Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






2. Face-to-face communication over long distances using video and computer technology.






3. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






4. Rules of etiquette that apply to Internet communication.






5. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






6. User Name; A one-word name that you type to identify yourself when connecting






7. Local Area Network; Multiple personal computers connected on a network






8. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






9. The Internet protocol used to transfer Web pages.






10. An error in programming






11. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






12. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






13. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






14. Custom-designed procedure program which automates tasks in an application program






15. Most common security tools used to restrict access to computer systems.






16. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






17. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






18. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






19. A stream of bits






20. Step-by-step procedure for calculating a number






21. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






22. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






23. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






24. Kilobyte; About 1000 bytes of information






25. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






26. A computer especially designed to provide software and other resources to other computers over a network






27. Long-term repository for data (e.g. disks - tapes)






28. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






29. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






30. Information systems or software programs designed to replicate the decision-making process of a human expert.






31. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






32. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






33. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






34. A business that provides its customers with connections to the Internet (along with other services).






35. A program for locating information on the Web. (uses Web crawlers)






36. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






37. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






38. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






39. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






40. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






41. Stores programs and the data they need to be instantly accessible to the CPU






42. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






43. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






44. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






45. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






46. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






47. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






48. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






49. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


50. Device for sending information from the computer (e.g. monitor or printer)