Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






2. The illegal duplication of copyrighted software






3. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






4. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






5. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






6. Most common security tools used to restrict access to computer systems.






7. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






8. Spreadsheet software function enabling users to change the appearance of cell contents






9. The density of pixels - measured by the number of dots per inch.






10. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






11. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






12. Local Area Network; Multiple personal computers connected on a network






13. Numbers which are the raw material used to perform calculations






14. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






15. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






16. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






17. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






18. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






19. Software used as an introductory - teaching or transitional tool for user tasks






20. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






21. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






22. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






23. Information systems or software programs designed to replicate the decision-making process of a human expert.






24. The use of computers to draw products or process designs on the screen.






25. Automatic replication of values - labels and formulas






26. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






27. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






28. Step-by-step procedure for calculating a number






29. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






30. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






31. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






32. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






33. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






34. Grouping of 8 bits






35. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






37. Synonym finder






38. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






39. A handheld device that displays digital representations of the contents of books.






40. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






41. A program for locating information on the Web. (uses Web crawlers)






42. Billions of clock cycles per second - a measurement of a computer's clock speed






43. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






44. Reference to a cell in relation to the current cell; modifies when copied






45. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






46. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






47. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






48. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






49. Random Access Memory; Memory that stores program instructions and data temporarily






50. Video clip in which one image metamorphoses into another.