Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






2. Face-to-face communication over long distances using video and computer technology.






3. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






4. User Name; A one-word name that you type to identify yourself when connecting






5. Software or hardware that guards against unauthorized access to an internal network






6. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






7. To copy software from an online source to a local computer






8. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






9. A device that enables digital machines to monitor a physical quantity of the analog world (i.e. temperature - humidity - pressure) to provide data used in robotics. (Enables robots to modify actions based on feedback from outside world) (Ex: vision -






10. Email discussion groups on special-interest topics. All subscribers receive messages sent to the group's mailing address. (private)






11. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






12. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






13. Process of saving data - esp. for data recovery. Many systems automatically back up data and software onto disks or tapes






14. Reference to a cell in relation to the current cell; modifies when copied






15. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






16. The spacing between letter pairs in a document.






17. Rectangular block of selected cells






18. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






19. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






20. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






21. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






22. Software which must be purchased through commercial channels and is copyrighted; Cannot be legally duplicated for others






23. Software that enables the user to manipulate photographs and other high-resolution images.






24. Loading the non-ROM part of the operating system into memory






25. Multimedia that enables the user to take an active part in the experience.






26. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






27. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






28. Fonts like those in the courier family that mimic typewriters; characters - no matter how narrow or wide - hold the same amount of space






29. Gigabyte; Approximately 1000 MB






30. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






31. Built-in component of a word processor or a separate program that compares words in a documents with words in a disk-based dictionary - and flags words not found in the dictionary; may operate in batch mode - checking all the words at once - or inter






32. Optical Mark Reader; A reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms






33. Graphics in which images are stored and manipulated as organized collections of pixels rather than as shapes and lines. Contrast with object-oriented graphics.






34. The address of a Web site. (unique)






35. The storage of pictures as collections of lines - shapes and other objects.






36. A business that provides its customers with connections to the Internet (along with other services).






37. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






38. The look and feel of the computing experience from a human point of view






39. The science of designing work environments that enable people and things to interact efficiently and safely






40. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






41. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






42. Software used as an introductory - teaching or transitional tool for user tasks






43. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






44. Automatic replication of values - labels and formulas






45. A special type of communications software designed to access and display information at Internet Web sites.






46. Software that is free to try with a send-payment-to-keep honor system






47. The density of pixels - measured by the number of dots per inch.






48. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






49. Documentation file that appears onscreen at the user's request






50. Software packages which include several applications designed to work well together; such as Microsoft Office