Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






2. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






3. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






4. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






5. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






6. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






7. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






8. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






9. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






10. Software or hardware that guards against unauthorized access to an internal network






11. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






12. The storage of pictures as collections of lines - shapes and other objects.






13. Loading the non-ROM part of the operating system into memory






14. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






15. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






16. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






17. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






18. Software packages which include several applications designed to work well together; such as Microsoft Office






19. Typeset-quality pages - ready to be photographed and printed.






20. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






21. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






22. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






23. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






24. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






25. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






26. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






27. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






28. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






29. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






30. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






31. Most common security tools used to restrict access to computer systems.






32. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






33. The density of pixels - measured by the number of dots per inch.






34. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






35. Terabyte; Approximately 1 million megabytes






36. Computer controlled machines designed to perform specific manual tasks ('forced labor')






37. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






38. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






39. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






40. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






41. A continuous wave






42. Using a computer to create - edit and print documents






43. Provides direct instruction in a clearly specified skill of subject






44. Device for sending information from the computer (e.g. monitor or printer)






45. Software that facilitates the arrangement of information into hierarchies or levels of ideas






46. Reference to a cell in relation to the current cell; modifies when copied






47. A program for locating information on the Web. (uses Web crawlers)






48. Kilobyte; About 1000 bytes of information






49. An agreement allowing the use of a software program on a single machine






50. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183