SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most common security tools used to restrict access to computer systems.
Video Editing Software
Natural language
Password
Agent
2. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes
Image Processing Software
Utility Program Features
HTML (hypertext markup language)
Model
3. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
Knowledge base
footer
Sensor
DTP (Desktop Publishing)
4. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network
Pixel
Output Devices
WAN
Browser
5. Someone who uses computer skills to gain unauthorized access to computer systems.
FTP (file transfer protocol)
Bandwidth
Hacker
Peer-to-Peer File Sharing (P2P)
6. Using a computer to create - edit and print documents
TCP/IP (transmission control protocol / Internet protocol)
word processing
Knowledge base
serif fonts
7. A set of rules for the exchange of data between a terminal and a computer - or between two computers.
Protocol
Pattern recognition
Factors that control image quality (2)
Advantages of Robots (3)
8. Software that facilitates the arrangement of information into hierarchies or levels of ideas
Computer Aided Design (CAD)
Speech recognition
Factors that affect bandwidth (3)
outliner
9. Horizontal
Bit
Morph
Ethernet
row
10. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
word wrap
Global positioning system
Intranet
serif fonts
11. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'
worksheet
Tim Burners-Lee (4)
Memory
Advantages of teleconferencing (3)
12. The use of computers to draw products or process designs on the screen.
Sensor
Video teleconference
OCR
Computer Aided Design (CAD)
13. Long-term repository for data (e.g. disks - tapes)
Storage Devices
Robot
Simulation
Knowledge engineer
14. Software that enables the user to manipulate photographs and other high-resolution images.
Byte
Image Processing Software
Gigahertz
Page-Layout Software
15. Billions of clock cycles per second - a measurement of a computer's clock speed
Command-Line Interface
Gigahertz
Laws of Robots (3) (Asimov)
Peripheral
16. The illegal duplication of copyrighted software
Software Piracy
Processor
Integrated Software
An example of presentation-graphics software
17. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.
Image Processing Software
Source Document
Password
template
18. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
Advantages of DTP
OCR
point size
Machine learning
19. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)
Software
Turning Test
Push technology
System Administrator
20. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
Cookies
Intranet
LAN
Drawing Software
21. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Hyperlink
Access-Control Software
Telecommuting
WYSIWYG
22. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.
Backup
Digital Video
Hypermedia
absolute reference
23. Size and style of typeface
Online help
font
IP address
LAN
24. A special type of communications software designed to access and display information at Internet Web sites.
IP address
Browser
word processing
Commercial Software
25. A software help agent that walks the user through a complex process
Responsibilities of System Admin
Wizard
Rules of Netiquette (6)
Fuzzy logic
26. Random Access Memory; Memory that stores program instructions and data temporarily
Mailing list
RAM
Bandwidth
Parallel processing
27. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t
Browser
RAM
Hyperlink
Disadvantages of hypertext (4)
28. Measure of character size (one point equals 1/72 inch)
Source Document
Access-Control Software
point size
TCP/IP (transmission control protocol / Internet protocol)
29. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
DTP (Desktop Publishing)
serif fonts
Source Document
WAN
30. The storage of pictures as collections of lines - shapes and other objects.
replication
Ergonomics
Advantages of teleconferencing (3)
Vector Graphics
31. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
Model + / ?
Site License
Open-Source Software
Cracking
32. Loading the non-ROM part of the operating system into memory
Booting
spell check
RAM
KB
33. Rectangular block of selected cells
Agent
An example of presentation-graphics software
Camera-Ready
range
34. In a computer simulation - the user and the computer responding to data from each other
Feedback Loop
Netiquette
ROM
word processing
35. Small text file that comes with many software packages - and contains information not included in the official documentation
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger
Hyperlink
Pull technology
Compatibility
Advantages of teleconferencing (3)
37. Device for accepting input (e.g. a keyboard)
Output Devices
Motion Picture Audio Layer (MP3)
Pattern recognition
Input Devices
38. Text entry providing information of the contents of a row/column
Gigahertz
label
Expert system
RAM
39. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
Hyperlink
formatting
Gigahertz
Disadvantages of telecommuting (3)
40. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
Disadvantages of ebooks
Morph
Worm
Ethernet
41. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Hyperlink
Worm
Knowledge base
Analog Signal
42. Information systems or software programs designed to replicate the decision-making process of a human expert.
template
Unicode
WWW (world wide web)
Expert system
43. 1) color depth; 2) resolution
header
monospaced fonts
Factors that control image quality (2)
Networks: + / ?
44. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.
Agent
Software
Hacker
Bit
45. Custom-designed procedure program which automates tasks in an application program
Knowledge base
macro
GUI Advantages
Turning Test
46. Computer controlled machines designed to perform specific manual tasks ('forced labor')
macro
Byte
Input Devices
Robot
47. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Artificial Intelligence (AI)
WAN
Software Piracy
Factors that affect bandwidth (3)
48. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Pull technology
GUI Advantages
Command-Line Interface
Bitmapped Graphics
49. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Intranet
Multimedia
Help file
Bug
50. Spreadsheet document which appears on the screen as a grid or numbered rows/columns
Cracking
Fuzzy logic
worksheet
Sensor