Test your basic knowledge |

IT Literacy

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Component of word-processing software that analyzes each word in context - checking for content errors - common grammatical errors - and stylistic problems






2. A program for locating information on the Web. (uses Web crawlers)






3. A text file that includes codes that describe the format - layout - and logical structure of a hypermedia document. Most Web pages are created with this code.






4. The combination of text - numbers - graphics - animation - sound effects - music and other media in a hyperlinked document.






5. Automates the creation of visual aids for lectures - training sessions and other presentations. Can include everything from spreadsheet charting programs to animation-editing software - but most commonly used for creating and displaying a series of o






6. 1) ability to create models with physical characteristics (weight and volume); 2) model can be rotated; 3) can evaluate structural performance by applying an imaginary force; 4) designs can be easily altered and edited






7. A pocket-sized computer used to organize appointments - tasks - notes - contacts - and other personal information; sometimes called hand-held computer or palmtop computer. Many PDAs include additional software and hardware for wireless communication.






8. Worksheets which contain labels and formulas but no data values; instant answers are produced when information is provided






9. License for multiple copies or removing restrictions on software copying and use at a network site






10. Stores a picture as a collection of lines and shapes. Also stores shapes as shape formulas and text as text.






11. 1)No common words 2)Change frequently 3)Use #s and letters 4)Keep it a secret






12. The use of computers to draw products or process designs on the screen.






13. Free software that is not copyrighted - offered through World Wide Websites - electronic bulletin boards - user groups - and other sources






14. Small text file that comes with many software packages - and contains information not included in the official documentation

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. Rectangular block of selected cells






16. Read-Only Memory; Memory that include permanent information only. The computer can only read information from in; it can never write any new information on it






17. A popular networking architecture developed in 1976 at Xerox with general principles which apply to all common network connections






18. 1) creative; 2) parallel processing (multitasking); 3) image analysis; 4) common sense knowledge; 5) see relationships between concepts; 6) knowledge base is vast - not narrow; 7) translation of languages (idioms); 8) expression/interpretation of emo






19. Intuitive: 1)throw away 2)trash bin; open file ~ folders 3)Consistent: integrated software 4)Forgiving: undo - cancel 5)Protective: double-click on closing 6)Flexible: copy/paste - shortcuts 7)Speech Recognition Software






20. The coming together of two or more disparate disciplines or technologies. (ex: fax machine which combines scanning/printing)






21. The narrow (but deep) knowledge base of an expert system.






22. A stream of bits






23. Technology in which browsers on client computers pull information from server machines; the browser needs to initiate a request before any information is delivered.






24. A system of programs that performs a variety of technical operations - providing an additional layer of insulation between the user and the bits-and-bytes world of computer hardware






25. Created: 1) URL; 2) HTML; 3) HTTP://; 4) first 'browser'






26. A program that performs useful tasks while at the same time carrying out a secret destructive act. A form of software sabotage/






27. Software that facilitates the arrangement of information into hierarchies or levels of ideas






28. A defense department system with 24 satellites that can pinpoint any location on the Earth.






29. Device for accepting input (e.g. a keyboard)






30. Stores programs and the data they need to be instantly accessible to the CPU






31. Uninterruptable Power Supply; A hardware device that protects computers from data loss during power failures






32. Identifying recurring patterns in input data with the goal of understand or categorizing that input. (Easy for humans) (Ex: fingerprint identification - handwriting recognition - speech recognition - optional character recognition)






33. A type of wireless device that enables mobile phones - hand-held computers - and PCs to communicate with each other regardless of operating system.






34. An agreement allowing the use of a software program on a single machine






35. 1) Save labor costs (work all the time - no breaks/vacations); 2) improve quality and increase production (esp. in repetitive tasks); 3) ideal for dangerous/impossible jobs for humans






36. 1) Say what is meant and with care (when using the Internet/email - there is no tone of voice); 2) keep it short (otherwise people may not read it all and miss stuff); 3) don't assume you're anonymous; 4) learn the non-verbal language of the net; 5)






37. Intersection of row and column






38. Synonym finder






39. Provides direct instruction in a clearly specified skill of subject






40. Using multiple processors to divide jobs into pieces and work simultaneously on the pieces (multitasking!)






41. To post software= or documents to an online source for availability to others






42. Face-to-face communication over long distances using video and computer technology.






43. The illegal duplication of copyrighted software






44. Software for editing digital video - including titles - sound and special effects.






45. A program designed to attack in response to a particular logical even or sequence of events. A type of software sabotage.






46. A self-contained intra-organizational network that is designed using the same technology as the Internet. (within organization)






47. Software that derives logical conclusions from premises known or assumed to be true. ('If... then...' logic)






48. A way to test machine intelligence. (Tester and subject converse - and tester attempts to perceive whether it's a human or computer)






49. Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance. (Used in games like chess/checkers; based on prior actions)






50. Microsoft Powerpoint