Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who uses computer skills to gain unauthorized access to computer systems.






2. The Internet protocol used to transfer Web pages.






3. Loading the non-ROM part of the operating system into memory






4. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






5. Numbers which are the raw material used to perform calculations






6. A desktop-published document that uses a wide range of color; contrast with spot color.






7. The address of a Web site. (unique)






8. Horizontal






9. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






10. Documentation and help available through a software company's Web site






11. Information in a form that can be read - used and manipulated by a computer






12. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






13. Software for editing digital video - including titles - sound and special effects.






14. Software or hardware that guards against unauthorized access to an internal network






15. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






16. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






17. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






18. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






19. Terabyte; Approximately 1 million megabytes






20. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






21. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






22. License for multiple copies or removing restrictions on software copying and use at a network site






23. Software help agent that walks the user through a complex process






24. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






25. The process of simulation motion with a series of still pictures.






26. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






27. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






28. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






29. In a computer simulation - the user and the computer responding to data from each other






30. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






31. Software that facilitates the arrangement of information into hierarchies or levels of ideas






32. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






33. A stream of bits






34. A software help agent that walks the user through a complex process






35. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






36. Long-term repository for data (e.g. disks - tapes)






37. Bit depth; the number of bits devoted to each pixel.






38. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






39. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






40. Reference to a specific cell address; doesn't change when copied






41. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






42. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






43. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






44. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






45. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






46. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






47. Reference to a cell in relation to the current cell; modifies when copied






48. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






49. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






50. Rectangular block of selected cells