Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






2. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






3. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






4. Fonts which provide more room for wide as opposed to narrow characters






5. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






6. Documentation file that appears onscreen at the user's request






7. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






8. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






9. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






10. User Name; A one-word name that you type to identify yourself when connecting






11. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






12. User interface that requires the user to type text commands on a command-line to communicate with the operating system






13. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






14. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






15. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






16. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






17. Kilobyte; About 1000 bytes of information






18. Random Access Memory; Memory that stores program instructions and data temporarily






19. A computer model of a real life situation used to see how a model operates under certain conditions






20. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






21. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






22. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






23. Horizontal






24. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






25. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






26. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






27. A computer especially designed to provide software and other resources to other computers over a network






28. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






29. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






30. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






31. Software that facilitates the arrangement of information into hierarchies or levels of ideas






32. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






33. Terabyte; Approximately 1 million megabytes






34. Stores programs and the data they need to be instantly accessible to the CPU






35. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






36. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






37. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






38. Television that processes information through a binary code rather than an analog signal.






39. Language that people speak/write everyday.






40. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






41. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






42. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






43. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






44. A desktop-published document that uses a wide range of color; contrast with spot color.






45. Software that is free to try with a send-payment-to-keep honor system






46. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






47. Device for sending information from the computer (e.g. monitor or printer)






48. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






49. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






50. Using a computer to create - edit and print documents