Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






2. Text entry providing information of the contents of a row/column






3. The illegal duplication of copyrighted software






4. Software that can be distributed and modified freely by users; example: Linux






5. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






6. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






7. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






8. Documentation and help available through a software company's Web site






9. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






10. Rules of etiquette that apply to Internet communication.






11. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






12. 1) color depth; 2) resolution






13. Provides direct instruction in a clearly specified skill of subject






14. A desktop-published document that uses a wide range of color; contrast with spot color.






15. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






16. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






17. Local Area Network; Multiple personal computers connected on a network






18. The storage of pictures as collections of lines - shapes and other objects.






19. Language that people speak/write everyday.






20. Working from home by modem - as do many programmers - accountants - and other information workers.






21. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






22. Reference to a cell in relation to the current cell; modifies when copied






23. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






24. Software that facilitates the arrangement of information into hierarchies or levels of ideas






25. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






26. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






27. Software that enables the user to manipulate photographs and other high-resolution images.






28. Random Access Memory; Memory that stores program instructions and data temporarily






29. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






30. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






31. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






32. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






33. Device for accepting input (e.g. a keyboard)






34. The narrow (but deep) knowledge base of an expert system.






35. Rectangular block of selected cells






36. Professionally designed - empty documents that can be adapted to specific user needs. In spreadsheet software - worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.






37. Stores programs and the data they need to be instantly accessible to the CPU






38. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






39. Software that is free to try with a send-payment-to-keep honor system






40. 1) vulnerable to network glitches and machine failures; 2) vulnerable to security breech; 3) filters out human component of communication (ex: eye contact; voice)






41. The process of simulation motion with a series of still pictures.






42. Most common security tools used to restrict access to computer systems.






43. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






44. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






45. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






46. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






47. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






48. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






49. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






50. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.