Download INFORMATION TECHNOLOGY CONCEPTS (54)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Bus (computing) wikipedia , lookup

Computer security wikipedia , lookup

Transcript
8 Pages
Contestant Number____________
Total Work Time____________
Rank____________
INFORMATION TECHNOLOGY
CONCEPTS (55)
—OPEN EVENT—
Regional—2006
Objective Questions (60 @ 10 points each)
TOTAL POINTS
_______ (600 pts.)
_______ (600)
Failure to adhere to any of the following rules will result in disqualification:
1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in
disqualification.
2. No equipment, supplies, or materials other than those specified for this event are allowed in the
testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or
keyed) are allowed in the testing area.
3. Electronic devices will be monitored according to ACT standards.
Do NOT open test booklet until instructed to do so.
Property of Business Professionals of America.
May be reproduced only for use in the Business Professionals of America
Workplace Skills Assessment Program regional competition.
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 2 of 8
True/False Directions: Using the Scantron scoring sheet provided, mark Column A if
the statement is True; mark Column B if the statement is False.
1. ROM is memory that can be both read and written to.
2. You can increase your computer’s memory capacity by adding an additional hard drive.
3. A company can connect to a branch office in another state by using a LAN.
4. A network interface card is used to connect a computer to a network.
5. MS FrontPage software is used to produce long documents.
6. System performance is affected by the degree of fragmentation in hard disk file placement.
7. A printer is most often connected through a computer’s serial port.
8. An operating system creates a common platform for all the software used by the computer.
9. Telephony refers to the integration of computer technology in cell phones.
10. Plug and Play is a mechanism for easing the installation of new software on your system
11. The process of dividing a disk into tracks and sectors for storing information in an orderly
fashion is called formatting.
12. By tapping the left mouse button once, a menu screen appears.
13. Toner is a fine powder used in thermal printers.
14. Prevention of RSI is an ergonomic issue.
15. In spreadsheets, rows are designated by letters.
16. The insertion point in MS Word is automatically repositioned when you scroll through a
document.
17. One problem with First and Second generation programming languages was that they
were specific to one type of computer and would usually not run with a different type of
CPU.
18. Spreadsheet software is often used to assist with what-if analysis.
19. The ESRB is an organization whose purpose is to identify the age-appropriateness of video
and computer games.
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 3 of 8
20. The terms “Internet” and “World Wide Web” are synonymous.
21. An IP address is composed of a protocol and domain name.
22. Yahoo! is an example of a search engine.
23. Using all uppercase characters in a chat room discussion is considered to be a breach of
proper “netiquette..”
24. The general category of application software refers to software that helps perform personal
or business tasks.
25. Clip art is a feature of many kinds of paint and image editing software and involves cutting,
pasting and merging images.
Multiple Choice: Identify the letter of the choice that best completes the statement or
answers the question.
26.
The process of testing and rewriting software to eliminate its flaws is called
A. Compiling
B. Interpreting
C. Interfacing
D. Debugging
27.
The Mylar disk upon which data is written in a floppy is known as a(n)
A. Cylinder
B. Cookie
C. Diskette
D. Cluster Byte
28.
The most popular pointing device for graphical interfaces in both Windows and the
Macintosh OS is
A. The Eraserhead
B. The Digitizing Table
C. Touchpad
D. The Mouse
29.
The joystick tells the computer how it is moving by using
A. Roller Balls
B. Two Pairs of Contact Bars
C. Two Rollers Mounted at a 90 degree Angle to Each Other
D. X-Y Axis Coordinates
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 4 of 8
30. A sheet of plastic onto which metallic circuits have been printed and containing slots for
other components is called
A. Daughterboard
B. Motherboard
C. Expansion Slot
D. CPU
31. A hard drive is an example of a device that is
A. Volatile
B. Nonvolatile
C. Analog
D. Interlaced
32. In the SVGA monitor usually the DAC circuit is contained within one specialized chip,
which contains three ______________ to produce color.
A. DAC’s
B. SVGA Adapters
C. Magnetic Deflection Yokes
D. Interlacing CRT Tubes
33. A modem
A. Demodulates a Digital Signal into an Analog Signal
B. Modulates an Analog Signal into a Digital Signal
C. Modulates a Digital Signal into an Analog Signal
D. Both A and C
34. Transmission speeds, the number of frequency changes occurring during one second, are
sometimes expressed in bauds, an outdated term. The more accurate term used today is
A. Hertz
B. Giga-Hertz
C. Bytes per Second
D. Bits per Second
35. The representation of a fact or idea is called
A. Information
B. Code
C. Hardware
D. Data
36. Data that has been organized into a meaningful way is called
A. Filed Data
B. Coded Data
C. Information
D. Data-eze
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 5 of 8
37. Digital light processing (DLP) produces brighter, sharper images than the old overhead
transparency projectors. DLP works by shining a light through a spinning wheel divided
into _____________ filters
A. Lens
B. LCD
C. Red, Blue and Green
D. Bias/Reset
38. The application of computer techniques and systems to gather potential legal evidence is
A. Cyber Policing
B. Digital Investigation
C. Internet Police Investigation (IPI)
D. Computer Forensics
39. Windows 98 enhanced Windows 95 in all of the following ways except
A. Customizable Taskbar
B. Customizable Desktop Backgrounds
C. Additional File Protection
D. Graphical Interface Operating System
40. The part of the system unit responsible for the processing is the
A. CPU
B. System Unit Board
C. Motherboard
D. Memory
41. Mice and keyboards are examples of
A. System Units
B. Input Devices
C. Output Devices
D. Application Devices
42. Point of sales terminals are used primarily by
A. Retail Employees
B. Factory Workers
C. Customers
D. E-Commerce Users
43. What does RAM stand for?
A. Realtime Accessible Memory
B. Random Access Memory
C. Registered Application Module
D. Remotely Accessible Machine
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 6 of 8
44. A properly positioned monitor is at least __________ inches from your eyes.
A. 12
B. 25
C. 18
D. 40
45. The word router is most synonymous to
A. Hub
B. Channel
C. Gateway
D. Adapter
46. If the operating system runs out of RAM to store required data and/or instructions, the
system borrows space from the hard drive. This is called
A. Thrashing
B. File Swapping
C. Paging
D. Virtual Memory
47. A warm boot is when you
A. Do a complete power down and restart the computer after it has been on for over an hour.
B. Restart the system while it is powered on.
C. Power down the system from hibernation mode, and then restart the computer.
D. Power down the system from standby mode, and then restart the computer.
48. An applied science concerned with designing and arranging things people use so that the
people and things interact most efficiently and safely is
A. Ergonomics
B. OSHA
C. RSI
D. FOLED
49. The type of printer that prints by selectively uncharging electricity from spots on a metal
drum is a(n)
A. Plotter
B. Laser Printer
C. Dot Matrix Printer
D. Inkjet Printer
50. In older versions of Windows a warm boot is performed by
A. Typing the Alt + Tab key combination
B. Selecting Hibernate or Standby when shutting down
C. Pressing the Power Switch
D. Typing the Ctrl + Alt + Delete key combination
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 7 of 8
51. Programs that sometimes piggy back on other software being downloaded and run in the
background of your system gathering information about you from your computer usage, then
periodically transmitting that information to their originators are called
A. Worms
B. Spyware
C. Backdoor Programs
D. Cut Cookies
52. Using MS Word, which method can be used to select a paragraph?
A. Double-Click Anywhere in the Paragraph
B. Triple-Click Anywhere in the Paragraph
C. Triple-Click Anywhere in the Left Margin
D. None of the Above
53. Which of the following was the first language intended for commercial use?
A. COBOL
B. Fortran
C. Jovial
D. Pascal
54. Almost all computers have a hard drive residing in a(n)
A. Internal Drive Bay
B. Expansion Card
C. Motherboard
D. External Drive Bay
55. The storage capacity of a typical PC hard drive is usually in
A. Terabytes
B. Gigahertz
C. Megahertz
D. Gigabytes
56. Two or more computers connected together via software and hardware so that they can
communicate with each other is a(n)
A. ANSI
B. Database Connection
C. Network
D. Web Server
57. A program that appears to be something useful or desirable, but at the same time does
something malicious in the background without your knowledge is called a(n)
A. Zombie
B. Trojan Horse
C. Worm
D. Virus
INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT
REGIONAL 2006
PAGE 8 of 8
58. Which of the following is the oldest programming language still used today?
A. COBOL
B. Fortran
C. Jovial
D. Pascal
59. When using MS Office the Title Bar
A. Contains the words: File; Edit; View; etc.
B. Contains the symbols: Sheet of Paper; Folder; Floppy Disk; Printer; etc.
C. Contains the name of the font being used; Size of Font; “B”; “I”; “U”; etc.
D. Is in blue at the very top of the screen
60. In the common spreadsheet there are __________ columns.
A. 148
B. 212
C. 256
D. 325