Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






2. Random Access Memory; Memory that stores program instructions and data temporarily






3. Reference to a specific cell address; doesn't change when copied






4. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






5. Grouping of 8 bits






6. Someone who uses computer skills to gain unauthorized access to computer systems.






7. Bit depth; the number of bits devoted to each pixel.






8. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






9. Rules of etiquette that apply to Internet communication.






10. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






11. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






12. A special type of communications software designed to access and display information at Internet Web sites.






13. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






14. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






15. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






16. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






17. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






18. To copy software from an online source to a local computer






19. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






20. Instructions that tell the hardware what to do to transform the input into out put






21. User interface that requires the user to type text commands on a command-line to communicate with the operating system






22. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






23. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






24. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






25. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






26. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






27. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






28. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






29. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






30. A defense department system with 24 satellites that can pinpoint any location on the Earth.






31. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






32. Software that facilitates the arrangement of information into hierarchies or levels of ideas






33. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






34. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






35. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






36. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






37. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






38. A business that provides its customers with connections to the Internet (along with other services).






39. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






40. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






41. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






42. Software used as an introductory - teaching or transitional tool for user tasks






43. Software that is free to try with a send-payment-to-keep honor system






44. The spacing between letter pairs in a document.






45. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






46. A computer model of a real life situation used to see how a model operates under certain conditions






47. A continuous wave






48. Rectangular block of selected cells






49. 1) color depth; 2) resolution






50. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others