48. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






49. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






50. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.