SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others
Color Depth
Hypertext
Protocol
Commercial Software
2. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited
Peripheral
Arpanet
Virus
Advantages of Computer Aided Design (CAD) (4)
3. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo
Natural language
Humans > Computers (8)
System Administrator
Interactive Multimedia
4. Reference to a cell in relation to the current cell; modifies when copied
Sensor
relative reference
Disadvantages of ebooks
Knowledge base
5. The process of simulation motion with a series of still pictures.
WYSIWYG
Animation
OCR
thesaurus
6. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.
Artificial Intelligence (AI)
Mailing list
Knowledge base
ASCII
7. Intersection of row and column
Backup
Integrated Software
Interactive Multimedia
cell
8. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software
Page-Layout Software
GUI Advantages
An example of presentation-graphics software
value
9. Anything that can be communicated
ebook (Electronic Book)
Backup
Factors that control image quality (2)
Information
10. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files
Pattern recognition
Online help
Speech recognition
Operating System
11. A desktop-published document that uses a wide range of color; contrast with spot color.
FTP (file transfer protocol)
Full-Color
replication
Software License
12. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.
Hyperlink
Access-Control Software
Wizard
LAN
13. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)
Master Pages
ebook (Electronic Book)
Intranet
Rules of Netiquette (6)
14. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.
OCR
Drawing Software
relative reference
Augmented Reality
15. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
Logic Bomb
Hacker
Disadvantages of teleconferencing (4)
Domains
16. Numbers which are the raw material used to perform calculations
UPS
Machine learning
value
ROM
17. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
Push technology
System Administrator
Arpanet
Hyperlink
18. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
relative reference
cell
Access-Control Software
TB
19. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security
Advantages of DTP
Biometrics
Firewall
Open-Source Software
20. Software that can be distributed and modified freely by users; example: Linux
Morph
Open-Source Software
Processor
Video teleconference
21. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number
WWW (world wide web)
footer
Web crawlers
Shareware
22. Software or hardware that guards against unauthorized access to an internal network
Source Document
Firewall
Hypertext
PDF (Portable Document Format)
23. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet
function
word wrap
Arpanet
IP address
24. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Virtual Reality (VR)
Sensor
Backdoor
formula
25. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems
Defragmenting
Pattern recognition
grammar and style checker
'what if?' questions
26. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.
Input Devices
Cracking
WWW (world wide web)
formatting
27. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.
Output Devices
Upload
Shareware
Pull technology
28. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o
cell format
spell check
Presentation-Graphics Software
Digital Signal
29. To post software= or documents to an online source for availability to others
OMR
Upload
Sensor
WWW (world wide web)
30. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret
Factors of a good pw...
ebook (Electronic Book)
TCP/IP (transmission control protocol / Internet protocol)
Virtual Reality (VR)
31. An individual responsible for maintaining a multi-user computer system
System Administrator
Protocol
Turning Test
Peer-to-Peer File Sharing (P2P)
32. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware
Backdoor
Web crawlers
Operating System
Biometrics
33. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.
Hypermedia
ASCII
Cookies
Knowledge engineer
34. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Image Processing Software
Encryption
serif fonts
Shareware
35. Provides direct instruction in a clearly specified skill of subject
Arpanet
URL (uniform resource locator)
Augmented Reality
Tutorial software
36. Kilobyte; About 1000 bytes of information
macro
KB
Server
automatic correction
37. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)
WAN
Pattern recognition
Responsibilities of System Admin
OMR
38. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)
Analog Signal
Machine learning
Wizard
Agent
39. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes
Advantages of Computer Aided Design (CAD) (4)
Backup
Rules of Netiquette (6)
Software Piracy
40. A communications protocol that enables users to download files from remote servers to their computers - and to upload files they want to share from their computers to these archives.
value
Rules of Thumb for DTP
Factors that control image quality (2)
FTP (file transfer protocol)
41. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
WYSIWYG
Site License
Morph
Computer Aided Design (CAD)
42. Software that serves as tools for doing system maintenance and some repairs that are not automatically handled by the operating system;
Utility Program
Source Document
Page-Layout Software
Virus
43. Unauthorized access and/or vandalism of computer systems; short for criminal hacking
Leading
justification
Motion Picture Audio Layer (MP3)
Cracking
44. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it
ROM
Tim Burners-Lee (4)
Musical Instrument Digital Interface (MIDI)
font
45. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'
Tim Burners-Lee (4)
Pixel
footer
Gigahertz
46. Documentation and help available through a software company's Web site
Online help
Help file
TCP/IP (transmission control protocol / Internet protocol)
Motion Picture Audio Layer (MP3)
47. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software
Knowledge engineer
Spot Color
OCR
Natural language
48. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
TB
Advantages of Expert Systems (4)
Data
Convergence
49. Software used as an introductory - teaching or transitional tool for user tasks
Training software
footer
Teleconference
Operating System Advantages
50. Software that facilitates the arrangement of information into hierarchies or levels of ideas
Robot
Virtual Reality (VR)
outliner
Domains