Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






2. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






3. User interface that requires the user to type text commands on a command-line to communicate with the operating system






4. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






5. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






6. The address of a Web site. (unique)






7. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






8. (autocorrect) word-processing feature that places footnotes where they belong on the page






9. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






10. The narrow (but deep) knowledge base of an expert system.






11. An agreement allowing the use of a software program on a single machine






12. Loading the non-ROM part of the operating system into memory






13. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






14. Using a computer to create - edit and print documents






15. Bit depth; the number of bits devoted to each pixel.






16. Software that is free to try with a send-payment-to-keep honor system






17. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






18. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






19. Instructions that tell the hardware what to do to transform the input into out put






20. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






21. Anything that can be communicated






22. The science of designing work environments that enable people and things to interact efficiently and safely






23. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






24. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






25. Provides direct instruction in a clearly specified skill of subject






26. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






27. A handheld device that displays digital representations of the contents of books.






28. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






29. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






30. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






31. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






32. Random Access Memory; Memory that stores program instructions and data temporarily






33. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






34. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






35. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






36. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






37. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






38. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






39. Synonym finder






40. Device for sending information from the computer (e.g. monitor or printer)






41. A business that provides its customers with connections to the Internet (along with other services).






42. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






43. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






44. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






45. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






46. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






47. A computer model of a real life situation used to see how a model operates under certain conditions






48. Video clip in which one image metamorphoses into another.






49. Measure of character size (one point equals 1/72 inch)






50. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms