Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






2. Language that people speak/write everyday.






3. Automatic replication of values - labels and formulas






4. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






5. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






6. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






7. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






8. Rectangular block of selected cells






9. The illegal duplication of copyrighted software






10. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






11. Provides direct instruction in a clearly specified skill of subject






12. The look and feel of the computing experience from a human point of view






13. A desktop-published document that uses a wide range of color; contrast with spot color.






14. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






15. Grouping of 8 bits






16. A computer model of a real life situation used to see how a model operates under certain conditions






17. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






18. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






19. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






20. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






21. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






22. Random Access Memory; Memory that stores program instructions and data temporarily






23. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






24. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






25. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






26. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






27. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






28. Size and style of typeface






29. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






30. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






31. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






32. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






33. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






34. Long-term repository for data (e.g. disks - tapes)






35. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






36. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






37. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






38. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






39. Reference to a specific cell address; doesn't change when copied






40. Software help agent that walks the user through a complex process






41. 1) color depth; 2) resolution






42. Software that facilitates the arrangement of information into hierarchies or levels of ideas






43. Local Area Network; Multiple personal computers connected on a network






44. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






45. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






46. An error in programming






47. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






48. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






49. Video clip in which one image metamorphoses into another.






50. Billions of clock cycles per second - a measurement of a computer's clock speed