FBLA RLC 2016

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

21) ______ allows separate partitions of a single server to support different operating systems. A) Multithreading B) Multiprocessing C) Virtualization D) Shared processing

21) C

22) With the development of ________ technology, a single chip was equipped with two or more processor cores. A) networking B) multicore C) multiprogramming D) multimedia

22) B

27) 1024 megabytes equals: A) MISSING ANSWER B) nanosecond C) kilobyte D) gigabyte

27) D

67) A_______ is a group of cells that form a rectangle on the screen. A) label B) column C) workbook D) range

67) D

68) This icon allows you to insert colorful cartoon like pictures in sliders. A) Pic icon B) Picture icon C) Clip Art D) Cartoon art

68) C

69) The standard toolbar is located underneath the: A) formatting toolbar B) task pane C) drawing toolbar D) menu bar

69) D

7) Broadband transmissions refer to what kind of signal? A) Asynchronous B) Digital C) Analog D) Synchronous

7) C

70) Labels are aligned at the _____ edge of the cell. A) right B) bottom top C) left D) top bottom

70) C

71) What command will remove a file from the hard drive of a computer? A) Paste B) Save C) Delete D) Copy

71) C

1) The general term for a slower speed network which spans a very long distance is a: A) WAN B) MAN C) LAN D) PAN

1) A

10) A connection-oriented protocol guarantees what? A) fast bandwidth B) high Security C) error free transmissions D) delivery of data

10) D

100) TCP stands for: A) Transistor Control Protocol B) Transfer Control Peripheral C) Transmission Control Protocol D) Transmission Control Program

100) C

11) There are ______ layers in the OSI Model. A) six B) eight C) nine D) seven

11) D

12) Email and FTP work at which layer of the OSI model? A) Application B) Session C) User D) Presentation

12) A

13) The most popular type of network architecture is ___________. A) FDDI B) Ethernet C) WAN D) ARC net

13) B

14) Which of the following is not a network topology? A) mesh B) Link C) Bus D) star

14) C

15) The service required for a system in a Windows Domain to access a resource in a Netware domain is called: A) File and Print Services for Netware (FPNW) B) Gateway Service for Netware (GSNW) C) Netware Services for Gateway (GSNW) D) Host Services for Netware (HSNW)

15) B

16) Most operating systems use a(n) ________________ files system in which files are organized in a tree-like structure. A) Hierarchical B) Linux C) NFTS D) Unix

16) A

17) The __________ is often very different from one operating system to the next, sometimes even between different versions of the same operating system. A) File Manager B) Memory Manager C) User Interface D) Process Manager

17) C

18) A ______ chip holds software that is used to start the computer. A) ROM B) RAM C) CPU D) buffer

18) A

19) Each peripheral device has its own software, called a(n), which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when itΓÇÖs appropriate. A) device handler B) device software C) device driver D) device controller

19) C

2) The main difference between a switch(or bridge) and a hub is that a switch also lies within the _____ layer of the OSI model. A) routing B) session C) network D) layer 2

2) D

20) The name for the core portion of an operating system is the: A) nucleus B) center C) kernel D) manager

20) C

23) The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the: A) block file B) bookmark file C) page file D) cache file

23) B

24) Cache memory is divided into blocks of equal size called: A) partitions B) pages C) slots D) segments

24) C

25) Main memory also is known as: A) single-user memory B) random access memory C) finite memory D) virtual memory

25) B

26) One approach to performing compaction is to do it when a certain _____ of memory becomes busy. A) percentage B) byte C) bit D) area

26) B

28) Approximately how many bytes make one megabyte? A) one thousand B) one hundred C) one million D) ten thousand

28) C

29) OS computer abbreviation usually means: A) Operating System B) Optical Sensor C) Order of Significance D) Open Software

29) A

3) Which one of the following statements is not true about Wide Area Networks (WANs)? A) WANs typically use public transports for connectivity. B) WANs typically have greater bandwidth capacities than LANs. C) WANs cover larger geographic areas than LANs. D) WANs usually use a router for connectivity.

3) B

30) The________ uniquely identifies each resource, starts its operation, monitors its progress, and, finally locates it making the operating system available to the next waiting process. A) Keyboard Manager B) File Manager C) Memory Manager D) Device Manager

30) D

31) Who developed a code for transmission of telegraphic information using sequences of long and short elements to represent letters, numerals, punctuation, and special characters? A) James Lindsay B) Elisha Gray C) Alexander Graham Bell D) Samuel Morse

31) D

32) Which one of the following signals is characterized by having the potential for infinite signal resolution and high density yet has noise and signal loss problems? A) digital B) analog C) aneroid D) cardiod

32) B

33) Which type of microphone, also known as a capacitor or electrostatic microphone, has a diaphragm that acts as one plate of a capacitor and vibrations produce changes in distance between the plates? A) dynamic B) condenser C) carbon D) piezoelectric

33) B

34) Which type of microphone works by using electromagnetic induction and is relatively inexpensive and resistant to moisture? A) carbon B) piezoelectric C) condenser D) dynamic

34) D

35) When referring to signal response,which is generally considered to be a perfect sphere in three dimensions? A) cardioid B) bi-directional C) omnidirectional D) shotgun

35) C

36) Which signal sensitivity pattern is so named for its heart-shaped pattern? A) cardioid B) bi-directional C) synchronous D) omnidirectional

36) A

37) What is the common term for combining many analog or digital signals and forwarding the selected input into a single line? A) multiplexing B) demodulation C) modulation D) demultiplexing

37) A

38) What is the term for the change in frequency of a wave for an observer moving relative to the source of the waves as is most commonly heard when a vehicle sounding a siren or horn approaches,passes, and recedes? A) Coriolis effect B) Doppler effect C) divergence D) convergence

38) B

39) What is the term for headphones which sit on top of the ears rather than around them? A) canalphones B) supra-aural C) circumaural D) earbuds

39) B

4) A server-based network usually involves one or more: A) hubs B) switches C) servers D) LANs

4) B

40) Spamming is very poor Netiquette and means: A) posting a message that contains graphics descriptions of something really gross B) sending in lines of nonsensical garbage in a chat conversation C) spilling the juice of meat-by products into your keyboard D) posting or emailing unsolicited advertising messages to a wide audience

40) B

41) A set of programs through which the computer manages its own resources such as the central processing unit,memory, secondary storage devices, and input/output devices. A) Integrated software B) Applications software C) Bundled software D) Operating systems software

41) D

42) When you change the color and background of a chart in a spreadsheet you are: A) scanning B) calculating C) formatting D) merging

42) C

43) Which feature of your word processing program would be used to send a form letter to a group of names and addresses: A) Mail Merge B) Sort and Send C) Spell Check D) View

43) A

44) Which one of the following is an example of an image file? A) .mp3 B) .jpeg C) .html D) .exe

44) B

45) Copying copyright protected software and giving it to others for free is: A) fair use B) a civil act C) always allowed D) a criminal act

45) D

46) To run power hungry programs such as video editing software the computer needs a lot of: A) ROM B) REM C) RAM D) video files

46) C

47) The connecting of computers so that information can be shared is called: A) networking B) surfing C) spamming D) phishing

47) A

48) When planning a database, what is the first step? A) change the page layout B) select a background color C) select fields D) select a font

48) C

49) Software programs or hardware devices setup to protect computers while online are called: A) firewalls B) filter C) browsers D) cookies

49) A

5) Which one of the following devices forwards incoming traffic to all ports except for the incoming port? A) bridge B) repeater C) router D) hub

5) D

50) Which one of the following is an output device: A) microphone B) mouse C) keyboard D) printer

50) D

51) Which one of the following would be used to compute the average score of four tests using a spreadsheet? A) a calculator B) a nerdy friend C) a formula D) a compilation

51) C

52) The part of a word processing document used to display repetitive information such as titles, dates, and page numbers is: A) page display B) header and footer C) search and replace D) cut and paste

52) B

53) The blinking line, box, or arrow on the computer screen is called the: A) world wide web B) cursor C) mouse D) graphic

53) B

54) What part of a window shows the name of the program you opened? A) Quick Access toolbar B) Scroll bar C) Ribbon D) Title bar

54) D

55) A______ is a container that helps you organize your files. A) file B) window C) folder D) taskbar

55) C

56) Some programs have______,words you click to show lists of commands. A) toolbars B) ribbons C) groups D) menus

56) D

57) When you ______a file, the file is transferred to the new location and no longer exists in its original location, A) copy B) move C) backup D) paste

57) B

58) You move a file using which commands? A) install B) copy and paste C) cut and paste D) delete

58) C

59) You should give folders______ names that help you easily to identify them. A) uniform B) identical C) unique D) similar

59) C

6) The main function of a firewall is: A) the weakening of data signals as they travel through a media B) to directly shield viruses C) to prevent unauthorized access to your network D) to make Internet connections faster

6) C

60) Which one of the following is a set of instructions written for a computer? A) password B) user account C) program D) log it

60) C

61) A ______ is a list of related commands. A) group B) menu C) dialog box D) button

61) B

62) The act of giving an instruction to your computer either by menu choice or keystroke. A) Command B) File C) Finder D) Download

62) A

63) Pressing _________ at the end of a row moves the insertion point to the first cell in the next row. A) Ctrl B) Tab C) Spacebar D) Enter

63) B

64) The following command is used to locate work with a subset of data in a worksheet. A) sort B) template C) freeze panes D) filter

64) D

65) __________ go horizontally-- side-by-side layout of boxes. A) Cell B) Columns C) Rows D) Grids

65) C

66) A group or block of cells in a spreadsheet. A) Cell Address B) Cell Range C) Data Range D) Ledger

66) B

72) The accepted standard for accessing an applications help system is to press the ____ key on the keyboard. A) F12 B) H C) F11 D) F1

72) D

73) Rotational hard disk drives are typically _____ than solid state drives. A) smaller B) faster C) slower D) more expensive

73) C

74) Solid State Disk (SSD) hard drives generally have the advantage of _____ over conventional rotational drives. A) faster speed B) larger size C) more vibration D) lower cost

74) A

75) To transfer data from one computer to another computer. A) booting B) uploading C) downloading D) copying

75) C

76) To send a file from one computer to another through a network. A) boot B) upload C) batch D) download

76) B

77) This is another name for secondary storage. A) density B) auxiliary storage C) cylinder storage D) memory

77) D

78) The pointer, usually arrow or cross shaped, which is controlled by the mouse. A) cursor B) codes C) diagram D) symbol

78) A

79) An add-on component to your computer. A) hardware B) peripheral C) software D) application

79) B

8) A Token Ring network uses what device to connect to workstations? A) MSAU B) Hub C) Switch D) Repeater

8) A

80) Which one of the following is an example of a peripheral? A) scanner B) spreadsheet C) desktop D) port

80) A

81) What step of information processing sends the information back to you in the manner you need it? A) distribution B) storage C) output D) input

81) C

82) A port that allows data to be transmitted in a series one after the other, such as the printer and modem ports on a computer. A) SCSI port B) serial port C) LPT1 port D) PCI

82) B

83) A copy of a file or disk you make for archiving purposes. A) hard drive B) compiler C) disk D) backup

83) D

84) A program that allows you to change settings in a program. A) finder B) application C) compiler D) control panel

84) D

85) Whath is a subdivision of a hard drives surface that is defined and used as a separate drive? A) palette B) partition C) divider D) popup menu

85) B

86) The _____ is the brain of the computer. A) CPU B) hard drive C) motherboard D) RAM

86) A

87) _____ offer the advantage of being instant-on machines with long battery life but typically have limited storage and alternative operating systems. A) Laptop computers B) Tablet computers C) Desktops D) Servers

87) B

88) _____ are output devices which allow for sound to be produced. A) Speakers B) Scanners C) Printers D) Microphones

88) A

89) If over time a print device's output becomes lighter and lighter, it may be time to: A) unplug the device B) replace the toner cartridge C) reinstall the drivers D) clean the device

89) B

9) The primary responsibility of the Network OSI layer is: A) data synchronization B) flow control C) routing D) media connectors

9) C

90) _____ are devices which read media from CD or DVD media. A) Hard drives B) Optical devices C) SSD's D) Scanners

90) B

91) _____ is the term used to describe malware that appears, to the user, to perform a desirable function but facilitates unauthorized access to the user's computer system. A) Trojan B) Rootkit C) Worm D) Spam

91) A

92) A software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed or while the application is being used is known as: A) Adware B) Trojan C) Spam D) Virus

92) A

93) What type of malware installed on computers collects information about users without their knowledge? A) Antivirus B) Ad-Aware C) Adware D) Spyware

93) D

94) What is the term for a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a Trojan horse? A) zombie B) client C) brick D) node

94) A

95) Who had the Internet first? A) financial institutions B) military C) individuals D) schools and hospitals

95) B

96) What does URL mean? A) world wide web B) an http C) air well D) Universal Resource Locator also known as the address

96) D

97) ______________________ is a group of people using social media tools and sites on the internet. A) Hyper-local community B) Online community C) Citizens D) Bloggers

97) B

98) ______________is an electronic version of a traditional printed book that can be download from the Internet and read on your computer or handheld device. A) Digital Story B) Drupal C) EBook D) Blog

98) C

99) Which is not a web browser? A) Netscape Communicator B) Internet Explorer C) File Zilla D) Google Chrome

99) C


Ensembles d'études connexes

Chemistry - Determining chemical formulas

View Set

Toeic speaking part 5. some questions

View Set

les adjectifs numéraux ordinaux, les sports

View Set

Introduction to Social Work - HS1 TEST 4

View Set

Leadership LaCharity Exam 2 (Chapter 9 - neuro)

View Set

Module 4: Properties of a Well Written Text

View Set

Langage amoureux (love language)

View Set

Accounting Ch.2 Required and Optional Notes

View Set