Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






2. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






3. Anything that can be communicated






4. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






5. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






6. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






7. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






9. Face-to-face communication over long distances using video and computer technology.






10. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






11. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






12. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






13. An agreement allowing the use of a software program on a single machine






14. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






15. The spacing between lines of text.






16. Information in a form that can be read - used and manipulated by a computer






17. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






18. Fonts which provide more room for wide as opposed to narrow characters






19. User interface that requires the user to type text commands on a command-line to communicate with the operating system






20. Software that facilitates the arrangement of information into hierarchies or levels of ideas






21. Microsoft Powerpoint






22. A stream of bits






23. The Internet protocol used to transfer Web pages.






24. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






25. Text entry providing information of the contents of a row/column






26. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






27. Intersection of row and column






28. Local Area Network; Multiple personal computers connected on a network






29. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






30. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






31. The storage of pictures as collections of lines - shapes and other objects.






32. Someone who uses computer skills to gain unauthorized access to computer systems.






33. Measure of character size (one point equals 1/72 inch)






34. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






35. Word-processing feature that divides long words situated at the ends of lines






36. Software for editing digital video - including titles - sound and special effects.






37. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






38. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






39. An individual responsible for maintaining a multi-user computer system






40. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






41. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






42. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






43. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






44. Step-by-step procedure for calculating a number






45. The spacing between letter pairs in a document.






46. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






47. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






48. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






49. The science of designing work environments that enable people and things to interact efficiently and safely






50. To copy software from an online source to a local computer







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests