SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided
template
Digital Signal
Master Pages
WWW (world wide web)
2. Spreadsheet software function enabling users to change the appearance of cell contents
MB
cell format
Parallel processing
Virus
3. Knowledge acquired from living in the world.
footer
Source Document
Common-sense knowledge
Networks: + / ?
4. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)
Command-Line Interface
Inference engine
LAN
Machine learning
5. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Worm
Kerning
Hyperlink
Mailing list
6. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.
Command-Line Interface
cell format
font
FTP (file transfer protocol)
7. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.
formula
Pull technology
Source Document
word processing
8. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
Responsibilities of System Admin
Online help
footer
URL (uniform resource locator)
9. Local Area Network; Multiple personal computers connected on a network
word processing
An example of presentation-graphics software
'Read-me' file
LAN
10. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
WAN
function
Booting
Logic Bomb
11. Software that can be distributed and modified freely by users; example: Linux
word processing
Open-Source Software
Encryption
word wrap
12. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Multimedia
Browser
'Read-me' file
Image Processing Software
13. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar
Unicode
WWW (world wide web)
Networks: + / ?
Digital Video
14. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Push technology
serif fonts
Rules of thumb for using Powerpoint (6)
Worm
15. The storage of pictures as collections of lines - shapes and other objects.
label
Digital Video
Password
Vector Graphics
16. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
Source Document
Shareware
range
Virus
17. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Backup
Mailing list
header
Bar Code Reader
18. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)
Cookies
Biometrics
formatting
typeface
19. The density of pixels - measured by the number of dots per inch.
justification
typeface
Personal digital assistant (PDA)
Resolution
20. Most common security tools used to restrict access to computer systems.
Pull technology
Password
Unicode
Login Name
21. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices
Cracking
Master Pages
LAN
Advantages of digital television (3)
22. Grouping of 8 bits
Byte
absolute reference
'Read-me' file
Bluetooth
23. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge
Utility Program
template
Hypermedia
Disadvantages of Expert Systems (2)
24. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.
Personal digital assistant (PDA)
Tim Burners-Lee (4)
Advantages of Expert Systems (4)
Backup
25. Terabyte; Approximately 1 million megabytes
Hyperlink
proportionally spaced fonts
TB
Firewall
26. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
Domain
Domains
KB
grammar and style checker
27. Instructions that tell the hardware what to do to transform the input into out put
Rules of Netiquette (6)
Software
Output Devices
Packet-switching
28. Bit depth; the number of bits devoted to each pixel.
Color Depth
Bluetooth
Laws of Robots (3) (Asimov)
Factors that affect bandwidth (3)
29. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)
Mailing list
Model + / ?
Pull technology
Sensor
30. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.
Video Editing Software
Defragmenting
Source Document
Image analysis
31. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive
Mailing list
Operating System Advantages
Trojan Horse
Commercial Software
32. An individual responsible for maintaining a multi-user computer system
Leading
System Administrator
Rules of Netiquette (6)
Model + / ?
33. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)
Factors of a good pw...
Intranet
Camera-Ready
Help file
34. A computer model of a real life situation used to see how a model operates under certain conditions
Input Devices
Simulation
UPS
Hyperlink
35. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)
Fuzzy logic
Tim Burners-Lee (4)
formula
header
36. Measure of character size (one point equals 1/72 inch)
point size
Push technology
template
Web crawlers
37. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
Multimedia
Command-Line Interface
Bit
Defragmenting
38. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
DTP (Desktop Publishing)
Hyperlink
Master Pages
UPS
39. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.
OMR
word processing
Hypermedia
GUI
40. A desktop-published document that uses a wide range of color; contrast with spot color.
Packet-switching
Natural language
Factors that control image quality (2)
Full-Color
41. Automatic replication of values - labels and formulas
FTP (file transfer protocol)
Software
ISP (Internet service provider)
replication
42. Megabyte; Approximately 1000K or 1 million bytes
Peripheral
proportionally spaced fonts
Unicode
MB
43. Video clip in which one image metamorphoses into another.
Page-Layout Software
Hyperlink
GB
Morph
44. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')
Shareware
Memory
Arpanet
Networks: + / ?
45. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Ethernet
Access-Control Software
font
GB
46. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
Software Piracy
automatic hyphenation
RAM
Pattern recognition
47. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.
column
Analog Signal
Digital Video
Rules of thumb for using Powerpoint (6)
48. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Musical Instrument Digital Interface (MIDI)
Defragmenting
Firewall
Command-Line Interface
49. Intersection of row and column
Arpanet
serif fonts
Musical Instrument Digital Interface (MIDI)
cell
50. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
Domain
Newsgroups
Encryption
DTP (Desktop Publishing)