Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






2. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






3. Software or hardware that guards against unauthorized access to an internal network






4. Information in a form that can be read - used and manipulated by a computer






5. In a computer simulation - the user and the computer responding to data from each other






6. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






7. An individual responsible for maintaining a multi-user computer system






8. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






9. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






10. Anything that can be communicated






11. The spacing between lines of text.






12. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






13. The illegal duplication of copyrighted software






14. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)






15. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






16. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






17. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






18. The address of a Web site. (unique)






19. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






20. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






21. Billions of clock cycles per second - a measurement of a computer's clock speed






22. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






23. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






24. A set of rules for the exchange of data between a terminal and a computer - or between two computers.






25. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






26. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






27. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






28. The storage of pictures as collections of lines - shapes and other objects.






29. Information systems or software programs designed to replicate the decision-making process of a human expert.






30. Television that processes information through a binary code rather than an analog signal.






31. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






32. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






33. Multimedia that enables the user to take an active part in the experience.






34. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






35. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






36. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






37. Using a computer to create - edit and print documents






38. Computer controlled machines designed to perform specific manual tasks ('forced labor')






39. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






40. 1) color depth; 2) resolution






41. Device for accepting input (e.g. a keyboard)






42. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






43. Microsoft Powerpoint






44. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






45. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






46. (autocorrect) word-processing feature that places footnotes where they belong on the page






47. An error in programming






48. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






49. Most common security tools used to restrict access to computer systems.






50. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.