SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)
Rules of thumb for using Powerpoint (6)
header
Natural language
Disadvantages of teleconferencing (4)
2. The use of computers to draw products or process designs on the screen.
Disadvantages of hypertext (4)
Networks: + / ?
Resolution
Computer Aided Design (CAD)
3. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)
Augmented Reality
column
Knowledge engineer
Bandwidth
4. A business that provides its customers with connections to the Internet (along with other services).
Rules of thumb for using Powerpoint (6)
ebook (Electronic Book)
Telecommuting
ISP (Internet service provider)
5. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices
Advantages of digital television (3)
Cracking
LAN
Operating System Advantages
6. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret
Wizard
URL (uniform resource locator)
Personal digital assistant (PDA)
Factors of a good pw...
7. Intersection of row and column
Open-Source Software
cell
Booting
Pull technology
8. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
Fuzzy logic
outliner
Commercial Software
Bit
9. Fonts which provide more room for wide as opposed to narrow characters
Teleconference
Digital television
proportionally spaced fonts
word processing
10. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Speech recognition
Parallel processing
typeface
serif fonts
11. Reference to a specific cell address; doesn't change when copied
label
Disadvantages of ebooks
absolute reference
Kerning
12. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.
Color Depth
Advantages of DTP
formula
Knowledge base
13. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers
function
Knowledge engineer
Wizard
Disadvantages of telecommuting (3)
14. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.
Hyperlink
Protocol
HTML (hypertext markup language)
MB
15. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
Ethernet
Simulation
Bit
Push technology
16. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
DTP (Desktop Publishing)
Networks: + / ?
outliner
Analog Signal
17. A software help agent that walks the user through a complex process
word wrap
Intranet
Wizard
KB
18. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.
typeface
Advantages of telecommuting (5)
Login Name
Global positioning system
19. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger
font
Advantages of teleconferencing (3)
Wizard
Operating System Advantages
20. Terabyte; Approximately 1 million megabytes
Laws of Robots (3) (Asimov)
TB
Hypermedia
Help file
21. Gigabyte; Approximately 1000 MB
GB
Bandwidth
Parallel processing
GUI Advantages
22. Language that people speak/write everyday.
Password
Digital Video
Natural language
Virtual Reality (VR)
23. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
Hyperlink
proportionally spaced fonts
Motion Picture Audio Layer (MP3)
Advantages of teleconferencing (3)
24. Documentation and help available through a software company's Web site
Upload
relative reference
worksheet
Online help
25. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o
Presentation-Graphics Software
Trojan Horse
Advantages of digital television (3)
Disadvantages of telecommuting (3)
26. Software that can be distributed and modified freely by users; example: Linux
Password
Open-Source Software
Morph
Rules of Netiquette (6)
27. The storage of pictures as collections of lines - shapes and other objects.
Color Depth
TCP/IP (transmission control protocol / Internet protocol)
Rules of Thumb for DTP
Vector Graphics
28. Vertical
Login Name
column
Newsgroups
Pull technology
29. To post software= or documents to an online source for availability to others
Resolution
Page-Layout Software
Upload
Laws of Robots (3) (Asimov)
30. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.
Virtual Reality (VR)
range
Morph
'what if?' questions
31. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
LAN
UPS
Access-Control Software
Utility Program
32. 1) Provide expertise when experts are unavailable; 2) preserve knowledge of experts after they leave an organization; 3) combine knowledge of several experts; 4) take care of routine task so workers can do more challenging jobs
WWW (world wide web)
Bandwidth
Online help
Advantages of Expert Systems (4)
33. Predefined set of calculations (i.e. SUM and AVERAGE)
Bandwidth
Advantages of telecommuting (5)
Download
function
34. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)
Output Devices
justification
Backup
Virus
35. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.
Software Piracy
justification
Advantages of Expert Systems (4)
Knowledge base
36. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
IP address
Personal digital assistant (PDA)
Server
thesaurus
37. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor
word wrap
Ethernet
Model
Virtual Reality (VR)
38. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Source Document
Bitmapped Graphics
OCR
Browser
39. Most common security tools used to restrict access to computer systems.
row
Advantages of Robots (3)
Password
Mailing list
40. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge
Personal digital assistant (PDA)
serif fonts
Pattern recognition
Disadvantages of Expert Systems (2)
41. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values
Factors that affect bandwidth (3)
Motion Picture Audio Layer (MP3)
label
Processor
42. Rectangular block of selected cells
range
Augmented Reality
Command-Line Interface
Peer-to-Peer File Sharing (P2P)
43. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
Disadvantages of ebooks
Advantages of digital television (3)
Bandwidth
justification
44. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.
Byte
Virtual Reality (VR)
Cookies
ISP (Internet service provider)
45. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.
Spot Color
Domains
Advantages of teleconferencing (3)
Site License
46. Loading the non-ROM part of the operating system into memory
Humans > Computers (8)
Help file
Protocol
Booting
47. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.
Knowledge engineer
Morph
Compatibility
LAN
48. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
Packet-switching
Intranet
Backdoor
Information
49. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.
Access-Control Software
spell check
Pull technology
Netiquette
50. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.
PDF (Portable Document Format)
Leading
Virus
GUI Advantages