Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Text entry providing information of the contents of a row/column






2. An agreement allowing the use of a software program on a single machine






3. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






4. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






5. License for multiple copies or removing restrictions on software copying and use at a network site






6. Bit depth; the number of bits devoted to each pixel.






7. Step-by-step procedure for calculating a number






8. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






9. Instructions that tell the hardware what to do to transform the input into out put






10. Software that enables the user to manipulate photographs and other high-resolution images.






11. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






12. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






13. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






14. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






15. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






16. Television that processes information through a binary code rather than an analog signal.






17. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






18. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






19. Anything that can be communicated






20. A program for locating information on the Web. (uses Web crawlers)






21. The process of simulation motion with a series of still pictures.






22. Information in a form that can be read - used and manipulated by a computer






23. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






24. The address of a Web site. (unique)






25. A desktop-published document that uses a wide range of color; contrast with spot color.






26. User interface that requires the user to type text commands on a command-line to communicate with the operating system






27. Software that can be distributed and modified freely by users; example: Linux






28. Measure of character size (one point equals 1/72 inch)






29. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






30. Software or hardware that guards against unauthorized access to an internal network






31. Typeset-quality pages - ready to be photographed and printed.






32. Documentation file that appears onscreen at the user's request






33. Documentation and help available through a software company's Web site






34. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






35. Most common security tools used to restrict access to computer systems.






36. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






37. An individual responsible for maintaining a multi-user computer system






38. Language that people speak/write everyday.






39. Working from home by modem - as do many programmers - accountants - and other information workers.






40. Long-term repository for data (e.g. disks - tapes)






41. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






42. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






43. Device for accepting input (e.g. a keyboard)






44. The density of pixels - measured by the number of dots per inch.






45. Reference to a specific cell address; doesn't change when copied






46. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






47. A stream of bits






48. Software that is free to try with a send-payment-to-keep honor system






49. The Internet protocol used to transfer Web pages.






50. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183