SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who uses computer skills to gain unauthorized access to computer systems.
header
thesaurus
Trojan Horse
Hacker
2. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t
Feedback Loop
Factors of a good pw...
Teleconference
Disadvantages of hypertext (4)
3. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Domain
Robot
worksheet
Ergonomics
4. Anything that can be communicated
Teleconference
Information
Bit
Domain
5. Software that enables the user to manipulate photographs and other high-resolution images.
Image Processing Software
Personal digital assistant (PDA)
Bitmapped Graphics
Newsgroups
6. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space
monospaced fonts
Animation
Color Depth
Pull technology
7. An agreement allowing the use of a software program on a single machine
OMR
Storage Devices
Inference engine
Software License
8. A computer model of a real life situation used to see how a model operates under certain conditions
Robot
Worm
Simulation
Intranet
9. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).
Factors that affect bandwidth (3)
Advantages of digital television (3)
Page-Layout Software
Intranet
10. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
Backdoor
Newsgroups
word processing
Fuzzy logic
11. Size and style of typeface
Speech recognition
Hacker
font
Memory
12. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided
Teleconference
template
Booting
Intranet
13. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.
Painting Software
Personal digital assistant (PDA)
TB
macro
14. The Internet protocol used to transfer Web pages.
Disadvantages of ebooks
Parallel processing
HTTP (hypertext transfer protocol)
Biometrics
15. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)
Server
Rules of Netiquette (6)
Advantages of Expert Systems (4)
OMR
16. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
template
Inference engine
Backdoor
Camera-Ready
17. An individual responsible for maintaining a multi-user computer system
Rules of Thumb for DTP
Gigahertz
System Administrator
Login Name
18. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
Backup
serif fonts
Bitmapped Graphics
Cookies
19. Knowledge acquired from living in the world.
Humans > Computers (8)
Leading
Model
Common-sense knowledge
20. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.
Search engine
Pull technology
typeface
Knowledge base
21. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
Convergence
Wizard
Packet-switching
label
22. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Web crawlers
LAN
range
typeface
23. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Networks: + / ?
Turning Test
Logic Bomb
Digital television
24. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
Trojan Horse
Firewall
Master Pages
Sensor
25. A program for locating information on the Web. (uses Web crawlers)
Search engine
WYSIWYG
formula
Global positioning system
26. A computer especially designed to provide software and other resources to other computers over a network
Natural language
Peer-to-Peer File Sharing (P2P)
Server
An example of presentation-graphics software
27. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter
ISP (Internet service provider)
Telecommuting
spell check
Bitmapped Graphics
28. The look and feel of the computing experience from a human point of view
User Interface
Server
Painting Software
Knowledge engineer
29. Software or hardware that guards against unauthorized access to an internal network
HTTP (hypertext transfer protocol)
Firewall
Bandwidth
Personal digital assistant (PDA)
30. A handheld device that displays digital representations of the contents of books.
ebook (Electronic Book)
Peer-to-Peer File Sharing (P2P)
DTP (Desktop Publishing)
Logic Bomb
31. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Pattern recognition
Disadvantages of hypertext (4)
Factors that affect bandwidth (3)
Image Processing Software
32. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Musical Instrument Digital Interface (MIDI)
Backup
ROM
Laws of Robots (3) (Asimov)
33. Television that processes information through a binary code rather than an analog signal.
Digital television
footer
Color Depth
Augmented Reality
34. Fonts which provide more room for wide as opposed to narrow characters
System Administrator
Backdoor
proportionally spaced fonts
Bar Code Reader
35. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
Shareware
OCR
Push technology
Backdoor
36. Microsoft Powerpoint
Drawing Software
Humans > Computers (8)
Disadvantages of teleconferencing (4)
An example of presentation-graphics software
37. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Natural language
Backdoor
Worm
Spot Color
38. Gigabyte; Approximately 1000 MB
Processor
GB
Global positioning system
Master Pages
39. Software that facilitates the arrangement of information into hierarchies or levels of ideas
User Interface
DTP (Desktop Publishing)
Pull technology
outliner
40. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
monospaced fonts
Peripheral
IP address
Hyperlink
41. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.
Peer-to-Peer File Sharing (P2P)
Feedback Loop
Bit
Biometrics
42. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
Push technology
Augmented Reality
DTP (Desktop Publishing)
Cracking
43. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.
Multimedia
automatic hyphenation
Pull technology
Hacker
44. Grouping of 8 bits
Netiquette
Server
Newsgroups
Byte
45. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.
macro
Help file
HTML (hypertext markup language)
Hypertext
46. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
relative reference
Speech recognition
outliner
Commercial Software
47. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
GB
Domain
Networks: + / ?
Hyperlink
48. Provides direct instruction in a clearly specified skill of subject
Tutorial software
Operating System
Analog Signal
absolute reference
49. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar
Networks: + / ?
Fuzzy logic
Disadvantages of teleconferencing (4)
Global positioning system
50. Word-processing feature that divides long words situated at the ends of lines
Robot
automatic hyphenation
function
Compatibility
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests