Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer especially designed to provide software and other resources to other computers over a network






2. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






3. Gigabyte; Approximately 1000 MB






4. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






5. Computer controlled machines designed to perform specific manual tasks ('forced labor')






6. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






7. Software for editing digital video - including titles - sound and special effects.






8. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






9. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






10. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






11. Device for accepting input (e.g. a keyboard)






12. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






13. A stream of bits






14. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






15. The process of simulation motion with a series of still pictures.






16. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






17. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






18. Face-to-face communication over long distances using video and computer technology.






19. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






20. A continuous wave






21. Random Access Memory; Memory that stores program instructions and data temporarily






22. Size and style of typeface






23. Horizontal






24. Someone who uses computer skills to gain unauthorized access to computer systems.






25. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






26. Documentation and help available through a software company's Web site






27. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






28. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






29. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






30. Billions of clock cycles per second - a measurement of a computer's clock speed






31. Terabyte; Approximately 1 million megabytes






32. Most common security tools used to restrict access to computer systems.






33. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






34. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






35. Software used as an introductory - teaching or transitional tool for user tasks






36. Knowledge acquired from living in the world.






37. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






38. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






39. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






40. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






41. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






42. An agreement allowing the use of a software program on a single machine






43. A program for locating information on the Web. (uses Web crawlers)






44. Kilobyte; About 1000 bytes of information






45. The science of designing work environments that enable people and things to interact efficiently and safely






46. Intersection of row and column






47. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






48. The illegal duplication of copyrighted software






49. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






50. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms