SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT Literacy
Start Test
Study First
Subjects
:
it-skills
,
literacy
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1) Amount of network traffic; 2) size/type of file being transferred; 3) type/quality of network connection
Storage Devices
Vector Graphics
Factors that affect bandwidth (3)
PDF (Portable Document Format)
2. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document
Information
formatting
Disadvantages of teleconferencing (4)
Tutorial software
3. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.
Bug
template
Server
Personal digital assistant (PDA)
4. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key
Motion Picture Audio Layer (MP3)
Encryption
Video Editing Software
Help file
5. The look and feel of the computing experience from a human point of view
Login Name
Access-Control Software
Sensor
User Interface
6. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive
Packet-switching
Knowledge engineer
Computer Aided Design (CAD)
Operating System Advantages
7. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.
Compatibility
absolute reference
TCP/IP (transmission control protocol / Internet protocol)
Motion Picture Audio Layer (MP3)
8. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources
Biometrics
Public Domain Software
macro
Sensor
9. Intersection of row and column
Data
value
cell
Expert system
10. A program for locating information on the Web. (uses Web crawlers)
Artificial Intelligence (AI)
Search engine
WAN
Domains
11. Software or hardware that guards against unauthorized access to an internal network
Firewall
User Interface
Personal digital assistant (PDA)
Cracking
12. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -
Image analysis
Speech recognition
Worm
Sensor
13. A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.
MB
Pixel
header
ISP (Internet service provider)
14. Information in a form that can be read - used and manipulated by a computer
Newsgroups
Kerning
Bug
Data
15. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on
ebook (Electronic Book)
Computer Aided Design (CAD)
Newsgroups
'what if?' questions
16. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger
Newsgroups
Advantages of teleconferencing (3)
Access-Control Software
template
17. Computer controlled machines designed to perform specific manual tasks ('forced labor')
Robot
Multimedia
ebook (Electronic Book)
Model + / ?
18. Software that can be distributed and modified freely by users; example: Linux
Speech recognition
Hypermedia
Backup
Open-Source Software
19. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.
Digital Signal
Speech recognition
Pull technology
Image Processing Software
20. Spreadsheet software function enabling users to change the appearance of cell contents
cell format
monospaced fonts
Color Depth
GUI Advantages
21. The field of computer science devoted to making computers perceive - reason and act in ways that have - until now - been reserved for human beings.
HTML (hypertext markup language)
range
Template
Artificial Intelligence (AI)
22. Software packages which include several applications designed to work well together; such as Microsoft Office
Tutorial software
Integrated Software
Public Domain Software
Agent
23. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers
Trojan Horse
WWW (world wide web)
Backdoor
Disadvantages of ebooks
24. Local Area Network; Multiple personal computers connected on a network
Rules of Netiquette (6)
Upload
LAN
User Interface
25. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page
Teleconference
WYSIWYG
Defragmenting
LAN
26. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware
ROM
Operating System
Morph
DTP (Desktop Publishing)
27. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)
Operating System
Convergence
Leading
Search engine
28. Block that appears at the top of every page in a document displaying repetitive information such as chapter title
header
Utility Program Features
Search engine
Netiquette
29. Multimedia that enables the user to take an active part in the experience.
Cracking
Command-Line Interface
ebook (Electronic Book)
Interactive Multimedia
30. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net
Domains
Domain
range
MB
31. Random Access Memory; Memory that stores program instructions and data temporarily
RAM
HTTP (hypertext transfer protocol)
Multimedia
WWW (world wide web)
32. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections
GUI
Master Pages
Tim Burners-Lee (4)
Ethernet
33. In a computer simulation - the user and the computer responding to data from each other
ISP (Internet service provider)
Cookies
Feedback Loop
Protocol
34. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.
Digital Video
function
Operating System Advantages
Video teleconference
35. 1) Paper is easier on eyes. 2) Books can be read anywhere w/o the need of electricity/batteries. 3) Books are aesthetically more pleasing. 4) Books can be highlighted and written in.
proportionally spaced fonts
Disadvantages of Expert Systems (2)
Login Name
Disadvantages of ebooks
36. User Name; A one-word name that you type to identify yourself when connecting
Artificial Intelligence (AI)
Peer-to-Peer File Sharing (P2P)
Bitmapped Graphics
Login Name
37. A desktop-published document that uses a wide range of color; contrast with spot color.
serif fonts
Humans > Computers (8)
FTP (file transfer protocol)
Full-Color
38. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms
Color Depth
OMR
An example of presentation-graphics software
Agent
39. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.
Access-Control Software
Command-Line Interface
Humans > Computers (8)
Software
40. A continuous wave
Analog Signal
Resolution
Advantages of Expert Systems (4)
spell check
41. License for multiple copies or removing restrictions on software copying and use at a network site
Site License
Rules of thumb for using Powerpoint (6)
Logic Bomb
replication
42. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer
Drawing Software
Kerning
Compatibility
value
43. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer
Knowledge engineer
Leading
Defragmenting
Unicode
44. Spreadsheet document which appears on the screen as a grid or numbered rows/columns
worksheet
Output Devices
Unicode
'Read-me' file
45. Software robots that systematically explore the Web - retrieve information about pages - and index the retrieved information in a database. (used by search engines)
Password
Wizard
Web crawlers
Laws of Robots (3) (Asimov)
46. Feature in spreadsheet software that allows speculation by providing instant answers to hypothetical questions
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.
Intranet
Output Devices
Agent
Information
48. Most common security tools used to restrict access to computer systems.
KB
Password
Access-Control Software
ebook (Electronic Book)
49. Face-to-face communication over long distances using video and computer technology.
Factors that control image quality (2)
Video teleconference
automatic correction
System Administrator
50. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.
System Administrator
Input Devices
Teleconference
Logic Bomb