SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars
Booting
Bar Code Reader
Color Depth
Natural language
2. The narrow (but deep) knowledge base of an expert system.
Musical Instrument Digital Interface (MIDI)
Teleconference
Domain
range
3. Predefined set of calculations (i.e. SUM and AVERAGE)
function
word wrap
Factors that control image quality (2)
Open-Source Software
4. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Fuzzy logic
Operating System Advantages
Advantages of Expert Systems (4)
Multimedia
5. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
Model + / ?
Advantages of digital television (3)
Color Depth
Processor
6. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
'Read-me' file
Search engine
Biometrics
Artificial Intelligence (AI)
7. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;
Logic Bomb
Expert system
Disadvantages of Expert Systems (2)
Utility Program
8. Grouping of 8 bits
template
Color Depth
Byte
Advantages of digital television (3)
9. The address of a Web site. (unique)
template
URL (uniform resource locator)
Responsibilities of System Admin
OMR
10. Documentation file that appears onscreen at the user's request
Hyperlink
typeface
Video teleconference
Help file
11. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo
WAN
Video Editing Software
Humans > Computers (8)
Full-Color
12. User interface that requires the user to type text commands on a command-line to communicate with the operating system
HTML (hypertext markup language)
Color Depth
word processing
Command-Line Interface
13. Word-processing feature that divides long words situated at the ends of lines
automatic hyphenation
relative reference
thesaurus
Musical Instrument Digital Interface (MIDI)
14. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
TCP/IP (transmission control protocol / Internet protocol)
Information
Software Piracy
Pattern recognition
15. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes
Model
Digital television
Disadvantages of teleconferencing (4)
formula
16. Information systems or software programs designed to replicate the decision-making process of a human expert.
Hypertext
Password
Expert system
thesaurus
17. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
Agent
Disadvantages of teleconferencing (4)
TB
Hyperlink
18. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger
Password
Advantages of teleconferencing (3)
OCR
Factors of a good pw...
19. Information in a form that can be read - used and manipulated by a computer
relative reference
column
Push technology
Data
20. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.
Knowledge engineer
Disadvantages of hypertext (4)
Presentation-Graphics Software
ROM
21. Using a computer to create - edit and print documents
word processing
URL (uniform resource locator)
Common-sense knowledge
automatic correction
22. Reference to a cell in relation to the current cell; modifies when copied
relative reference
Site License
DTP (Desktop Publishing)
Factors that control image quality (2)
23. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
HTML (hypertext markup language)
monospaced fonts
cell format
Motion Picture Audio Layer (MP3)
24. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.
Public Domain Software
Netiquette
Hypermedia
FTP (file transfer protocol)
25. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Training software
WWW (world wide web)
Encryption
outliner
26. User Name; A one-word name that you type to identify yourself when connecting
Analog Signal
Color Depth
Template
Login Name
27. Device for accepting input (e.g. a keyboard)
formatting
RAM
Input Devices
User Interface
28. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware
Operating System
Disadvantages of teleconferencing (4)
Digital Signal
Protocol
29. Most common security tools used to restrict access to computer systems.
Password
label
Bug
LAN
30. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices
Utility Program
Compatibility
Arpanet
Advantages of digital television (3)
31. Reference to a specific cell address; doesn't change when copied
PDF (Portable Document Format)
absolute reference
Packet-switching
Pull technology
32. Someone who uses computer skills to gain unauthorized access to computer systems.
Hacker
Rules of thumb for using Powerpoint (6)
OCR
Pull technology
33. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')
Natural language
Disadvantages of telecommuting (3)
Pull technology
Arpanet
34. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures
Kerning
Cookies
UPS
Logic Bomb
35. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
Bit
Spot Color
Netiquette
grammar and style checker
36. Numbers which are the raw material used to perform calculations
Knowledge base
Login Name
value
TB
37. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
URL (uniform resource locator)
Commercial Software
Machine learning
Musical Instrument Digital Interface (MIDI)
38. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
template
Laws of Robots (3) (Asimov)
Cookies
Robot
39. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Access-Control Software
Login Name
template
Sensor
40. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Laws of Robots (3) (Asimov)
Painting Software
Bitmapped Graphics
Wizard
41. The look and feel of the computing experience from a human point of view
User Interface
Download
TCP/IP (transmission control protocol / Internet protocol)
Ethernet
42. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
Cookies
Virtual Reality (VR)
Site License
absolute reference
43. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Animation
Rules of Netiquette (6)
Domains
Operating System
44. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
Logic Bomb
Disadvantages of ebooks
replication
Video teleconference
45. Rules of etiquette that apply to Internet communication.
Operating System Advantages
Netiquette
Protocol
URL (uniform resource locator)
46. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.
Digital Video
Output Devices
Knowledge base
Worm
47. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
Peer-to-Peer File Sharing (P2P)
Search engine
Video Editing Software
Advantages of telecommuting (5)
48. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
relative reference
Upload
formatting
Speech recognition
49. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)
Digital television
range
word processing
Mailing list
50. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
formula
Wizard
Trojan Horse
Feedback Loop
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests