Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






2. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






3. The illegal duplication of copyrighted software






4. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






5. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






6. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






7. Video clip in which one image metamorphoses into another.






8. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






9. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






10. The Internet protocol used to transfer Web pages.






11. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






12. A computer especially designed to provide software and other resources to other computers over a network






13. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






14. Megabyte; Approximately 1000K or 1 million bytes






15. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






16. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






17. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






18. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






19. The narrow (but deep) knowledge base of an expert system.






20. The address of a Web site. (unique)






21. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






22. Fonts which provide more room for wide as opposed to narrow characters






23. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






24. Custom-designed procedure program which automates tasks in an application program






25. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






26. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






27. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






28. The spacing between letter pairs in a document.






29. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






30. Spreadsheet software function enabling users to change the appearance of cell contents






31. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






32. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






33. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






34. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






35. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






36. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






37. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






38. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






39. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






40. An error in programming






41. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






42. Device for sending information from the computer (e.g. monitor or printer)






43. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






44. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






45. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






46. (autocorrect) word-processing feature that places footnotes where they belong on the page






47. Synonym finder






48. Terabyte; Approximately 1 million megabytes






49. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






50. 1) color depth; 2) resolution