1



NEW YORK STATE FBLA

INTRODUCTION TO TECHNOLOGY CONCEPTS

2008

PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO

Test Directions

1. Complete the information requested on the answer sheet.

PRINT YOUR NAME on the “Name” line.

PRINT the name of the event, INTRODUCTION TO TECHNOLOGY CONCEPTS on the “Subject” line.

PRINT the name of your CHAPTER on the “DATE” line.

2. All answers will be recorded on the answer sheet.

Please do not write on the test booklet.

Scrap paper will be provided.

3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it.

4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed.

5. Tie will be broken using the last 10 questions of the test.

1. This is the area of a computer that temporarily holds data that is waiting to be processed, stored, or output.

A. Memory

B. Storage

C. Input

D. Output

2. Which is an example of a public computer data network?

A. Arpanet

B. Search engine

C. Web browser

D. World Wide Web

3. The first computer used in business was the

A. UNIVAC

B. ENIAC

C. McIntosh

D. Gateway

4. Data is processed in the

A. Central Processing Unit

B. Memory Chip

C. Storage Unit

D. Personal Digital Assistant

5. An unauthorized group of instructions inserted into a software program in order to disrupt or destroy the program is called

A. Code

B. Password

C. Sensor

D. Virus

6. Which activity would damage information on a floppy disk?

A. Stacking disks on top of each other

B. Placing them on a TV

C. Changing passwords

D. Rebooting the computer with the disk still inserted in the drive

7. The smallest unit of a spreadsheet is a

A. Cell

B. Column

C. Range

D. Row

8. Which software program is best for creating logo designs?

A. Database

B. Graphics

C. Spreadsheet

D. Telecommunications

9. A computer ___ is two or more computers or devices that are connected for the purpose of sharing data and programs.

A. Matrix

B. Network

C. Panel

D. PDA

10. A personal computer that requests data from a server is called a

A. client

B. circuit

C. Mask

D. PDA

11. A(n) ____ system, such as Windows, UNIX, or Mac OS, is essentially the master controller for all of the activities that take place within a computer system.

A. Control

B. Matrix

C. Operating

D. Panel

12. In a database file, all the data about an individual company is called a

A. Field

B. Record

C. Report

D. Row

13. Which peripheral is an output device?

A. Joystick

B. Mouse

C. Printer

D. Scanner

14. Which computer is also called a personal computer?

A. Mainframe

B. Microcomputer

C. Minicomputer

D. Supercomputer

15. The intersection of a row and column in a spreadsheet is called a

A. Cell

B. Formula

C. Range

D. Value

16. A computer ___ designs and tests new hardware products, such as computer chips, circuit boards, computers, and peripheral devices.

A. Engineer

B. Operator

C. Programmer

D. Specialist

17. A(n) ___ is typically used as an electronic appointment book, address book, calculator, and notepad.

A. ADP

B. PAD

C. PDA

D. DPA

18. Data becomes ____ when it is presented in a format that people can understand and use.

A. Figures

B. Information

C. Records

D. Symbolic

19. An example of an “always on” connection to the Internet is

A. dial-up

B. cable modem

C. DSL

D. Both B & C

20. A ___ is small and lightweight, giving it the advantage of portability.

A. Macrocomputer

B. Microcomputer

C. Minicomputer

D. Notebook computer

21. In a spreadsheet, the term “global format” refers to

A. one cell

B. one row

C. all cells

D. all documents

22. Which database command is used to find a specific piece of information?

A. Insert

B. Replicate

C. Report

D. Query

23. A library keeps a file that includes the title, author and subject of each of its books. Which type of software is best for this task?

A. Database

B. Graphics

C. Spreadsheet

D. Word Processing

24. Which function does the cursor reach the end of a line and then move directly to the next line in a word processing application?

A. Field extention

B. File naming

C. Word search

D. Word wrap

25. Which item would be considered output by an architectural agency?

A. Blueprint

B. CAD program

C. Construction schedule

D. Energy

26. Which formula represents the multiplication of two numbers?

A. =sum(D1-C1)

B. =sum(sum(C1:C10)

C. =C1xD1

D. =C1*D1

27. The title of a spreadsheet or the identifier for a column or row is called a

A. Default

B. Format

C. Label

D. Legend

28. Typically, this kind of software testing is conducted by a team of off-site testers, such as a professional testing company.

A. Alpha

B. Beta

C. Epsilon

D. Gamma

29. The 1990’s spawned a group of Internet-based companies that are referred to as

A. Cyber coms

B. Dot coms

C. Intercoms

D. Net coms

30. ___ refers to selecting part of an image.

A. Cropping

B. Interpolation

C. Pixelation

D. Resolution

31. Most digital cameras store photographic images in ____ format(s).

A. AIFF

B. GIF

C. JPEG

D. TIFF

32. A ____ is a smooth blending of shades from one color to another, or from light to dark.

A. Dither

B. Gradient

C. Metafile

D. Trace

33. Web page videos typically use ___ video which transmits the first segment of video, begins to play it, and then continues to transfer additional segments.

A. Internal

B. External

C. Rendering

D. Streaming

34. Camera manufacturers sometimes express the resolution of digital cameras as

A. Kilopixels

B. Gigapixels

C. Megapixels

D. Micropixels

35. Small Java applications are called Java ____.

A. Applets

B. Fragments

C. Frames

D. Servlets

36. A conveniently small and portable sized peripheral that allows you to store larger sized files is a ______.

A. Compact card

B. Flash drive

C. Firewire

D. Zoom

37. In order to quickly capture video footage from a digital video camera to a computer system using the fastest speed available, you would use _____.

A. Dazzle

B. Firewire

C. RCA cables

D. USB cables

38. The ____ is the communications network that carries Web data.

A. WC3

B. Intranet

C. Internet

D. Java Virtual Network

39. The Web is based on the concept of ____, a collection of documents that can be related by links.

A. Cookies

B. Hypertext

C. Ports

D. Tags

40. A(n) ___ typically maintains the devices that provide subscribers with e-mail and access to the Web.

A. DNS

B. ISP

C. Modem

D. Workstation

41. ___ refers to the set of rules for efficiently transmitting data from one network node to another.

A. Communications protocol

B. Ethernet policy

C. Parity

D. Simplex

42. Which word processing command is used to move up and down through text on a computer screen?

A. Hanging indent

B. Return

C. Scroll

D. Tab

43. Which function is used to arrange records in a file from a database?

A. Add

B. Delete

C. Search

D. Sort

44. Setting the margins and the spacing for a document is called

A. Copying

B. Formatting

C. Inserting

D. Saving

45. Which computer output device is used to create the final product of a word processing project?

A. Monitor

B. Plotter

C. Printer

D. Video disk

46. Which type of data consists of values?

A. Character/alpha

B. Field

C. Global

D. numeric

47. Line spacing in a text document can be changed by changing the

A. Center point

B. Default

C. Margins

D. Mode

48. Which type of software is most likely used to produce a company’s financial statements?

A. Database

B. Graphics

C. Spreadsheet

D. Word processing

49. Which kind of chart best shows the relationship of the parts to the total?

A. bar chart

B. pie chart

C. text chart

D. Line chart

50. A ___ is a device that is connected to at least two networks – sort of like a spider sitting in the middle of a web.

A. Gateway

B. Hub

C. Repeater

D. Router

51. ___ is a protocol that works with TCP/IP to get Web resources to your desktop.

A. FTP

B. HTML

C. HTTP

D. URL

52. A ___ connects several nodes of a LAN.

A. Gateway

B. Hub

C. Repeater

D. Router

53. A non-functioning link is called a(n) ____ link.

A. Broken

B. Concomitant

C. Legendary

D. Unfound

54. The resolution of a computer monitor depends on the number of small dots the screen can produce. These small dots of light are called

A. Axes

B. Legends

C. Pixels

D. Sets

55. Vertical lines of information on a spreadsheet are called

A. Blocks

B. Cells

C. Columns

D. Rows

56. An example of a graphics software program that creates vector graphics is

A. Adobe Illustrator

B. Microsoft Excel

C. Microsoft Publisher

D. Microsoft Word

57. The computer term that refers to the heaviness or thickness of a stroke is

A. Fill

B. Style

C. Swatch

D. Weight

58. Which software program would be used to create a magazine?

A. Access

B. Excel

C. InDesign

D. Microsoft Word

59. Unlike disk storage, most RAM is

A. Integrated

B. Non-volatile

C. Virtual

D. Volatile

60. A(n) _____ circuit is a super-thin slice of semi-conducting material packed with microscopic circuit elements such as wires, transistors, capacitors, logic gates, and resistors.

A. Analog

B. Digital

C. Ion

D. Integrated

61. CD-___ technology allows you to write data on a CD, then change that data at a later time.

A. R

B. RW

C. W

D. All of the above

62. CD and DVD storage can be classified as ____ storage.

A. Analog

B. Digital

C. Magnetic

D. Optical

63. Hard disk and tape storage technologies can be classified as ____ storage.

A. Analog

B. Digital

C. Magnetic

D. Optical

64. ___ access is the ability of a device to “jump” directly to the requested data.

A. Jump

B. Quick

C. Random

D. Sequential

65. Every web page has a unique address called a(n)

A. FTP

B. HTTP

C. Protocol

D. URL

66. By using a computer _____, your computer never misses one of your keystrokes, no matter how fast you type.

A. Buffer

B. Command-line interface

C. GUI

D. Both B & C

67. ____ is copyright software marketed under the “try before you buy” policy.

A. Freeware

B. Open source software

C. Public domain software

D. Shareware

68. A(n) ____ is text that you specify to automatically appear in the top margin of every page.

A. Abbreviation

B. Footer

C. Header

D. Structure

69. Using the ___ key as you click each item works well to select files that are not listed consecutively.

A. Alt

B. Ctrl

C. F1

D. Shift

70. You can _____ to rearrange the files on a disk so that they are stored in contiguous clusters, speeding up the computer system.

A. Compress

B. Compact

C. Defragment

D. Decompress

71. Files with a ____ extension appear in the Open list when you are working with Microsoft Word software.

A. .doc

B. .ppt

C. .psd

D. .xls

72. How many bits are in a byte?

A. 4

B. 10

C. 12

D. 15

73. Which backup type backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?

A. Copy

B. Differential

C. Full

D. Incremental

74. This access method “fights” for the transmission media. Its drawback is that collisions happen quite often.

A. Contention

B. Polling

C. Token passing

D. None of the above

75. A piece of hardware that deals with attenuation problems is called a:

A. NAC

B. NIC

C. Passive Hub

D. Repeater

76. This is the area in RAM set aside for a device and its drivers to use.

A. DMA channel

B. IRC

C. IRQ

D. Memory address

77. What is the expansion slot on laptops commonly called?

A. FDDI

B. IEEE

C. ITU-T

D. PCMCIA

78. What numbering system do computers use for data processing?

A. Binary

B. Decimal

C. Hexadecimal

D. Octal

79. When Virtual Basic saves a file, it adds the extension _____ to the file name.

A. .exe

B. .frm

C. .prg

D. .vbp

80. One billion bytes is called a _________, and typical hard disk sizes range from 10 to 75 billion bytes.

A. Dekabyte (DB)

B. Kibobyte (KB)

C. Gigabyte (GB)

D. Megabyte (MB)

81. A hertz is defined as

A. 4 cycles per second

B. 3 cycles per second

C. 5 pulses per second

D. 1 pulse per second

82. Voice mail

A. involves using video and computer technology to conduct a meeting between participants at geographically separate locations.

B. is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the internet.

C. functions much like an answering machine, allowing callers to leave a voice message for the called party.

D. permits users to converse in real time with each other via the computer while connected to the Internet.

83. The paragraph mark (¶) is a formatting mark that indicates where the ____ was pressed.

A. ENTER key

B. SHIFT key

C. SPACEBAR key

D. TAB key

84. The series of electronic pulses created by the CPU at a predetermined rate that affect machine cycle time is called

A. A megahertz

B. An ALU cycle speed

C. Clock speed

D. Cycle speed

85. An internet utility called _____ sends a signal to a specific internet address and waits for a reply.

A. ICMP (Internet Control Message Protocol)

B. PANG (Packet Acoustic Networking)

C. PING (Packet Internet Groper)

D. Traceroute (TRAC)

86. A _____ is a narrow recording band that forms a full circle on the surface of a disk.

A. Cluster

B. Sector

C. Shutter

D. Track

87. ____ involves running more than one application at the same time.

A. Multitasking

B. Multithreading

C. Spooling

D. Time-sharing

88. Printer resolution is measured by the number of _______ a printer can output.

A. Bits per centimeter (bpc)

B. Characters per page (cpp)

C. Dots per inch (dpi)

D. Pixels per segment (pps)

89. A monitor’s viewable size is the ____ measurement of the actual viewing area provided by the monitor.

A. Area

B. Diagonal

C. Horizontal

D. Vertical

90. PowerPoint is a powerful presentation ____ program.

A. Database

B. Graphics

C. Spreadsheet

D. Word Processing

91. Syntax errors will be caused by all of the following except

A. Leaving out required punctuation

B. Misspelling a command

C. Typing command words out of order

D. Using the wrong control signal

92. COM 1 shares an IRQ with which other COM port?

A. COM 2

B. COM 3

C. COM 4

D. COM 5

93. All of the following are key sequences to access the BIOS except

A. Ctrl+Shift+Esc

B. Del

C. F5

D. Shift+F1

94. Which Windows error is caused by an application being “greedy” and taking memory away from other programs?

A. General Protection Fault

B. General System Error

C. Memory Protection Fault

D. System Fault

95. What tool is used to check a machine for hard drive errors?

A. Disk Cleanup

B. Disk Fragmenter

C. Scandisk

D. System Monitor

96. When a drive is partitioned, what is the partition that is created called?

A. Expanded partition

B. Extended partition

C. Primary partition

D. Secondary partition

97. You are using your USB port for your scanner. What is the preferred method for swapping your scanner with a previously configured digital camera?

A. Shut the computer down, disconnect the scanner, connect the digital camera, and then turn the computer back on.

B. Hot-swap the devices by disconnecting the scanner and hooking up the digital camera while the computer stays on.

C. Turn off the scanner, disconnect it and connect the digital camera and reboot the system

D. None of the above. Digital cameras will not work on a USB port.

98. FireWire, or IEEE 1394 is used for

A. Downloading large video files to a PC

B. The preferred method for linking multiple peripherals

C. Providing dirct access to the Internet, bypassing the modem

D. Activating explosives via the computer

99. The most common error that happens in Windows when a program accesses memory that another program is using or when a program accesses a memory address that doesn’t exist is called

A. General protection fault

B. Windows protection error

C. Illegal operation

D. System lock-up

100. Which of the following statements is true regarding DRAM and SRAM?

A. DRAM is used as cache memory because it is available in higher capacities than SRAM

B. DRAM is used as main memory because it is cheaper than SRAM

C. SRAM is used as main memory because it is faster than DRAM

D. SRAM requires a constant power refresh

ANSWER KEY

|NO. |ANSWER |NO. |ANSWER |NO. |ANSWER |NO. |ANSWER. |

| |A | |D | |C | |D |

| |D | |C | |B | |D |

| |B | |B | |A | |A |

| |A | |B | |C | |D |

| |D | |A | |C | |C |

| |B | |C | |A | |D |

| |A | |B | |D | |C |

| |B | |D | |C | |A |

| |B | |C | |D | |C |

| |A | |A | |D | |C |

| |C | |B | |B | |D |

| |B | |B | |D | |A |

| |C | |C | |C | |C |

| |B | |B | |C | |B |

| |A | |B | |D | |B |

| |A | |A | |A | |D |

| |C | |C | |D | |B |

| |B | |D | |C | |C |

| |D | |B | |B | |A |

| |D | |C | |C | |C |

| |C | |D | |A | |C |

| |D | |B | |B | |B |

| |A | |C | |D | |A |

| |D | |B | |A | |A |

| |A | |D | |D | |B |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download