1 - BCSD
NEW YORK STATE FBLA
INTRODUCTION TO TECHNOLOGY CONCEPTS
2011
PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO
Test Directions
1. Complete the information requested on the answer sheet.
PRINT YOUR NAME on the “Name” line.
PRINT the name of the event, INTRODUCTION TO TECHNOLOGY CONCEPTS on the “Subject” line.
PRINT the name of your CHAPTER on the “DATE” line.
2. All answers will be recorded on the answer sheet.
Please do not write on the test booklet.
Scrap paper will be provided.
3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it.
4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed.
Tie will be broken using the last 10 questions of the test.
1. The oldest and most stable operating system that runs on a non-proprietary system is:
A. OS
B. Windows
C. MS – DOS
D. Unix
2. A system of computers that are linked together is called a:
A. System set-up
B. Network
C. Multi-media system
D. Application software
3. The basic job of an ISP is to:
A. Provide access to the Internet
B. Navigate the Internet
C. Transfer emails
D. Connect a networked system
4. Most operating systems use a(n) ___________ file system in which files are organized in a tree-like manner:
A. Unix
B. Lenux
C. Heirarchical
D. NTFS
5. RAM stands for:
A. Readily available memory
B. Returned access memory
C. Random access management
D. Random access memory
6. When using a dial-up system, you connect with a modem using what device?
A. a phone line
B. a CD-Rom
C. the assistance of an operator
D. Arpanet
7. A _____________ network allows each user to access what is stored on the hard drives of the other computers on that network.
A. Local area
B. Peer-to-peer
C. Client server
D. File server
8. A distributed network configuration in which all data/information pass through a central computer is
A. bus network
B. ring network
C. star network
D point-to-point network
9. The most flexibility in how devices are wired together is provided by
A. bus networks
B. star networks
C. ring networks
D. T-switched networks
10. The precursor to the Internet was the
A. MilNet
B. ARPANet
C. World Wide net
D. Charlotte’s Web
11. The uniqueness of a hypertext document lies in the fact that it
A. combines text and graphics
B. can be stored on a computer
C. can be linked to other documents
D. is created using a text editor
12. A CPU contains
A. an analytical engine and a control unit
B. an arithmetic/logic unit and a card reader
C. a card reader and a printing device
D. a control unit and an arithmetic/logic unit
13. The part of a computer that directs and coordinates the overall operation of the computer system is called the
A. ROM program
B. control unit
C. system board
D. arithmetic/logic unit
14. A byte is equal to
A. four bits, or one nibble
B. six bits and one nibble
C. two bits
D. eight bits
15. An application program used primarily for financial analyses and record keeping, resembling on the screen the paper with rows and columns is called a
A. document
B. presentation
C. spreadsheet
D. graphic image
16. A type of software that creates a user interface and supports the working of computer devices and software programs that perform specific jobs is called a(n)
A. marked up document
B. operating system
C. browser
D. magnetic media image
17. The parts of the information processing cycle are
A. fetching, decoding, executing, storing
B. fetching, comparing, interpreting, outputting
C. input, interpret, processing, outputting
D. inputting, processing, comparing, storing
18. To transmit data, such as a digitized text file, sound, or picture, from a remote site to one’s own computer via a network is considered a
A. download
B. upload
C. transmission
D. retrieval
19. A bit of programming code, created as a prank or as a malicious action, that secretly affects other programs and causes unintended consequences is called a(n)
A. graphic
B. computer virus
C. rogue
D. modem
20. Which of the following types of memory is considered a secondary type of processing storage and represents a holding area in which the data and instructions is temporarily stored
A. ROM
B. RAM
C. Cache
D. BIOS
21. The program that boots or starts the computer when it is turned on and controls communications with the keyboard, disk drives, and other components is called
A. BIOS
B. POST
C. ROM
D. USB
22. A communications (COM) port used for connecting devices such as the keyboard, mouse, and modem is considered a _____ port
A. serial
B. parallel
C. video
D. USB
23. Two types of computer software include:
A. Application software and System software
B. System software and Technical support
C. Virus scan and Programming software
D. Hardware and Application software
24. An example of an operating system is
A. Microsoft Access
B. Windows XP
C. Turbotax
D. Adobe Photoshop
25. _____ is a Unix-like computer operating system. It is one of the most prominent examples of open source development and free software; its underlying source code is available for anyone to use, modify, and redistribute freely.
A. Vista
B. XP
C. MS-DOS
D. Linux
26. A ____ is a computer program (or set of programs) that translates text written in a computer language into another computer language.
A. Compiler
B. Programmer
C. Java Script
D. Interpreter
27. The process of producing professional-looking documents such as flyers.
A. Typesetting
B. Book binding
C. Printing
D. Desktop publishing
28. When creating a presentation:
A. be consistent
B. project an image
C. organize the information
D. all of the above
29. This type of software is one of the most common applications for computers today.
A. Word processing
B. Spreadsheet
C. Database
D. Presentation
30. The following software is an example of an engineering software packet:
A. MS-DOS
B. CAD
C. Linux
D. Excel
31. Software developed for the purpose of making profit and are usually very expensive are classified as
A. Proprietary software
B. Open source software
C. Freeware
D. Shareware
32. Which of the following provide the widest viewing surface:
A. 640 x 480
B. 800 x 600
C. 1024 x 768
D. 1280 x 1024
33. Another term for telecommunications is
A. communicating over a distance
B. connectivity
C. workflow automation
D. local area network
34. Tangible, physical equipment that can be seen and touched is called
A. software
B. hardware
C. harddrive
D. diskettes
35. The smallest piece of information used by a computer is a
A. bit
B. byte
C. kilobyte
D. megabyte
36. A _____ is a device that connects several nodes of a LAN
A. gateway
B. network
C. hub
D. router
37. This type of drive is used to store data inside the computer.
A. Magnetic tape drive
B. Jaz drive
C. CD-R drive
D. Hard drive
38. A _____ is a set of program instructions that attaches itself to a file, reproduces itself and spreads to other files
A. virus
B. lurker
C. horse
D. worm
39. These ports transmit data one bit at a time
A. parallel port
B. serial port
C. MIDI port
D. SCSI port
40. A gigabyte is equal to
A. 1024 bits
B. 1024 bytes
C. 1024 kilobytes
D. 1024 megabytes
41. A system malfunction whereby a computer stops working and must be restarted
A. crash
B. restart
C. BIOS
D. reboot
42. This is the point at which a row and column meet in a spreadsheet.
A. Cell pointer
B. Cell
C. Intersection
D. A1
43. A collection of related data
A. field
B. record
C. table
D. database
44. _______ contain customized color schemes
A. animation programs
B. transition programs
C. design templates
D. graphic programs
45. Protocol for fast communication and file transfer across a network
A. Arpanet
B. Betanet
C. Intranet
D. Ethernet
46. Sending e-mail falsely claiming to be an established, legitimate enterprise in attempt to scam the user into surrendering private information that is used to steal one’s identity
A. twittering
B. blogging
C. clickjacking
D. phishing
47. When you format a disk, you are using a ____ program
A. utility
B. word processing
C. database
D. spreadsheet
48. In some software programs, this key can be used to stop a command in progress
A. pause
B. scroll lock
C. ESC
D. print screen
49. The part of the word processing screen that shows the name of the document on which you are working is called the
A. menu bar
B. title bar
C. status bar
D. tool bar
50. The main directory of a disk is referred to as the ____ directory.
a. main
b. cache
c. subsidiary
d. root
51. Arranges data in alphabetical or numerical order
A. an ascending sort
B. a descending sort
C. a data sort
D. a record sort
52. These are used to match a range of information in your database fields.
A. equal signs
B. greater than signs
C. comparison operators
D. less than or equal to signs
53. A small data file stored on a computer by a website to allow it to remember your preferences
A. portal
B. cookie
C. twitter
D. wiki
54. A computer’s main circuit board is called a _____ and houses all essential chips and connects the circuitry among them.
A. random access memory
B. mother board
C. hard drive
D. primary board
55. A(n) _____ is a collection of tiny wires through which data, in the form of “0s” and “1s”, is transmitted from one part of a computer to another.
A. bandwidth
B. input device
C. PC card
D. Bus
56. The connection between a user and software, between two hardware devices, or between two applications
A. Interface
B. Icon
C. Input device
D. Keyboard
57. A measurement of the sharpness of an image displayed on a computer monitor or other output device. It is measured in dots per inch.
A. pixel
B. resolution
C. bitmap
D. jpeg
58. An (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign this before being granted a network ID. AUP is the acronym for
A. Acquired Use Policy
B. Acceptable Use Policy
C. Agreeing to Use Policy
D. Agreement of Usage Policy
59. The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe
A. Saving
B. Protecting
C. Backup
D. Controlling data
60. An object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
A. C++
B. HTML
C. JavaScript
D. Basic
61. Processed data, usually text, graphics, or sound, that can be used immediately, or stored in computer-usable form for later use.
A. Information
B. CRT
C. Output
D. Display
62. Storage of data that is capable of being accessed and displayed, but not changed and resaved.
A. CD-ROM
B. Optical Disk
C. Read-Only Memory
D. Rewritable Memory
63. A type of optical laser disk, this is a very high capacity storage device that is often used by companies to store huge amounts of data, particularly images.
A. WORM
B. Floppy disk
C. Magnetic tape
D. Disk pack
64. The process of starting a computer by turning on the unit’s power switch.
A. warm boot
B. buffer
C. BIOS
D. cold boot
65. A ____ provides a set of options from which a user selects by clicking a highlighted option with a mouse or by typing one or more keystrokes.
A. submenu
B. menu
C. table of contents
D. index
66. The term FAX stands for the word(s)
A. Fast Action
B. Forward And X-cept
C. Facsimile
D. None of the above
67. Gridlines are usually shown in
A. Tables
B. Itineraries
C. Mail Merges
D. Reports
68. The up and down movement within a word processing document is called
A. Cut and Paste
B. Vertical alignment
C. Scrolling
D. Alignment
69. A _____ program performs a specific task, such as checking for viruses, uninstalling programs, and deleting data no longer needed.
A. utility
B. software
C. scanned
D. read-only
70. In computing, ____ represents information that has been translated into a form that is more convenient to move or process.
A. processing
B. data
C. a character
D. a binary character
71. What is the result of processed data?
A. Input
B. Output
C. CPU
D. DRAM
72. A means by which you mark favorite home pages and addresses to various Internet clients for future reference is called
A. Gopher
B. Browser
C. Hits
D. Bookmarks
73. The process by which a digitized image turns into a second image is called
A. digitalizing
B. imaging
C. clipart
D. morphing
74. What is HTML?
A. A protocol used for transferring Web pages
B. A service that supplies computers with IP addresses
C. A service that resolves IP addresses to domain names
D. A language used to create Web pages
75. A blueprint that includes the formatting graphics, or color necessary to create a specific look is a
A. template
B. pattern
C. sheet
D. image
76. The first page that is displayed when your browser starts is a
A. bookmark
B. start page
C. home page
D. beginning page
77. FTP stands for:
A. File transmit protection
B. File transfer protocol
C. Fax transmit provider
D. File transmitting provider
78. GUI stands for:
A. Graphic Used Interchangeably
B. Grid Under Index
C. Graphical User Interface
D. Graphic Usually Inserted
79. A card that enables and controls the exchange of data between the computers in a local area network is called a
A. video card
B. network interrupt card
C. communication card
D. network interface card
80. The primary hardware/software technology used to stop the problems of connecting incompatible computer networks is called
A. a bus
B. an application
C. a port
D. the router
81. Software that is used to block access to certain materials on the Internet is called
A. filtering software
B. Web blocking software
C. virus protection
D. blockware
82. A type of cable that uses pulses of light over a light-conducting fiber is called
A. fluorescent cable
B. light cable
C. fiber optic cable
D. fiber light cable
83. To protect information sent across the Internet and prevent others from reading the data except the intended recipient, it should be
A. encrypted
B. decrypted
C. modulated
D. audited
84. Which of the following is a small, lightweight, handheld computer that is used as a personal organizer?
A. PDO
B. PDA
C. CPU
D. PC
85. A series of recorded commands or instructions that are grouped together as a single command
A. macro
B. micro
C. record
D. merge
86. Which one of the following is the most widely used integrated office suite in business?
A. Word Perfect
B. Microsoft Office
C. Lotus Smart Suite
D. Microsoft Works
87. Which feature allows the same text to appear on the top of every page?
A. footer
B. footnote
C. Bullet
D. header
88. Which application is best used to create a letter?
A. word processing
B. spreadsheet application
C. database application
D. presentation software
89. Which of the following is saved to its source? If the original object is changed, the object in the current document is not changed. It is stored in the current document.
A. Linked object
B. Implanted object
C. Embedded object
D. Fixed object
90. Which of the following would be used to send the same document to several people in a word processing application?
A. table
B. macro
C. template
D. merge
91. Your application has frozen. Which of the following is the best way to close the application in Windows without rebooting?
A. File, Exit, Save
B. Right click, Select End Task
C. Alt-F5
D. Ctrl-Alt-Delete, End Task
92. In word processing and page layout programs, the space between the letters of a word
A. kerning
B. character
C. spacing differential
D. leading
93. Which of the following physically separates a LAN into multiple segments? Each segment is in a separate collision domain; however, all segments are in the same broadcast domain.
A. hub
B. bridge
C. switch
D. router
94. Two types of telephone lines are available for communication. Which of the following provides for a full-time, constant connection?
A. Dialect line
B. Dial-up line
C. Dedicated line
D. Committed line
95. Which of the following is usually a combination of software and hardware intended to protect a network against external threats coming from the Internet?
A. Securewall
B. Firewall
C. Datawall
D. Systemwall
96. Which of the following can provide temporary connections to an existing network, provide some degree of portability, and extend networks beyond the limits of physical connectivity?
A. wireless networks
B. UTP networks
C. coaxial networks
D. fiber networks
97. The term used to identify people who are responsible for managing a network is a
A. system technician
B. data entry operator
C. computer supervisor
D. system administrator
98. BIOS is an acronym that stands for
A. Baseline Internal Operating System
B. Basic Input/Output System
C. Blocked Indication of System
D. Breakdown of Internet and Operating System
99. Spamming refers to
A. posting humorous anecdotes
B. posting your home page
C. posting inappropriate or unwanted messages
D. posting viruses
100. The electronic address of a particular Web site is called a
A. standard address location
B. uniform resource locator
C. homepage
D. unified standard location
ANSWER KEY
|1. C |26. A |51. A |76. C |
|2. B |27. D |52. C |77. B |
|3. A |28. D |53. B |78. C |
|4. C |29. A |54. B |79. D |
|5. D |30. B |55. D |80. D |
|6. A |31. A |56. A |81. A |
|7. B |32. D |57. B |82. C |
|8. C |33. A |58. B |83. A |
|9. A |34. B |59. C |84. B |
|10. B |35. A |60. A |85. A |
|11. C |36. C |61. C |86. B |
|12. D |37. D |62. C |87. D |
|13. B |38. A |63. A |88. A |
|14. D |39. B |64. D |89. C |
|15. C |40. D |65. B |90. D |
|16. B |41. A |66. C |91. D |
|17. A |42. B |67. A |92. A |
|18. A |43. D |68. C |93. B |
|19. B |44. C |68. A |94. C |
|20. C |45. D |70. B |95. B |
|21. A |46. D |71. B |96. A |
|22. A |47. A |72. D |97. D |
|23. A |48. A |73. D |98. B |
|24. B |49. B |74. D |99. C |
|25. D |50. D |75. A |100. B |
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- 1 or 2 374 374 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 374 374 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 711 711 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 711 711 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 693 693 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 693 693 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 593 593 1 0 0 0 1 or 2dvchrbu 168 1 1 default username and password
- 1 or 3 593 593 1 0 0 0 1 or 2dvchrbu 168 1 1 default username and password
- 1 or 2 910 910 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 910 910 1 0 0 0 1 168 1 1 default username and password
- 192 1 or 2 33 33 1 0 0 0 1 1 1 default username and password
- 1 or 2 364 364 1 0 0 0 1 168 1 1 admin username and password