Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






2. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






3. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






4. Measure of character size (one point equals 1/72 inch)






5. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






6. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






7. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






8. Spreadsheet software function enabling users to change the appearance of cell contents






9. Software help agent that walks the user through a complex process






10. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






11. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






12. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






13. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






14. Synonym finder






15. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






16. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






17. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






18. Terabyte; Approximately 1 million megabytes






19. Automatic replication of values - labels and formulas






20. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






21. The process of simulation motion with a series of still pictures.






22. 1) color depth; 2) resolution






23. License for multiple copies or removing restrictions on software copying and use at a network site






24. Device for accepting input (e.g. a keyboard)






25. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






26. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






27. A defense department system with 24 satellites that can pinpoint any location on the Earth.






28. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






29. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






30. Working from home by modem - as do many programmers - accountants - and other information workers.






31. The storage of pictures as collections of lines - shapes and other objects.






32. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






33. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






34. Someone who uses computer skills to gain unauthorized access to computer systems.






35. Grouping of 8 bits






36. Instructions that tell the hardware what to do to transform the input into out put






37. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






38. A stream of bits






39. Information in a form that can be read - used and manipulated by a computer






40. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






41. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






42. Long-term repository for data (e.g. disks - tapes)






43. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






44. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






45. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






46. A business that provides its customers with connections to the Internet (along with other services).






47. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






48. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






49. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






50. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net