SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Predefined set of calculations (i.e. SUM and AVERAGE)
Spot Color
function
cell
WWW (world wide web)
2. The science of designing work environments that enable people and things to interact efficiently and safely
OCR
Browser
Ergonomics
Bitmapped Graphics
3. The look and feel of the computing experience from a human point of view
User Interface
Convergence
Operating System Advantages
row
4. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Musical Instrument Digital Interface (MIDI)
word wrap
Advantages of teleconferencing (3)
Booting
5. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.
Public Domain Software
Software
TCP/IP (transmission control protocol / Internet protocol)
Training software
6. To post software= or documents to an online source for availability to others
Rules of thumb for using Powerpoint (6)
Upload
Responsibilities of System Admin
TB
7. Software that can be distributed and modified freely by users; example: Linux
Mailing list
word processing
Open-Source Software
Advantages of Robots (3)
8. Software used as an introductory - teaching or transitional tool for user tasks
'what if?' questions
Download
Training software
Master Pages
9. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)
Model
Hypermedia
Shareware
Inference engine
10. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor
word wrap
WAN
OCR
macro
11. Rectangular block of selected cells
Interactive Multimedia
Commercial Software
formatting
range
12. Multimedia that enables the user to take an active part in the experience.
Trojan Horse
template
Interactive Multimedia
Leading
13. Video clip in which one image metamorphoses into another.
Biometrics
Backdoor
Operating System
Morph
14. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
word wrap
Shareware
PDF (Portable Document Format)
FTP (file transfer protocol)
15. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)
Cracking
Encryption
typeface
cell
16. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Fuzzy logic
Sensor
formula
Logic Bomb
17. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Web crawlers
Personal digital assistant (PDA)
Training software
WYSIWYG
18. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
Software Piracy
Responsibilities of System Admin
IP address
Natural language
19. Device for accepting input (e.g. a keyboard)
Defragmenting
Tutorial software
Input Devices
KB
20. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)
Machine learning
An example of presentation-graphics software
Gigahertz
Turning Test
21. Custom-designed procedure program which automates tasks in an application program
Storage Devices
footer
macro
Packet-switching
22. Documentation and help available through a software company's Web site
Download
Resolution
column
Online help
23. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
formatting
GUI
Peer-to-Peer File Sharing (P2P)
Operating System
24. Terabyte; Approximately 1 million megabytes
Color Depth
Access-Control Software
Sensor
TB
25. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Backup
replication
outliner
Packet-switching
26. Face-to-face communication over long distances using video and computer technology.
Disadvantages of ebooks
Video teleconference
spell check
'what if?' questions
27. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
IP address
Arpanet
justification
formula
28. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Resolution
Video Editing Software
Teleconference
Access-Control Software
29. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections
Ethernet
Spot Color
Trojan Horse
Digital Video
30. The density of pixels - measured by the number of dots per inch.
Data
Resolution
Disadvantages of Expert Systems (2)
replication
31. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Server
Hyperlink
Painting Software
Advantages of digital television (3)
32. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Personal digital assistant (PDA)
Command-Line Interface
Factors that affect bandwidth (3)
Convergence
33. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)
User Interface
Disadvantages of hypertext (4)
Machine learning
Ethernet
34. Kilobyte; About 1000 bytes of information
Domain
KB
Peripheral
Rules of Netiquette (6)
35. Size and style of typeface
WYSIWYG
font
Browser
Leading
36. The storage of pictures as collections of lines - shapes and other objects.
HTTP (hypertext transfer protocol)
Vector Graphics
Simulation
TB
37. Small text file that comes with many software packages - and contains information not included in the official documentation
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. Software help agent that walks the user through a complex process
Download
Image analysis
OMR
Wizard
39. Loading the non-ROM part of the operating system into memory
Source Document
Drawing Software
Booting
Utility Program Features
40. The address of a Web site. (unique)
grammar and style checker
Robot
DTP (Desktop Publishing)
URL (uniform resource locator)
41. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)
Training software
Rules of Netiquette (6)
Mailing list
Open-Source Software
42. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
Packet-switching
automatic hyphenation
Peripheral
Kerning
43. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
Painting Software
Pull technology
Push technology
Advantages of Computer Aided Design (CAD) (4)
44. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
IP address
Factors that control image quality (2)
Disadvantages of teleconferencing (4)
replication
45. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
RAM
Model + / ?
Machine learning
range
46. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)
Factors that control image quality (2)
Search engine
Encryption
Bandwidth
47. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
IP address
thesaurus
Web crawlers
Newsgroups
48. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Training software
Networks: + / ?
function
Domains
49. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Global positioning system
Backdoor
Bluetooth
word wrap
50. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)
WYSIWYG
Search engine
Rules of thumb for using Powerpoint (6)
row