1 - BCSD



NEW YORK STATE FBLA

INTRODUCTION TO TECHNOLOGY CONCEPTS

2011

PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO

Test Directions

1. Complete the information requested on the answer sheet.

PRINT YOUR NAME on the “Name” line.

PRINT the name of the event, INTRODUCTION TO TECHNOLOGY CONCEPTS on the “Subject” line.

PRINT the name of your CHAPTER on the “DATE” line.

2. All answers will be recorded on the answer sheet.

Please do not write on the test booklet.

Scrap paper will be provided.

3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it.

4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed.

Tie will be broken using the last 10 questions of the test.

1. The oldest and most stable operating system that runs on a non-proprietary system is:

A. OS

B. Windows

C. MS – DOS

D. Unix

2. A system of computers that are linked together is called a:

A. System set-up

B. Network

C. Multi-media system

D. Application software

3. The basic job of an ISP is to:

A. Provide access to the Internet

B. Navigate the Internet

C. Transfer emails

D. Connect a networked system

4. Most operating systems use a(n) ___________ file system in which files are organized in a tree-like manner:

A. Unix

B. Lenux

C. Heirarchical

D. NTFS

5. RAM stands for:

A. Readily available memory

B. Returned access memory

C. Random access management

D. Random access memory

6. When using a dial-up system, you connect with a modem using what device?

A. a phone line

B. a CD-Rom

C. the assistance of an operator

D. Arpanet

7. A _____________ network allows each user to access what is stored on the hard drives of the other computers on that network.

A. Local area

B. Peer-to-peer

C. Client server

D. File server

8. A distributed network configuration in which all data/information pass through a central computer is

A. bus network

B. ring network

C. star network

D point-to-point network

9. The most flexibility in how devices are wired together is provided by

A. bus networks

B. star networks

C. ring networks

D. T-switched networks

10. The precursor to the Internet was the

A. MilNet

B. ARPANet

C. World Wide net

D. Charlotte’s Web

11. The uniqueness of a hypertext document lies in the fact that it

A. combines text and graphics

B. can be stored on a computer

C. can be linked to other documents

D. is created using a text editor

12. A CPU contains

A. an analytical engine and a control unit

B. an arithmetic/logic unit and a card reader

C. a card reader and a printing device

D. a control unit and an arithmetic/logic unit

13. The part of a computer that directs and coordinates the overall operation of the computer system is called the

A. ROM program

B. control unit

C. system board

D. arithmetic/logic unit

14. A byte is equal to

A. four bits, or one nibble

B. six bits and one nibble

C. two bits

D. eight bits

15. An application program used primarily for financial analyses and record keeping, resembling on the screen the paper with rows and columns is called a

A. document

B. presentation

C. spreadsheet

D. graphic image

16. A type of software that creates a user interface and supports the working of computer devices and software programs that perform specific jobs is called a(n)

A. marked up document

B. operating system

C. browser

D. magnetic media image

17. The parts of the information processing cycle are

A. fetching, decoding, executing, storing

B. fetching, comparing, interpreting, outputting

C. input, interpret, processing, outputting

D. inputting, processing, comparing, storing

18. To transmit data, such as a digitized text file, sound, or picture, from a remote site to one’s own computer via a network is considered a

A. download

B. upload

C. transmission

D. retrieval

19. A bit of programming code, created as a prank or as a malicious action, that secretly affects other programs and causes unintended consequences is called a(n)

A. graphic

B. computer virus

C. rogue

D. modem

20. Which of the following types of memory is considered a secondary type of processing storage and represents a holding area in which the data and instructions is temporarily stored

A. ROM

B. RAM

C. Cache

D. BIOS

21. The program that boots or starts the computer when it is turned on and controls communications with the keyboard, disk drives, and other components is called

A. BIOS

B. POST

C. ROM

D. USB

22. A communications (COM) port used for connecting devices such as the keyboard, mouse, and modem is considered a _____ port

A. serial

B. parallel

C. video

D. USB

23. Two types of computer software include:

A. Application software and System software

B. System software and Technical support

C. Virus scan and Programming software

D. Hardware and Application software

24. An example of an operating system is

A. Microsoft Access

B. Windows XP

C. Turbotax

D. Adobe Photoshop

25. _____ is a Unix-like computer operating system. It is one of the most prominent examples of open source development and free software; its underlying source code is available for anyone to use, modify, and redistribute freely.

A. Vista

B. XP

C. MS-DOS

D. Linux

26. A ____ is a computer program (or set of programs) that translates text written in a computer language into another computer language.

A. Compiler

B. Programmer

C. Java Script

D. Interpreter

27. The process of producing professional-looking documents such as flyers.

A. Typesetting

B. Book binding

C. Printing

D. Desktop publishing

28. When creating a presentation:

A. be consistent

B. project an image

C. organize the information

D. all of the above

29. This type of software is one of the most common applications for computers today.

A. Word processing

B. Spreadsheet

C. Database

D. Presentation

30. The following software is an example of an engineering software packet:

A. MS-DOS

B. CAD

C. Linux

D. Excel

31. Software developed for the purpose of making profit and are usually very expensive are classified as

A. Proprietary software

B. Open source software

C. Freeware

D. Shareware

32. Which of the following provide the widest viewing surface:

A. 640 x 480

B. 800 x 600

C. 1024 x 768

D. 1280 x 1024

33. Another term for telecommunications is

A. communicating over a distance

B. connectivity

C. workflow automation

D. local area network

34. Tangible, physical equipment that can be seen and touched is called

A. software

B. hardware

C. harddrive

D. diskettes

35. The smallest piece of information used by a computer is a

A. bit

B. byte

C. kilobyte

D. megabyte

36. A _____ is a device that connects several nodes of a LAN

A. gateway

B. network

C. hub

D. router

37. This type of drive is used to store data inside the computer.

A. Magnetic tape drive

B. Jaz drive

C. CD-R drive

D. Hard drive

38. A _____ is a set of program instructions that attaches itself to a file, reproduces itself and spreads to other files

A. virus

B. lurker

C. horse

D. worm

39. These ports transmit data one bit at a time

A. parallel port

B. serial port

C. MIDI port

D. SCSI port

40. A gigabyte is equal to

A. 1024 bits

B. 1024 bytes

C. 1024 kilobytes

D. 1024 megabytes

41. A system malfunction whereby a computer stops working and must be restarted

A. crash

B. restart

C. BIOS

D. reboot

42. This is the point at which a row and column meet in a spreadsheet.

A. Cell pointer

B. Cell

C. Intersection

D. A1

43. A collection of related data

A. field

B. record

C. table

D. database

44. _______ contain customized color schemes

A. animation programs

B. transition programs

C. design templates

D. graphic programs

45. Protocol for fast communication and file transfer across a network

A. Arpanet

B. Betanet

C. Intranet

D. Ethernet

46. Sending e-mail falsely claiming to be an established, legitimate enterprise in attempt to scam the user into surrendering private information that is used to steal one’s identity

A. twittering

B. blogging

C. clickjacking

D. phishing

47. When you format a disk, you are using a ____ program

A. utility

B. word processing

C. database

D. spreadsheet

48. In some software programs, this key can be used to stop a command in progress

A. pause

B. scroll lock

C. ESC

D. print screen

49. The part of the word processing screen that shows the name of the document on which you are working is called the

A. menu bar

B. title bar

C. status bar

D. tool bar

50. The main directory of a disk is referred to as the ____ directory.

a. main

b. cache

c. subsidiary

d. root

51. Arranges data in alphabetical or numerical order

A. an ascending sort

B. a descending sort

C. a data sort

D. a record sort

52. These are used to match a range of information in your database fields.

A. equal signs

B. greater than signs

C. comparison operators

D. less than or equal to signs

53. A small data file stored on a computer by a website to allow it to remember your preferences

A. portal

B. cookie

C. twitter

D. wiki

54. A computer’s main circuit board is called a _____ and houses all essential chips and connects the circuitry among them.

A. random access memory

B. mother board

C. hard drive

D. primary board

55. A(n) _____ is a collection of tiny wires through which data, in the form of “0s” and “1s”, is transmitted from one part of a computer to another.

A. bandwidth

B. input device

C. PC card

D. Bus

56. The connection between a user and software, between two hardware devices, or between two applications

A. Interface

B. Icon

C. Input device

D. Keyboard

57. A measurement of the sharpness of an image displayed on a computer monitor or other output device. It is measured in dots per inch.

A. pixel

B. resolution

C. bitmap

D. jpeg

58. An (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign this before being granted a network ID. AUP is the acronym for

A. Acquired Use Policy

B. Acceptable Use Policy

C. Agreeing to Use Policy

D. Agreement of Usage Policy

59. The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe

A. Saving

B. Protecting

C. Backup

D. Controlling data

60. An object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.

A. C++

B. HTML

C. JavaScript

D. Basic

61. Processed data, usually text, graphics, or sound, that can be used immediately, or stored in computer-usable form for later use.

A. Information

B. CRT

C. Output

D. Display

62. Storage of data that is capable of being accessed and displayed, but not changed and resaved.

A. CD-ROM

B. Optical Disk

C. Read-Only Memory

D. Rewritable Memory

63. A type of optical laser disk, this is a very high capacity storage device that is often used by companies to store huge amounts of data, particularly images.

A. WORM

B. Floppy disk

C. Magnetic tape

D. Disk pack

64. The process of starting a computer by turning on the unit’s power switch.

A. warm boot

B. buffer

C. BIOS

D. cold boot

65. A ____ provides a set of options from which a user selects by clicking a highlighted option with a mouse or by typing one or more keystrokes.

A. submenu

B. menu

C. table of contents

D. index

66. The term FAX stands for the word(s)

A. Fast Action

B. Forward And X-cept

C. Facsimile

D. None of the above

67. Gridlines are usually shown in

A. Tables

B. Itineraries

C. Mail Merges

D. Reports

68. The up and down movement within a word processing document is called

A. Cut and Paste

B. Vertical alignment

C. Scrolling

D. Alignment

69. A _____ program performs a specific task, such as checking for viruses, uninstalling programs, and deleting data no longer needed.

A. utility

B. software

C. scanned

D. read-only

70. In computing, ____ represents information that has been translated into a form that is more convenient to move or process.

A. processing

B. data

C. a character

D. a binary character

71. What is the result of processed data?

A. Input

B. Output

C. CPU

D. DRAM

72. A means by which you mark favorite home pages and addresses to various Internet clients for future reference is called

A. Gopher

B. Browser

C. Hits

D. Bookmarks

73. The process by which a digitized image turns into a second image is called

A. digitalizing

B. imaging

C. clipart

D. morphing

74. What is HTML?

A. A protocol used for transferring Web pages

B. A service that supplies computers with IP addresses

C. A service that resolves IP addresses to domain names

D. A language used to create Web pages

75. A blueprint that includes the formatting graphics, or color necessary to create a specific look is a

A. template

B. pattern

C. sheet

D. image

76. The first page that is displayed when your browser starts is a

A. bookmark

B. start page

C. home page

D. beginning page

77. FTP stands for:

A. File transmit protection

B. File transfer protocol

C. Fax transmit provider

D. File transmitting provider

78. GUI stands for:

A. Graphic Used Interchangeably

B. Grid Under Index

C. Graphical User Interface

D. Graphic Usually Inserted

79. A card that enables and controls the exchange of data between the computers in a local area network is called a

A. video card

B. network interrupt card

C. communication card

D. network interface card

80. The primary hardware/software technology used to stop the problems of connecting incompatible computer networks is called

A. a bus

B. an application

C. a port

D. the router

81. Software that is used to block access to certain materials on the Internet is called

A. filtering software

B. Web blocking software

C. virus protection

D. blockware

82. A type of cable that uses pulses of light over a light-conducting fiber is called

A. fluorescent cable

B. light cable

C. fiber optic cable

D. fiber light cable

83. To protect information sent across the Internet and prevent others from reading the data except the intended recipient, it should be

A. encrypted

B. decrypted

C. modulated

D. audited

84. Which of the following is a small, lightweight, handheld computer that is used as a personal organizer?

A. PDO

B. PDA

C. CPU

D. PC

85. A series of recorded commands or instructions that are grouped together as a single command

A. macro

B. micro

C. record

D. merge

86. Which one of the following is the most widely used integrated office suite in business?

A. Word Perfect

B. Microsoft Office

C. Lotus Smart Suite

D. Microsoft Works

87. Which feature allows the same text to appear on the top of every page?

A. footer

B. footnote

C. Bullet

D. header

88. Which application is best used to create a letter?

A. word processing

B. spreadsheet application

C. database application

D. presentation software

89. Which of the following is saved to its source? If the original object is changed, the object in the current document is not changed. It is stored in the current document.

A. Linked object

B. Implanted object

C. Embedded object

D. Fixed object

90. Which of the following would be used to send the same document to several people in a word processing application?

A. table

B. macro

C. template

D. merge

91. Your application has frozen. Which of the following is the best way to close the application in Windows without rebooting?

A. File, Exit, Save

B. Right click, Select End Task

C. Alt-F5

D. Ctrl-Alt-Delete, End Task

92. In word processing and page layout programs, the space between the letters of a word

A. kerning

B. character

C. spacing differential

D. leading

93. Which of the following physically separates a LAN into multiple segments? Each segment is in a separate collision domain; however, all segments are in the same broadcast domain.

A. hub

B. bridge

C. switch

D. router

94. Two types of telephone lines are available for communication. Which of the following provides for a full-time, constant connection?

A. Dialect line

B. Dial-up line

C. Dedicated line

D. Committed line

95. Which of the following is usually a combination of software and hardware intended to protect a network against external threats coming from the Internet?

A. Securewall

B. Firewall

C. Datawall

D. Systemwall

96. Which of the following can provide temporary connections to an existing network, provide some degree of portability, and extend networks beyond the limits of physical connectivity?

A. wireless networks

B. UTP networks

C. coaxial networks

D. fiber networks

97. The term used to identify people who are responsible for managing a network is a

A. system technician

B. data entry operator

C. computer supervisor

D. system administrator

98. BIOS is an acronym that stands for

A. Baseline Internal Operating System

B. Basic Input/Output System

C. Blocked Indication of System

D. Breakdown of Internet and Operating System

99. Spamming refers to

A. posting humorous anecdotes

B. posting your home page

C. posting inappropriate or unwanted messages

D. posting viruses

100. The electronic address of a particular Web site is called a

A. standard address location

B. uniform resource locator

C. homepage

D. unified standard location

ANSWER KEY

|1. C |26. A |51. A |76. C |

|2. B |27. D |52. C |77. B |

|3. A |28. D |53. B |78. C |

|4. C |29. A |54. B |79. D |

|5. D |30. B |55. D |80. D |

|6. A |31. A |56. A |81. A |

|7. B |32. D |57. B |82. C |

|8. C |33. A |58. B |83. A |

|9. A |34. B |59. C |84. B |

|10. B |35. A |60. A |85. A |

|11. C |36. C |61. C |86. B |

|12. D |37. D |62. C |87. D |

|13. B |38. A |63. A |88. A |

|14. D |39. B |64. D |89. C |

|15. C |40. D |65. B |90. D |

|16. B |41. A |66. C |91. D |

|17. A |42. B |67. A |92. A |

|18. A |43. D |68. C |93. B |

|19. B |44. C |68. A |94. C |

|20. C |45. D |70. B |95. B |

|21. A |46. D |71. B |96. A |

|22. A |47. A |72. D |97. D |

|23. A |48. A |73. D |98. B |

|24. B |49. B |74. D |99. C |

|25. D |50. D |75. A |100. B |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download