INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2015

Page 1 of 10

INFORMATION

TECHNOLOGY CONCEPTS

(391)

—OPEN EVENT—

REGIONAL – 2015

DO NOT WRITE ON TEST BOOKLET

TOTAL POINTS______(500)

Failure to adhere to any of the following rules will result in disqualification:

  1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification.
  2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area.
  3. Electronic devices will be monitored according to ACT standards.

No more than 60 minutes testing time

Property of Business Professionals of America.

May be reproduced only for use in the Business Professionals of America

Workplace Skills Assessment Program competition.

Identify the letter of the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. (10 pts. each)

If you finish before the end of the 60 minutes testing, notify the proctor. Time may be a factor in determining the winner of the event of a tie.

  1. A____ is a personal computer similar in size and thickness to a notepad; a user uses a stylus or digital pen on a touch screen.
  2. super computer
  3. tablet PC
  4. personal PC
  5. PDA
  6. ____ is a computer that accepts input directly onto an LCD screen rather than via a keyboard or mouse.
  7. super computer
  8. tablet PC
  9. embedded computer
  10. integrated computer
  11. ____ is a type of printer which prints text and images by spraying tiny droplets of ink onto paper.
  12. inkjet printer
  13. dot-matrix printer
  14. laser printer
  15. thermal printer
  16. Which of the following is an advantage of an inkjet printer?
  17. good for high-volume printing
  18. easily highlight over the printed text on paper
  19. printing speed is the fastest compared to other printers
  20. capable of printing vivid colors and best for printing pictures
  21. Which of the following best describes a dot-matrix printer?
  22. a printer that prints text and images by spraying tiny droplets of ink onto paper
  23. an impact printer that produces text and graphics when tiny wire pins on the print head strike the ink ribbon
  24. non-impact printers which can print text and images in high speed
  25. pushes electrically heated pins against heat-sensitive paper
  1. Which of the following would be best suited for scanning pictures?
  2. Photo Scanner
  3. Flatbed Scanner
  4. Portable Scanner
  5. ADF Scanner
  6. ____ is defined as: “a global system of interconnected computer networks that use the TCP/IP protocol suite to serve billions of users worldwide.”
  7. World Wide Web
  8. Computer Network
  9. Internet
  10. ARPANET
  11. Which of the following terms applies to all of the web pages for Amazon.com?
  12. Top-level domain
  13. Web site
  14. Web site address
  15. Web domain
  16. Software such as Google Chrome and Mozilla Firefox are referred to as ____.
  17. System software
  18. Internet Browsers
  19. Utility Software
  20. Internet Tools
  21. What type of telecommunication hardware allows you to access the Web?
  22. Browser
  23. Modem
  24. FTP protocol
  25. IRC
  26. From this list, which of the following is the most current Operating System?
  27. Windows 7
  28. Microsoft 2013
  29. Microsoft Windows 2010
  30. Windows 8
  1. Which of the following is not considered a word processor?
  2. Microsoft Word
  3. Pages
  4. Microsoft Publisher
  5. Google Docs
  6. In spreadsheet software, a function formula has two components and they are:
  7. Operand and operator
  8. Multiplication and division
  9. Numbers and cell reference
  10. Absolute and relative values
  1. A possible solution for a non-working printer is to check if the printer ____.
  2. is turned on
  3. has paper
  4. has a cable connected to the computer
  5. all of the above
  6. When purchasing software programs, you also purchase with the software a _____; this gives a single computer user the permission to use the program.
  7. Network license
  8. User agreement
  9. Service pack
  10. Software license
  11. _____ are applications without the need for a platform and do not require installation and are accessible by any modern browser.
  12. HTML5 applications
  13. updates
  14. web applications
  15. online software
  16. Another word for software is ____.
  17. interface
  18. hardware
  19. algorithm
  20. program
  1. A ____ is a program written to cause corruption of data on a computer.
  2. Worm
  3. Logic bomb
  4. Virus
  5. Trojan horse
  6. Phishing is a type of email ____.
  7. listing
  8. controller
  9. fraud
  10. hardware
  1. ____ software should always be running on a computer to protect data and programs from corruption or destruction.
  2. Biometrics
  3. Firewall
  4. Anti-Virus
  5. Public Detection Intrusion
  6. Which of the following defines a differential backup?
  7. Backs up all files since the last full backup
  8. Backs up all the files that have changed since the last incremental or full
  9. Backs up all files
  10. Backs up all files since the last differential
  11. Which of the following defines an incremental backup?
  12. Backs up all files since the last full backup
  13. Backs up all the files that have changed since the last incremental or full
  14. Backs up all files
  15. Backs up all files since the last differential
  16. What does VOIP stand for?
  17. Video Over Internet Protocol
  18. Voice Over Internal Phones
  19. Video On Internal Pipe
  20. Voice Over Internet Protocol
  1. What does SIP stand for?
  2. Session Initiation Protocol
  3. System In Progress
  4. System Integration Plan
  5. Session Internet Protocol
  6. What does TCP stand for?
  7. Transmission Control Protocol
  8. Transport Control Protocol
  9. Transmission Communication Protocol
  10. Transit Control Protocol
  11. What does IP stand for?
  12. Internetwork Protocol
  13. Internet Protocol
  14. Internal Protocol
  15. Intermission Protocol
  1. What are the two different types of mice?
  2. Roller ball and optical
  3. Laser and friction
  4. Tactile and optical
  5. None of the above
  6. Which type of network media is subject to eavesdropping?
  7. Coaxial
  8. Wireless
  9. Fiber optic
  10. Shielded twisted pair
  11. What is software that self-installs on a computer, enabling information to be gathered covertly about a person’s Internet use and passwords?
  1. Malware
  2. Spyware
  3. Virus
  4. Trojan Horse
  1. What is the protocol developed by Netscape used by websites to transmit documents securely across the Internet.
  1. HTTPS
  2. SSL
  3. TLS
  4. IIS
  1. Which of the following devices is used to connect multiple computers to the network where one wall jack is available?
  1. Network Router
  2. Network Switch
  3. Network Interface Card
  4. Both A and B
  1. What is software that is installed on a computer and is designed to mimic legitimate software and disables system software?
  1. Malware
  2. Spyware
  3. Virus
  4. Rootkit
  1. What is the transmission speed of a 100BaseT network?
  1. 1 Mbps
  2. 10 Mbps
  3. 100 Mbps
  4. 1000 Mbps
  1. Which of the following TCP/IP commands can be used to enter commands on a remote computer?
  2. ARP
  3. Netstat
  4. FTP
  5. Telnet
  1. Which network protocol is best suited for transferring files and data from one computer to the next?
  2. HTTP
  3. FTP
  4. NetBUI
  5. AppleTalk
  6. A(n) ____ is an instruction that causes a program or utility to respond to the user?
  7. window
  8. icon
  9. dialog
  10. command
  11. What utility would a technician use to view the current processing running on the system?
  12. Event Viewer
  13. Task Manager
  14. Disk Utility
  15. System Monitor
  16. Which of these types of computers would be a good choice for a salesperson who spends most of the day visiting customers?
  17. Mainframe computer
  18. Network computer
  19. Personal computer
  20. Laptop
  1. You have a customer data file that is approximately 45MB in size. You need to have fast access to any part of this file and to edit information that it contains frequently. Which of these storage devices would be most appropriate for storing this file?
  2. Zip disk
  3. Floppy Disk
  4. Flash Drive
  5. Hard drive
  1. Which of the following activities is permissible under copyright law?
  2. Downloading a bootleg copy of a new rock CD from the Internet
  3. Making a backup of a software program as permitted by the EULA
  4. Typing an article from a current magazine and making digital copies for your friends
  5. Scanning photographs from a coffee-table book for use as computer wallpaper
  6. Every computer connected directly to the network via cable or a phone line with at least one other computer is called a(n):
  7. Internet
  8. Network Computer
  9. World Wide Web
  10. Gateway
  11. What is the function of a firewall?
  12. To protect the computer fromaccessing inappropriate context
  13. To protect the computer from releasing information on the Internet
  14. To monitor and protect the computer from incoming and/or outgoing malicious traffic
  15. To protect the internal data of the network by providing a second copy of data
  16. Which of the following is an input device?
  17. Monitor
  18. Printer
  19. Scanner
  20. Speakers
  21. The physical parts of the computer are called:
  22. Software
  23. Operating system
  24. Hardware
  25. Components
  1. _____ is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system.
  2. CPU
  3. RAM
  4. SDRAM
  5. CD-ROM
  6. Which of the following stores important information related to the starting of a computer?
  7. DRAM
  8. CMOS memory
  9. Cache memory
  10. BIOS
  11. What component of the computer converts AC to DC?
  12. Surge protector
  13. UPS
  14. Voltage regulator
  15. Power supply
  16. With respect to a network interface card, the term 10/100 refers to:
  17. Protocol speed
  18. Fiber speed
  19. Megabits per seconds
  20. Minimum and maximum server speed
  21. Missing slot covers on a computer case can cause?
  22. overheating
  23. power surges
  24. EMI
  25. Incomplete path for ESD
  26. Electrostatic Discharge (ESD) would cause the most damage to which component?
  27. Power supply
  28. Motherboard
  29. Monitor
  30. Keyboard