Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software or hardware that guards against unauthorized access to an internal network






2. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






3. Intersection of row and column






4. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






5. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






6. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






7. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






8. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






9. Local Area Network; Multiple personal computers connected on a network






10. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






11. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






12. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






13. Software that can be distributed and modified freely by users; example: Linux






14. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






15. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






16. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






17. Most common security tools used to restrict access to computer systems.






18. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






19. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






20. Measure of character size (one point equals 1/72 inch)






21. The look and feel of the computing experience from a human point of view






22. Device for accepting input (e.g. a keyboard)






23. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






24. Billions of clock cycles per second - a measurement of a computer's clock speed






25. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






26. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






27. Automatic replication of values - labels and formulas






28. Text entry providing information of the contents of a row/column






29. The process of simulation motion with a series of still pictures.






30. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






31. Bit depth; the number of bits devoted to each pixel.






32. Predefined set of calculations (i.e. SUM and AVERAGE)






33. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






34. Computer controlled machines designed to perform specific manual tasks ('forced labor')






35. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






36. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






37. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






38. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






39. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






40. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






41. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






42. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






43. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).






44. Microsoft Powerpoint






45. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


46. Kilobyte; About 1000 bytes of information






47. Grouping of 8 bits






48. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






49. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






50. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)