1
NEW YORK STATE FBLA
INTRODUCTION TO TECHNOLOGY CONCEPTS
2008
PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO
Test Directions
1. Complete the information requested on the answer sheet.
PRINT YOUR NAME on the “Name” line.
PRINT the name of the event, INTRODUCTION TO TECHNOLOGY CONCEPTS on the “Subject” line.
PRINT the name of your CHAPTER on the “DATE” line.
2. All answers will be recorded on the answer sheet.
Please do not write on the test booklet.
Scrap paper will be provided.
3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it.
4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed.
5. Tie will be broken using the last 10 questions of the test.
1. This is the area of a computer that temporarily holds data that is waiting to be processed, stored, or output.
A. Memory
B. Storage
C. Input
D. Output
2. Which is an example of a public computer data network?
A. Arpanet
B. Search engine
C. Web browser
D. World Wide Web
3. The first computer used in business was the
A. UNIVAC
B. ENIAC
C. McIntosh
D. Gateway
4. Data is processed in the
A. Central Processing Unit
B. Memory Chip
C. Storage Unit
D. Personal Digital Assistant
5. An unauthorized group of instructions inserted into a software program in order to disrupt or destroy the program is called
A. Code
B. Password
C. Sensor
D. Virus
6. Which activity would damage information on a floppy disk?
A. Stacking disks on top of each other
B. Placing them on a TV
C. Changing passwords
D. Rebooting the computer with the disk still inserted in the drive
7. The smallest unit of a spreadsheet is a
A. Cell
B. Column
C. Range
D. Row
8. Which software program is best for creating logo designs?
A. Database
B. Graphics
C. Spreadsheet
D. Telecommunications
9. A computer ___ is two or more computers or devices that are connected for the purpose of sharing data and programs.
A. Matrix
B. Network
C. Panel
D. PDA
10. A personal computer that requests data from a server is called a
A. client
B. circuit
C. Mask
D. PDA
11. A(n) ____ system, such as Windows, UNIX, or Mac OS, is essentially the master controller for all of the activities that take place within a computer system.
A. Control
B. Matrix
C. Operating
D. Panel
12. In a database file, all the data about an individual company is called a
A. Field
B. Record
C. Report
D. Row
13. Which peripheral is an output device?
A. Joystick
B. Mouse
C. Printer
D. Scanner
14. Which computer is also called a personal computer?
A. Mainframe
B. Microcomputer
C. Minicomputer
D. Supercomputer
15. The intersection of a row and column in a spreadsheet is called a
A. Cell
B. Formula
C. Range
D. Value
16. A computer ___ designs and tests new hardware products, such as computer chips, circuit boards, computers, and peripheral devices.
A. Engineer
B. Operator
C. Programmer
D. Specialist
17. A(n) ___ is typically used as an electronic appointment book, address book, calculator, and notepad.
A. ADP
B. PAD
C. PDA
D. DPA
18. Data becomes ____ when it is presented in a format that people can understand and use.
A. Figures
B. Information
C. Records
D. Symbolic
19. An example of an “always on” connection to the Internet is
A. dial-up
B. cable modem
C. DSL
D. Both B & C
20. A ___ is small and lightweight, giving it the advantage of portability.
A. Macrocomputer
B. Microcomputer
C. Minicomputer
D. Notebook computer
21. In a spreadsheet, the term “global format” refers to
A. one cell
B. one row
C. all cells
D. all documents
22. Which database command is used to find a specific piece of information?
A. Insert
B. Replicate
C. Report
D. Query
23. A library keeps a file that includes the title, author and subject of each of its books. Which type of software is best for this task?
A. Database
B. Graphics
C. Spreadsheet
D. Word Processing
24. Which function does the cursor reach the end of a line and then move directly to the next line in a word processing application?
A. Field extention
B. File naming
C. Word search
D. Word wrap
25. Which item would be considered output by an architectural agency?
A. Blueprint
B. CAD program
C. Construction schedule
D. Energy
26. Which formula represents the multiplication of two numbers?
A. =sum(D1-C1)
B. =sum(sum(C1:C10)
C. =C1xD1
D. =C1*D1
27. The title of a spreadsheet or the identifier for a column or row is called a
A. Default
B. Format
C. Label
D. Legend
28. Typically, this kind of software testing is conducted by a team of off-site testers, such as a professional testing company.
A. Alpha
B. Beta
C. Epsilon
D. Gamma
29. The 1990’s spawned a group of Internet-based companies that are referred to as
A. Cyber coms
B. Dot coms
C. Intercoms
D. Net coms
30. ___ refers to selecting part of an image.
A. Cropping
B. Interpolation
C. Pixelation
D. Resolution
31. Most digital cameras store photographic images in ____ format(s).
A. AIFF
B. GIF
C. JPEG
D. TIFF
32. A ____ is a smooth blending of shades from one color to another, or from light to dark.
A. Dither
B. Gradient
C. Metafile
D. Trace
33. Web page videos typically use ___ video which transmits the first segment of video, begins to play it, and then continues to transfer additional segments.
A. Internal
B. External
C. Rendering
D. Streaming
34. Camera manufacturers sometimes express the resolution of digital cameras as
A. Kilopixels
B. Gigapixels
C. Megapixels
D. Micropixels
35. Small Java applications are called Java ____.
A. Applets
B. Fragments
C. Frames
D. Servlets
36. A conveniently small and portable sized peripheral that allows you to store larger sized files is a ______.
A. Compact card
B. Flash drive
C. Firewire
D. Zoom
37. In order to quickly capture video footage from a digital video camera to a computer system using the fastest speed available, you would use _____.
A. Dazzle
B. Firewire
C. RCA cables
D. USB cables
38. The ____ is the communications network that carries Web data.
A. WC3
B. Intranet
C. Internet
D. Java Virtual Network
39. The Web is based on the concept of ____, a collection of documents that can be related by links.
A. Cookies
B. Hypertext
C. Ports
D. Tags
40. A(n) ___ typically maintains the devices that provide subscribers with e-mail and access to the Web.
A. DNS
B. ISP
C. Modem
D. Workstation
41. ___ refers to the set of rules for efficiently transmitting data from one network node to another.
A. Communications protocol
B. Ethernet policy
C. Parity
D. Simplex
42. Which word processing command is used to move up and down through text on a computer screen?
A. Hanging indent
B. Return
C. Scroll
D. Tab
43. Which function is used to arrange records in a file from a database?
A. Add
B. Delete
C. Search
D. Sort
44. Setting the margins and the spacing for a document is called
A. Copying
B. Formatting
C. Inserting
D. Saving
45. Which computer output device is used to create the final product of a word processing project?
A. Monitor
B. Plotter
C. Printer
D. Video disk
46. Which type of data consists of values?
A. Character/alpha
B. Field
C. Global
D. numeric
47. Line spacing in a text document can be changed by changing the
A. Center point
B. Default
C. Margins
D. Mode
48. Which type of software is most likely used to produce a company’s financial statements?
A. Database
B. Graphics
C. Spreadsheet
D. Word processing
49. Which kind of chart best shows the relationship of the parts to the total?
A. bar chart
B. pie chart
C. text chart
D. Line chart
50. A ___ is a device that is connected to at least two networks – sort of like a spider sitting in the middle of a web.
A. Gateway
B. Hub
C. Repeater
D. Router
51. ___ is a protocol that works with TCP/IP to get Web resources to your desktop.
A. FTP
B. HTML
C. HTTP
D. URL
52. A ___ connects several nodes of a LAN.
A. Gateway
B. Hub
C. Repeater
D. Router
53. A non-functioning link is called a(n) ____ link.
A. Broken
B. Concomitant
C. Legendary
D. Unfound
54. The resolution of a computer monitor depends on the number of small dots the screen can produce. These small dots of light are called
A. Axes
B. Legends
C. Pixels
D. Sets
55. Vertical lines of information on a spreadsheet are called
A. Blocks
B. Cells
C. Columns
D. Rows
56. An example of a graphics software program that creates vector graphics is
A. Adobe Illustrator
B. Microsoft Excel
C. Microsoft Publisher
D. Microsoft Word
57. The computer term that refers to the heaviness or thickness of a stroke is
A. Fill
B. Style
C. Swatch
D. Weight
58. Which software program would be used to create a magazine?
A. Access
B. Excel
C. InDesign
D. Microsoft Word
59. Unlike disk storage, most RAM is
A. Integrated
B. Non-volatile
C. Virtual
D. Volatile
60. A(n) _____ circuit is a super-thin slice of semi-conducting material packed with microscopic circuit elements such as wires, transistors, capacitors, logic gates, and resistors.
A. Analog
B. Digital
C. Ion
D. Integrated
61. CD-___ technology allows you to write data on a CD, then change that data at a later time.
A. R
B. RW
C. W
D. All of the above
62. CD and DVD storage can be classified as ____ storage.
A. Analog
B. Digital
C. Magnetic
D. Optical
63. Hard disk and tape storage technologies can be classified as ____ storage.
A. Analog
B. Digital
C. Magnetic
D. Optical
64. ___ access is the ability of a device to “jump” directly to the requested data.
A. Jump
B. Quick
C. Random
D. Sequential
65. Every web page has a unique address called a(n)
A. FTP
B. HTTP
C. Protocol
D. URL
66. By using a computer _____, your computer never misses one of your keystrokes, no matter how fast you type.
A. Buffer
B. Command-line interface
C. GUI
D. Both B & C
67. ____ is copyright software marketed under the “try before you buy” policy.
A. Freeware
B. Open source software
C. Public domain software
D. Shareware
68. A(n) ____ is text that you specify to automatically appear in the top margin of every page.
A. Abbreviation
B. Footer
C. Header
D. Structure
69. Using the ___ key as you click each item works well to select files that are not listed consecutively.
A. Alt
B. Ctrl
C. F1
D. Shift
70. You can _____ to rearrange the files on a disk so that they are stored in contiguous clusters, speeding up the computer system.
A. Compress
B. Compact
C. Defragment
D. Decompress
71. Files with a ____ extension appear in the Open list when you are working with Microsoft Word software.
A. .doc
B. .ppt
C. .psd
D. .xls
72. How many bits are in a byte?
A. 4
B. 10
C. 12
D. 15
73. Which backup type backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?
A. Copy
B. Differential
C. Full
D. Incremental
74. This access method “fights” for the transmission media. Its drawback is that collisions happen quite often.
A. Contention
B. Polling
C. Token passing
D. None of the above
75. A piece of hardware that deals with attenuation problems is called a:
A. NAC
B. NIC
C. Passive Hub
D. Repeater
76. This is the area in RAM set aside for a device and its drivers to use.
A. DMA channel
B. IRC
C. IRQ
D. Memory address
77. What is the expansion slot on laptops commonly called?
A. FDDI
B. IEEE
C. ITU-T
D. PCMCIA
78. What numbering system do computers use for data processing?
A. Binary
B. Decimal
C. Hexadecimal
D. Octal
79. When Virtual Basic saves a file, it adds the extension _____ to the file name.
A. .exe
B. .frm
C. .prg
D. .vbp
80. One billion bytes is called a _________, and typical hard disk sizes range from 10 to 75 billion bytes.
A. Dekabyte (DB)
B. Kibobyte (KB)
C. Gigabyte (GB)
D. Megabyte (MB)
81. A hertz is defined as
A. 4 cycles per second
B. 3 cycles per second
C. 5 pulses per second
D. 1 pulse per second
82. Voice mail
A. involves using video and computer technology to conduct a meeting between participants at geographically separate locations.
B. is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the internet.
C. functions much like an answering machine, allowing callers to leave a voice message for the called party.
D. permits users to converse in real time with each other via the computer while connected to the Internet.
83. The paragraph mark (¶) is a formatting mark that indicates where the ____ was pressed.
A. ENTER key
B. SHIFT key
C. SPACEBAR key
D. TAB key
84. The series of electronic pulses created by the CPU at a predetermined rate that affect machine cycle time is called
A. A megahertz
B. An ALU cycle speed
C. Clock speed
D. Cycle speed
85. An internet utility called _____ sends a signal to a specific internet address and waits for a reply.
A. ICMP (Internet Control Message Protocol)
B. PANG (Packet Acoustic Networking)
C. PING (Packet Internet Groper)
D. Traceroute (TRAC)
86. A _____ is a narrow recording band that forms a full circle on the surface of a disk.
A. Cluster
B. Sector
C. Shutter
D. Track
87. ____ involves running more than one application at the same time.
A. Multitasking
B. Multithreading
C. Spooling
D. Time-sharing
88. Printer resolution is measured by the number of _______ a printer can output.
A. Bits per centimeter (bpc)
B. Characters per page (cpp)
C. Dots per inch (dpi)
D. Pixels per segment (pps)
89. A monitor’s viewable size is the ____ measurement of the actual viewing area provided by the monitor.
A. Area
B. Diagonal
C. Horizontal
D. Vertical
90. PowerPoint is a powerful presentation ____ program.
A. Database
B. Graphics
C. Spreadsheet
D. Word Processing
91. Syntax errors will be caused by all of the following except
A. Leaving out required punctuation
B. Misspelling a command
C. Typing command words out of order
D. Using the wrong control signal
92. COM 1 shares an IRQ with which other COM port?
A. COM 2
B. COM 3
C. COM 4
D. COM 5
93. All of the following are key sequences to access the BIOS except
A. Ctrl+Shift+Esc
B. Del
C. F5
D. Shift+F1
94. Which Windows error is caused by an application being “greedy” and taking memory away from other programs?
A. General Protection Fault
B. General System Error
C. Memory Protection Fault
D. System Fault
95. What tool is used to check a machine for hard drive errors?
A. Disk Cleanup
B. Disk Fragmenter
C. Scandisk
D. System Monitor
96. When a drive is partitioned, what is the partition that is created called?
A. Expanded partition
B. Extended partition
C. Primary partition
D. Secondary partition
97. You are using your USB port for your scanner. What is the preferred method for swapping your scanner with a previously configured digital camera?
A. Shut the computer down, disconnect the scanner, connect the digital camera, and then turn the computer back on.
B. Hot-swap the devices by disconnecting the scanner and hooking up the digital camera while the computer stays on.
C. Turn off the scanner, disconnect it and connect the digital camera and reboot the system
D. None of the above. Digital cameras will not work on a USB port.
98. FireWire, or IEEE 1394 is used for
A. Downloading large video files to a PC
B. The preferred method for linking multiple peripherals
C. Providing dirct access to the Internet, bypassing the modem
D. Activating explosives via the computer
99. The most common error that happens in Windows when a program accesses memory that another program is using or when a program accesses a memory address that doesn’t exist is called
A. General protection fault
B. Windows protection error
C. Illegal operation
D. System lock-up
100. Which of the following statements is true regarding DRAM and SRAM?
A. DRAM is used as cache memory because it is available in higher capacities than SRAM
B. DRAM is used as main memory because it is cheaper than SRAM
C. SRAM is used as main memory because it is faster than DRAM
D. SRAM requires a constant power refresh
ANSWER KEY
|NO. |ANSWER |NO. |ANSWER |NO. |ANSWER |NO. |ANSWER. |
| |A | |D | |C | |D |
| |D | |C | |B | |D |
| |B | |B | |A | |A |
| |A | |B | |C | |D |
| |D | |A | |C | |C |
| |B | |C | |A | |D |
| |A | |B | |D | |C |
| |B | |D | |C | |A |
| |B | |C | |D | |C |
| |A | |A | |D | |C |
| |C | |B | |B | |D |
| |B | |B | |D | |A |
| |C | |C | |C | |C |
| |B | |B | |C | |B |
| |A | |B | |D | |B |
| |A | |A | |A | |D |
| |C | |C | |D | |B |
| |B | |D | |C | |C |
| |D | |B | |B | |A |
| |D | |C | |C | |C |
| |C | |D | |A | |C |
| |D | |B | |B | |B |
| |A | |C | |D | |A |
| |D | |B | |A | |A |
| |A | |D | |D | |B |
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- 1 or 2 374 374 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 374 374 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 711 711 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 711 711 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 693 693 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 693 693 1 0 0 0 1 168 1 1 default username and password
- 1 or 2 593 593 1 0 0 0 1 or 2dvchrbu 168 1 1 default username and password
- 1 or 3 593 593 1 0 0 0 1 or 2dvchrbu 168 1 1 default username and password
- 1 or 2 910 910 1 0 0 0 1 168 1 1 default username and password
- 1 or 3 910 910 1 0 0 0 1 168 1 1 default username and password
- 192 1 or 2 33 33 1 0 0 0 1 1 1 default username and password
- 1 or 2 364 364 1 0 0 0 1 168 1 1 admin username and password