Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An individual responsible for maintaining a multi-user computer system






2. Software that facilitates the arrangement of information into hierarchies or levels of ideas






3. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






4. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






5. A software help agent that walks the user through a complex process






6. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






7. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






8. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






9. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






10. The science of designing work environments that enable people and things to interact efficiently and safely






11. Information systems or software programs designed to replicate the decision-making process of a human expert.






12. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






13. The spacing between lines of text.






14. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






15. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






16. Software that can be distributed and modified freely by users; example: Linux






17. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






18. License for multiple copies or removing restrictions on software copying and use at a network site






19. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






20. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






21. Using a computer to create - edit and print documents






22. An error in programming






23. The density of pixels - measured by the number of dots per inch.






24. An agreement allowing the use of a software program on a single machine






25. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






26. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






27. Documentation file that appears onscreen at the user's request






28. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






29. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






30. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






31. Enables you to 'paint' pixels on the screen with a pointing device.






32. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






33. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






34. Megabyte; Approximately 1000K or 1 million bytes






35. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. Billions of clock cycles per second - a measurement of a computer's clock speed






37. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






38. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






39. Microsoft Powerpoint






40. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






41. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






42. Custom-designed procedure program which automates tasks in an application program






43. 1) color depth; 2) resolution






44. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






45. Computer controlled machines designed to perform specific manual tasks ('forced labor')






46. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






47. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






48. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






49. The Internet protocol used to transfer Web pages.






50. Reference to a cell in relation to the current cell; modifies when copied