0% found this document useful (0 votes)
82 views22 pages

2016 SLC Intro To Information Technology

Uploaded by

sslaa82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views22 pages

2016 SLC Intro To Information Technology

Uploaded by

sslaa82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Intro to Information Technology - 2016 SLC

1) The general term for a slower speed network which spans a very long distance is a:
A) WAN
B) MAN
C) LAN
D) PAN

2) The main difference between a switch(or bridge) and a hub is that a switch also lies within the _____ layer of the OSI model.
A) routing
B) session
C) network
D) layer 2

3) Which one of the following statements is not true about Wide Area Networks (WANs)?
A) WANs typically use public transports for connectivity.
B) WANs typically have greater bandwidth capacities than LANs.
C) WANs cover larger geographic areas than LANs.
D) WANs usually use a router for connectivity.

4) A server-based network usually involves one or more:


A) hubs
B) switches
C) servers
D) LANs

5) Which one of the following devices forwards incoming traffic to all ports except for the incoming port?
A) bridge
B) repeater
C) router
D) hub

6) The main function of a firewall is:


A) the weakening of data signals as they travel through a media
B) to directly shield viruses
C) to prevent unauthorized access to your network
D) to make Internet connections faster

7) Broadband transmissions refer to what kind of signal?


A) Asynchronous
B) Digital
C) Analog
D) Synchronous

8) A Token Ring network uses what device to connect to workstations?


A) MSAU
B) Hub
C) Switch
D) Repeater

9) The primary responsibility of the Network OSI layer is:


A) data synchronization
B) flow control
C) routing
D) media connectors

10) A connection-oriented protocol guarantees what?


A) fast bandwidth
B) high Security
C) error free transmissions
D) delivery of data
11) There are ______ layers in the OSI Model.
A) six
B) eight
C) nine
D) seven

12) Email and FTP work at which layer of the OSI model?
A) Application
B) Session
C) User
D) Presentation

13) The most popular type of network architecture is ___________.


A) FDDI
B) Ethernet
C) WAN
D) ARC net

14) Which of the following is not a network topology?


A) mesh
B) Link
C) Bus
D) star

15) The service required for a system in a Windows Domain to access a resource in a Netware domain is called:
A) File and Print Services for Netware (FPNW)
B) Gateway Service for Netware (GSNW)
C) Netware Services for Gateway (GSNW)
D) Host Services for Netware (HSNW)

16) Most operating systems use a(n) ________________ files system in which files are organized in a tree-like structure.
A) Hierarchical
B) Linux
C) NFTS
D) Unix

17) The __________ is often very different from one operating system to the next, sometimes even between different versions of the
same operating system.
A) File Manager
B) Memory Manager
C) User Interface
D) Process Manager

18) A ______ chip holds software that is used to start the computer.
A) ROM
B) RAM
C) CPU
D) buffer

19) Each peripheral device has its own software, called a(n), which contains the detailed instructions required to start that device,
allocate it to a job, use the device correctly, and deallocate it when it’s appropriate.
A) device handler
B) device software
C) device driver
D) device controller

20) The name for the core portion of an operating system is the:
A) nucleus
B) center
C) kernel
D) manager
21) ______ allows separate partitions of a single server to support different operating systems.
A) Multithreading
B) Multiprocessing
C) Virtualization
D) Shared processing

22) With the development of ________ technology, a single chip was equipped with two or more processor cores.
A) networking
B) multicore
C) multiprogramming
D) multimedia

23) The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access
them repeatedly without wasting time. This purpose is similar to that of the:
A) block file
B) bookmark file
C) page file
D) cache file

24) Cache memory is divided into blocks of equal size called:


A) partitions
B) pages
C) slots
D) segments

25) Main memory also is known as:


A) single-user memory
B) random access memory
C) finite memory
D) virtual memory

26)

A) percentage
B) byte
C) bit
D) area

27) 1024 megabytes equals:


A) MISSING ANSWER
B) nanosecond
C) kilobyte
D) gigabyte

28) Approximately how many bytes make one megabyte?


A) one thousand
B) one hundred
C) one million
D) ten thousand

29) OS computer abbreviation usually means:


A) Operating System
B) Optical Sensor
C) Order of Significance
D) Open Software

30) The________ uniquely identifies each resource, starts its operation, monitors its progress, and, finally locates it making the
operating system available to the next waiting process.
A) Keyboard Manager
B) File Manager
C) Memory Manager
D) Device Manager

31) Who developed a code for transmission of telegraphic information using sequences of long and short elements to represent
letters, numerals, punctuation, and special characters?
A) James Lindsay
B) Elisha Gray
C) Alexander Graham Bell
D) Samuel Morse

32) Which one of the following signals is characterized by having the potential for infinite signal resolution and high density yet has
noise and signal loss problems?
A) digital
B) analog
C) aneroid
D) cardiod

33) Which type of microphone, also known as a capacitor or electrostatic microphone, has a diaphragm that acts as one plate of a
capacitor and vibrations produce changes in distance between the plates?
A) dynamic
B) condenser
C) carbon
D) piezoelectric

34) Which type of microphone works by using electromagnetic induction and is relatively inexpensive and resistant to moisture?
A) carbon
B) piezoelectric
C) condenser
D) dynamic

35) When referring to signal response, which is generally considered to be a perfect sphere in three dimensions?
A) cardioid
B) bi-directional
C) omnidirectional
D) shotgun

36) Which signal sensitivity pattern is so named for its heart-shaped pattern?
A) cardioid
B) bi-directional
C) synchronous
D) omnidirectional

37) What is the common term for combining many analog or digital signals and forwarding the selected input into a single line?
A) multiplexing
B) demodulation
C) modulation
D) demultiplexing

38) What is the term for the change in frequency of a wave for an observer moving relative to the source of the waves as is most
commonly heard when a vehicle sounding a siren or horn approaches, passes, and recedes?
A) Coriolis effect
B) Doppler effect
C) divergence
D) convergence

39) What is the term for headphones which sit on top of the ears rather than around them?
A) canalphones
B) supra-aural
C) circumaural
D) earbuds

40) Spamming is very poor Netiquette and means:


A) posting a message that contains graphics descriptions of something really gross
B) sending in lines of nonsensical garbage in a chat conversation
C) spilling the juice of meat-by products into your keyboard
D) posting or emailing unsolicited advertising messages to a wide audience

41) A set of programs through which the computer manages its own resources such as the central processing unit, memory,
secondary storage devices, and input/output devices.
A) Integrated software
B) Applications software
C) Bundled software
D) Operating systems software

42) When you change the color and background of a chart in a spreadsheet you are:
A) scanning
B) calculating
C) formatting
D) merging

43) Which feature of your word processing program would be used to send a form letter to a group of names and addresses:
A) Mail Merge
B) Sort and Send
C) Spell Check
D) View

44) Which one of the following is an example of an image file?


A) .mp3
B) .jpeg
C) .html
D) .exe

45) Copying copyright protected software and giving it to others for free is:
A) fair use
B) a civil act
C) always allowed
D) a criminal act

46) To run power hungry programs such as video editing software the computer needs a lot of:
A) ROM
B) REM
C) RAM
D) video files

47) The connecting of computers so that information can be shared is called:


A) networking
B) surfing
C) spamming
D) phishing

48) When planning a database, what is the first step?


A) change the page layout
B) select a background color
C) select fields
D) select a font

49) Software programs or hardware devices setup to protect computers while online are called:
A) firewalls
B) filter
C) browsers
D) cookies

50) Which one of the following is an output device:


A) microphone
B) mouse
C) keyboard
D) printer
51) Which one of the following would be used to compute the average score of four tests using a spreadsheet?
A) a calculator
B) a nerdy friend
C) a formula
D) a compilation

52) The part of a word processing document used to display repetitive information such as titles, dates, and page numbers is:
A) page display
B) header and footer
C) search and replace
D) cut and paste

53) The blinking line, box, or arrow on the computer screen is called the:
A) world wide web
B) cursor
C) mouse
D) graphic

54) What part of a window shows the name of the program you opened?
A) Quick Access toolbar
B) Scroll bar
C) Ribbon
D) Title bar

55) A______ is a container that helps you organize your files.


A) file
B) window
C) folder
D) taskbar

56) Some programs have______, words you click to show lists of commands.
A) toolbars
B) ribbons
C) groups
D) menus

57) When you ______a file, the file is transferred to the new location and no longer exists in its original location,
A) copy
B) move
C) backup
D) paste

58) You move a file using which commands?


A) install
B) copy and paste
C) cut and paste
D) delete

59) You should give folders______ names that help you easily to identify them.
A) uniform
B) identical
C) unique
D) similar

60) Which one of the following is a set of instructions written for a computer?
A) password
B) user account
C) program
D) log it
61) A ______ is a list of related commands.
A) group
B) menu
C) dialog box
D) button

62) The act of giving an instruction to your computer either by menu choice or keystroke.
A) Command
B) File
C) Finder
D) Download

63) Pressing _________ at the end of a row moves the insertion point to the first cell in the next row.
A) Ctrl
B) Tab
C) Spacebar
D) Enter

64) The following command is used to locate work with a subset of data in a worksheet.
A) sort
B) template
C) freeze panes
D) filter

65) __________ go horizontally—a side-by-side layout of boxes.


A) Cell
B) Columns
C) Rows
D) Grids

66) A group or block of cells in a spreadsheet.


A) Cell Address
B) Cell Range
C) Data Range
D) Ledger

67) A_______ is a group of cells that form a rectangle on the screen.


A) label
B) column
C) workbook
D) range

68) This icon allows you to insert colorful cartoon like pictures in sliders.
A) Pic icon
B) Picture icon
C) Clip Art
D) Cartoon art

69) The standard toolbar is located underneath the:


A) formatting toolbar
B) task pane
C) drawing toolbar
D) menu bar

70) Labels are aligned at the _____ edge of the cell.


A) right
B) bottom top
C) left
D) top bottom
71) What command will remove a file from the hard drive of a computer?
A) Paste
B) Save
C) Delete
D) Copy

72) The accepted standard for accessing an applications help system is to press the ____ key on the keyboard.
A) F12
B) H
C) F11
D) F1

73) Rotational hard disk drives are typically _____ than solid state drives.
A) smaller
B) faster
C) slower
D) more expensive

74) Solid State Disk (SSD) hard drives generally have the advantage of _____ over conventional rotational drives.
A) faster speed
B) larger size
C) more vibration
D) lower cost

75) To transfer data from one computer to another computer.


A) booting
B) uploading
C) downloading
D) copying

76) To send a file from one computer to another through a network.


A) boot
B) upload
C) batch
D) download

77) This is another name for secondary storage.


A) density
B) auxiliary storage
C) cylinder storage
D) memory

78) The pointer, usually arrow or cross shaped, which is controlled by the mouse.
A) cursor
B) codes
C) diagram
D) symbol

79) An add-on component to your computer.


A) hardware
B) peripheral
C) software
D) application

80) Which one of the following is an example of a peripheral?


A) scanner
B) spreadsheet
C) desktop
D) port
81) What step of information processing sends the information back to you in the manner you need it?
A) distribution
B) storage
C) output
D) input

82) A port that allows data to be transmitted in a series one after the other, such as the printer and modem ports on a computer.
A) SCSI port
B) serial port
C) LPT1 port
D) PCI

83) A copy of a file or disk you make for archiving purposes.


A) hard drive
B) compiler
C) disk
D) backup

84) A program that allows you to change settings in a program.


A) finder
B) application
C) compiler
D) control panel

85) Whath is a subdivision of a hard drives surface that is defined and used as a separate drive?
A) palette
B) partition
C) divider
D) popup menu

86) The _____ is the brain of the computer.


A) CPU
B) hard drive
C) motherboard
D) RAM

87) _____ offer the advantage of being instant-on machines with long battery life but typically have limited storage and alternative
operating systems.
A) Laptop computers
B) Tablet computers
C) Desktops
D) Servers

88) _____ are output devices which allow for sound to be produced.
A) Speakers
B) Scanners
C) Printers
D) Microphones

89) If over time a print device's output becomes lighter and lighter, it may be time to:
A) unplug the device
B) replace the toner cartridge
C) reinstall the drivers
D) clean the device

90) _____ are devices which read media from CD or DVD media.
A) Hard drives
B) Optical devices
C) SSD's
D) Scanners
91) _____ is the term used to describe malware that appears, to the user, to perform a desirable function but facilitates unauthorized
access to the user's computer system.
A) Trojan
B) Rootkit
C) Worm
D) Spam

92) A software package which automatically plays, displays, or downloads advertisements to a computer after the software is
installed or while the application is being used is known as:
A) Adware
B) Trojan
C) Spam
D) Virus

93) What type of malware installed on computers collects information about users without their knowledge?
A) Antivirus
B) Ad-Aware
C) Adware
D) Spyware

94) What is the term for a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a Trojan
horse?
A) zombie
B) client
C) brick
D) node

95) Who had the Internet first?


A) financial institutions
B) military
C) individuals
D) schools and hospitals

96) What does URL mean?


A) world wide web
B) an http
C) air well
D) Universal Resource Locator also known as the address

97) ______________________ is a group of people using social media tools and sites on the internet.
A) Hyper-local community
B) Online community
C) Citizens
D) Bloggers

98) ______________is an electronic version of a traditional printed book that can be download from the Internet and read on your
computer or handheld device.
A) Digital Story
B) Drupal
C) EBook
D) Blog

99) Which is not a web browser?


A) Netscape Communicator
B) Internet Explorer
C) File Zilla
D) Google Chrome

100) TCP stands for:


A) Transistor Control Protocol
B) Transfer Control Peripheral
C) Transmission Control Protocol
D) Transmission Control Program

2016 SLC Intro to Information Technology


1) A
2) D
3) B
4) B
5) D
6) C
7) C
8) A
9) C
1
D
0)
1
D
1)
1
A
2)
1
B
3)
1
C
4)
1
B
5)
1
A
6)
1
C
7)
1
A
8)
1
C
9)
2
C
0)
2
C
1)
2
B
2)
2
B
3)
2
C
4)
2
B
5)
2
B
6)
2
D
7)
2
C
8)
2
A
9)
3
D
0)
3
D
1)
3
B
2)
3
B
3)
3
D
4)
3
C
5)
3
A
6)
3
A
7)
3
B
8)
3
B
9)
4
B
0)
4
D
1)
4
C
2)
4
A
3)
4
B
4)
4
D
5)
4
C
6)
4
A
7)
4
C
8)
4
A
9)
5
D
0)
5
C
1)
5
B
2)
5
B
3)
5
D
4)
5
C
5)
5
D
6)
5
B
7)
5
C
8)
5
C
9)
6
C
0)
6
B
1)
6
A
2)
6
B
3)
6
D
4)
6
C
5)
6
B
6)
6
D
7)
6
C
8)
6
D
9)
7
C
0)
7
C
1)
7
D
2)
7
C
3)
7
A
4)
7
C
5)
7
B
6)
7
D
7)
7
A
8)
7
B
9)
8
A
0)
8
C
1)
8
B
2)
8
D
3)
8
D
4)
8
B
5)
8
A
6)
8
B
7)
8
A
8)
8
B
9)
9
B
0)
9
A
1)
9
A
2)
9
D
3)
9
A
4)
9
B
5)
9
D
6)
9
B
7)
9
C
8)
9
C
9)
1
0 C
0)

You might also like