Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measurements of individual body characteristics - such as voiceprint or fingerprint; sometimes used in computer security






2. Software that spreads from program to program or from disk to disk - and uses each infected program or disk to copy itself. A form of software sabotage.






3. Technology in which information is delivered automatically to a client computer. The user subscribes to a service - and the server delivers that information periodically and unobtrusively. Contrast with pull technology.






4. Computer controlled machines designed to perform specific manual tasks ('forced labor')






5. A class of Internet addresses indicated by a suffix such as: .com - .gov - .net






6. A program that eliminates fragmented files by changing the assignment of clusters to files; Easier to find files/programs -> Faster computer






7. 1) must be a disciplined worker -- self-motivation! (IB student); 2) must have good time management; 3) lack of socialization with coworkers






8. Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks - seeking out uninfected workstations to occupy. A form of software sabotage






9. Ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup called Usenet. You can check into and out of them whenever you want; all messages are posted on






10. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






11. Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files; they can see but not change them.






12. Provides direct instruction in a clearly specified skill of subject






13. Software that is free to try with a send-payment-to-keep honor system






14. An online meeting between 2 or more people; done in 'real time' (ex: IM [instant messaging])






15. Horizontal






16. The use of computers to draw products or process designs on the screen.






17. To copy software from an online source to a local computer






18. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






19. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






20. The online sharing of music or other computer files directly among individual computer users' hard drives - rather than through posting the files on central servers.






21. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






22. 1) data stays consistent over distances; 2) more data can be transmitted; 3) can communicate with other devices






23. Gigabyte; Approximately 1000 MB






24. A computer model of a real life situation used to see how a model operates under certain conditions






25. A special type of communications software designed to access and display information at Internet Web sites.






26. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






27. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






28. Most common security tools used to restrict access to computer systems.






29. ~Advantages 1)Share data - increase productivity 2)Share hardware - reduce costs 3)Allow people to work together/communicate ~Disadvantages 1)Easier spread of viruses 2)Privacy issues - especially access levels not set 3)Integrity of data - when shar






30. 1) flexible schedule; 2) save time commuting and save $; 3) better for the environment (less gas consumption); 4) better ergonomics (working conditions); 5) save office space/expenses.






31. Fonts which provide more room for wide as opposed to narrow characters






32. Software for editing digital video - including titles - sound and special effects.






33. Software packages which include several applications designed to work well together; such as Microsoft Office






34. Protocols developed as an experiment in internetworking - now the language of the Internet - allowing cross-network communication for almost every type of computer and network.






35. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






36. A continuous wave






37. A word - phrase - or picture that acts as a button - enabling the user to explore the Web or a multimedia document with mouse clicks.






38. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






39. The science of designing work environments that enable people and things to interact efficiently and safely






40. Predefined set of calculations (i.e. SUM and AVERAGE)






41. Device for sending information from the computer (e.g. monitor or printer)






42. Spreadsheet document which appears on the screen as a grid or numbered rows/columns






43. An agreement allowing the use of a software program on a single machine






44. Software that can be distributed and modified freely by users; example: Linux






45. Wide Area Network ; A network that extends over a long distance. Each network site is a node on the network






46. Network created in 1969 from a government grant during the Cold War that is the foundation of today's Internet. ('Advanced Research Project Agency NETwork')






47. Protects transmitted information by scrambling the transmissions; When a user encrypts a message by applying a secret numerical code (encryption key) - the message can be read only after it's been reconstructed with a matching key






48. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






49. Alignment of text on a line: left justification (smooth left margin - ragged right margin) - right justification (smooth right - ragged left)






50. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.