Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






2. Anything that can be communicated






3. Working from home by modem - as do many programmers - accountants - and other information workers.






4. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






5. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






6. Local Area Network; Multiple personal computers connected on a network






7. A business that provides its customers with connections to the Internet (along with other services).






8. The spacing between letter pairs in a document.






9. A software help agent that walks the user through a complex process






10. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






11. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






12. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






13. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






14. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






15. 1) color depth; 2) resolution






16. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






17. Grouping of 8 bits






18. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






19. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






20. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






21. Spreadsheet software function enabling users to change the appearance of cell contents






22. Software that enables the user to manipulate photographs and other high-resolution images.






23. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






24. Fonts which provide more room for wide as opposed to narrow characters






25. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






26. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






27. Device for accepting input (e.g. a keyboard)






28. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






29. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






30. Rules of etiquette that apply to Internet communication.






31. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






32. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






33. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






34. Documentation and help available through a software company's Web site






35. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






36. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






37. Horizontal






38. The spacing between lines of text.






39. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






40. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






41. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






42. Video clip in which one image metamorphoses into another.






43. Software or hardware that guards against unauthorized access to an internal network






44. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






45. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






46. User interface that requires the user to type text commands on a command-line to communicate with the operating system






47. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






48. Software that is free to try with a send-payment-to-keep honor system






49. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






50. A desktop-published document that uses a wide range of color; contrast with spot color.