Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






2. Software that can be distributed and modified freely by users; example: Linux






3. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






4. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






5. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






6. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






7. Bit depth; the number of bits devoted to each pixel.






8. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






9. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






10. Enables you to 'paint' pixels on the screen with a pointing device.






11. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






12. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






13. The address of a Web site. (unique)






14. Documentation file that appears onscreen at the user's request






15. To post software= or documents to an online source for availability to others






16. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






17. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






18. The illegal duplication of copyrighted software






19. Numbers which are the raw material used to perform calculations






20. Documentation and help available through a software company's Web site






21. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






22. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






23. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






24. Stores programs and the data they need to be instantly accessible to the CPU






25. Using a computer to create - edit and print documents






26. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






27. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






28. The narrow (but deep) knowledge base of an expert system.






29. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






30. Megabyte; Approximately 1000K or 1 million bytes






31. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






32. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






33. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






34. Billions of clock cycles per second - a measurement of a computer's clock speed






35. The process of simulation motion with a series of still pictures.






36. Software for editing digital video - including titles - sound and special effects.






37. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






38. Software help agent that walks the user through a complex process






39. An individual responsible for maintaining a multi-user computer system






40. Spreadsheet software function enabling users to change the appearance of cell contents






41. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






42. A program for locating information on the Web. (uses Web crawlers)






43. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






44. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






45. The Internet protocol used to transfer Web pages.






46. Most common security tools used to restrict access to computer systems.






47. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






48. Someone who uses computer skills to gain unauthorized access to computer systems.






49. User Name; A one-word name that you type to identify yourself when connecting






50. Software or hardware that guards against unauthorized access to an internal network