SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.
Color Depth
Agent
Intranet
Feedback Loop
2. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.
Personal digital assistant (PDA)
Firewall
Backup
Common-sense knowledge
3. Documentation file that appears onscreen at the user's request
Camera-Ready
Help file
User Interface
range
4. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret
Password
Factors of a good pw...
Disadvantages of teleconferencing (4)
GUI
5. Billions of clock cycles per second - a measurement of a computer's clock speed
Gigahertz
serif fonts
Online help
Backup
6. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)
Image analysis
Domain
Logic Bomb
GB
7. Vertical
Rules of Netiquette (6)
column
Shareware
Logic Bomb
8. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network
Rules of Netiquette (6)
word processing
Cookies
WAN
9. A defense department system with 24 satellites that can pinpoint any location on the Earth.
serif fonts
Booting
Global positioning system
Augmented Reality
10. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger
Processor
typeface
Advantages of teleconferencing (3)
Packet-switching
11. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers
Painting Software
Expert system
Disadvantages of telecommuting (3)
'Read-me' file
12. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).
spell check
Master Pages
Rules of thumb for using Powerpoint (6)
Natural language
13. Bit depth; the number of bits devoted to each pixel.
GB
formatting
Color Depth
automatic correction
14. User Name; A one-word name that you type to identify yourself when connecting
Hyperlink
GB
Bit
Login Name
15. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Command-Line Interface
Newsgroups
cell
Open-Source Software
16. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
Tim Burners-Lee (4)
Server
Disadvantages of teleconferencing (4)
Backup
17. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.
FTP (file transfer protocol)
footer
Domains
Operating System
18. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
Virtual Reality (VR)
Defragmenting
value
Knowledge base
19. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)
Unicode
Backdoor
Bandwidth
Robot
20. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1
Download
Disadvantages of ebooks
Compatibility
Bit
21. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values
worksheet
Software Piracy
Advantages of teleconferencing (3)
Processor
22. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files
Rules of Thumb for DTP
Speech recognition
Vector Graphics
Humans < Computers (3)
23. (autocorrect) word-processing feature that places footnotes where they belong on the page
Firewall
Networks: + / ?
Worm
automatic correction
24. Software help agent that walks the user through a complex process
Turning Test
Wizard
RAM
Training software
25. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
Model + / ?
Leading
Commercial Software
Rules of thumb for using Powerpoint (6)
26. Reference to a cell in relation to the current cell; modifies when copied
formatting
Parallel processing
Browser
relative reference
27. In a computer simulation - the user and the computer responding to data from each other
Feedback Loop
Turning Test
Unicode
Disadvantages of Expert Systems (2)
28. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor
word wrap
Gigahertz
Disadvantages of ebooks
WYSIWYG
29. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
Biometrics
formatting
Rules of thumb for using Powerpoint (6)
cell format
30. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar
Networks: + / ?
Cracking
Teleconference
Online help
31. Software that enables the user to manipulate photographs and other high-resolution images.
justification
formula
Image Processing Software
Pixel
32. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
Personal digital assistant (PDA)
Simulation
Advantages of Computer Aided Design (CAD) (4)
Feedback Loop
33. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
Software Piracy
Wizard
Humans > Computers (8)
Packet-switching
34. Word-processing feature that divides long words situated at the ends of lines
Interactive Multimedia
Upload
Advantages of digital television (3)
automatic hyphenation
35. Loading the non-ROM part of the operating system into memory
Global positioning system
Shareware
Booting
function
36. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Advantages of digital television (3)
Responsibilities of System Admin
serif fonts
automatic hyphenation
37. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)
Peripheral
Software Piracy
Vector Graphics
Parallel processing
38. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
Cookies
Model
Agent
Logic Bomb
39. Device for accepting input (e.g. a keyboard)
Input Devices
Trojan Horse
Analog Signal
Model + / ?
40. Text entry providing information of the contents of a row/column
label
Bar Code Reader
Knowledge engineer
template
41. Custom-designed procedure program which automates tasks in an application program
replication
Access-Control Software
macro
relative reference
42. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
template
Worm
Logic Bomb
Parallel processing
43. The illegal duplication of copyrighted software
Advantages of teleconferencing (3)
Peripheral
Compatibility
Software Piracy
44. The narrow (but deep) knowledge base of an expert system.
WAN
Digital Signal
Biometrics
Domain
45. Television that processes information through a binary code rather than an analog signal.
Digital television
Leading
KB
Pull technology
46. The spacing between lines of text.
Online help
formula
Leading
Output Devices
47. Predefined set of calculations (i.e. SUM and AVERAGE)
function
macro
Humans > Computers (8)
Operating System Advantages
48. Automatic replication of values - labels and formulas
replication
worksheet
automatic correction
RAM
49. Working from home by modem - as do many programmers - accountants - and other information workers.
point size
Drawing Software
Telecommuting
Leading
50. Language that people speak/write everyday.
Video Editing Software
Storage Devices
UPS
Natural language