Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






2. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






3. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






4. Reference to a cell in relation to the current cell; modifies when copied






5. The process of simulation motion with a series of still pictures.






6. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






7. Intersection of row and column






8. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






9. Anything that can be communicated






10. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






11. A desktop-published document that uses a wide range of color; contrast with spot color.






12. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






13. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






14. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






15. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






16. Numbers which are the raw material used to perform calculations






17. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






18. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






19. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






20. Software that can be distributed and modified freely by users; example: Linux






21. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






22. Software or hardware that guards against unauthorized access to an internal network






23. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






24. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






25. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






26. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






27. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






28. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






29. To post software= or documents to an online source for availability to others






30. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






31. An individual responsible for maintaining a multi-user computer system






32. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






33. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






34. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






35. Provides direct instruction in a clearly specified skill of subject






36. Kilobyte; About 1000 bytes of information






37. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






38. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






39. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






40. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






41. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






42. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






43. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






44. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






45. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






46. Documentation and help available through a software company's Web site






47. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






48. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






49. Software used as an introductory - teaching or transitional tool for user tasks






50. Software that facilitates the arrangement of information into hierarchies or levels of ideas