Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






2. Provides direct instruction in a clearly specified skill of subject






3. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






4. The spacing between lines of text.






5. Instructions that tell the hardware what to do to transform the input into out put






6. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






7. Random Access Memory; Memory that stores program instructions and data temporarily






8. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






9. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






10. Terabyte; Approximately 1 million megabytes






11. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






12. A defense department system with 24 satellites that can pinpoint any location on the Earth.






13. Software that can be distributed and modified freely by users; example: Linux






14. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






15. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






16. Enables you to 'paint' pixels on the screen with a pointing device.






17. The storage of pictures as collections of lines - shapes and other objects.






18. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






19. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






20. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






21. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






22. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






23. Intersection of row and column






24. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






25. A software help agent that walks the user through a complex process






26. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






27. Software that is free to try with a send-payment-to-keep honor system






28. Spreadsheet software function enabling users to change the appearance of cell contents






29. Information in a form that can be read - used and manipulated by a computer






30. Software that facilitates the arrangement of information into hierarchies or levels of ideas






31. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






32. Software that enables the user to manipulate photographs and other high-resolution images.






33. Grouping of 8 bits






34. The narrow (but deep) knowledge base of an expert system.






35. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






36. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






37. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






38. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






39. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






40. Measure of character size (one point equals 1/72 inch)






41. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






42. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






43. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






44. Stores programs and the data they need to be instantly accessible to the CPU






45. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






46. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






47. Most common security tools used to restrict access to computer systems.






48. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






49. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






50. An error in programming