Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Language that people speak/write everyday.






2. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






3. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






4. Text entry providing information of the contents of a row/column






5. A special type of communications software designed to access and display information at Internet Web sites.






6. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






7. Intersection of row and column






8. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






9. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






10. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






11. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






12. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






13. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






14. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






15. Device for accepting input (e.g. a keyboard)






16. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. Provides direct instruction in a clearly specified skill of subject






18. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






19. Step-by-step procedure for calculating a number






20. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






21. Loading the non-ROM part of the operating system into memory






22. Terabyte; Approximately 1 million megabytes






23. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






24. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






25. Reference to a cell in relation to the current cell; modifies when copied






26. Fonts which provide more room for wide as opposed to narrow characters






27. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






28. Most common security tools used to restrict access to computer systems.






29. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






30. The address of a Web site. (unique)






31. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






32. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






33. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






34. Computer controlled machines designed to perform specific manual tasks ('forced labor')






35. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






36. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






37. Local Area Network; Multiple personal computers connected on a network






38. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






39. Grouping of 8 bits






40. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






41. In a computer simulation - the user and the computer responding to data from each other






42. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






43. Typeset-quality pages - ready to be photographed and printed.






44. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






45. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






46. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






47. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






48. Instructions that tell the hardware what to do to transform the input into out put






49. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






50. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware