Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






2. Synonym finder






3. Device for accepting input (e.g. a keyboard)






4. To copy software from an online source to a local computer






5. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






6. Instructions that tell the hardware what to do to transform the input into out put






7. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






8. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






9. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






10. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






11. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






12. Multimedia that enables the user to take an active part in the experience.






13. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






14. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






15. A handheld device that displays digital representations of the contents of books.






16. Step-by-step procedure for calculating a number






17. Most common security tools used to restrict access to computer systems.






18. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






19. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






20. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






21. Gigabyte; Approximately 1000 MB






22. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






23. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






24. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






25. An agreement allowing the use of a software program on a single machine






26. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






27. User Name; A one-word name that you type to identify yourself when connecting






28. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






29. Automatic replication of values - labels and formulas






30. Random Access Memory; Memory that stores program instructions and data temporarily






31. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






32. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






33. Word-processing feature that divides long words situated at the ends of lines






34. Billions of clock cycles per second - a measurement of a computer's clock speed






35. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






36. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






37. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






38. Video clip in which one image metamorphoses into another.






39. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






40. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






41. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






42. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






43. A software help agent that walks the user through a complex process






44. Predefined set of calculations (i.e. SUM and AVERAGE)






45. Software packages which include several applications designed to work well together; such as Microsoft Office






46. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






47. Loading the non-ROM part of the operating system into memory






48. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






49. A special type of communications software designed to access and display information at Internet Web sites.






50. 1) color depth; 2) resolution