Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






2. Gigabyte; Approximately 1000 MB






3. Documentation file that appears onscreen at the user's request






4. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






5. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






6. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






7. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






8. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






9. Software that enables the user to manipulate photographs and other high-resolution images.






10. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






11. A software help agent that walks the user through a complex process






12. Provides direct instruction in a clearly specified skill of subject






13. The science of designing work environments that enable people and things to interact efficiently and safely






14. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






15. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






16. Terabyte; Approximately 1 million megabytes






17. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






18. Loading the non-ROM part of the operating system into memory






19. Stores programs and the data they need to be instantly accessible to the CPU






20. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






21. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






22. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






23. A stream of bits






24. An individual responsible for maintaining a multi-user computer system






25. A desktop-published document that uses a wide range of color; contrast with spot color.






26. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






28. Most common security tools used to restrict access to computer systems.






29. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






30. Vertical






31. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






32. A computer especially designed to provide software and other resources to other computers over a network






33. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






34. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






35. Local Area Network; Multiple personal computers connected on a network






36. Step-by-step procedure for calculating a number






37. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






38. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






39. Custom-designed procedure program which automates tasks in an application program






40. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;






41. Software that facilitates the arrangement of information into hierarchies or levels of ideas






42. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






43. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






44. Someone who uses computer skills to gain unauthorized access to computer systems.






45. Computer controlled machines designed to perform specific manual tasks ('forced labor')






46. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






47. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






48. Enables you to 'paint' pixels on the screen with a pointing device.






49. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






50. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files