Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A special type of communications software designed to access and display information at Internet Web sites.






2. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






3. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






4. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






5. Numbers which are the raw material used to perform calculations






6. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






7. Using a computer to create - edit and print documents






8. An error in programming






9. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






10. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






11. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






12. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






13. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






14. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






15. A desktop-published document that uses a wide range of color; contrast with spot color.






16. Device for sending information from the computer (e.g. monitor or printer)






17. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






18. Step-by-step procedure for calculating a number






19. Automatic replication of values - labels and formulas






20. Spreadsheet software function enabling users to change the appearance of cell contents






21. Fonts which provide more room for wide as opposed to narrow characters






22. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






23. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






24. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






25. License for multiple copies or removing restrictions on software copying and use at a network site






26. The spacing between lines of text.






27. Billions of clock cycles per second - a measurement of a computer's clock speed






28. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






29. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






30. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






31. A program for locating information on the Web. (uses Web crawlers)






32. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






33. Video clip in which one image metamorphoses into another.






34. A defense department system with 24 satellites that can pinpoint any location on the Earth.






35. Terabyte; Approximately 1 million megabytes






36. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






37. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






38. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






39. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






40. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






41. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






42. Word-processing feature that divides long words situated at the ends of lines






43. A handheld device that displays digital representations of the contents of books.






44. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






45. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






46. Loading the non-ROM part of the operating system into memory






47. Information in a form that can be read - used and manipulated by a computer






48. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






49. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






50. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)