Issuu on Google+

Regionals 2004—Technology Concepts 1. The CRT contains ______________ which allows the electron beam to flow freely. a. A vacuum c. oxygen b. Water d. CPUs 2. Parity memory has what ability that non-parity memory lacks? a. The ability to correct 1-bit errors b. The ability to detect 2-bit errors c. The ability to correct 2-bit errors d. The ability to detect 1-bit errors 3. What type of network resource distribution scheme involves central management or resources? a. Communism b. Client/server c. Peer-to-peer d. Centralized Resource Allocation Management 4. What are the three different types of PCMCIA cards? a. 1 millimeter, 2 millimeter, 3 millimeter b. Type A, Type B, Type C c. Type I, Type II, Type III d. Mini, medium, maximum 5. A CD-ROM disc can hold up to ____________ megabytes of data. a. 650 c. 100 b. 250 d. 550 6. Covering the notch on a floppy diskette enables ____________. a. Read protection c. password protection b. Write protection d. user verification 7. The Internet can be used for which of the following? a. Take classes b. Buying goods and services c. Constructing network infrastructures d. All of the above 8. The oldest, most stable, most robust operating system that runs on nonproprietary system is a. OS c. MS-DOS b. Basic d. Unix

9. A system of computers linked together is called: a. A network c. a CD-ROM b. Application software d. a multimedia system 10. The standard protocol for sending e-mail is a. HTTP c. SMTP b. TCP/IP d. HTML 11. Which of the following is not a network topology? a. Bus c. star b. Link d. mesh 12. The basic job of an ISP is to ________________. a. Provide access to the Internet b. Design websites c. Transfer e-mail to a server d. Navigate the Internet 13. Which of the following provides the widest viewing surface? a. 640 x 480 b. 800 x 600 c. 1024 x 768 d. 1280 x 1024 14. The most popular type of network architecture is _________________. a. WAN c. Ethernet b. ARC net d. FDDI 15. Most operating systems use a(n) ______________ files system in which files are organized in a tree-like structure. a. NTFS c. Unix b. Hierarchical d. Linux 16. The PCI bus runs at____________-megahertz. a. 8 c. 100 b. 50 d. 33 17. The three major components of an operating system are: a. User Interface, Kernel, File Management System b. CPU, RAM, Hard Drive c. User Management System, Granule, File Interface d. ROM BIOS, RAM, Hard Drive

18. VGA requires a(n) _________________monitor. a. LCD c. 14 inch b. Analog d. digital 19. RAM stands for __________________. a. Readily available memory b. Returned access memory c. Random access management d. Random access memory 20. DPUI stands for _______________. a. Dots per inch b. Data path input c. Dips per inch d. Data per inch 21. Another term for telecommunications is __________________. a. Communicating over a distance b. Workflow automation c. Connectivity d. Local area network 22. A ________________ network allows each user to access what is stored on the hard drives of the other computers on that network. a. Local area b. Peer-to-peer c. File server d. Client server 23. When you dial up to the Internet with a modem, you a. Use a phone line b. Use an AT&T operator c. Use a DVD d. Use ARPANET 24. When you start your GUI browser, you will automatically come to a. Hypertext links c. bookmarks b. A hotlist d. a Home Page 25. In URL addresses, COM is short for ______________. a. Communications c. computer b. commercial d command

26. BBS stands for _____________________. a. Business board structure b. British board system c. Bulletin board system d. Bulletin business system 27. What is the most powerful feature of a database management system? a. Query c. search b. File d. add and delete 28. The most common example of messaging services is _____________. a. Voice message c. electronic bulletin board b. E-mail d. video messaging 29. The intersection of a column and a row is called what? a. A label c. a formula b. A value d. a cell 30. The word modem is taken from the terms a. Modulator and demodulator b. Modifier and demodifier c. Modernize and demodernize d. Module and demodule 31. The two common methods used for connecting LANs to each other are a. Rings and busses b. Hubs and nodes c. Bridges and routers d. Peers and servers 32. The expansion card that allows a node to communicate with the rest of the network is called __________________. a. Network operating card b. Network interface card c. Fiber optic card d. Workstation interface card 33. The speed at which data is transmitted is expressed as a. bps c. kps b. cps d. mps 34. The physical arrangement of a network’s layout is called________________. a. Topology c. component b. Distribution d. netware

35. Which one of the following is not a commonly used setting for modem communications? a. Baud rate c. data bits and stop bits b. Parity d. style 36. Which of the following is not a method for storing files electronically? a. Bar coding c. optical disks b. Hard drives d. CD-ROMs 37. What type of computer system does not require software to run? a. Workstation c. digital system b. Embedded system d. notebook computer system 38. Two types of browsers are _________________. a. HTTP and URL b. Textual and graphic c. Serial and parallel d. Hypertext and hypermedia 39. _____________________ is the person responsible for the efficient management and security of the company network. a. Network server b. Network supervisor c. Network administrator d. Network manager 40. Which network service would you use to delete the contents of a shared folder? a. Applications services c. message service b. Print services d. file service 41. Ethernet is a. A LAN protocol b. A star network c. A network operating system d. An intranet 42. Quick Time and Fast Play are examples of ____________. a. Links b. Software programs called viewers c. Multimedia files d. Software programs called finders 43. The type of cable that would provide the fastest transmission is a. Twisted-pair c. linked b. Coaxial d. fiber-optic

44. Which of the following is an example of a network? a. a computer attached to a printer and a scanner to input and output information b. a computer sharing a communication medium to communicate with peripherals or other computers to share information c. several printers connected to a switch box going to a single terminal. d. Several diskettes holding information for one workstation. 45. Which topology has a centralized location in which all the cables come together to a central point, similar to a mainframe, and if this point fails, it brings down the entire network? a. Bus c. mesh b. Star d. ring 46. Which topology has a layout in which every workstation or peripheral has a direct connection to every other workstation or peripheral on the network? a. Bus c. mesh b. Star d. ring 47. What does a network interface card add to a computer’s functionality? a. It provides faster communication between the CPU and the hard disk. b. It provides the capability to communicate across a phone line to another computer c. It provides the capability to communicate with other computers across a medium such as a CAT5 cable, with an RJ-45 connector connected to the computer to a hub. d. It provides the capability to save more information on a diskette than normal 48. In order for a NIC to interact with the computer, what needs to be installed? a. The appropriate documentation for the user to take advantage of the features of the interface card b. A driver, which is software that enables the NIC and the computer to communicate with each other c. A bus, which enables the interface card to communicate through the various topologies of the Internet d. Nothing 49. Which of the following types of hubs does not regenerate the signal and therefore is not a repeater? a. Active c. passive b. Hybrid d. switching hub

50. What network component is used to extend the distance of the signal when transmitting over the normal specified distance? a. Passive hub c. IRQ b. NIC d. repeater 51. What does EPROM stand for? a. Enhanced programmable read-only memory b. Erasable programmable read-out memory c. Enhanced permanent read-only memory d. Erasable programmable read-only memory 52. Information transmitted via single wire, one bit at a time is called a. Finite c. serial b. Infinite d. parallel 53. An automated program that searches the Internet for new Web documents and places their addresses and content-related information in a database is called a _________. a. Search engine c. browser b. Web crawler d. spider 54. To send an abusive or personally insulting e-mail message is called ________. a. Flaming c. raging b. Spamming d. e-swearing 55. __________________ is relating to a time frame imposed by external constraints. a. Clockspeed c. real time b. Picosecond d. life speed 56. __________ is a standard high-speed parallel interface. a. ITP c. UPS b. SCSI d. PPTP 57. _________________ is the number of bytes stored on one inch of magnetic tape. a. Blocking c. bundling b. Density d. parity 58. A set of instructions sent to a modem that would automate its operation is called a. A script c. a dialing sequence b. A macro d. directions

59. The concept of drive mirroring refers to a. Dual video display b. Polishing of disk storage space c. Data written to two physical disk simultaneously d. Reflective transfer of data 60. The three elements of data integrity are ______________. a. Data fields, records, and files b. Data attributes, security, and maintenance c. Data accuracy, reliability, and timeliness d. Data age, length, and permanence 61. Light pens, digitizers, and graphics tablets are _______________. a. Graphic input devices b. Data storage elements c. Information retrieval methods d. System security components 62. The unit that synchronizes the operations of a computer is the _________. a. Timing module c. instruction cycle b. System clock d. wide SCSI 63. ________________ can be programmed in a relational database application to prevent multiple users from attempting to update the record simultaneously. a. Access limitation c. file encryption b. record locking d. login limitation 64. _______________is increasing disk storage space without physically increasing the disk’s size. a. Deleting files c. off line storage b. Compression d. disk cache 65. _________________ are the two types of memory in a PC. a. ROM and RAM b. RAM and REM c. RIM and RAM d. REM and ROM 66. HTML is used for____________________. a. Determining the profit on computer sales b. Translating computer instructions c. Creating web pages d. Creating software documentation

67. Building a working model of a new system is called __________. a. Sampling b. Prototyping c. Evaluation d. Construction 68. Software designed to plan, schedule, track, and analyze events, resources, and costs of a project are called ________________. a. Project coordination software b. Project implementation software c. Project management software d. Project planning software 69. GIGO stands for _______________. a. Grant independent guest operator b. Guaranteed internal gap operation c. Garbage in, garbage out d. Greater internal gain operation 70. Database fields may be formatted as _____________________. a. Numeric, alphabetic, or alphanumeric b. Numeric, character, or date c. Time, date, or combination d. Numeric, wider, or indented 71. Batch processing refers to _________________. a. Processing a set of data as each element is received b. Processing a set of data as a single group c. Processing a set of data that is defective d. Processing a set of instructions one at a time 72. Tangible, physical equipment that can be seen and touched. a. software b. hardware c. data d. operating system 73. The technology that enables computers to communicate between each other. a. telecommunications b. data communications c. serial ports d. information technology

74. Input, output, and processing devices together represent a ___________. a. mechanical device b. computer system c. motherboard d. CPU 75. The CPU is located on the ________________________. a. Processor b. external port c. motherboard d. fatherboard

Regionals 2004—Technology Concepts


Answer Key 1. A

26. C

51. D

2. D

27. A

52. C

3. D

53. A

4. C

28. B 29. D

5. A

30. A

55. C

6. B

31. C

56. B

7. D

32. B

57. D

8. C

33. A

58. A

9. A

34. A

59. C

10. C

35. D

60. C


36. A

61. A

12. A

37. A

62. B

13. D

38. B

63. B

14. C

39. C

64. B

15. B

40. D

65. A

16. C

41. A

66. C

17. A

42. B

67. B

18. A

43. D

68. C

19. D

44. B

69. C

20. A

45. B

70. A

21. A


71. B

22. B

47. C

72. B

23. A

48. B

73. A

24. D

49. C

74. B

25. B

50. D

75. C

54. A