Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






2. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






3. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






4. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






5. Video reduced to a series of numbers (0 and 1) - which can be edited - stored - and played back without loss of quality.






6. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






7. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






8. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Predefined set of calculations (i.e. SUM and AVERAGE)






10. A database that contains both facts - and a system of rules for determining and changing the relationship among those facts.






11. A program for locating information on the Web. (uses Web crawlers)






12. Loading the non-ROM part of the operating system into memory






13. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






14. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






15. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






16. Rules of etiquette that apply to Internet communication.






17. Rectangular block of selected cells






18. ~Adding/configuring new work stations ~Setting up user accounts ~Installing system wide software ~Performing preventative procedures for viruses ~Allocating storage space






19. The quantity of information that can be transmitted through a communication medium in a given amount of time. (more bandwidth = faster transmission)






20. Local Area Network; Multiple personal computers connected on a network






21. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






22. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






23. The spacing between letter pairs in a document.






24. Knowledge acquired from living in the world.






25. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






26. Automatic replication of values - labels and formulas






27. Function which enables users to change the appearance of a document by specifying the font - point size - and style of any character in the document - as well as the overall layout of text and graphical elements in the document






28. Intersection of row and column






29. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






30. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






31. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






32. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






33. Communicates with peripherals; Coordinates the concurrent processing of tasks; Manages memory; Keeps track of location of all programs/files of hard drive






34. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






35. Software or hardware that guards against unauthorized access to an internal network






36. A method of compression that can squeeze a music file to a fraction of its original CD sized with only slight loss of quality.






37. Graphical User Interface; A user interface based on graphical displays. With a mouse - the user points to icons that represent files - folders - and disks. Documents are displayed in windows. The user selects commands from menus






38. Long-term repository for data (e.g. disks - tapes)






39. A desktop-published document that uses a wide range of color; contrast with spot color.






40. Allows documents of all types to be stored - viewed - or modified on any Windows or Macintosh computer - making it possible for many organizations to reduce paper flow.






41. Device for sending information from the computer (e.g. monitor or printer)






42. The process of identifying objects and shapes in a photograph - drawing - video or other visual image. (Effortless for humans - difficult for computers)






43. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






44. Megabyte; Approximately 1000K or 1 million bytes






45. An interactive cross-reference system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.






46. Vertical






47. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






48. American Standard Code for Information Interchange; A code that represents characters as 8-bit codes. Allows the binary computer to work with letters - digits and special characters






49. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






50. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software