Test your basic knowledge |

Technology In Action - 2

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of software programs that have been bundled together as a package.






2. A measure of the greatest amount of light showing when a monitor is displaying pure white; measured as candelas per square meter (cd/m^2) or nits.






3. 'An application program that helps business owners manage their finances more efficiently by providing tools for tracking accounting transactions such as sales - accounts receivable - inventory purchases - and accounts payable.'






4. A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.






5. A type of monitor that is lighter and more energy-efficient than a CRT monitor; often used with portbale computers such as notebooks.






6. 'One of two recognized DVD formats that enables you to both read - record (R) - and rewrite (RW) data on the disc.'






7. An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed internet connection.






8. The process for loading the operating system (OS) into random access memory (RAM) when the computer is turned on.






9. 'The process of identifying a computer user - based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.'






10. Any of the main files of an operating system.






11. The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.






12. 'An attack delivered by specialized hacking software that tries many combinations of letters - numbers - and pieces of a user ID in an attempt to discover a user password.'






13. Measured in degrees - this tells how far you can move to the side of (or above or below) the monitor before the image quality degrades to unacceptable levels.






14. A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity.






15. The instructions programmers write in a higher-level language.






16. 'Someone who has training in computer and peripheral maintenance and repair - network design - and the installation of network software; installs new equipment - configures computers for users - repairs equipment - and assigns network access to users






17. Acts as a go-between for computers on the internal network and the external network (the Internet).






18. 'The steady and constant pace at which a computer goes through machine cycles - measured in hertz (Hz).'






19. Comprises computing devices - softeare - or peripherals that use techniques - parts - and methods from an earlier time that are no longer popular.






20. A circuit board with specific functions that augment the computer's basic functions and provide connections to other devices; examples include sound card and video card.






21. 'A drive that uses the same kind of memory that flash drives use - but can reach data in only a tenth of the time a flash drive requires.'






22. A tyoe of audio processing that makes the listner experiance sound as if it were coming in all directions.






23. A home that has a computer and other digital devices that are all connected to a home network.






24. Programs designed to provide users with entertainment. Computer games make up the vast majority of entertainment software.






25. 'Programs that include image - video - and audio editing software - animation software - and other specialty software required to produce computer games - animations - and movies.'






26. A special data packet that allows Data to flows from device to device in one direction only.






27. 'The essential component of the operating system that is responsible for managing the processor and all other components of the computer system. Because it stays in random access memory (RAM) the entire time the computer is powered on - the kernel is






28. 'A device that reads information from a magnetic strip on the back of a credit card-like access card (such as a student ID card); card readers are easily programmed by adding authorized ID card numbers - Social Security numbers - and so on.'






29. An expansion card that attached to the motherboard inside the system unit and the enables the computer to produce sounds by providing a connection for the speakers and microphone.






30. The process of swapping data or instructions that have been placed in the swap file for later use back into active random access memory (RAM). The contents of the hard drive's swap file then become less active data or instructions.






31. An application program such as Microsoft Excel or Lotus 1-2-3 that enables a user to do calculations and numerical analyses easily.






32. The part of the system unit of a computer that is responsible for data processing ( the 'brains' of the computer); it is the largest and most important chip in the computer. The CPU controls all the functionsperformed by the computer's other componen






33. A digit that corresponds to the on and off states of a computer's switches. A bit contains a value of either 0 or 1.






34. 'A large - expensive computer that supports hundreds or thousands of users simultaneously and executes many different programs at the same time.'






35. A set of memory chips - located on the motherboard - which stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up.






36. A special numerical code that prioritizes requests from various devices. These requests then are placed in the interrupt table in the computer's primary memory.






37. 'A server that handles all communications between the network and other networks - including managing Internet connectivity.'






38. 'In Windows 7 - a folder that is used to display files from different locations as if they were all saved in a single folder - regardless of where they are actually stored in the file hierarchy.'






39. A server that keeps track of who is logging on to the network and which services on the network are available to each user.






40. 'The set of programs on a computer that helps a user carry out tasks such as word processing - sending e-mail - balancing a budget - creating presentations - editing photos - taking an online course - and playing games.'






41. The process of connecting to a wireless network without the permission of the owner of the network.






42. A computer that provides resources to other computers on a network.






43. The 802.11 standard for wireless data transmissions established by the Institute of Electrical and Electronics Engineers (IEEE).






44. A port that is slightly larger than a standard phone jack and transfers data at speeds of up to 10 -000Mbps; used to connect a computer to a DSL or cable modem or a network.






45. A computer that provides resources to other computers on a network.






46. A computer running a specialized operating system that enables it to host Web pages (and other information) and provide requested Web pages to clients.






47. An application program for creating dynamic slide shows such as Microsoft PowerPoint or Apple Keynote.






48. A measure of the difference in light intensity between the brightest white and the darkest black colors that a monitor can produce. If the contrast ratio is too low - colors tend to fade when the brightness is adjusted to a high or low setting.






49. The access method that ring networks use to avoid data collisions.






50. A drive that plugs into a universal serial bus(USB) port on a computer and stores data digitally. Also called USB drive - jump drive - or thumb drive.