Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






2. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






3. Documentation and help available through a software company's Web site






4. A continuous wave






5. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






6. Automatic replication of values - labels and formulas






7. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






8. Spreadsheet software function enabling users to change the appearance of cell contents






9. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






10. The address of a Web site. (unique)






11. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






12. Local Area Network; Multiple personal computers connected on a network






13. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






14. An error in programming






15. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






16. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






17. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






18. Face-to-face communication over long distances using video and computer technology.






19. Rectangular block of selected cells






20. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






21. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






22. Software that is free to try with a send-payment-to-keep honor system






23. A program for locating information on the Web. (uses Web crawlers)






24. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






25. Intersection of row and column






26. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






27. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






28. Software that facilitates the arrangement of information into hierarchies or levels of ideas






29. The process of simulation motion with a series of still pictures.






30. Grouping of 8 bits






31. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






32. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






33. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






34. Size and style of typeface






35. Text entry providing information of the contents of a row/column






36. Working from home by modem - as do many programmers - accountants - and other information workers.






37. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






38. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






39. Knowledge acquired from living in the world.






40. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






41. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






42. Step-by-step procedure for calculating a number






43. The look and feel of the computing experience from a human point of view






44. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






45. Multimedia that enables the user to take an active part in the experience.






46. A handheld device that displays digital representations of the contents of books.






47. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






48. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






49. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






50. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.