Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The storage of pictures as collections of lines - shapes and other objects.






2. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






3. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






4. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






5. The illegal duplication of copyrighted software






6. Television that processes information through a binary code rather than an analog signal.






7. A computer especially designed to provide software and other resources to other computers over a network






8. Most common security tools used to restrict access to computer systems.






9. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






10. Enables you to 'paint' pixels on the screen with a pointing device.






11. The spacing between lines of text.






12. The density of pixels - measured by the number of dots per inch.






13. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






14. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






15. Typeset-quality pages - ready to be photographed and printed.






16. Reference to a specific cell address; doesn't change when copied






17. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






18. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






19. The narrow (but deep) knowledge base of an expert system.






20. A desktop-published document that uses a wide range of color; contrast with spot color.






21. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






22. (autocorrect) word-processing feature that places footnotes where they belong on the page






23. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






24. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






25. Custom-designed procedure program which automates tasks in an application program






26. A defense department system with 24 satellites that can pinpoint any location on the Earth.






27. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






28. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






29. An individual responsible for maintaining a multi-user computer system






30. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






31. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






32. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






33. Size and style of typeface






34. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






35. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






36. Working from home by modem - as do many programmers - accountants - and other information workers.






37. Software that is free to try with a send-payment-to-keep honor system






38. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






39. A continuous wave






40. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






41. Anything that can be communicated






42. Megabyte; Approximately 1000K or 1 million bytes






43. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






44. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






45. The process of simulation motion with a series of still pictures.






46. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






47. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






48. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






49. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






50. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive