Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Typeset-quality pages - ready to be photographed and printed.

2. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting

3. Vertical

4. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes

5. Face-to-face communication over long distances using video and computer technology.

6. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.

7. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware

8. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)

9. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms

10. To post software= or documents to an online source for availability to others

11. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software

12. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources

13. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key

14. Multimedia that enables the user to take an active part in the experience.

15. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.

16. Size and style of typeface

17. The use of computers to draw products or process designs on the screen.

18. Random Access Memory; Memory that stores program instructions and data temporarily

19. (autocorrect) word-processing feature that places footnotes where they belong on the page

20. Video clip in which one image metamorphoses into another.

21. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.

22. To copy software from an online source to a local computer

23. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars

24. Software that facilitates the arrangement of information into hierarchies or levels of ideas

25. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others

26. An agreement allowing the use of a software program on a single machine

27. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.

28. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)

29. Knowledge acquired from living in the world.

30. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices

31. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.

32. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document

33. Intersection of row and column

34. Billions of clock cycles per second - a measurement of a computer's clock speed

35. Spreadsheet document which appears on the screen as a grid or numbered rows/columns

36. Television that processes information through a binary code rather than an analog signal.

37. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.

38. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number

39. Device for sending information from the computer (e.g. monitor or printer)

40. Bit depth; the number of bits devoted to each pixel.

41. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.

42. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.

43. Spreadsheet software function enabling users to change the appearance of cell contents

44. The storage of pictures as collections of lines - shapes and other objects.

45. Instructions that tell the hardware what to do to transform the input into out put

46. The look and feel of the computing experience from a human point of view

47. A computer model of a real life situation used to see how a model operates under certain conditions

48. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'

49. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs

50. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)