Você está na página 1de 19

NEW YORK STATE FBLA INTRODUCTION TO TECHNOLOGY CONCEPTS

2009
PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO Test Directions 1. Complete the information requested on the answer sheet. PRINT YOUR NAME on the Name line. PRINT the name of the event, INTRODUCTION TO TECHNOLOGY CONCEPTS on the Subject line. PRINT the name of your CHAPTER on the DATE line. 2. All answers will be recorded on the answer sheet. Please do not write on the test booklet. Scrap paper will be provided. 3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it. 4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed. 5. Tie will be broken using the last 10 questions of the test.

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS

1.

URLs that require an SSL connection begin with a. b. c. d. http https url www

2.

A wireless communication system for computing devices such as cell phones a. b. c. d. Bluetooth clickjacking Cookie ISTE

3.

Two or more computers that are connected together to share data and/or programs are called a. b. c. d. macrocomputer network PDA Vector

4.

A(n) ____ circuit is a super-thin slice of semi-conducting material packed with microscopic circuit elements such as wires, transistors, capacitors, logic gates, and resistors. a. b. c. d. analog closed integrated ion

5.

Typically, a(n) ___ test is conducted by a team of off-site testers, such as a professional testing company. a. alpha b. beta c. gamma d. epsilon A satellite-based navigation system made up of a network of 24 satellites in orbit by the US Department of Defense a. b. c. d. GPS SBN SBS USN

6.

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS


7. The original backbone of the internet that was originally designed for US Department of Defense usage: a. b. c. d. 8. ARPANET Internet Intranet Scubanet

An online encyclopedia dedicated to computer technology a. b. c. d. Encyclopedia Brittanica Encyclopedia of Technology Webopedia Wikipedia

9.

A protocol used to assign dynamic IP addresses to devices on a network whereby a device gets a different IP address every time it connects to a network. a. b. c. d. DCCP DHCP DIPA DIP

10.

____ is an area of a computer that temporarily holds data that is waiting to be processed, stored, or output. a. b. c. d. Input Memory Output Storage

11.

A person who buys up domain names to sell at a profit is a a. b. c. d. cybersquatter domainman domainseller urlsalesman

12.

A measure of total amount of data transferred over a period of time a. b. c. d. arpabit bandwidth gigabit terabit

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 13. The smallest piece of information used by a computer is a a. b. c. d. 14. bit byte kilobyte megabyte

A _____specialist analyzes a computer systems vulnerability to threats from viruses, hackers and physical damage. a. b. c. d. database QA R&D security

15.

A _____ is a device that connects several nodes of a LAN a. b. c. d. gateway hub repeater router

16.

A(n) ____ backup makes a fresh copy of every file that exists in the folders youve specified for the backup a. b. c. d. differential full incremental indexed

17.

A _____ is a set of program instructions that attaches itself to a file, reproduces itself and spreads to other files a. b. c. d. horse lurker virus worm

18.

A free social messaging utility for staying connected in real time with others a. b. c. d. ASCII blog podcast twitter

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 19. An open handset alliance project based on Linux with a platform developed by Google a. b. c. d. 20. android blog ligoogle opalin

A gigabyte is equal to a. b. c. d. 1024 bits 1024 bytes 1024 kilobytes 1024 megabytes

21.

Any technology for compressing and decompressing data such as MPEG, Indeo and Cinepak is a. b. c. d. blog codec technocode twitter

22.

A system malfunction whereby a computer stops working and must be restarted a. b. c. d. crash defrag phishing reboot

23.

Software that displays ads on your computer; also known as spyware or malware a. b. c. d. adware bit bug wicket

24.

To move scattered pieces of data/files into contiguous blocks in the memory or on a hard drive a. b. c. d. contigulation defragment digitize fragment

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 25.

A picture or figure that represents you or another person in an online environment a. b. c. d. alias android avatar bug

26.

Protocol for fast communication and file transfer across a network a. b. c. d. Arpanet Betanet Ethernet Intranet

27.

A programming error that causes a program to behave in an unexpected way a. b. c. d. avatar bug codec wiki

28.

The temporary memory on the hard drive of a computer is known as a. b. c. d. bandwidth bit cache SSL

29.

Sending e-mail falsely claiming to be an established, legitimate enterprise in attempt to scam the user into surrendering private information that is used to steal ones identity a. b. c. d. twittering blogging clickjacking phishing

30.

Using the ___ key as you click each item you want to select when the files you wish to select are not all directly in a row a. b. c. d. Alt Ctrl F1 Shift

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 31. The main directory of a disk is referred to as the ____ directory. a. b. c. d. 32. cache main subsidiary root

A file name extension is usually related to the file a. b. c. d. codec format bandwidth model

33.

The text that you specify to automatically appear in the top margin area of every page in a document is a a. b. c. d. appendix footer header index

34.

A ____ holds one item of data relevant to a record. a. b. c. d. cell field record table

35.

___ is copyrighted software marketed under a try before you buy policy a. b. c. d. freeware open source software public domain software shareware

36.

Each _____ contains data for a group of related fields. a. b. c. d. cell field record table

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 37. A computers microprocessor only understands ___ language. a. b. c. d. 38. BIOS ISTE machine source

A small data file stored on a computer by a website to allow it to remember your preferences a. b. c. d. bit cookie twitter wiki

39.

This type of printer is the most popular type for PCs because they are inexpensive and produce good quality color printouts. a. b. c. d. dot matrix inkjet laser thermal

40.

A computers main circuit board is called a _____ and houses all essential chips and connects the circuitry among them. a. b. c. d. fatherboard hard drive motherboard primary board

41.

Dot ___ is a measure of image clarity a. b. c. d. angle matrix pitch resolution

42.

Data is processed in the a. b. c. d. ASCII CPU ISTE PDA

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 43. This is typically used as an electronic appointment book, address book, calendar or notepad a. b. c. d. 44. Android Bluetooth GPS PDA

A computer that requests data from a server is called a a. b. c. d. client ISTE OSI PDA

45.

Each ___ represents one character (a letter, number or punctuation mark). a. b. c. d. bit byte nibble nub

46.

In terms of data storage, each 1 or 0 is called a(n) a. b. c. d. analog bit byte nub

47.

A(n) ____ system, such as Windows, UNIX, or Mac OS, is essentially the aster conductor of all activities that take place within a computer. a. b. c. d. control matrix operating organization

48.

___ software is a set of computer programs that helps a person carry out a given task. a. b. c. d. applications document operating system system

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 49.

10

Data becomes _____ when it is presented in a format that people can understand and use. a. b. c. d. information figures records symbols

50.

A filename ___ describes a files contents a. b. c. d. executable extension periphery SSL

51.

___ access is the ability of a device to jump directly to the requested data. a. b. c. d. jump quick random sequential

52.

CD and DVD storage can be classified as ___ storage. a. b. c. d. analog digital magnetic optical

53.

Hard disk and tape storage technologies can be classified as ___ storage. a. b. c. d. analog digital magnetic optical

54.

CD-___ technology allows you to write data on a CD, then change that data and save it again on that same disk. a. b. c. d. R RW W None of the above

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 55.

11

Disk ___ refers to the closeness and size of the magnetic particles on the surface of a disk. a. b. c. d. alacrity bandwidth codec density

56.

By using a keyboard ____, your computer never misses one of your keystrokes, no matter how fast you type. a. b. c. d. buffer codec command line interface GUI

57.

A _____ can be used when rearranging the order of records in a database. a. b. c. d. filter function query sort

58.

A mathematical equation entered into a spreadsheet to ask the computer to calculate a. b. c. d. field formula query record

59.

An applications program such as Adobe InDesign, Microsoft Publisher or Quark Express that allows you to create newsletters with complicated formatting. a. b. c. d. database desktop publishing spreadsheet word processing

60.

An applications software program that allows you to repair red eyes or crop portraits down is a. b. c. d. Microsoft Powerpoint Microsoft Publisher Adobe Photoshop Printshop

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 61.

12

Software that allows you to create a presentation that includes photos, text, sound bytes and even video clips and can be used as a self-running presentation: a. b. c. d. Microsoft Access Microsoft Excel Microsoft PowerPoint Microsoft Word

62.

Files with this extension appear in the Open list when you are working with Microsoft Word a. b. c. d. .ppt .doc .wps .xls

63.

The ____ computer in a network actually provides the services to the other network users. a. b. c. d. client host repeater router

64.

This data communications network usually connects personal computers within a single building a. b. c. d. FAN LAN MAN WAN

65.

___ refers to a set of rules for efficiently transmitting data from one network to a. b. c. d. communications protocol codec parity simplex

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 66.

13

A technique of checking to see whether data has been lost or written over when its moved from one place in storage to another or when transmitted between computers is a. b. c. d. bandwidth DNS parity repeater

67.

A device that is connected to at least two networks (like a spider sitting in the center of a web) a. b. c. d. gateway hub repeater router

68.

The Web is based on the concept of ____, a collection of documents that can be related by links a. b. c. d. cookies hypertext ports tags

69.

Each web page is stored as a file called a(n) ___ document. a. b. c. d. HTML HTTP ISP XML

70.

Small Java applications are called a. b. c. d. applets fragments morsels servlets

71.

These printers are a popular technology for situations that require high volume printouts. a. b. c. d. dot matrix inkjet laser plotter

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 72. A ____ digitizes real objects. a. b. c. d. 73. avatar CRT scanner sound card

14

A popular data storage device that allows you to carry important data files to and from school with you with large amounts of data storage that can easily be written and re-written to without loss of data integrity a. b. c. d. CD-R flash drive floppy disk hard disk

74.

If your computer and your digital video camera have ____ ports, you can connect the two objects with a special cable and transfer video files quickly to your computer for editing. a. b. c. d. ASCII compact firewire SCSI

75.

Some cameras can beam photo data to your computers ___ port. a. b. c. d. AIFF infrared JPEG USB

76.

Most cameras store photographs in ___ format. a. b. c. d. .BMP .GIF .JPG .TIFF

77.

To select a group of files that are all listed contiguously, use the ___ key. a. b. c. d. alt ctrl F1 shift

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 78. This technique refers to selecting part of an image a. b. c. d. 79. cropping interpolating pixelating resoluting

15

Camera manufacturers express the resolution of digital cameras as a. b. c. d. kilopixels gigapixels megapixels micropixels

80.

This type of file is not compressed in any way, therefore it typically creates the largest file size: a. b. c. d. BMP GIF JPG MP3

81.

The ____ is a smooth blending of shades from one color to another, or from light to dark a. b. c. d. dither feather gradient hue

82.

A video ____ device converts a cameras analog signals to digital data. a. b. c. d. capture grabber render transfer

83.

These internet based companies were popular in the 1990s a. b. c. d. cybercoms dotcoms intercoms netcoms

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 84. What company listed below is a help-desk for business clients with software questions? a. b. c. d. 85. Eastman Kodak EDS Paychex Walmart

16

These professionals actually get paid to develop and design new hardware products such as new computer gadgets and other devices. a. b. c. d. engineer operator programmer SYSOP

86.

One college that offers computer game programming as a major is a. b. c. d. any SUNY school Syracuse University RIT University of Buffalo

87.

A VHS video tape would contain what type of data? a. b. c. d. analog digital IEE 1394 metadata

88.

A common effect added to Powerpoint presentations and digital video presentations, such as fade, dissolve and wipe, are called a. b. c. d. animation composting synchronizing transitions

89.

The most tedious part of the digital video editing process involves watching the source tapes and noting the shots you want to use in the project. This is called a. b. c. d. capturing logging rough cutting sweetening

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 90. A software program used for web design a. b. c. d. 91. Access Dreamweaver Premiere Print Shop

17

Any element that actually runs off a printed page is called a ___ element. a. b. c. d. bleed cookie nibblet spread

92.

Space between columns in a document is called a. b. c. d. bleed space gutter space pasteboard slug area

93.

If you want the O in Once upon a time to be printed in a large font and actually appear in a border area to the left of the entire first paragraph in a story, you would want to select the O and make it a a. b. c. d. drop cap drop shadow framed object superscript

94.

This type of printer combines percentages of these four basic ink colors to produce a desired color (cyan, magenta, yellow and black) a. b. c. d. ASCII CMYB CMYK RGB

95.

To place a file or object directly into a file so that it becomes part of the file, rather than being linked to it a. b. c. d. dither embed feather shear

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS 96.

18

The desktop publishing term for border or outline of an object such as its weight, color, style, etc. a. b. c. d. fill font outline stroke

97.

The characteristics of the inner area of an object such as its color, pattern, style, etc. on the INSIDE of an object is the a. b. c. d. fill font outline stroke

98.

This Microsoft Office 207 item replaced the traditional FILE menu option in previous versions of Microsoft Office and is used to print, save, open and create new files. a. b. c. d. Format Toolbar Standard Toolbar Office Button Taskbar

99.

Microsoft-developed technology that allows software components to work with other software components, regardless of the language used to create them a. b. c. d. ActiveX Applet Interlacing Snippets

100.

This part of a web page changes in appearance when the mouse pointer passes over them a. b. c. d. anchors delimiters PNG rollover areas

NYS FBLA SLC 2009 INTRODUCTION TO TECHNOLOGY CONCEPTS

19

Answer Section
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. B A B C B A A C B B A B A D B B C D A D B A A B C 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. C B C D B D B C B D C C B B C C B D A B B C A A B 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. C D C B D A D B B C C B B B A C D B A A C C B C B 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. C D A C A C A B B A C A D B B A B A C B D A C A D