Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






2. The spacing between letter pairs in a document.






3. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






4. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






5. The look and feel of the computing experience from a human point of view






6. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






7. Size and style of typeface






8. Rules of etiquette that apply to Internet communication.






9. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






10. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






11. The spacing between lines of text.






12. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






13. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






14. The science of designing work environments that enable people and things to interact efficiently and safely






15. User interface that requires the user to type text commands on a command-line to communicate with the operating system






16. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






17. The density of pixels - measured by the number of dots per inch.






18. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






19. Reference to a specific cell address; doesn't change when copied






20. Enables you to 'paint' pixels on the screen with a pointing device.






21. A computer model of a real life situation used to see how a model operates under certain conditions






22. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






23. To post software= or documents to an online source for availability to others






24. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






25. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






26. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






27. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






28. Information in a form that can be read - used and manipulated by a computer






29. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






30. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






31. The use of computers to draw products or process designs on the screen.






32. A special type of communications software designed to access and display information at Internet Web sites.






33. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






34. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






35. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






36. Software packages which include several applications designed to work well together; such as Microsoft Office






37. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






38. License for multiple copies or removing restrictions on software copying and use at a network site






39. Billions of clock cycles per second - a measurement of a computer's clock speed






40. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






41. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






42. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






43. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






44. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






45. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






46. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






47. Gigabyte; Approximately 1000 MB






48. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






49. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






50. Bit depth; the number of bits devoted to each pixel.