Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






2. Device for accepting input (e.g. a keyboard)






3. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






4. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






5. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






6. Software that can be distributed and modified freely by users; example: Linux






7. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






8. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






9. Synonym finder






10. A stream of bits






11. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






12. An individual responsible for maintaining a multi-user computer system






13. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






14. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






15. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






16. Software that facilitates the arrangement of information into hierarchies or levels of ideas






17. Documentation file that appears onscreen at the user's request






18. Size and style of typeface






19. An error in programming






20. In a computer simulation - the user and the computer responding to data from each other






21. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






22. To post software= or documents to an online source for availability to others






23. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






24. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






25. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






26. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






27. Software that is free to try with a send-payment-to-keep honor system






28. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






29. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






30. Face-to-face communication over long distances using video and computer technology.






31. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






32. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






33. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






34. A computer model of a real life situation used to see how a model operates under certain conditions






35. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






36. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






37. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






38. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






39. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






40. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






41. Megabyte; Approximately 1000K or 1 million bytes






42. To copy software from an online source to a local computer






43. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






44. Automatic replication of values - labels and formulas






45. The density of pixels - measured by the number of dots per inch.






46. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






47. The address of a Web site. (unique)






48. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






49. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






50. The science of designing work environments that enable people and things to interact efficiently and safely