Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






2. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






3. The address of a Web site. (unique)






4. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






5. Optical Character Recognition; Locating and identifying printed characters embedded in an image - allowing the text to be stored as an editable document. Can be performed by wand readers - pen scanners - and OCR software






6. Computer controlled machines designed to perform specific manual tasks ('forced labor')






7. User interface that requires the user to type text commands on a command-line to communicate with the operating system






8. Software that facilitates the arrangement of information into hierarchies or levels of ideas






9. 1) documents can be disorienting and leave the reader wondering; 2) documents don't always have the links readers want - leaving them frustrated because they can't easily get from here to there; 3) documents may contain 'lost' links - especially on t






10. Unauthorized access and/or vandalism of computer systems; short for criminal hacking






11. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






12. Software or hardware that guards against unauthorized access to an internal network






13. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






14. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






15. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






16. Measure of character size (one point equals 1/72 inch)






17. 1) outline your ideas; 2) remember your audience; 3) use large fonts; 4) be 'stingy' with words (bullets - summarize); 5) use a consistent design; 6) be smart with art (use appropriate graphics)






18. Typeface fonts in which the characters are embellished with fine lines (serifs) at the ends of the main strokes






19. User Name; A one-word name that you type to identify yourself when connecting






20. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






21. A computer model of a real life situation used to see how a model operates under certain conditions






22. Information in a form that can be read - used and manipulated by a computer






23. To copy software from an online source to a local computer






24. Information systems or software programs designed to replicate the decision-making process of a human expert.






25. Device for sending information from the computer (e.g. monitor or printer)






26. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






27. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






28. Software used as an introductory - teaching or transitional tool for user tasks






29. Billions of clock cycles per second - a measurement of a computer's clock speed






30. Random Access Memory; Memory that stores program instructions and data temporarily






31. Video clip in which one image metamorphoses into another.






32. Stores programs and the data they need to be instantly accessible to the CPU






33. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






34. The storage of pictures as collections of lines - shapes and other objects.






35. Software packages which include several applications designed to work well together; such as Microsoft Office






36. Television that processes information through a binary code rather than an analog signal.






37. The relatively easy use of a single color (or sometimes two) to add interest to a desktop-publishing product.






38. A continuous wave






39. 1) Plan before you publish! 2) Use appropriate fonts. 3) Don't go 'style-crazy.' 4) Look at the document through the reader's eyes. 5) Learn from the masters. 6) Know your limitations. 7) Remember your message/objective.






40. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






41. The ability of a software program to run on a specific computer system. Also the ability of a hardware device to function with a particular type of computer






42. Using some combination of text - graphics - animation - video - music - voice and sound effects to communicate.






43. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






44. A 65 -000-character set for making letters - digits - and special characters fit into the computer's binary circuitry






45. 1) Mathematical calculations faster w/ more accuracy; 2) storing vast amounts of data; 3) recall information






46. Small text file that comes with many software packages - and contains information not included in the official documentation


47. A unique string of four numbers separated by periods that serves as a unique address for a computer on the Internet. The IP address of the host computer and the sending computer is included with every packet of information that traverses the Internet






48. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






49. Device for accepting input (e.g. a keyboard)






50. Most common security tools used to restrict access to computer systems.