SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
Cracking
GUI Advantages
Drawing Software
function
2. Multimedia that enables the user to take an active part in the experience.
Agent
column
Interactive Multimedia
Shareware
3. Rules of etiquette that apply to Internet communication.
absolute reference
Netiquette
Hyperlink
Access-Control Software
4. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)
Open-Source Software
Login Name
Cracking
Fuzzy logic
5. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
Password
range
Processor
Virtual Reality (VR)
6. A software help agent that walks the user through a complex process
Wizard
Ergonomics
Disadvantages of hypertext (4)
Commercial Software
7. Kilobyte; About 1000 bytes of information
Backdoor
Operating System Advantages
KB
Artificial Intelligence (AI)
8. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.
HTML (hypertext markup language)
Password
Augmented Reality
Operating System Advantages
9. User Name; A one-word name that you type to identify yourself when connecting
word processing
Sensor
Logic Bomb
Login Name
10. The address of a Web site. (unique)
Feedback Loop
PDF (Portable Document Format)
Wizard
URL (uniform resource locator)
11. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Bar Code Reader
Data
Backdoor
HTTP (hypertext transfer protocol)
12. Word-processing feature that divides long words situated at the ends of lines
Utility Program
automatic hyphenation
Turning Test
Firewall
13. Device for sending information from the computer (e.g. monitor or printer)
Kerning
value
automatic hyphenation
Output Devices
14. Software or hardware that guards against unauthorized access to an internal network
Public Domain Software
Ergonomics
Firewall
Hypermedia
15. Size and style of typeface
Compatibility
font
Responsibilities of System Admin
Humans > Computers (8)
16. 1) color depth; 2) resolution
Responsibilities of System Admin
Firewall
Factors that control image quality (2)
Data
17. Software for editing digital video - including titles - sound and special effects.
Memory
Video Editing Software
range
Humans < Computers (3)
18. The look and feel of the computing experience from a human point of view
Knowledge engineer
grammar and style checker
User Interface
Vector Graphics
19. A stream of bits
Backup
Digital Signal
Newsgroups
Bitmapped Graphics
20. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t
Pixel
Master Pages
Disadvantages of hypertext (4)
Memory
21. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
Web crawlers
Model + / ?
word processing
template
22. A set of rules for the exchange of data between a terminal and a computer - or between two computers.
Robot
Protocol
OMR
Interactive Multimedia
23. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Worm
WAN
TCP/IP (transmission control protocol / Internet protocol)
row
24. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;
relative reference
Utility Program
GB
label
25. Vertical
column
Laws of Robots (3) (Asimov)
Sensor
Arpanet
26. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Speech recognition
Advantages of Robots (3)
Factors that affect bandwidth (3)
Data
27. An individual responsible for maintaining a multi-user computer system
Simulation
Login Name
System Administrator
Pull technology
28. The spacing between letter pairs in a document.
An example of presentation-graphics software
Robot
Kerning
Expert system
29. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware
Source Document
Sensor
Training software
Operating System
30. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Command-Line Interface
ebook (Electronic Book)
ROM
Interactive Multimedia
31. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Bar Code Reader
Advantages of Robots (3)
Personal digital assistant (PDA)
Logic Bomb
32. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)
Ethernet
typeface
Agent
Vector Graphics
33. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
Agent
PDF (Portable Document Format)
label
Painting Software
34. Random Access Memory; Memory that stores program instructions and data temporarily
RAM
Robot
Rules of Netiquette (6)
Interactive Multimedia
35. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Turning Test
Multimedia
relative reference
Hyperlink
36. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Search engine
Encryption
HTTP (hypertext transfer protocol)
Wizard
37. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided
word wrap
Gigahertz
template
Color Depth
38. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters
Advantages of digital television (3)
absolute reference
ASCII
Help file
39. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.
Digital Video
Image Processing Software
Disadvantages of telecommuting (3)
Peer-to-Peer File Sharing (P2P)
40. Knowledge acquired from living in the world.
System Administrator
Page-Layout Software
Common-sense knowledge
ebook (Electronic Book)
41. Software that is free to try with a send-payment-to-keep honor system
automatic correction
Shareware
Open-Source Software
row
42. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Commercial Software
absolute reference
Robot
Processor
43. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.
row
Backdoor
cell
Rules of Thumb for DTP
44. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Disadvantages of ebooks
Kerning
Video Editing Software
Access-Control Software
45. Provides direct instruction in a clearly specified skill of subject
Open-Source Software
Wizard
Personal digital assistant (PDA)
Tutorial software
46. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.
cell
Pixel
Peer-to-Peer File Sharing (P2P)
Animation
47. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)
Disadvantages of hypertext (4)
Intranet
Software
Operating System Advantages
48. A computer model of a real life situation used to see how a model operates under certain conditions
Model
Simulation
Drawing Software
ebook (Electronic Book)
49. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
MB
Bitmapped Graphics
Turning Test
Disadvantages of ebooks
50. Spreadsheet document which appears on the screen as a grid or numbered rows/columns
worksheet
Booting
Software Piracy
System Administrator