Test your basic knowledge |

Technology In Action - 2

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The maximum speed at which data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps).






2. 'A section of a hard drive platter - wedge-shaped from the center of the platter to the edge.'






3. A method of optical storage for digital data; originally developed for storing digital audio.






4. Software that translates spoken words into typed text.






5. A user interface in which the user chooses a command from menus displayed on the screen.






6. A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate.






7. An expansion card that enables a computer to produce sounds that are omnidirectional or three dimensional.






8. 'A type of hard drive that uses much thinner cables - and can transfer data more quickly - than IDE drives.'






9. Numbers - words - pictures - or sounds that represent facts - figures - or ideas.






10. 'An operating system originally conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974 - the UNIX code was rewritten in the standard programming language C. Today there are various commercial versions of UNIX.'






11. The amount of random access memory (RAM) that is installed in a computer.






12. 'The time it takes for the hard drive's read/write heads to move over the surface of the disk - between tracks - to the correct track.'






13. 'A network topology in which each node on the network is responsible for retransmitting the token - or the data - to other nodes.'






14. A software program or hardware device designed to prevent unauthorized access to computers or networks.






15. A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.






16. The metal or plastic case that holds all the physical parts of the computer together - including the computer's processor (its brains) - its memory - and the many circuit boards that help the computer function.






17. The number of bits a video card uses to store data about each pixel on the monitor.






18. A computer that requests information from a server in a client/server network (such as your computer when you are connected to the Internet).






19. Data that has been organized or presented in a meaningful fashion.






20. 'Programs such as Microsoft Outlook or Lotus Organizer that strive to replace the various management tools found on a traditional desk such as a calendar - address book - notepad - and to-do lists.'






21. 'The set of programs on a computer that helps a user carry out tasks such as word processing - sending e-mail - balancing a budget - creating presentations - editing photos - taking an online course - and playing games.'






22. Manipulating or organizing data into information.






23. A hardware device used to enter typed data and commands into a computer.






24. A measure of processing speed equal to 1 million hertz.






25. An expansion card that is installed inside a system unit to translate binary data ( the 1s and the 0s the computer uses) into the images viewed on the monitor.






26. The language computers use to process data into information - consisting of only the values 0 and 1.






27. A program that takes out redundancies in a file to reduce the file size.






28. An expansion card that provides the computer with a connection to the internet via conventional phone lines.






29. A design in newer routers that provides for faster wireless data transmission by utilizing more than one antenna to transmit and receive data.






30. A home that has a computer and other digital devices that are all connected to a home network.






31. A list of commands that displays on the screen.






32. 'A method of data collision detection in which a node connected to the network listens (that is - has carrier sense) to determine that no other nodes are currently transmitting data signals; short for Carrier Sense Multiple Access with Collision Dete






33. Eight binary digits(bits)






34. A single point that creates the images on a computer monitor. Pixels are illuminated by an electron beam that passes rapidly back and forth across the back of the screen so that the pixels appear to glow continuously.






35. A drive that uses the same kind if memory that flash drives use - but can reach data in only a tenth of the time a flash drive requires.






36. 'A group of two or more computers (or nodes) that are configured to share information and resources such as printers - files - and databases.'






37. A mouse that uses an internal sensor or a laser to conrtol the mouse's movement. The sensor sends signals to the computer - telling it where to move the pointer on the screen.






38. 'In Windows 7 - a folder that is used to display files from different locations as if they were all saved in a single folder - regardless of where they are actually stored in the file hierarchy.'






39. Programs for editing photographs and other images.






40. 'A special signal sent to all network nodes - alerting them that a data collision has occurred.'






41. 'A type of network design in which users are not responsible for creating their own data backups or providing security for their computers; instead - those tasks are handled by a centralized server - software - and a system administrator.'






42. A single software program that incorporates the most commonly used tools of many productivity software programs.






43. A fast transfer port.






44. Software that turns an artificial environment into a realistic experience.






45. A network that uses public communication pathways (usually the Internet) to provide branch offices or employees who are not at the office with secure access to the company network. VPNs maintain privacy by using secure data communication protocols.






46. 'A device that reads information from a magnetic strip on the back of a credit card-like access card (such as a student ID card); card readers are easily programmed by adding authorized ID card numbers - Social Security numbers - and so on.'






47. Temporary storage - such as in random access memory (RAM) - When the power is off - the data in volatile storage is cleared out.






48. A topology comprised of several topologies and combined into one network.






49. A large - expensive computer that supports hundreds or thousands of users simultaneously and executes many different programs at the same time.






50. A network in which the nodes are located within a small geographic area.