Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






2. Knowledge acquired from living in the world.






3. An error in programming






4. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






5. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






6. Software packages which include several applications designed to work well together; such as Microsoft Office






7. Bit depth; the number of bits devoted to each pixel.






8. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






9. A computer especially designed to provide software and other resources to other computers over a network






10. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






11. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






12. Using a computer to create - edit and print documents






13. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






14. Synonym finder






15. Step-by-step procedure for calculating a number






16. Fonts which provide more room for wide as opposed to narrow characters






17. Stores programs and the data they need to be instantly accessible to the CPU






18. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






19. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






20. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






21. Long-term repository for data (e.g. disks - tapes)






22. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






23. Measure of character size (one point equals 1/72 inch)






24. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






25. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






26. Terabyte; Approximately 1 million megabytes






27. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






28. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






29. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






30. The narrow (but deep) knowledge base of an expert system.






31. Predefined set of calculations (i.e. SUM and AVERAGE)






32. Language that people speak/write everyday.






33. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






34. A desktop-published document that uses a wide range of color; contrast with spot color.






35. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






36. Rectangular block of selected cells






37. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






38. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






39. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






40. The process of simulation motion with a series of still pictures.






41. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






42. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






43. Reference to a cell in relation to the current cell; modifies when copied






44. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






45. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






46. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






47. Word-processing feature that divides long words situated at the ends of lines






48. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






49. Text entry providing information of the contents of a row/column






50. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.