Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Language that people speak/write everyday.






2. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






3. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






4. License for multiple copies or removing restrictions on software copying and use at a network site






5. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






6. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






7. Intersection of row and column






8. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






9. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






10. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






11. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






12. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






13. Reference to a specific cell address; doesn't change when copied






14. Text entry providing information of the contents of a row/column






15. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






16. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






17. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






18. Instructions that tell the hardware what to do to transform the input into out put






19. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






20. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






21. Information in a form that can be read - used and manipulated by a computer






22. Random Access Memory; Memory that stores program instructions and data temporarily






23. Someone who uses computer skills to gain unauthorized access to computer systems.






24. A continuous wave






25. Using a computer to create - edit and print documents






26. Automatic replication of values - labels and formulas






27. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






28. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






29. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






30. Megabyte; Approximately 1000K or 1 million bytes






31. Software that can be distributed and modified freely by users; example: Linux






32. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






33. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






34. Knowledge acquired from living in the world.






35. Stores programs and the data they need to be instantly accessible to the CPU






36. Measure of character size (one point equals 1/72 inch)






37. Spreadsheet software function enabling users to change the appearance of cell contents






38. Step-by-step procedure for calculating a number






39. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






40. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






41. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






42. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






43. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






44. Software that facilitates the arrangement of information into hierarchies or levels of ideas






45. Synonym finder






46. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






47. Word-processing feature that divides long words situated at the ends of lines






48. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






49. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






50. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices