Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To post software= or documents to an online source for availability to others






2. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






3. A desktop-published document that uses a wide range of color; contrast with spot color.






4. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






5. Using a computer to create - edit and print documents






6. Size and style of typeface






7. Reference to a specific cell address; doesn't change when copied






8. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






9. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






10. Provides direct instruction in a clearly specified skill of subject






11. A business that provides its customers with connections to the Internet (along with other services).






12. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






13. Microsoft Powerpoint






14. Billions of clock cycles per second - a measurement of a computer's clock speed






15. Intersection of row and column






16. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






17. The spacing between letter pairs in a document.






18. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






19. Instructions that tell the hardware what to do to transform the input into out put






20. An individual responsible for maintaining a multi-user computer system






21. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






22. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






23. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






24. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






25. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






26. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






27. A software help agent that walks the user through a complex process






28. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






29. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






30. The spacing between lines of text.






31. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






32. Gigabyte; Approximately 1000 MB






33. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






34. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






35. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






36. A handheld device that displays digital representations of the contents of books.






37. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






38. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






39. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






40. The use of computers to draw products or process designs on the screen.






41. Documentation and help available through a software company's Web site






42. Terabyte; Approximately 1 million megabytes






43. Reference to a cell in relation to the current cell; modifies when copied






44. Random Access Memory; Memory that stores program instructions and data temporarily






45. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






46. To copy software from an online source to a local computer






47. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






48. Software that is free to try with a send-payment-to-keep honor system






49. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






50. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)