SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Grouping of 8 bits
Digital television
Image Processing Software
Byte
Online help
2. Spreadsheet software function enabling users to change the appearance of cell contents
Leading
word wrap
cell format
Training software
3. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
'what if?' questions
Worm
absolute reference
OCR
4. Device for sending information from the computer (e.g. monitor or printer)
header
Advantages of teleconferencing (3)
Output Devices
Ergonomics
5. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Hyperlink
Tim Burners-Lee (4)
GUI Advantages
Password
6. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
Computer Aided Design (CAD)
WYSIWYG
IP address
Gigahertz
7. Software used as an introductory - teaching or transitional tool for user tasks
Advantages of telecommuting (5)
Training software
Image Processing Software
automatic correction
8. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')
Arpanet
Search engine
Disadvantages of teleconferencing (4)
Domain
9. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Vector Graphics
Pull technology
Factors that affect bandwidth (3)
Arpanet
10. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge
Disadvantages of Expert Systems (2)
Shareware
label
Hyperlink
11. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)
Source Document
Bar Code Reader
Open-Source Software
Disadvantages of teleconferencing (4)
12. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
Disadvantages of ebooks
Tim Burners-Lee (4)
Trojan Horse
Motion Picture Audio Layer (MP3)
13. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Mailing list
Open-Source Software
Global positioning system
Logic Bomb
14. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)
HTML (hypertext markup language)
Mailing list
Software Piracy
Training software
15. Billions of clock cycles per second - a measurement of a computer's clock speed
Laws of Robots (3) (Asimov)
Gigahertz
absolute reference
Factors of a good pw...
16. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.
Login Name
Operating System
Drawing Software
Turning Test
17. Microsoft Powerpoint
cell format
An example of presentation-graphics software
Humans > Computers (8)
font
18. Software that facilitates the arrangement of information into hierarchies or levels of ideas
outliner
Digital television
Personal digital assistant (PDA)
Software Piracy
19. Most common security tools used to restrict access to computer systems.
automatic hyphenation
Software Piracy
Login Name
Password
20. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
Factors that control image quality (2)
Simulation
Pattern recognition
Inference engine
21. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
typeface
WAN
Bug
Defragmenting
22. The process of simulation motion with a series of still pictures.
Image analysis
Animation
Convergence
Simulation
23. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa
Download
Model + / ?
monospaced fonts
Tutorial software
24. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o
Humans > Computers (8)
ASCII
Presentation-Graphics Software
Domains
25. Multimedia that enables the user to take an active part in the experience.
Interactive Multimedia
Virus
Pattern recognition
Simulation
26. A standard interface that allows electronic instruments and computers to communicate with each other and work together.
Booting
Expert system
Musical Instrument Digital Interface (MIDI)
row
27. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided
replication
WYSIWYG
template
Kerning
28. Face-to-face communication over long distances using video and computer technology.
value
Video teleconference
Operating System Advantages
Encryption
29. Kilobyte; About 1000 bytes of information
KB
Pixel
Push technology
Motion Picture Audio Layer (MP3)
30. Information in a form that can be read - used and manipulated by a computer
User Interface
Pixel
Data
KB
31. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
cell
Backdoor
Web crawlers
Fuzzy logic
32. Rectangular block of selected cells
Advantages of Computer Aided Design (CAD) (4)
Rules of thumb for using Powerpoint (6)
Advantages of digital television (3)
range
33. Software that enables the user to manipulate photographs and other high-resolution images.
ROM
TCP/IP (transmission control protocol / Internet protocol)
Upload
Image Processing Software
34. The use of computers to draw products or process designs on the screen.
Rules of thumb for using Powerpoint (6)
Computer Aided Design (CAD)
Bit
TB
35. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
grammar and style checker
Resolution
Protocol
Factors of a good pw...
36. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.
Command-Line Interface
function
Digital Video
Virus
37. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
Rules of Thumb for DTP
Hacker
Search engine
PDF (Portable Document Format)
38. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space
Tim Burners-Lee (4)
macro
word wrap
Responsibilities of System Admin
39. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures
Disadvantages of hypertext (4)
Peer-to-Peer File Sharing (P2P)
Presentation-Graphics Software
UPS
40. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
footer
Backup
Web crawlers
Worm
41. Measure of character size (one point equals 1/72 inch)
macro
Color Depth
point size
Cookies
42. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs
Search engine
Advantages of Expert Systems (4)
spell check
WYSIWYG
43. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'
Tim Burners-Lee (4)
MB
Presentation-Graphics Software
Hypermedia
44. 1) color depth; 2) resolution
KB
DTP (Desktop Publishing)
Factors that control image quality (2)
Video Editing Software
45. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.
Pattern recognition
Inference engine
WWW (world wide web)
Color Depth
46. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
UPS
Password
Domains
Convergence
47. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software
Wizard
OMR
Master Pages
GUI Advantages
48. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it
Arpanet
UPS
Biometrics
ROM
49. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
Cookies
Video teleconference
Bluetooth
Hypermedia
50. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Encryption
function
Wizard
typeface
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests