Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






2. Provides direct instruction in a clearly specified skill of subject






3. A continuous wave






4. Word-processing feature that divides long words situated at the ends of lines






5. Random Access Memory; Memory that stores program instructions and data temporarily






6. Intersection of row and column






7. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






8. User interface that requires the user to type text commands on a command-line to communicate with the operating system






9. Television that processes information through a binary code rather than an analog signal.






10. Vertical






11. Local Area Network; Multiple personal computers connected on a network






12. A special type of communications software designed to access and display information at Internet Web sites.






13. Size and style of typeface






14. Multimedia that enables the user to take an active part in the experience.






15. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






16. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






17. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






18. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






19. Software or hardware that guards against unauthorized access to an internal network






20. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






21. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






22. In desktop publishing - the articles - chapters - drawings - maps - charts - and photographs that are to appear in the publication. Usually produces with standard word processors and graphics programs.






23. Measure of character size (one point equals 1/72 inch)






24. Kilobyte; About 1000 bytes of information






25. The spacing between lines of text.






26. Loading the non-ROM part of the operating system into memory






27. Predefined set of calculations (i.e. SUM and AVERAGE)






28. Gigabyte; Approximately 1000 MB






29. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






30. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






31. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






32. The process of simulation motion with a series of still pictures.






33. Horizontal






34. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.






35. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






36. Software packages which include several applications designed to work well together; such as Microsoft Office






37. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






38. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






39. A standard interface that allows electronic instruments and computers to communicate with each other and work together.






40. A program for locating information on the Web. (uses Web crawlers)






41. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






42. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






43. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






44. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






45. Language that people speak/write everyday.






46. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






47. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






48. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






49. User Name; A one-word name that you type to identify yourself when connecting






50. 1) Robot must not injure a human or - by inaction - allow a human to come to harm; 2) must obey orders given by humans (except where the order conflicts w/ first law); 3) must protect its own existence (w/o conflicting w/ first & second law)