Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






2. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






3. Stores programs and the data they need to be instantly accessible to the CPU






4. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






5. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






6. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






7. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






8. Numbers which are the raw material used to perform calculations






9. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






10. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






11. The spacing between lines of text.






12. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






13. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






14. Software used as an introductory - teaching or transitional tool for user tasks






15. A computer especially designed to provide software and other resources to other computers over a network






16. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






17. License for multiple copies or removing restrictions on software copying and use at a network site






18. An agreement allowing the use of a software program on a single machine






19. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






20. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






21. In a computer simulation - the user and the computer responding to data from each other






22. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






23. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






24. Loading the non-ROM part of the operating system into memory






25. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






26. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






27. Software packages which include several applications designed to work well together; such as Microsoft Office






28. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






29. Software for editing digital video - including titles - sound and special effects.






30. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






31. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






32. The spacing between letter pairs in a document.






33. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






34. The narrow (but deep) knowledge base of an expert system.






35. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






36. A business that provides its customers with connections to the Internet (along with other services).






37. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






38. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






39. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






40. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






41. The illegal duplication of copyrighted software






42. A continuous wave






43. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






44. The density of pixels - measured by the number of dots per inch.






45. Intersection of row and column






46. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






47. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






48. Gigabyte; Approximately 1000 MB






49. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






50. Grouping of 8 bits