SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
Virus
Fuzzy logic
WAN
template
2. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Image analysis
Color Depth
GUI Advantages
WYSIWYG
3. Anything that can be communicated
Encryption
Knowledge engineer
Information
An example of presentation-graphics software
4. Instructions that tell the hardware what to do to transform the input into out put
Software
Ethernet
Byte
Advantages of Expert Systems (4)
5. Block that appears at the top of every page in a document displaying repetitive information such as chapter title
Mailing list
Web crawlers
header
Full-Color
6. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices
Byte
automatic correction
Robot
Advantages of digital television (3)
7. To post software= or documents to an online source for availability to others
Upload
Domain
Digital Signal
monospaced fonts
8. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Animation
Output Devices
Command-Line Interface
Byte
9. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
UPS
Search engine
font
Virtual Reality (VR)
10. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.
monospaced fonts
Server
Software
Pixel
11. A handheld device that displays digital representations of the contents of books.
Model + / ?
ebook (Electronic Book)
Packet-switching
Advantages of teleconferencing (3)
12. The use of computers to draw products or process designs on the screen.
Simulation
Cracking
Inference engine
Computer Aided Design (CAD)
13. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
RAM
HTTP (hypertext transfer protocol)
Tim Burners-Lee (4)
Drawing Software
14. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo
relative reference
Humans > Computers (8)
Gigahertz
Web crawlers
15. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Hyperlink
KB
Animation
Interactive Multimedia
16. Grouping of 8 bits
DTP (Desktop Publishing)
Byte
GB
cell format
17. Most common security tools used to restrict access to computer systems.
Password
Model + / ?
Login Name
MB
18. Automatic replication of values - labels and formulas
Convergence
replication
Packet-switching
Disadvantages of Expert Systems (2)
19. Knowledge acquired from living in the world.
Pixel
Common-sense knowledge
Simulation
Rules of Thumb for DTP
20. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Backdoor
Image Processing Software
label
Digital Video
21. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions
22. Multimedia that enables the user to take an active part in the experience.
Operating System Advantages
Parallel processing
Interactive Multimedia
Model + / ?
23. Documentation file that appears onscreen at the user's request
Common-sense knowledge
Sensor
Help file
Multimedia
24. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.
Parallel processing
Upload
Responsibilities of System Admin
Personal digital assistant (PDA)
25. Measure of character size (one point equals 1/72 inch)
Domain
Telecommuting
Pixel
point size
26. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
Augmented Reality
Morph
Password
justification
27. Synonym finder
Presentation-Graphics Software
Open-Source Software
thesaurus
Password
28. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
KB
Wizard
Defragmenting
Computer Aided Design (CAD)
29. The look and feel of the computing experience from a human point of view
spell check
User Interface
Peripheral
Kerning
30. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Hypertext
serif fonts
Browser
Firewall
31. The spacing between lines of text.
macro
Leading
Site License
Wizard
32. Information in a form that can be read - used and manipulated by a computer
Data
GUI Advantages
User Interface
Video Editing Software
33. Software that facilitates the arrangement of information into hierarchies or levels of ideas
outliner
point size
Painting Software
Hypertext
34. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
range
HTTP (hypertext transfer protocol)
Netiquette
Disadvantages of teleconferencing (4)
35. Size and style of typeface
Knowledge engineer
GUI Advantages
font
Output Devices
36. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
HTTP (hypertext transfer protocol)
Natural language
Advantages of Robots (3)
Compatibility
37. Using a computer to create - edit and print documents
Protocol
Domains
word processing
WAN
38. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.
MB
point size
Upload
Advantages of DTP
39. Custom-designed procedure program which automates tasks in an application program
Personal digital assistant (PDA)
Peripheral
Video teleconference
macro
40. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.
Access-Control Software
Software
Personal digital assistant (PDA)
FTP (file transfer protocol)
41. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret
Server
Byte
Factors of a good pw...
Bit
42. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
formatting
An example of presentation-graphics software
Image Processing Software
Interactive Multimedia
43. Unauthorized access and/or vandalism of computer systems; short for criminal hacking
Advantages of teleconferencing (3)
Cracking
Arpanet
Teleconference
44. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
range
Booting
Public Domain Software
Disadvantages of telecommuting (3)
45. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Encryption
Software Piracy
Drawing Software
Backdoor
46. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.
Operating System
Machine learning
Template
Hacker
47. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Domains
formatting
Painting Software
Common-sense knowledge
48. Software used as an introductory - teaching or transitional tool for user tasks
Color Depth
Server
Factors of a good pw...
Training software
49. The process of simulation motion with a series of still pictures.
Animation
Digital television
Painting Software
Operating System
50. Television that processes information through a binary code rather than an analog signal.
Open-Source Software
PDF (Portable Document Format)
word wrap
Digital television