SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Logic Bomb
Advantages of Expert Systems (4)
KB
Advantages of telecommuting (5)
2. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
OMR
proportionally spaced fonts
serif fonts
Bluetooth
3. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware
ebook (Electronic Book)
header
Operating System
cell format
4. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)
Fuzzy logic
formatting
Responsibilities of System Admin
KB
5. 1) color depth; 2) resolution
MB
Packet-switching
Motion Picture Audio Layer (MP3)
Factors that control image quality (2)
6. Rectangular block of selected cells
absolute reference
Hyperlink
Logic Bomb
range
7. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)
Biometrics
Source Document
font
Mailing list
8. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
Peer-to-Peer File Sharing (P2P)
Worm
Utility Program Features
Responsibilities of System Admin
9. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes
Presentation-Graphics Software
Model
grammar and style checker
Digital Signal
10. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
Access-Control Software
Pattern recognition
Protocol
Motion Picture Audio Layer (MP3)
11. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive
Operating System Advantages
Processor
cell
Advantages of teleconferencing (3)
12. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
Defragmenting
Digital Video
WAN
Training software
13. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values
Hacker
Backdoor
Processor
Defragmenting
14. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
Operating System
An example of presentation-graphics software
Inference engine
footer
15. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
monospaced fonts
Master Pages
Advantages of DTP
Model + / ?
16. Face-to-face communication over long distances using video and computer technology.
Download
LAN
Domains
Video teleconference
17. Device for sending information from the computer (e.g. monitor or printer)
Ethernet
Output Devices
PDF (Portable Document Format)
'Read-me' file
18. A business that provides its customers with connections to the Internet (along with other services).
RAM
Password
ASCII
ISP (Internet service provider)
19. (autocorrect) word-processing feature that places footnotes where they belong on the page
Encryption
proportionally spaced fonts
Unicode
automatic correction
20. Device for accepting input (e.g. a keyboard)
Utility Program Features
RAM
TCP/IP (transmission control protocol / Internet protocol)
Input Devices
21. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Site License
Factors that affect bandwidth (3)
Hyperlink
Push technology
22. Typeset-quality pages - ready to be photographed and printed.
GUI Advantages
column
Camera-Ready
Online help
23. Long-term repository for data (e.g. disks - tapes)
Personal digital assistant (PDA)
Storage Devices
ASCII
Logic Bomb
24. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Morph
Vector Graphics
WYSIWYG
Login Name
25. A handheld device that displays digital representations of the contents of books.
ebook (Electronic Book)
Input Devices
Digital television
Computer Aided Design (CAD)
26. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1
Bit
Knowledge base
Cookies
Networks: + / ?
27. The look and feel of the computing experience from a human point of view
ebook (Electronic Book)
Painting Software
justification
User Interface
28. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)
Bitmapped Graphics
Bandwidth
HTTP (hypertext transfer protocol)
proportionally spaced fonts
29. The illegal duplication of copyrighted software
Software Piracy
Digital Video
Information
spell check
30. Grouping of 8 bits
absolute reference
Push technology
Byte
HTML (hypertext markup language)
31. Megabyte; Approximately 1000K or 1 million bytes
Utility Program Features
relative reference
ebook (Electronic Book)
MB
32. Loading the non-ROM part of the operating system into memory
Domains
Booting
Software
Byte
33. Intersection of row and column
cell
Worm
Turning Test
Simulation
34. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
formatting
Ethernet
Hypertext
IP address
35. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Mailing list
Hypertext
Domains
Advantages of Robots (3)
36. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Defragmenting
Server
Command-Line Interface
Protocol
37. Random Access Memory; Memory that stores program instructions and data temporarily
'Read-me' file
Packet-switching
spell check
RAM
38. A special type of communications software designed to access and display information at Internet Web sites.
column
Kerning
Peer-to-Peer File Sharing (P2P)
Browser
39. A program for locating information on the Web. (uses Web crawlers)
Search engine
Agent
replication
Bandwidth
40. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)
'Read-me' file
Parallel processing
Gigahertz
Virus
41. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers
Kerning
Color Depth
Booting
Disadvantages of telecommuting (3)
42. Custom-designed procedure program which automates tasks in an application program
Output Devices
footer
macro
Server
43. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar
automatic hyphenation
Factors that control image quality (2)
outliner
Networks: + / ?
44. Enables you to 'paint' pixels on the screen with a pointing device.
Cracking
Painting Software
Telecommuting
Fuzzy logic
45. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
Compatibility
Model
Login Name
Color Depth
46. A computer model of a real life situation used to see how a model operates under certain conditions
Utility Program
Logic Bomb
Public Domain Software
Simulation
47. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
An example of presentation-graphics software
Networks: + / ?
Arpanet
Drawing Software
48. An error in programming
URL (uniform resource locator)
Ergonomics
Bug
Commercial Software
49. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
Netiquette
TCP/IP (transmission control protocol / Internet protocol)
Inference engine
grammar and style checker
50. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.
HTML (hypertext markup language)
PDF (Portable Document Format)
formula
Booting