Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software for editing digital video - including titles - sound and special effects.






2. A special type of communications software designed to access and display information at Internet Web sites.






3. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






4. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






5. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






6. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






7. The look and feel of the computing experience from a human point of view






8. Text-editing feature of a word-processing program which automatically moves any words that won't fit on the current line to the next line - along with the cursor






9. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






10. Binary digit; The smallest unit of information. A bit can have two values: 0 or 1






11. Device for sending information from the computer (e.g. monitor or printer)






12. Part of the computer which processes information - performs arithmetic calculations - and makes basic decisions based on information values






13. 1) color depth; 2) resolution






14. Software packages which include several applications designed to work well together; such as Microsoft Office






15. A type of logic that allows conclusions to be stated as probabilities rather than certainties. (Used by inference engines and knowledge bases)






16. Stores programs and the data they need to be instantly accessible to the CPU






17. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection






18. Measure of character size (one point equals 1/72 inch)






19. Loading the non-ROM part of the operating system into memory






20. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






21. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






22. Reference to a cell in relation to the current cell; modifies when copied






23. A continuous wave






24. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






25. Most common security tools used to restrict access to computer systems.






26. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






27. An error in programming






28. Long-term repository for data (e.g. disks - tapes)






29. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






30. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






31. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






32. Size and style of typeface






33. Software that is free to try with a send-payment-to-keep honor system






34. Intersection of row and column






35. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






36. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






37. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






38. Custom-designed procedure program which automates tasks in an application program






39. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






40. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






41. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






42. A handheld device that displays digital representations of the contents of books.






43. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






44. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






45. An agreement allowing the use of a software program on a single machine






46. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






47. Documentation and help available through a software company's Web site






48. Megabyte; Approximately 1000K or 1 million bytes






49. The narrow (but deep) knowledge base of an expert system.






50. A business that provides its customers with connections to the Internet (along with other services).