Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Fonts which provide more room for wide as opposed to narrow characters






2. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






3. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






4. Numbers which are the raw material used to perform calculations






5. Custom-designed procedure program which automates tasks in an application program






6. Kilobyte; About 1000 bytes of information






7. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






8. Instructions that tell the hardware what to do to transform the input into out put






9. Synonym finder






10. A continuous wave






11. The Internet protocol used to transfer Web pages.






12. The look and feel of the computing experience from a human point of view






13. Software that is free to try with a send-payment-to-keep honor system






14. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






15. Provides direct instruction in a clearly specified skill of subject






16. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






17. Local Area Network; Multiple personal computers connected on a network






18. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






19. Terabyte; Approximately 1 million megabytes






20. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






21. Horizontal






22. Enables you to 'paint' pixels on the screen with a pointing device.






23. The storage of pictures as collections of lines - shapes and other objects.






24. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






25. A computer especially designed to provide software and other resources to other computers over a network






26. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






27. Size and style of typeface






28. Rectangular block of selected cells






29. Stores programs and the data they need to be instantly accessible to the CPU






30. (autocorrect) word-processing feature that places footnotes where they belong on the page






31. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






32. Automatic replication of values - labels and formulas






33. An individual responsible for maintaining a multi-user computer system






34. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






35. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






36. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






37. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






38. Reference to a specific cell address; doesn't change when copied






39. Software or hardware that guards against unauthorized access to an internal network






40. Billions of clock cycles per second - a measurement of a computer's clock speed






41. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






42. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






43. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






44. A defense department system with 24 satellites that can pinpoint any location on the Earth.






45. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






46. An agreement allowing the use of a software program on a single machine






47. An error in programming






48. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






49. Using a computer to create - edit and print documents






50. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information