Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The spacing between lines of text.






2. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






3. Stores programs and the data they need to be instantly accessible to the CPU






4. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






5. The illegal duplication of copyrighted software






6. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






7. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






8. Size and style of typeface






9. The use of computers to draw products or process designs on the screen.






10. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






11. Fonts which provide more room for wide as opposed to narrow characters






12. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






13. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






14. An error in programming






15. A software help agent that walks the user through a complex process






16. Face-to-face communication over long distances using video and computer technology.






17. Software or hardware that guards against unauthorized access to an internal network






18. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






19. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






20. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






21. Vertical






22. To copy software from an online source to a local computer






23. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






24. License for multiple copies or removing restrictions on software copying and use at a network site






25. A continuous wave






26. Using a computer to create - edit and print documents






27. Intersection of row and column






28. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






29. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






30. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






31. Small text file that comes with many software packages - and contains information not included in the official documentation






32. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






33. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






34. Reference to a specific cell address; doesn't change when copied






35. Knowledge acquired from living in the world.






36. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






37. Rules of etiquette that apply to Internet communication.






38. Most common security tools used to restrict access to computer systems.






39. An individual responsible for maintaining a multi-user computer system






40. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






41. A stream of bits






42. Information systems or software programs designed to replicate the decision-making process of a human expert.






43. Software packages which include several applications designed to work well together; such as Microsoft Office






44. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






45. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






46. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






47. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






48. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






49. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






50. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.