Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






2. Enables you to 'paint' pixels on the screen with a pointing device.






3. Documentation file that appears onscreen at the user's request






4. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






5. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






6. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






7. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






8. The storage of pictures as collections of lines - shapes and other objects.






9. Step-by-step procedure for calculating a number






10. Provides direct instruction in a clearly specified skill of subject






11. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






12. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






13. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






14. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






15. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






16. Kilobyte; About 1000 bytes of information






17. Billions of clock cycles per second - a measurement of a computer's clock speed






18. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






19. Megabyte; Approximately 1000K or 1 million bytes






20. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






21. An error in programming






22. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






23. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






24. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






25. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






26. A handheld device that displays digital representations of the contents of books.






27. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






28. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






29. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






30. Terabyte; Approximately 1 million megabytes






31. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






32. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






33. To post software= or documents to an online source for availability to others






34. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






35. Stores programs and the data they need to be instantly accessible to the CPU






36. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






37. A continuous wave






38. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






39. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






40. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






41. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






42. Predefined set of calculations (i.e. SUM and AVERAGE)






43. The science of designing work environments that enable people and things to interact efficiently and safely






44. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






45. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






46. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






47. Software packages which include several applications designed to work well together; such as Microsoft Office






48. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






49. Text entry providing information of the contents of a row/column






50. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes