Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






2. Reference to a specific cell address; doesn't change when copied






3. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






4. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






5. Software that can be distributed and modified freely by users; example: Linux






6. Rules of etiquette that apply to Internet communication.






7. Megabyte; Approximately 1000K or 1 million bytes






8. Software help agent that walks the user through a complex process






9. A software help agent that walks the user through a complex process






10. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






11. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






12. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






13. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






14. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






15. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






16. The illegal duplication of copyrighted software






17. Information in a form that can be read - used and manipulated by a computer






18. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






19. Working from home by modem - as do many programmers - accountants - and other information workers.






20. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






21. Video clip in which one image metamorphoses into another.






22. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






23. Intersection of row and column






24. A handheld device that displays digital representations of the contents of books.






25. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






26. User interface that requires the user to type text commands on a command-line to communicate with the operating system






27. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






28. Software or hardware that guards against unauthorized access to an internal network






29. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






30. Stores programs and the data they need to be instantly accessible to the CPU






31. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






32. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






33. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






34. A computer model of a real life situation used to see how a model operates under certain conditions






35. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






36. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






37. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






38. The science of designing work environments that enable people and things to interact efficiently and safely






39. A stream of bits






40. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






41. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






42. Spreadsheet software function enabling users to change the appearance of cell contents






43. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






44. Anything that can be communicated






45. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






46. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






47. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






48. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






49. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






50. Knowledge acquired from living in the world.