FBLA RLC 2016
21) ______ allows separate partitions of a single server to support different operating systems. A) Multithreading B) Multiprocessing C) Virtualization D) Shared processing
21) C
22) With the development of ________ technology, a single chip was equipped with two or more processor cores. A) networking B) multicore C) multiprogramming D) multimedia
22) B
27) 1024 megabytes equals: A) MISSING ANSWER B) nanosecond C) kilobyte D) gigabyte
27) D
67) A_______ is a group of cells that form a rectangle on the screen. A) label B) column C) workbook D) range
67) D
68) This icon allows you to insert colorful cartoon like pictures in sliders. A) Pic icon B) Picture icon C) Clip Art D) Cartoon art
68) C
69) The standard toolbar is located underneath the: A) formatting toolbar B) task pane C) drawing toolbar D) menu bar
69) D
7) Broadband transmissions refer to what kind of signal? A) Asynchronous B) Digital C) Analog D) Synchronous
7) C
70) Labels are aligned at the _____ edge of the cell. A) right B) bottom top C) left D) top bottom
70) C
71) What command will remove a file from the hard drive of a computer? A) Paste B) Save C) Delete D) Copy
71) C
1) The general term for a slower speed network which spans a very long distance is a: A) WAN B) MAN C) LAN D) PAN
1) A
10) A connection-oriented protocol guarantees what? A) fast bandwidth B) high Security C) error free transmissions D) delivery of data
10) D
100) TCP stands for: A) Transistor Control Protocol B) Transfer Control Peripheral C) Transmission Control Protocol D) Transmission Control Program
100) C
11) There are ______ layers in the OSI Model. A) six B) eight C) nine D) seven
11) D
12) Email and FTP work at which layer of the OSI model? A) Application B) Session C) User D) Presentation
12) A
13) The most popular type of network architecture is ___________. A) FDDI B) Ethernet C) WAN D) ARC net
13) B
14) Which of the following is not a network topology? A) mesh B) Link C) Bus D) star
14) C
15) The service required for a system in a Windows Domain to access a resource in a Netware domain is called: A) File and Print Services for Netware (FPNW) B) Gateway Service for Netware (GSNW) C) Netware Services for Gateway (GSNW) D) Host Services for Netware (HSNW)
15) B
16) Most operating systems use a(n) ________________ files system in which files are organized in a tree-like structure. A) Hierarchical B) Linux C) NFTS D) Unix
16) A
17) The __________ is often very different from one operating system to the next, sometimes even between different versions of the same operating system. A) File Manager B) Memory Manager C) User Interface D) Process Manager
17) C
18) A ______ chip holds software that is used to start the computer. A) ROM B) RAM C) CPU D) buffer
18) A
19) Each peripheral device has its own software, called a(n), which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when itΓÇÖs appropriate. A) device handler B) device software C) device driver D) device controller
19) C
2) The main difference between a switch(or bridge) and a hub is that a switch also lies within the _____ layer of the OSI model. A) routing B) session C) network D) layer 2
2) D
20) The name for the core portion of an operating system is the: A) nucleus B) center C) kernel D) manager
20) C
23) The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the: A) block file B) bookmark file C) page file D) cache file
23) B
24) Cache memory is divided into blocks of equal size called: A) partitions B) pages C) slots D) segments
24) C
25) Main memory also is known as: A) single-user memory B) random access memory C) finite memory D) virtual memory
25) B
26) One approach to performing compaction is to do it when a certain _____ of memory becomes busy. A) percentage B) byte C) bit D) area
26) B
28) Approximately how many bytes make one megabyte? A) one thousand B) one hundred C) one million D) ten thousand
28) C
29) OS computer abbreviation usually means: A) Operating System B) Optical Sensor C) Order of Significance D) Open Software
29) A
3) Which one of the following statements is not true about Wide Area Networks (WANs)? A) WANs typically use public transports for connectivity. B) WANs typically have greater bandwidth capacities than LANs. C) WANs cover larger geographic areas than LANs. D) WANs usually use a router for connectivity.
3) B
30) The________ uniquely identifies each resource, starts its operation, monitors its progress, and, finally locates it making the operating system available to the next waiting process. A) Keyboard Manager B) File Manager C) Memory Manager D) Device Manager
30) D
31) Who developed a code for transmission of telegraphic information using sequences of long and short elements to represent letters, numerals, punctuation, and special characters? A) James Lindsay B) Elisha Gray C) Alexander Graham Bell D) Samuel Morse
31) D
32) Which one of the following signals is characterized by having the potential for infinite signal resolution and high density yet has noise and signal loss problems? A) digital B) analog C) aneroid D) cardiod
32) B
33) Which type of microphone, also known as a capacitor or electrostatic microphone, has a diaphragm that acts as one plate of a capacitor and vibrations produce changes in distance between the plates? A) dynamic B) condenser C) carbon D) piezoelectric
33) B
34) Which type of microphone works by using electromagnetic induction and is relatively inexpensive and resistant to moisture? A) carbon B) piezoelectric C) condenser D) dynamic
34) D
35) When referring to signal response,which is generally considered to be a perfect sphere in three dimensions? A) cardioid B) bi-directional C) omnidirectional D) shotgun
35) C
36) Which signal sensitivity pattern is so named for its heart-shaped pattern? A) cardioid B) bi-directional C) synchronous D) omnidirectional
36) A
37) What is the common term for combining many analog or digital signals and forwarding the selected input into a single line? A) multiplexing B) demodulation C) modulation D) demultiplexing
37) A
38) What is the term for the change in frequency of a wave for an observer moving relative to the source of the waves as is most commonly heard when a vehicle sounding a siren or horn approaches,passes, and recedes? A) Coriolis effect B) Doppler effect C) divergence D) convergence
38) B
39) What is the term for headphones which sit on top of the ears rather than around them? A) canalphones B) supra-aural C) circumaural D) earbuds
39) B
4) A server-based network usually involves one or more: A) hubs B) switches C) servers D) LANs
4) B
40) Spamming is very poor Netiquette and means: A) posting a message that contains graphics descriptions of something really gross B) sending in lines of nonsensical garbage in a chat conversation C) spilling the juice of meat-by products into your keyboard D) posting or emailing unsolicited advertising messages to a wide audience
40) B
41) A set of programs through which the computer manages its own resources such as the central processing unit,memory, secondary storage devices, and input/output devices. A) Integrated software B) Applications software C) Bundled software D) Operating systems software
41) D
42) When you change the color and background of a chart in a spreadsheet you are: A) scanning B) calculating C) formatting D) merging
42) C
43) Which feature of your word processing program would be used to send a form letter to a group of names and addresses: A) Mail Merge B) Sort and Send C) Spell Check D) View
43) A
44) Which one of the following is an example of an image file? A) .mp3 B) .jpeg C) .html D) .exe
44) B
45) Copying copyright protected software and giving it to others for free is: A) fair use B) a civil act C) always allowed D) a criminal act
45) D
46) To run power hungry programs such as video editing software the computer needs a lot of: A) ROM B) REM C) RAM D) video files
46) C
47) The connecting of computers so that information can be shared is called: A) networking B) surfing C) spamming D) phishing
47) A
48) When planning a database, what is the first step? A) change the page layout B) select a background color C) select fields D) select a font
48) C
49) Software programs or hardware devices setup to protect computers while online are called: A) firewalls B) filter C) browsers D) cookies
49) A
5) Which one of the following devices forwards incoming traffic to all ports except for the incoming port? A) bridge B) repeater C) router D) hub
5) D
50) Which one of the following is an output device: A) microphone B) mouse C) keyboard D) printer
50) D
51) Which one of the following would be used to compute the average score of four tests using a spreadsheet? A) a calculator B) a nerdy friend C) a formula D) a compilation
51) C
52) The part of a word processing document used to display repetitive information such as titles, dates, and page numbers is: A) page display B) header and footer C) search and replace D) cut and paste
52) B
53) The blinking line, box, or arrow on the computer screen is called the: A) world wide web B) cursor C) mouse D) graphic
53) B
54) What part of a window shows the name of the program you opened? A) Quick Access toolbar B) Scroll bar C) Ribbon D) Title bar
54) D
55) A______ is a container that helps you organize your files. A) file B) window C) folder D) taskbar
55) C
56) Some programs have______,words you click to show lists of commands. A) toolbars B) ribbons C) groups D) menus
56) D
57) When you ______a file, the file is transferred to the new location and no longer exists in its original location, A) copy B) move C) backup D) paste
57) B
58) You move a file using which commands? A) install B) copy and paste C) cut and paste D) delete
58) C
59) You should give folders______ names that help you easily to identify them. A) uniform B) identical C) unique D) similar
59) C
6) The main function of a firewall is: A) the weakening of data signals as they travel through a media B) to directly shield viruses C) to prevent unauthorized access to your network D) to make Internet connections faster
6) C
60) Which one of the following is a set of instructions written for a computer? A) password B) user account C) program D) log it
60) C
61) A ______ is a list of related commands. A) group B) menu C) dialog box D) button
61) B
62) The act of giving an instruction to your computer either by menu choice or keystroke. A) Command B) File C) Finder D) Download
62) A
63) Pressing _________ at the end of a row moves the insertion point to the first cell in the next row. A) Ctrl B) Tab C) Spacebar D) Enter
63) B
64) The following command is used to locate work with a subset of data in a worksheet. A) sort B) template C) freeze panes D) filter
64) D
65) __________ go horizontally-- side-by-side layout of boxes. A) Cell B) Columns C) Rows D) Grids
65) C
66) A group or block of cells in a spreadsheet. A) Cell Address B) Cell Range C) Data Range D) Ledger
66) B
72) The accepted standard for accessing an applications help system is to press the ____ key on the keyboard. A) F12 B) H C) F11 D) F1
72) D
73) Rotational hard disk drives are typically _____ than solid state drives. A) smaller B) faster C) slower D) more expensive
73) C
74) Solid State Disk (SSD) hard drives generally have the advantage of _____ over conventional rotational drives. A) faster speed B) larger size C) more vibration D) lower cost
74) A
75) To transfer data from one computer to another computer. A) booting B) uploading C) downloading D) copying
75) C
76) To send a file from one computer to another through a network. A) boot B) upload C) batch D) download
76) B
77) This is another name for secondary storage. A) density B) auxiliary storage C) cylinder storage D) memory
77) D
78) The pointer, usually arrow or cross shaped, which is controlled by the mouse. A) cursor B) codes C) diagram D) symbol
78) A
79) An add-on component to your computer. A) hardware B) peripheral C) software D) application
79) B
8) A Token Ring network uses what device to connect to workstations? A) MSAU B) Hub C) Switch D) Repeater
8) A
80) Which one of the following is an example of a peripheral? A) scanner B) spreadsheet C) desktop D) port
80) A
81) What step of information processing sends the information back to you in the manner you need it? A) distribution B) storage C) output D) input
81) C
82) A port that allows data to be transmitted in a series one after the other, such as the printer and modem ports on a computer. A) SCSI port B) serial port C) LPT1 port D) PCI
82) B
83) A copy of a file or disk you make for archiving purposes. A) hard drive B) compiler C) disk D) backup
83) D
84) A program that allows you to change settings in a program. A) finder B) application C) compiler D) control panel
84) D
85) Whath is a subdivision of a hard drives surface that is defined and used as a separate drive? A) palette B) partition C) divider D) popup menu
85) B
86) The _____ is the brain of the computer. A) CPU B) hard drive C) motherboard D) RAM
86) A
87) _____ offer the advantage of being instant-on machines with long battery life but typically have limited storage and alternative operating systems. A) Laptop computers B) Tablet computers C) Desktops D) Servers
87) B
88) _____ are output devices which allow for sound to be produced. A) Speakers B) Scanners C) Printers D) Microphones
88) A
89) If over time a print device's output becomes lighter and lighter, it may be time to: A) unplug the device B) replace the toner cartridge C) reinstall the drivers D) clean the device
89) B
9) The primary responsibility of the Network OSI layer is: A) data synchronization B) flow control C) routing D) media connectors
9) C
90) _____ are devices which read media from CD or DVD media. A) Hard drives B) Optical devices C) SSD's D) Scanners
90) B
91) _____ is the term used to describe malware that appears, to the user, to perform a desirable function but facilitates unauthorized access to the user's computer system. A) Trojan B) Rootkit C) Worm D) Spam
91) A
92) A software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed or while the application is being used is known as: A) Adware B) Trojan C) Spam D) Virus
92) A
93) What type of malware installed on computers collects information about users without their knowledge? A) Antivirus B) Ad-Aware C) Adware D) Spyware
93) D
94) What is the term for a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a Trojan horse? A) zombie B) client C) brick D) node
94) A
95) Who had the Internet first? A) financial institutions B) military C) individuals D) schools and hospitals
95) B
96) What does URL mean? A) world wide web B) an http C) air well D) Universal Resource Locator also known as the address
96) D
97) ______________________ is a group of people using social media tools and sites on the internet. A) Hyper-local community B) Online community C) Citizens D) Bloggers
97) B
98) ______________is an electronic version of a traditional printed book that can be download from the Internet and read on your computer or handheld device. A) Digital Story B) Drupal C) EBook D) Blog
98) C
99) Which is not a web browser? A) Netscape Communicator B) Internet Explorer C) File Zilla D) Google Chrome
99) C