Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The use of computer displays that add virtual information to a person's sensory perceptions - supplementing rather than replacing (as in virtual reality) the world the user sees.






2. Documentation and help available through a software company's Web site






3. Block of information that appears at the bottom of every page in a document - displaying repetitive information such as automatically calculated page number






4. Video clip in which one image metamorphoses into another.






5. ~Advantages 1)Safety: easy to simulate without actual risk 2)Economy: Build/simulate/destroy without waste 3)Projection 4)Visualization 5)Replication: Redo/rerun/alter easily ~Disadvantages 1)Reliability 2)Depends on original info 3)Complete trust fa






6. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






7. Spreadsheet software function enabling users to change the appearance of cell contents






8. A specialist who interviews and observes experts - and converts their words and actions into a knowledge base.






9. 'what you see is what you get' (wizzy-wig); arrangement of words on the screen representing a close approximation to the arrangement of words on the printed page






10. Software for editing digital video - including titles - sound and special effects.






11. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






12. A handheld device that displays digital representations of the contents of books.






13. Device for accepting input (e.g. a keyboard)






14. Part of the Internet - a collection of multimedia documents created by organizations and users worldwide. Documents are linked in a hypertext Web site that allows users to explore them with simpler mouse clicks.






15. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






16. Software used mainly to produce print publications. Also - the process of using desktop-publishing software to produce publications (e.g. brochures - newsletters - forms - menus - event fliers - notices)






17. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






18. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






19. All type - including roman - bold - and italics - of a single design (i.e. Helvetica)






20. Software or hardware that guards against unauthorized access to an internal network






21. A reading tool that uses light to read universal product codes - inventory codes - and other codes created out of patterns of variable-width bars






22. A computer especially designed to provide software and other resources to other computers over a network






23. The Internet protocol used to transfer Web pages.






24. Computer controlled machines designed to perform specific manual tasks ('forced labor')






25. Predefined set of calculations (i.e. SUM and AVERAGE)






26. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






27. Most common security tools used to restrict access to computer systems.






28. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






29. The narrow (but deep) knowledge base of an expert system.






30. Television that processes information through a binary code rather than an analog signal.






31. Technology that creates the illusion that the user is immersed in a world that exists only inside the computer; this environment contains both scenes and the controls to change those scenes.






32. Software that enables the user to manipulate photographs and other high-resolution images.






33. Software programs that can ask questions - respond to commands - pay attention to users' work patters - serve as a guide and a coach - take on owner's goals - and use reasoning to fabricate their own goals.






34. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






35. Software that is free to try with a send-payment-to-keep honor system






36. The identification of spoken words and sentences by a computer - making it possible for voice input to be converted into text files






37. Text entry providing information of the contents of a row/column






38. User interface that requires the user to type text commands on a command-line to communicate with the operating system






39. Instructions that tell the hardware what to do to transform the input into out put






40. 1) makes long distance meetings possible and reduces costs; 2) enables decisions to evolve over time; 3) emphasizes messages over messenger






41. 1) Saves printing costs after initial software purchase. 2) Saves time traveling back to commercial printer b/c you can use a personal printer. 3) Reduces # of publication errors. 4) Allows more people to publish.






42. In a computer simulation - the user and the computer responding to data from each other






43. The process of simulation motion with a series of still pictures.






44. An undocumented way of gaining access to a program - online service - or entire computer system - written by a programmer who created the code; Can be a security hazard because it is vulnerable to hackers






45. (Modeling) The use of computers to create abstract models of objects - organisms - organizations and processes






46. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






47. Documentation file that appears onscreen at the user's request






48. License for multiple copies or removing restrictions on software copying and use at a network site






49. 1) Poor at planning strategies (less creativity than humans) and can't make decisions (after diagnosis - can't say how to treat patient); 2) powerless outside narrow (but deep) domain of knowledge






50. Block that appears at the top of every page in a document displaying repetitive information such as chapter title