Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Microsoft Powerpoint






2. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






3. Information in a form that can be read - used and manipulated by a computer






4. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






5. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






6. A handheld device that displays digital representations of the contents of books.






7. Size and style of typeface






8. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






9. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






10. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






11. Bit depth; the number of bits devoted to each pixel.






12. Instructions that tell the hardware what to do to transform the input into out put






13. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






14. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






16. The science of designing work environments that enable people and things to interact efficiently and safely






17. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






18. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






19. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






20. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






21. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






22. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






23. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






24. Synonym finder






25. The spacing between lines of text.






26. A computer especially designed to provide software and other resources to other computers over a network






27. License for multiple copies or removing restrictions on software copying and use at a network site






28. Custom-designed procedure program which automates tasks in an application program






29. Face-to-face communication over long distances using video and computer technology.






30. Television that processes information through a binary code rather than an analog signal.






31. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






32. A special type of communications software designed to access and display information at Internet Web sites.






33. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






34. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






35. To post software= or documents to an online source for availability to others






36. Random Access Memory; Memory that stores program instructions and data temporarily






37. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






38. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






39. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






40. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






41. Stores programs and the data they need to be instantly accessible to the CPU






42. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






43. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






44. Horizontal






45. Most common security tools used to restrict access to computer systems.






46. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






47. To copy software from an online source to a local computer






48. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






49. Gigabyte; Approximately 1000 MB






50. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it