Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






2. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






3. An individual responsible for maintaining a multi-user computer system






4. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






5. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






6. A stream of bits






7. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






8. Software that enables the user to manipulate photographs and other high-resolution images.






9. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






10. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






11. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






12. The address of a Web site. (unique)






13. Text entry providing information of the contents of a row/column






14. Information systems or software programs designed to replicate the decision-making process of a human expert.






15. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






16. Step-by-step procedure for calculating a number






17. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






18. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






19. Billions of clock cycles per second - a measurement of a computer's clock speed






20. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






21. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






22. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






23. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






24. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






25. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






26. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






27. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






28. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






29. Loading the non-ROM part of the operating system into memory






30. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






31. Stores programs and the data they need to be instantly accessible to the CPU






32. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






33. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






34. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






35. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






36. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






37. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






38. A program for locating information on the Web. (uses Web crawlers)






39. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






40. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






41. The science of designing work environments that enable people and things to interact efficiently and safely






42. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






43. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






44. Custom-designed procedure program which automates tasks in an application program






45. Gigabyte; Approximately 1000 MB






46. The use of computers to draw products or process designs on the screen.






47. The look and feel of the computing experience from a human point of view






48. Grouping of 8 bits






49. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






50. User Name; A one-word name that you type to identify yourself when connecting