SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
Help file
Model
Trojan Horse
Digital television
2. Television that processes information through a binary code rather than an analog signal.
Color Depth
Digital television
Software License
Integrated Software
3. Word-processing feature that divides long words situated at the ends of lines
Augmented Reality
Site License
Access-Control Software
automatic hyphenation
4. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes
Ethernet
Augmented Reality
Model
Netiquette
5. Rules of etiquette that apply to Internet communication.
TCP/IP (transmission control protocol / Internet protocol)
KB
Netiquette
Trojan Horse
6. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
Hyperlink
Public Domain Software
Image Processing Software
Digital Video
7. A defense department system with 24 satellites that can pinpoint any location on the Earth.
Byte
Global positioning system
GUI
ebook (Electronic Book)
8. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
Disadvantages of teleconferencing (4)
Upload
Compatibility
Trojan Horse
9. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.
Gigahertz
Domain
macro
Knowledge engineer
10. The narrow (but deep) knowledge base of an expert system.
Hypermedia
Digital television
header
Domain
11. Software that facilitates the arrangement of information into hierarchies or levels of ideas
outliner
Defragmenting
Netiquette
proportionally spaced fonts
12. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t
Information
Wizard
Responsibilities of System Admin
Disadvantages of hypertext (4)
13. A special type of communications software designed to access and display information at Internet Web sites.
Browser
ebook (Electronic Book)
Arpanet
serif fonts
14. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry
Bitmapped Graphics
label
monospaced fonts
Unicode
15. Predefined set of calculations (i.e. SUM and AVERAGE)
Advantages of Robots (3)
Wizard
function
cell format
16. Stores programs and the data they need to be instantly accessible to the CPU
Domain
Memory
Trojan Horse
Public Domain Software
17. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Factors that affect bandwidth (3)
Spot Color
Disadvantages of hypertext (4)
MB
18. Measure of character size (one point equals 1/72 inch)
Master Pages
Morph
Leading
point size
19. Size and style of typeface
Template
Factors that control image quality (2)
Global positioning system
font
20. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars
Advantages of Computer Aided Design (CAD) (4)
monospaced fonts
Bar Code Reader
Networks: + / ?
21. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Logic Bomb
Parallel processing
proportionally spaced fonts
Rules of thumb for using Powerpoint (6)
22. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
word wrap
cell
Motion Picture Audio Layer (MP3)
Virus
23. A desktop-published document that uses a wide range of color; contrast with spot color.
Full-Color
Factors that control image quality (2)
Parallel processing
Worm
24. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)
Model
Laws of Robots (3) (Asimov)
Master Pages
Responsibilities of System Admin
25. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)
monospaced fonts
Convergence
Intranet
Image analysis
26. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
Motion Picture Audio Layer (MP3)
Image Processing Software
Mailing list
Analog Signal
27. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.
Disadvantages of ebooks
Template
ISP (Internet service provider)
An example of presentation-graphics software
28. Software that enables the user to manipulate photographs and other high-resolution images.
Image Processing Software
Training software
Processor
Virtual Reality (VR)
29. Rectangular block of selected cells
Protocol
Open-Source Software
Command-Line Interface
range
30. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
WYSIWYG
Search engine
Cookies
Page-Layout Software
31. Text entry providing information of the contents of a row/column
Image Processing Software
Computer Aided Design (CAD)
automatic correction
label
32. The process of simulation motion with a series of still pictures.
Cracking
Command-Line Interface
Virtual Reality (VR)
Animation
33. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Disadvantages of teleconferencing (4)
worksheet
Bitmapped Graphics
Worm
34. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.
Feedback Loop
Bluetooth
footer
Disadvantages of teleconferencing (4)
35. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
Robot
Presentation-Graphics Software
WAN
PDF (Portable Document Format)
36. Reference to a cell in relation to the current cell; modifies when copied
relative reference
Advantages of Expert Systems (4)
Factors that affect bandwidth (3)
cell
37. Terabyte; Approximately 1 million megabytes
replication
Teleconference
Turning Test
TB
38. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1
Bit
Feedback Loop
absolute reference
Tutorial software
39. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
Wizard
Intranet
Humans > Computers (8)
justification
40. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Upload
Search engine
Hyperlink
'what if?' questions
41. The illegal duplication of copyrighted software
Humans > Computers (8)
Software Piracy
DTP (Desktop Publishing)
Advantages of DTP
42. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space
Global positioning system
Unicode
Rules of thumb for using Powerpoint (6)
Responsibilities of System Admin
43. Software for editing digital video - including titles - sound and special effects.
User Interface
Video Editing Software
Humans > Computers (8)
formatting
44. Grouping of 8 bits
formatting
Byte
Password
TB
45. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')
Arpanet
thesaurus
GB
Disadvantages of ebooks
46. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
automatic correction
Humans < Computers (3)
Musical Instrument Digital Interface (MIDI)
Web crawlers
47. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Output Devices
Web crawlers
Arpanet
Backup
48. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)
GUI
Image Processing Software
Digital Video
typeface
49. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting
Advantages of telecommuting (5)
Utility Program Features
Factors of a good pw...
Commercial Software
50. A set of rules for the exchange of data between a terminal and a computer - or between two computers.
GUI Advantages
Protocol
Utility Program Features
User Interface