Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
8 Pages Contestant Number____________ Total Work Time____________ Rank____________ INFORMATION TECHNOLOGY CONCEPTS (55) —OPEN EVENT— Regional—2006 Objective Questions (60 @ 10 points each) TOTAL POINTS _______ (600 pts.) _______ (600) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. Do NOT open test booklet until instructed to do so. Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program regional competition. INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 2 of 8 True/False Directions: Using the Scantron scoring sheet provided, mark Column A if the statement is True; mark Column B if the statement is False. 1. ROM is memory that can be both read and written to. 2. You can increase your computer’s memory capacity by adding an additional hard drive. 3. A company can connect to a branch office in another state by using a LAN. 4. A network interface card is used to connect a computer to a network. 5. MS FrontPage software is used to produce long documents. 6. System performance is affected by the degree of fragmentation in hard disk file placement. 7. A printer is most often connected through a computer’s serial port. 8. An operating system creates a common platform for all the software used by the computer. 9. Telephony refers to the integration of computer technology in cell phones. 10. Plug and Play is a mechanism for easing the installation of new software on your system 11. The process of dividing a disk into tracks and sectors for storing information in an orderly fashion is called formatting. 12. By tapping the left mouse button once, a menu screen appears. 13. Toner is a fine powder used in thermal printers. 14. Prevention of RSI is an ergonomic issue. 15. In spreadsheets, rows are designated by letters. 16. The insertion point in MS Word is automatically repositioned when you scroll through a document. 17. One problem with First and Second generation programming languages was that they were specific to one type of computer and would usually not run with a different type of CPU. 18. Spreadsheet software is often used to assist with what-if analysis. 19. The ESRB is an organization whose purpose is to identify the age-appropriateness of video and computer games. INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 3 of 8 20. The terms “Internet” and “World Wide Web” are synonymous. 21. An IP address is composed of a protocol and domain name. 22. Yahoo! is an example of a search engine. 23. Using all uppercase characters in a chat room discussion is considered to be a breach of proper “netiquette..” 24. The general category of application software refers to software that helps perform personal or business tasks. 25. Clip art is a feature of many kinds of paint and image editing software and involves cutting, pasting and merging images. Multiple Choice: Identify the letter of the choice that best completes the statement or answers the question. 26. The process of testing and rewriting software to eliminate its flaws is called A. Compiling B. Interpreting C. Interfacing D. Debugging 27. The Mylar disk upon which data is written in a floppy is known as a(n) A. Cylinder B. Cookie C. Diskette D. Cluster Byte 28. The most popular pointing device for graphical interfaces in both Windows and the Macintosh OS is A. The Eraserhead B. The Digitizing Table C. Touchpad D. The Mouse 29. The joystick tells the computer how it is moving by using A. Roller Balls B. Two Pairs of Contact Bars C. Two Rollers Mounted at a 90 degree Angle to Each Other D. X-Y Axis Coordinates INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 4 of 8 30. A sheet of plastic onto which metallic circuits have been printed and containing slots for other components is called A. Daughterboard B. Motherboard C. Expansion Slot D. CPU 31. A hard drive is an example of a device that is A. Volatile B. Nonvolatile C. Analog D. Interlaced 32. In the SVGA monitor usually the DAC circuit is contained within one specialized chip, which contains three ______________ to produce color. A. DAC’s B. SVGA Adapters C. Magnetic Deflection Yokes D. Interlacing CRT Tubes 33. A modem A. Demodulates a Digital Signal into an Analog Signal B. Modulates an Analog Signal into a Digital Signal C. Modulates a Digital Signal into an Analog Signal D. Both A and C 34. Transmission speeds, the number of frequency changes occurring during one second, are sometimes expressed in bauds, an outdated term. The more accurate term used today is A. Hertz B. Giga-Hertz C. Bytes per Second D. Bits per Second 35. The representation of a fact or idea is called A. Information B. Code C. Hardware D. Data 36. Data that has been organized into a meaningful way is called A. Filed Data B. Coded Data C. Information D. Data-eze INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 5 of 8 37. Digital light processing (DLP) produces brighter, sharper images than the old overhead transparency projectors. DLP works by shining a light through a spinning wheel divided into _____________ filters A. Lens B. LCD C. Red, Blue and Green D. Bias/Reset 38. The application of computer techniques and systems to gather potential legal evidence is A. Cyber Policing B. Digital Investigation C. Internet Police Investigation (IPI) D. Computer Forensics 39. Windows 98 enhanced Windows 95 in all of the following ways except A. Customizable Taskbar B. Customizable Desktop Backgrounds C. Additional File Protection D. Graphical Interface Operating System 40. The part of the system unit responsible for the processing is the A. CPU B. System Unit Board C. Motherboard D. Memory 41. Mice and keyboards are examples of A. System Units B. Input Devices C. Output Devices D. Application Devices 42. Point of sales terminals are used primarily by A. Retail Employees B. Factory Workers C. Customers D. E-Commerce Users 43. What does RAM stand for? A. Realtime Accessible Memory B. Random Access Memory C. Registered Application Module D. Remotely Accessible Machine INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 6 of 8 44. A properly positioned monitor is at least __________ inches from your eyes. A. 12 B. 25 C. 18 D. 40 45. The word router is most synonymous to A. Hub B. Channel C. Gateway D. Adapter 46. If the operating system runs out of RAM to store required data and/or instructions, the system borrows space from the hard drive. This is called A. Thrashing B. File Swapping C. Paging D. Virtual Memory 47. A warm boot is when you A. Do a complete power down and restart the computer after it has been on for over an hour. B. Restart the system while it is powered on. C. Power down the system from hibernation mode, and then restart the computer. D. Power down the system from standby mode, and then restart the computer. 48. An applied science concerned with designing and arranging things people use so that the people and things interact most efficiently and safely is A. Ergonomics B. OSHA C. RSI D. FOLED 49. The type of printer that prints by selectively uncharging electricity from spots on a metal drum is a(n) A. Plotter B. Laser Printer C. Dot Matrix Printer D. Inkjet Printer 50. In older versions of Windows a warm boot is performed by A. Typing the Alt + Tab key combination B. Selecting Hibernate or Standby when shutting down C. Pressing the Power Switch D. Typing the Ctrl + Alt + Delete key combination INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 7 of 8 51. Programs that sometimes piggy back on other software being downloaded and run in the background of your system gathering information about you from your computer usage, then periodically transmitting that information to their originators are called A. Worms B. Spyware C. Backdoor Programs D. Cut Cookies 52. Using MS Word, which method can be used to select a paragraph? A. Double-Click Anywhere in the Paragraph B. Triple-Click Anywhere in the Paragraph C. Triple-Click Anywhere in the Left Margin D. None of the Above 53. Which of the following was the first language intended for commercial use? A. COBOL B. Fortran C. Jovial D. Pascal 54. Almost all computers have a hard drive residing in a(n) A. Internal Drive Bay B. Expansion Card C. Motherboard D. External Drive Bay 55. The storage capacity of a typical PC hard drive is usually in A. Terabytes B. Gigahertz C. Megahertz D. Gigabytes 56. Two or more computers connected together via software and hardware so that they can communicate with each other is a(n) A. ANSI B. Database Connection C. Network D. Web Server 57. A program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge is called a(n) A. Zombie B. Trojan Horse C. Worm D. Virus INFORMATION TECHNOLOGY CONCEPTS—OPEN EVENT REGIONAL 2006 PAGE 8 of 8 58. Which of the following is the oldest programming language still used today? A. COBOL B. Fortran C. Jovial D. Pascal 59. When using MS Office the Title Bar A. Contains the words: File; Edit; View; etc. B. Contains the symbols: Sheet of Paper; Folder; Floppy Disk; Printer; etc. C. Contains the name of the font being used; Size of Font; “B”; “I”; “U”; etc. D. Is in blue at the very top of the screen 60. In the common spreadsheet there are __________ columns. A. 148 B. 212 C. 256 D. 325