Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






2. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






3. User interface that requires the user to type text commands on a command-line to communicate with the operating system






4. Automatic replication of values - labels and formulas






5. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






6. Spreadsheet software function enabling users to change the appearance of cell contents






7. Terabyte; Approximately 1 million megabytes






8. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






9. Fonts which provide more room for wide as opposed to narrow characters






10. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






11. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






12. Measure of character size (one point equals 1/72 inch)






13. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






14. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






15. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






16. Local Area Network; Multiple personal computers connected on a network






17. Most common security tools used to restrict access to computer systems.






18. A desktop-published document that uses a wide range of color; contrast with spot color.






19. An agreement allowing the use of a software program on a single machine






20. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






21. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






22. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






23. The spacing between letter pairs in a document.






24. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






25. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






26. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






27. Grouping of 8 bits






28. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






29. A program for locating information on the Web. (uses Web crawlers)






30. Vertical






31. Device for accepting input (e.g. a keyboard)






32. Synonym finder






33. Rectangular block of selected cells






34. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






35. The science of designing work environments that enable people and things to interact efficiently and safely






36. The address of a Web site. (unique)






37. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






38. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






39. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






40. The Internet protocol used to transfer Web pages.






41. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






42. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






43. Software that facilitates the arrangement of information into hierarchies or levels of ideas






44. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






45. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






46. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






47. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






48. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






49. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






50. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/