Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer especially designed to provide software and other resources to other computers over a network






2. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






3. A program for locating information on the Web. (uses Web crawlers)






4. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






5. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






6. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






7. Gigabyte; Approximately 1000 MB






8. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






9. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






10. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






11. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






12. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






13. Device for accepting input (e.g. a keyboard)






14. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






16. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






17. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






18. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






19. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






20. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






21. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






22. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






23. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






24. An error in programming






25. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






26. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






27. A desktop-published document that uses a wide range of color; contrast with spot color.






28. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






29. Information systems or software programs designed to replicate the decision-making process of a human expert.






30. To post software= or documents to an online source for availability to others






31. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






32. The narrow (but deep) knowledge base of an expert system.






33. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






34. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






35. Documentation file that appears onscreen at the user's request






36. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






37. Bit depth; the number of bits devoted to each pixel.






38. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






39. The spacing between lines of text.






40. The Internet protocol used to transfer Web pages.






41. Stores programs and the data they need to be instantly accessible to the CPU






42. 1) color depth; 2) resolution






43. Software for editing digital video - including titles - sound and special effects.






44. License for multiple copies or removing restrictions on software copying and use at a network site






45. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






46. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






47. Provides direct instruction in a clearly specified skill of subject






48. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






49. A software help agent that walks the user through a complex process






50. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.