SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge
Expert system
Disadvantages of Expert Systems (2)
Data
User Interface
2. Fonts which provide more room for wide as opposed to narrow characters
outliner
ISP (Internet service provider)
Access-Control Software
proportionally spaced fonts
3. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space
proportionally spaced fonts
Digital Video
monospaced fonts
Hyperlink
4. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)
Leading
Image Processing Software
Fuzzy logic
Hyperlink
5. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes
Tutorial software
Backdoor
User Interface
serif fonts
6. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'
Tim Burners-Lee (4)
value
range
TCP/IP (transmission control protocol / Internet protocol)
7. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)
Hypermedia
word processing
Feedback Loop
Rules of thumb for using Powerpoint (6)
8. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry
Virtual Reality (VR)
Unicode
Global positioning system
automatic correction
9. Automatic replication of values - labels and formulas
Ergonomics
replication
function
label
10. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Advantages of Computer Aided Design (CAD) (4)
label
outliner
Hyperlink
11. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1
Bit
Memory
Push technology
Output Devices
12. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
footer
Musical Instrument Digital Interface (MIDI)
Utility Program
Color Depth
13. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.
Online help
'Read-me' file
Advantages of telecommuting (5)
Memory
14. Someone who uses computer skills to gain unauthorized access to computer systems.
Full-Color
Upload
Hyperlink
Hacker
15. The storage of pictures as collections of lines - shapes and other objects.
Commercial Software
Vector Graphics
Unicode
Personal digital assistant (PDA)
16. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.
Advantages of Computer Aided Design (CAD) (4)
Hypertext
Motion Picture Audio Layer (MP3)
Public Domain Software
17. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)
Peripheral
value
Laws of Robots (3) (Asimov)
Intranet
18. Software that can be distributed and modified freely by users; example: Linux
proportionally spaced fonts
Open-Source Software
Disadvantages of ebooks
Domains
19. Spreadsheet software function enabling users to change the appearance of cell contents
ebook (Electronic Book)
cell format
Protocol
Global positioning system
20. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters
Robot
Color Depth
ASCII
Humans > Computers (8)
21. To copy software from an online source to a local computer
Operating System
Download
footer
Arpanet
22. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Hyperlink
Newsgroups
word processing
User Interface
23. Provides direct instruction in a clearly specified skill of subject
Memory
Expert system
ASCII
Tutorial software
24. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
automatic hyphenation
An example of presentation-graphics software
Commercial Software
Painting Software
25. Software packages which include several applications designed to work well together; such as Microsoft Office
Compatibility
Global positioning system
Integrated Software
Biometrics
26. Synonym finder
thesaurus
Protocol
Operating System Advantages
ROM
27. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided
URL (uniform resource locator)
template
Bitmapped Graphics
Domain
28. User interface that requires the user to type text commands on a command-line to communicate with the operating system
Command-Line Interface
Rules of Thumb for DTP
Pattern recognition
Tutorial software
29. Megabyte; Approximately 1000K or 1 million bytes
Mailing list
Personal digital assistant (PDA)
MB
template
30. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive
Source Document
Operating System Advantages
Software License
cell
31. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/
Booting
Command-Line Interface
Trojan Horse
justification
32. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.
'Read-me' file
Arpanet
PDF (Portable Document Format)
Full-Color
33. (autocorrect) word-processing feature that places footnotes where they belong on the page
Hacker
Image Processing Software
automatic correction
Pixel
34. The spacing between letter pairs in a document.
Operating System Advantages
Kerning
Pull technology
TCP/IP (transmission control protocol / Internet protocol)
35. To post software= or documents to an online source for availability to others
worksheet
Upload
Software Piracy
Tim Burners-Lee (4)
36. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Speech recognition
PDF (Portable Document Format)
Domains
outliner
37. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections
Ethernet
Hypertext
Bar Code Reader
GUI
38. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter
spell check
Arpanet
Upload
OCR
39. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
Networks: + / ?
Laws of Robots (3) (Asimov)
Convergence
Domains
40. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
Color Depth
formatting
ASCII
function
41. Information systems or software programs designed to replicate the decision-making process of a human expert.
Expert system
Booting
Telecommuting
Pattern recognition
42. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo
Humans > Computers (8)
Compatibility
Public Domain Software
TCP/IP (transmission control protocol / Internet protocol)
43. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
Inference engine
Digital television
Convergence
Advantages of Computer Aided Design (CAD) (4)
44. Small text file that comes with many software packages - and contains information not included in the official documentation
45. Stores programs and the data they need to be instantly accessible to the CPU
Site License
Intranet
Memory
Laws of Robots (3) (Asimov)
46. License for multiple copies or removing restrictions on software copying and use at a network site
Site License
Disadvantages of ebooks
Model
spell check
47. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)
Packet-switching
Rules of Netiquette (6)
Advantages of Robots (3)
Disadvantages of hypertext (4)
48. Using a computer to create - edit and print documents
ebook (Electronic Book)
word processing
Software License
Morph
49. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
Musical Instrument Digital Interface (MIDI)
Morph
Compatibility
justification
50. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Output Devices
Backdoor
Tutorial software
Presentation-Graphics Software