Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






2. Multimedia that enables the user to take an active part in the experience.






3. Rules of etiquette that apply to Internet communication.






4. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






5. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






6. A software help agent that walks the user through a complex process






7. Kilobyte; About 1000 bytes of information






8. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






9. User Name; A one-word name that you type to identify yourself when connecting






10. The address of a Web site. (unique)






11. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






12. Word-processing feature that divides long words situated at the ends of lines






13. Device for sending information from the computer (e.g. monitor or printer)






14. Software or hardware that guards against unauthorized access to an internal network






15. Size and style of typeface






16. 1) color depth; 2) resolution






17. Software for editing digital video - including titles - sound and special effects.






18. The look and feel of the computing experience from a human point of view






19. A stream of bits






20. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






21. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






22. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






23. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






24. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






25. Vertical






26. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






27. An individual responsible for maintaining a multi-user computer system






28. The spacing between letter pairs in a document.






29. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






30. User interface that requires the user to type text commands on a command-line to communicate with the operating system






31. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






32. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






33. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






34. Random Access Memory; Memory that stores program instructions and data temporarily






35. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






36. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






37. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






38. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






39. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






40. Knowledge acquired from living in the world.






41. Software that is free to try with a send-payment-to-keep honor system






42. Computer controlled machines designed to perform specific manual tasks ('forced labor')






43. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






44. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






45. Provides direct instruction in a clearly specified skill of subject






46. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






47. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






48. A computer model of a real life situation used to see how a model operates under certain conditions






49. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






50. Spreadsheet document which appears on the screen as a grid or numbered rows/columns