Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






2. Television that processes information through a binary code rather than an analog signal.






3. Random Access Memory; Memory that stores program instructions and data temporarily






4. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






5. Software or hardware that guards against unauthorized access to an internal network






6. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






7. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






8. Vertical






9. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






10. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






11. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






12. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






13. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






15. The spacing between letter pairs in a document.






16. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






17. Documentation and help available through a software company's Web site






18. Software that enables the user to manipulate photographs and other high-resolution images.






19. A business that provides its customers with connections to the Internet (along with other services).






20. To post software= or documents to an online source for availability to others






21. Video clip in which one image metamorphoses into another.






22. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






23. Software that facilitates the arrangement of information into hierarchies or levels of ideas






24. An error in programming






25. Megabyte; Approximately 1000K or 1 million bytes






26. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






27. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






28. A defense department system with 24 satellites that can pinpoint any location on the Earth.






29. An agreement allowing the use of a software program on a single machine






30. Someone who uses computer skills to gain unauthorized access to computer systems.






31. To copy software from an online source to a local computer






32. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






33. Fonts which provide more room for wide as opposed to narrow characters






34. Reference to a cell in relation to the current cell; modifies when copied






35. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






36. Software that can be distributed and modified freely by users; example: Linux






37. Using a computer to create - edit and print documents






38. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






39. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






40. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






41. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






42. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






43. Face-to-face communication over long distances using video and computer technology.






44. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






45. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






46. Long-term repository for data (e.g. disks - tapes)






47. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






48. The storage of pictures as collections of lines - shapes and other objects.






49. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






50. A standard interface that allows electronic instruments and computers to communicate with each other and work together.