Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Grouping of 8 bits






2. Spreadsheet software function enabling users to change the appearance of cell contents






3. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






4. Device for sending information from the computer (e.g. monitor or printer)






5. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






6. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






7. Software used as an introductory - teaching or transitional tool for user tasks






8. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






9. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






10. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






11. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






12. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






13. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






14. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






15. Billions of clock cycles per second - a measurement of a computer's clock speed






16. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






17. Microsoft Powerpoint






18. Software that facilitates the arrangement of information into hierarchies or levels of ideas






19. Most common security tools used to restrict access to computer systems.






20. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






21. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






22. The process of simulation motion with a series of still pictures.






23. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






24. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






25. Multimedia that enables the user to take an active part in the experience.






26. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






27. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






28. Face-to-face communication over long distances using video and computer technology.






29. Kilobyte; About 1000 bytes of information






30. Information in a form that can be read - used and manipulated by a computer






31. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






32. Rectangular block of selected cells






33. Software that enables the user to manipulate photographs and other high-resolution images.






34. The use of computers to draw products or process designs on the screen.






35. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






36. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






37. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






38. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






39. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






40. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






41. Measure of character size (one point equals 1/72 inch)






42. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs






43. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






44. 1) color depth; 2) resolution






45. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






46. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






47. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






48. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






49. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






50. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests