Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






2. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






3. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






4. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






5. The look and feel of the computing experience from a human point of view






6. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






7. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






8. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






9. Intersection of row and column






10. A program for locating information on the Web. (uses Web crawlers)






11. Software or hardware that guards against unauthorized access to an internal network






12. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






13. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.






14. Information in a form that can be read - used and manipulated by a computer






15. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






16. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






17. Computer controlled machines designed to perform specific manual tasks ('forced labor')






18. Software that can be distributed and modified freely by users; example: Linux






19. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






20. Spreadsheet software function enabling users to change the appearance of cell contents






21. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.






22. Software packages which include several applications designed to work well together; such as Microsoft Office






23. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






24. Local Area Network; Multiple personal computers connected on a network






25. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






26. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






27. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






28. Block that appears at the top of every page in a document displaying repetitive information such as chapter title






29. Multimedia that enables the user to take an active part in the experience.






30. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






31. Random Access Memory; Memory that stores program instructions and data temporarily






32. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






33. In a computer simulation - the user and the computer responding to data from each other






34. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






35. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






36. User Name; A one-word name that you type to identify yourself when connecting






37. A desktop-published document that uses a wide range of color; contrast with spot color.






38. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






39. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






40. A continuous wave






41. License for multiple copies or removing restrictions on software copying and use at a network site






42. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






43. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






44. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






45. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)






46. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






48. Most common security tools used to restrict access to computer systems.






49. Face-to-face communication over long distances using video and computer technology.






50. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.