SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Megabyte; Approximately 1000K or 1 million bytes
MB
Backdoor
Server
Logic Bomb
2. Stores programs and the data they need to be instantly accessible to the CPU
Video teleconference
Memory
Advantages of Robots (3)
System Administrator
3. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Hyperlink
Virus
Hypertext
Simulation
4. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
Disadvantages of Expert Systems (2)
footer
Drawing Software
Utility Program Features
5. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space
Bandwidth
Storage Devices
monospaced fonts
Machine learning
6. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.
Machine learning
Advantages of Expert Systems (4)
Knowledge base
Page-Layout Software
7. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.
Cracking
WAN
Pixel
Pattern recognition
8. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Software Piracy
Digital Signal
Access-Control Software
TB
9. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections
Kerning
Firewall
Ethernet
value
10. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars
absolute reference
Bar Code Reader
Commercial Software
Command-Line Interface
11. The spacing between letter pairs in a document.
Kerning
Personal digital assistant (PDA)
Bar Code Reader
Online help
12. In a computer simulation - the user and the computer responding to data from each other
URL (uniform resource locator)
Computer Aided Design (CAD)
Feedback Loop
Fuzzy logic
13. A handheld device that displays digital representations of the contents of books.
ebook (Electronic Book)
Video Editing Software
Site License
Bug
14. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.
Humans > Computers (8)
Agent
Convergence
Rules of thumb for using Powerpoint (6)
15. User Name; A one-word name that you type to identify yourself when connecting
Backdoor
Drawing Software
Resolution
Login Name
16. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.
template
Firewall
Advantages of telecommuting (5)
Animation
17. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
grammar and style checker
outliner
automatic hyphenation
Download
18. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.
Bluetooth
Logic Bomb
ASCII
Teleconference
19. The Internet protocol used to transfer Web pages.
Ethernet
Sensor
URL (uniform resource locator)
HTTP (hypertext transfer protocol)
20. Block that appears at the top of every page in a document displaying repetitive information such as chapter title
header
Parallel processing
Bandwidth
Push technology
21. (autocorrect) word-processing feature that places footnotes where they belong on the page
Tutorial software
Interactive Multimedia
TB
automatic correction
22. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Logic Bomb
Backup
Memory
replication
23. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.
typeface
LAN
Mailing list
Template
24. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Hypertext
Humans > Computers (8)
serif fonts
Factors that affect bandwidth (3)
25. Device for accepting input (e.g. a keyboard)
Input Devices
User Interface
Humans > Computers (8)
Peripheral
26. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Netiquette
Web crawlers
Digital Signal
Help file
27. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers
Disadvantages of telecommuting (3)
Training software
ASCII
header
28. Documentation and help available through a software company's Web site
Command-Line Interface
Data
Online help
cell
29. The density of pixels - measured by the number of dots per inch.
worksheet
Password
Kerning
Resolution
30. Using a computer to create - edit and print documents
word processing
URL (uniform resource locator)
Utility Program
Presentation-Graphics Software
31. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Robot
cell format
Browser
Encryption
32. A defense department system with 24 satellites that can pinpoint any location on the Earth.
point size
range
Global positioning system
Unicode
33. Software or hardware that guards against unauthorized access to an internal network
HTML (hypertext markup language)
Fuzzy logic
Firewall
Virus
34. An individual responsible for maintaining a multi-user computer system
System Administrator
Access-Control Software
User Interface
FTP (file transfer protocol)
35. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)
HTML (hypertext markup language)
Open-Source Software
Peripheral
KB
36. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus
Feedback Loop
GUI
Software
Hacker
37. The storage of pictures as collections of lines - shapes and other objects.
Hyperlink
Vector Graphics
Knowledge engineer
OMR
38. Word-processing feature that divides long words situated at the ends of lines
PDF (Portable Document Format)
Utility Program
Intranet
automatic hyphenation
39. Bit depth; the number of bits devoted to each pixel.
Advantages of telecommuting (5)
Color Depth
WYSIWYG
RAM
40. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
Packet-switching
replication
Knowledge base
Rules of Thumb for DTP
41. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
Resolution
Advantages of teleconferencing (3)
Template
Humans < Computers (3)
42. Information in a form that can be read - used and manipulated by a computer
Humans > Computers (8)
Operating System Advantages
Data
Mailing list
43. Loading the non-ROM part of the operating system into memory
Booting
Color Depth
Compatibility
proportionally spaced fonts
44. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
'Read-me' file
Backup
Trojan Horse
Convergence
45. To copy software from an online source to a local computer
Backup
Download
Storage Devices
Fuzzy logic
46. Software packages which include several applications designed to work well together; such as Microsoft Office
serif fonts
Trojan Horse
Integrated Software
value
47. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Factors that control image quality (2)
Backup
Teleconference
Help file
48. Local Area Network; Multiple personal computers connected on a network
Byte
LAN
Hacker
Inference engine
49. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
spell check
Hypertext
DTP (Desktop Publishing)
Commercial Software
50. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
Model + / ?
justification
Newsgroups
Access-Control Software