SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices
Advantages of digital television (3)
Digital television
cell format
LAN
2. Size and style of typeface
Bandwidth
cell
font
Motion Picture Audio Layer (MP3)
3. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.
TCP/IP (transmission control protocol / Internet protocol)
Digital television
header
IP address
4. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).
Personal digital assistant (PDA)
Master Pages
Rules of Netiquette (6)
URL (uniform resource locator)
5. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Inference engine
Backup
Compatibility
Bandwidth
6. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
word processing
Rules of Netiquette (6)
Bar Code Reader
OCR
7. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
Cookies
Push technology
Virtual Reality (VR)
Online help
8. In a computer simulation - the user and the computer responding to data from each other
Feedback Loop
Integrated Software
Robot
Advantages of Expert Systems (4)
9. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)
Intranet
Processor
Humans < Computers (3)
Software License
10. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars
Humans < Computers (3)
Bar Code Reader
RAM
Image analysis
11. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values
typeface
ASCII
Disadvantages of telecommuting (3)
Processor
12. Device for sending information from the computer (e.g. monitor or printer)
Gigahertz
Output Devices
Interactive Multimedia
Password
13. Information systems or software programs designed to replicate the decision-making process of a human expert.
Expert system
Trojan Horse
Login Name
Parallel processing
14. Random Access Memory; Memory that stores program instructions and data temporarily
Domain
Peripheral
relative reference
RAM
15. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.
Laws of Robots (3) (Asimov)
Advantages of telecommuting (5)
Password
Upload
16. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
justification
Pattern recognition
Software Piracy
HTML (hypertext markup language)
17. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Site License
justification
Byte
Musical Instrument Digital Interface (MIDI)
18. Device for accepting input (e.g. a keyboard)
Memory
Input Devices
Compatibility
font
19. Most common security tools used to restrict access to computer systems.
Pattern recognition
Bandwidth
Processor
Password
20. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
Public Domain Software
ROM
Analog Signal
MB
21. License for multiple copies or removing restrictions on software copying and use at a network site
Page-Layout Software
Ethernet
Site License
Cookies
22. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Biometrics
WYSIWYG
Factors of a good pw...
Disadvantages of ebooks
23. Long-term repository for data (e.g. disks - tapes)
Rules of Thumb for DTP
Compatibility
range
Storage Devices
24. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter
Color Depth
Booting
spell check
Peer-to-Peer File Sharing (P2P)
25. Anything that can be communicated
ebook (Electronic Book)
thesaurus
Information
Operating System Advantages
26. Language that people speak/write everyday.
Disadvantages of hypertext (4)
Natural language
DTP (Desktop Publishing)
Artificial Intelligence (AI)
27. Gigabyte; Approximately 1000 MB
Computer Aided Design (CAD)
Virus
GB
Kerning
28. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space
Responsibilities of System Admin
Download
Common-sense knowledge
Master Pages
29. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
Biometrics
UPS
Online help
Common-sense knowledge
30. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Site License
Peer-to-Peer File Sharing (P2P)
Intranet
Logic Bomb
31. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
GB
Advantages of Robots (3)
System Administrator
Compatibility
32. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.
Byte
Speech recognition
Advantages of teleconferencing (3)
Template
33. Software used as an introductory - teaching or transitional tool for user tasks
Advantages of telecommuting (5)
Wizard
Training software
DTP (Desktop Publishing)
34. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
Hypertext
Motion Picture Audio Layer (MP3)
ebook (Electronic Book)
cell
35. (autocorrect) word-processing feature that places footnotes where they belong on the page
ebook (Electronic Book)
automatic correction
Intranet
Domain
36. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs
label
Advantages of Expert Systems (4)
Responsibilities of System Admin
Computer Aided Design (CAD)
37. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;
Utility Program
Presentation-Graphics Software
Byte
HTTP (hypertext transfer protocol)
38. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
Hypermedia
Morph
Encryption
Pattern recognition
39. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -
Training software
Knowledge engineer
row
Sensor
40. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
IP address
System Administrator
Bitmapped Graphics
Bluetooth
41. Software help agent that walks the user through a complex process
Wizard
value
Artificial Intelligence (AI)
Pixel
42. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.
Analog Signal
Worm
Source Document
Packet-switching
43. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.
Advantages of DTP
Peer-to-Peer File Sharing (P2P)
Server
Factors that affect bandwidth (3)
44. A computer especially designed to provide software and other resources to other computers over a network
Packet-switching
RAM
Server
Public Domain Software
45. A software help agent that walks the user through a complex process
ROM
Wizard
serif fonts
Inference engine
46. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting
proportionally spaced fonts
Utility Program Features
Humans < Computers (3)
Advantages of digital television (3)
47. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
Virus
Image Processing Software
word processing
Input Devices
48. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Multimedia
Password
IP address
value
49. The look and feel of the computing experience from a human point of view
Model + / ?
Disadvantages of hypertext (4)
Source Document
User Interface
50. The spacing between lines of text.
Virtual Reality (VR)
Byte
Leading
Software License