Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






2. Local Area Network; Multiple personal computers connected on a network






3. Stores programs and the data they need to be instantly accessible to the CPU






4. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






5. An external device (i.e. keyboard - monitor) connected via cable to the system central processing unit (CPU)






6. In desktop publishing - the pages that control the general layout of the document (such as the page borders - numbers - or header).






7. Long-term repository for data (e.g. disks - tapes)






8. Random Access Memory; Memory that stores program instructions and data temporarily






9. The density of pixels - measured by the number of dots per inch.






10. Rules of etiquette that apply to Internet communication.






11. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






12. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






13. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






14. A defense department system with 24 satellites that can pinpoint any location on the Earth.






15. Text entry providing information of the contents of a row/column






16. A program for locating information on the Web. (uses Web crawlers)






17. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.






18. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






19. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






20. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






21. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






22. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






23. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






24. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






25. A stream of bits






26. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






27. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






28. Most common security tools used to restrict access to computer systems.






29. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






30. An agreement allowing the use of a software program on a single machine






31. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






32. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






33. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






34. Face-to-face communication over long distances using video and computer technology.






35. The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination - where they are reunited.






36. 1) color depth; 2) resolution






37. A special type of communications software designed to access and display information at Internet Web sites.






38. User Name; A one-word name that you type to identify yourself when connecting






39. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






40. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






41. The spacing between lines of text.






42. User interface that requires the user to type text commands on a command-line to communicate with the operating system






43. Copy files between storage devices; Repair damaged data files; Guard against viruses; Compress files to take up less disk space; example: defragmenting






44. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






45. Small files deposited on a user's hard disk by Web sites - enabling sites to remember what they know about their visitors between sessions.






46. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






47. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






48. To copy software from an online source to a local computer






49. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






50. Information systems or software programs designed to replicate the decision-making process of a human expert.