SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret
Factors of a good pw...
Leading
Video Editing Software
Image Processing Software
2. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
Backup
Pattern recognition
Teleconference
worksheet
3. The address of a Web site. (unique)
HTML (hypertext markup language)
Sensor
Browser
URL (uniform resource locator)
4. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.
HTML (hypertext markup language)
Integrated Software
header
Leading
5. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
FTP (file transfer protocol)
Worm
Web crawlers
OCR
6. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Help file
Advantages of Computer Aided Design (CAD) (4)
Netiquette
Robot
7. User interface that requires the user to type text commands on a command-line to communicate with the operating system
cell
Shareware
Digital television
Command-Line Interface
8. Software that facilitates the arrangement of information into hierarchies or levels of ideas
outliner
Peripheral
Machine learning
KB
9. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t
Disadvantages of hypertext (4)
IP address
WAN
word processing
10. Unauthorized access and/or vandalism of computer systems; short for criminal hacking
proportionally spaced fonts
Cracking
Integrated Software
Software
11. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
Tutorial software
Peer-to-Peer File Sharing (P2P)
OCR
KB
12. Software or hardware that guards against unauthorized access to an internal network
Push technology
Firewall
Defragmenting
LAN
13. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Worm
row
ebook (Electronic Book)
Networks: + / ?
14. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
footer
Search engine
Disadvantages of ebooks
WYSIWYG
15. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software
GUI Advantages
Inference engine
Humans > Computers (8)
DTP (Desktop Publishing)
16. Measure of character size (one point equals 1/72 inch)
replication
Backup
point size
Analog Signal
17. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)
Public Domain Software
Common-sense knowledge
Disadvantages of Expert Systems (2)
Rules of thumb for using Powerpoint (6)
18. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
serif fonts
Morph
Push technology
word processing
19. User Name; A one-word name that you type to identify yourself when connecting
WAN
Bandwidth
Bar Code Reader
Login Name
20. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers
Robot
Biometrics
Server
Disadvantages of telecommuting (3)
21. A computer model of a real life situation used to see how a model operates under certain conditions
Command-Line Interface
Simulation
Booting
worksheet
22. Information in a form that can be read - used and manipulated by a computer
HTML (hypertext markup language)
typeface
Telecommuting
Data
23. To copy software from an online source to a local computer
HTTP (hypertext transfer protocol)
Musical Instrument Digital Interface (MIDI)
Download
Hypermedia
24. Information systems or software programs designed to replicate the decision-making process of a human expert.
Expert system
KB
Domains
cell
25. Device for sending information from the computer (e.g. monitor or printer)
Fuzzy logic
function
Laws of Robots (3) (Asimov)
Output Devices
26. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
Newsgroups
ISP (Internet service provider)
Software
GB
27. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)
function
Speech recognition
Intranet
monospaced fonts
28. Software used as an introductory - teaching or transitional tool for user tasks
Computer Aided Design (CAD)
Training software
Bar Code Reader
Gigahertz
29. Billions of clock cycles per second - a measurement of a computer's clock speed
Augmented Reality
formula
Worm
Gigahertz
30. Random Access Memory; Memory that stores program instructions and data temporarily
RAM
Morph
Output Devices
Web crawlers
31. Video clip in which one image metamorphoses into another.
Networks: + / ?
Rules of Thumb for DTP
Morph
Advantages of Robots (3)
32. Stores programs and the data they need to be instantly accessible to the CPU
Advantages of DTP
Memory
Digital television
Advantages of Expert Systems (4)
33. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
Biometrics
Information
function
Rules of thumb for using Powerpoint (6)
34. The storage of pictures as collections of lines - shapes and other objects.
outliner
Responsibilities of System Admin
Vector Graphics
Advantages of Computer Aided Design (CAD) (4)
35. Software packages which include several applications designed to work well together; such as Microsoft Office
Integrated Software
Page-Layout Software
Packet-switching
Speech recognition
36. Television that processes information through a binary code rather than an analog signal.
Motion Picture Audio Layer (MP3)
Intranet
Digital television
Convergence
37. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.
Template
Multimedia
Spot Color
label
38. A continuous wave
Agent
TB
TCP/IP (transmission control protocol / Internet protocol)
Analog Signal
39. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.
Rules of Thumb for DTP
replication
Computer Aided Design (CAD)
Spot Color
40. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
justification
worksheet
Global positioning system
Virtual Reality (VR)
41. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
spell check
Compatibility
Memory
Software License
42. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Multimedia
row
Data
Bug
43. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
footer
Virus
Rules of Thumb for DTP
template
44. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry
GUI Advantages
Unicode
Personal digital assistant (PDA)
Speech recognition
45. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
TB
Humans < Computers (3)
Laws of Robots (3) (Asimov)
row
46. Small text file that comes with many software packages - and contains information not included in the official documentation
47. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
Personal digital assistant (PDA)
Hypermedia
IP address
Compatibility
48. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])
Logic Bomb
'what if?' questions
Teleconference
Disadvantages of Expert Systems (2)
49. Device for accepting input (e.g. a keyboard)
Fuzzy logic
Input Devices
Pull technology
Virus
50. Most common security tools used to restrict access to computer systems.
Ergonomics
Password
OMR
Simulation