Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






2. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






3. Someone who uses computer skills to gain unauthorized access to computer systems.






4. Instructions that tell the hardware what to do to transform the input into out put






5. A desktop-published document that uses a wide range of color; contrast with spot color.






6. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






7. Using a computer to create - edit and print documents






8. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






9. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






10. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






11. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






12. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






13. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






14. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






15. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






16. Rectangular block of selected cells






17. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






18. Software or hardware that guards against unauthorized access to an internal network






19. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






20. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






21. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






22. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






23. Device for accepting input (e.g. a keyboard)






24. To copy software from an online source to a local computer






25. Software help agent that walks the user through a complex process






26. The Internet protocol used to transfer Web pages.






27. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






28. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






29. A computer model of a real life situation used to see how a model operates under certain conditions






30. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






31. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






32. The density of pixels - measured by the number of dots per inch.






33. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






34. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






35. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






36. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






37. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






38. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






39. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






40. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






41. The look and feel of the computing experience from a human point of view






42. License for multiple copies or removing restrictions on software copying and use at a network site






43. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






44. The process of simulation motion with a series of still pictures.






45. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






46. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






47. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






48. Reference to a cell in relation to the current cell; modifies when copied






49. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






50. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -