SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software or hardware that guards against unauthorized access to an internal network
Digital Signal
ASCII
Download
Firewall
2. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
value
Rules of Thumb for DTP
Model
Hypertext
3. Intersection of row and column
cell
Shareware
replication
DTP (Desktop Publishing)
4. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Source Document
Operating System
Browser
Backdoor
5. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures
Virus
Virtual Reality (VR)
relative reference
UPS
6. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
Vector Graphics
Convergence
Public Domain Software
HTTP (hypertext transfer protocol)
7. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage
Factors that control image quality (2)
Worm
Tim Burners-Lee (4)
Byte
8. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
'what if?' questions
Virus
Advantages of Computer Aided Design (CAD) (4)
outliner
9. Local Area Network; Multiple personal computers connected on a network
cell format
Knowledge engineer
Defragmenting
LAN
10. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Full-Color
Wizard
Logic Bomb
Utility Program Features
11. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.
Disadvantages of teleconferencing (4)
Sensor
Bitmapped Graphics
Bug
12. Unauthorized access and/or vandalism of computer systems; short for criminal hacking
Cracking
point size
Bitmapped Graphics
Disadvantages of ebooks
13. Software that can be distributed and modified freely by users; example: Linux
Open-Source Software
Hyperlink
Bluetooth
Ethernet
14. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.
monospaced fonts
Advantages of telecommuting (5)
Hyperlink
Encryption
15. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).
Master Pages
macro
System Administrator
Interactive Multimedia
16. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it
ROM
Integrated Software
Responsibilities of System Admin
KB
17. Most common security tools used to restrict access to computer systems.
outliner
Master Pages
Password
System Administrator
18. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry
Resolution
Knowledge engineer
Download
Unicode
19. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
typeface
Factors of a good pw...
Page-Layout Software
Access-Control Software
20. Measure of character size (one point equals 1/72 inch)
ebook (Electronic Book)
point size
Peer-to-Peer File Sharing (P2P)
Shareware
21. The look and feel of the computing experience from a human point of view
User Interface
WYSIWYG
URL (uniform resource locator)
ebook (Electronic Book)
22. Device for accepting input (e.g. a keyboard)
Input Devices
replication
Site License
Training software
23. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software
Agent
Factors that control image quality (2)
Byte
GUI Advantages
24. Billions of clock cycles per second - a measurement of a computer's clock speed
Networks: + / ?
Gigahertz
Pattern recognition
KB
25. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Encryption
Personal digital assistant (PDA)
HTML (hypertext markup language)
Computer Aided Design (CAD)
26. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Factors of a good pw...
Factors that affect bandwidth (3)
footer
User Interface
27. Automatic replication of values - labels and formulas
Humans < Computers (3)
replication
Bar Code Reader
Presentation-Graphics Software
28. Text entry providing information of the contents of a row/column
footer
Machine learning
Interactive Multimedia
label
29. The process of simulation motion with a series of still pictures.
Animation
Rules of Thumb for DTP
Hyperlink
Rules of Netiquette (6)
30. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])
Rules of Netiquette (6)
Newsgroups
Teleconference
justification
31. Bit depth; the number of bits devoted to each pixel.
Color Depth
word processing
Newsgroups
Common-sense knowledge
32. Predefined set of calculations (i.e. SUM and AVERAGE)
Packet-switching
function
automatic correction
Template
33. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.
Parallel processing
Hypertext
Rules of Thumb for DTP
Advantages of Expert Systems (4)
34. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Robot
Protocol
Responsibilities of System Admin
label
35. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.
Spot Color
Factors that control image quality (2)
Sensor
Ethernet
36. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Expert system
Firewall
Web crawlers
Bitmapped Graphics
37. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)
Fuzzy logic
Arpanet
DTP (Desktop Publishing)
Public Domain Software
38. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo
Laws of Robots (3) (Asimov)
Disadvantages of hypertext (4)
Humans > Computers (8)
Vector Graphics
39. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information
Ethernet
Peer-to-Peer File Sharing (P2P)
Humans < Computers (3)
URL (uniform resource locator)
40. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.
Video teleconference
cell
Packet-switching
proportionally spaced fonts
41. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.
Template
Defragmenting
Pattern recognition
Advantages of Computer Aided Design (CAD) (4)
42. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -
Sensor
Analog Signal
Personal digital assistant (PDA)
Advantages of Expert Systems (4)
43. In desktop publishing - software used to combine various source documents into coherent - visually appealing publication (e.g. Adobe InDesign).
Storage Devices
Page-Layout Software
Model + / ?
Hyperlink
44. Microsoft Powerpoint
word wrap
An example of presentation-graphics software
Analog Signal
System Administrator
45. Small text file that comes with many software packages - and contains information not included in the official documentation
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. Kilobyte; About 1000 bytes of information
KB
formatting
Disadvantages of hypertext (4)
Tutorial software
47. Grouping of 8 bits
Video teleconference
Byte
GUI
Painting Software
48. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans
Training software
Leading
Bandwidth
Advantages of Robots (3)
49. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters
KB
point size
ASCII
Public Domain Software
50. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
Speech recognition
Convergence
monospaced fonts
Advantages of Expert Systems (4)