2016 SLC Intro to Information Technology Past Paper PDF
Document Details
Uploaded by Deleted User
2016
SLC
Tags
Summary
This is a past paper from the SLC board for Intro to Information Technology in 2016. The paper contains multiple-choice questions focused on topics such as network architecture, computer components, and basic operating system concepts, testing the fundamental knowledge of information technology.
Full Transcript
# Intro to Information Technology - 2016 SLC 1. The general term for a slower speed network which spans a very long distance is a: - WAN - MAN - LAN - PAN 2. The main difference between a switch(or bridge) and a hub is that a switch also lies within the **_layer_** of the OSI model...
# Intro to Information Technology - 2016 SLC 1. The general term for a slower speed network which spans a very long distance is a: - WAN - MAN - LAN - PAN 2. The main difference between a switch(or bridge) and a hub is that a switch also lies within the **_layer_** of the OSI model. - Routing - Session - Network - Layer 2 3. Which one of the following statements is not true about Wide Area Networks (WANs)? - WANs typically use public transports for Connectivity. - WANs typically have greater bandwidth capacities than LANs. - WANs cover larger geographic areas than LANs. - WANs usually use a router for connectivity. 4. A server-based network usually involves one or more: - hubs - switches - servers - LANs 5. Which one of the following devices forwards incoming traffic to all ports except for the incoming port? - bridge - repeater - router - hub 6. The main function of a firewall is: - the weakening of data signals as they travel through a media - to directly shield viruses - to prevent unauthorized access to your network - to make Internet connections faster 7. Broadband transmissions refer to what kind of signal? - Asynchronous - Digital - Analog - Synchronous 8. A Token Ring network uses what device to connect to workstations? - MSAU - Hub - Switch - Repeater 9. The primary responsibility of the Network OSI layer is: - data synchronization - flow control - routing - media connectors 10. A connection-oriented protocol guarantees what? - fast bandwidth - high security - error-free transmissions - delivery of data 11. There are **_seven_** layers in the OSI Model. - six - eight - nine - seven 12. Email and FTP work at which layer of the OSI model? - Application - Session - User - Presentation 13. The most popular type of network architecture is **_Ethernet_**. - FDDI - Ethernet - WAN - ARC Net 14. Which of the following is not a network topology? - Mesh - Link - Bus - Star 15. The service required for a system in a Windows Domain to access a resource in a Netware domain is called: - File and Print Services for Netware (FPNW) - Gateway Service for Netware (GSNW) - Netware Services for Gateway (GSNW) - Host Services for Netware (HSNW) 16. Most operating systems use a(n) file system in which files are organized in a tree-like structure. - Hierarchical - Linux - NFTS - Unix 17. The **_Memory Manager_** is often very different from one operating system to the next, sometimes even between different versions of the same operating system. - File Manager - Memory Manager - User Interface - Process Manager 18. A **_ROM_** chip holds software that is used to start the computer. - ROM - RAM - CPU - Buffer 19. Each peripheral device has its own software, called a(n) **_device driver_**, which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when it's appropriate. - device handler - device software - device driver - device controller 20. The name for the core portion of an operating system is the: - nucleus - center - kernel - manager 21. **_Virtualization_** allows separate partitions of a single server to support different operating systems. - Multithreading - Multiprocessing - Virtualization - Shared processing 22. With the development of **_multicore_** technology, a single chip was equipped with two or more processor cores. - Networking - Multicore - Multiprogramming - Multimedia 23. The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the: - block file - bookmark file - page file - cache file 24. Cache memory is divided into blocks of equal size called: - partitions - pages - slots - segments 25. Main memory also is known as: - single-user memory - random access memory - finite memory - virtual memory 26. **_Byte_** - percentage - byte - bit - area 27. 1024 megabytes equals: - MISSING ANSWER - nanosecond - kilobyte - gigabyte 28. Approximately how many bytes make one megabyte? - one thousand - one hundred - one million - ten thousand 29. OS computer abbreviation usually means: - Operating System - Optical Sensor - Order of Significance - Open Software 30. The **_Device Manager_** uniquely identifies each resource, starts its operation, monitors its progress, and, finally locates it making the operating system available to the next waiting process. - Keyboard Manager - File Manager - Memory Manager - Device Manager 31. Who developed a code for transmission of telegraphic information using sequences of long and short elements to represent letters, numerals, punctuation, and special characters? - James Lindsay - Elisha Gray - Alexander Graham Bell - Samuel Morse 32. Which one of the following signals is characterized by having the potential for infinite signal resolution and high density yet has noise and signal loss problems? - Digital - Analog - Aneroid - Cardiod 33. Which type of microphone, also known as a capacitor or electrostatic microphone, has a diaphragm that acts as one plate of a capacitor and vibrations produce changes in distance between the plates? - Dynamic - Condenser - Carbon - Piezoelectric 34. Which type of microphone works by using electromagnetic induction and is relatively inexpensive and resistant to moisture? - Carbon - Piezoelectric - Condenser - Dynamic 35. When referring to signal response, which is generally considered to be a perfect sphere in three dimensions? - Cardioid - Bi-directional - Omnidirectional - Shotgun 36. Which signal sensitivity pattern is so named for its heart-shaped pattern? - Cardioid - Bi-directional - Synchronous - Omnidirectional 37. What is the common term for combining many analog or digital signals and forwarding the selected input into a single line? - Multiplexing - Demodulation - Modulation - Demultiplexing 38. What is the term for the change in frequency of a wave for an observer moving relative to the source of the waves as is most commonly heard when a vehicle sounding a siren or horn approaches, passes, and recedes? - Coriolis effect - Doppler effect - Divergence - Convergence 39. What is the term for headphones which sit on top of the ears rather than around them? - Canalphones - Supra-aural - Circumaural - Earbuds 40. Spamming is very poor Netiquette and means: - posting a message that contains graphics descriptions of something really gross - sending in lines of nonsensical garbage in a chat conversation - spilling the juice of meat byproducts into your keyboard - posting or emailing unsolicited advertising messages to a wide audience 41. A set of programs through which the computer manages its own resources such as the central processing unit, memory, secondary storage devices, and input/output devices. - Integrated software - Applications software - Bundled software - Operating systems software 42. When you change the color and background of a chart in a spreadsheet you are: - scanning - calculating - formatting - merging 43. Which feature of your word processing program would be used to send a form letter to a group of names and addresses: - Mail Merge - Sort and Send - Spell Check - View 44. Which one of the following is an example of an image file? - .mp3 - .jpeg - .html - .exe 45. Copying copyright protected software and giving it to others for free is: - fair use - a civil act - always allowed - a criminal act 46. To run power hungry programs such as video editing software the computer needs a lot of: - ROM - REM - RAM - video files 47. The connecting of computers so that information can be shared is called: - networking - surfing - spamming - phishing 48. When planning a database, what is the first step? - change the page layout - select a background color - select fields - select a font 49. Software programs or hardware devices setup to protect computers while online are called: - firewalls - filter - browsers - cookies 50. Which one of the following is an output device: - microphone - mouse - keyboard - printer 51. Which one of the following would be used to compute the average score of four tests using a spreadsheet? - a calculator - a nerdy friend - a formula - a compilation 52. The part of a word processing document used to display repetitive information such as titles, dates, and page numbers is: - page display - header and footer - search and replace - cut and paste 53. The blinking line, box, or arrow on the computer screen is called the: - world wide web - cursor - mouse - graphic 54. What part of a window shows the name of the program you opened? - Quick Access toolbar - Scroll bar - Ribbon - Title bar 55. A **_folder_** is a container that helps you organize your files. - file - window - folder - taskbar 56. Some programs have **_menus_** words you click to show lists of commands. - toolbars - ribbons - groups - menus 57. When you **_move_** a file, the file is transferred to the new location and no longer exists in its original location. - copy - move - backup - paste 58. You move a file using which commands? - install - copy and paste - cut and paste - delete 59. You should give folders **_unique_** names that help you easily to identify them. - uniform - identical - unique - similar 60. Which one of the, following is a set of instructions written for a computer? - password - user account - program - log it 61. A **_menu_** is a list of related commands. - group - menu - dialog box - button 62. The act of giving an instruction to your computer either by menu choice or keystroke. - Command - File - Finder - Download 63. Pressing **_Enter_** at the end of a row moves the insertion point to the first cell in the next row. - Ctrl - Tab - Spacebar - Enter 64. The following command is used to locate work with a subset of data in a worksheet. - sort - template - freeze panes - filter 65. **_Columns_** go horizontally—a side-by-side layout of boxes. - Cell - Columns - Rows - Grids 66. A group or block of cells in a spreadsheet. - Cell Address - Cell Range - Data Range - Ledger 67. A **_workbook_** is a group of cells that form a rectangle on the screen. - label - column - workbook - range 68. This icon allows you to insert colorful cartoon like pictures in sliders. - Pic icon - Picture icon - Clip Art - Cartoon art 69. The standard toolbar is located underneath the: - formatting toolbar - task pane - drawing toolbar - menu bar 70. Labels are aligned at the **_left_** edge of the cell. - right - bottom top - left - top bottom 71. What command will remove a file from the hard drive of a computer? - Paste - Save - Delete - Copy 72. The accepted standard for accessing an applications help system is to press the **_F1_** key on the keyboard. - F12 - H - F11 - F1 73. Rotational hard disk drives are typically **_slower_** than solid state drives. - smaller - faster - slower - more expensive 74. Solid State Disk (SSD) hard drives generally have the advantage of **_faster speed_** over conventional rotational drives. - faster speed - larger size - more vibration - lower cost 75. To transfer data from one computer to another computer. - booting - uploading - downloading - copying 76. To send a file from one computer to another through a network. - boot - upload - batch - download 77. This is another name for secondary storage. - density - auxiliary storage - cylinder storage - memory 78. The pointer, usually arrow or cross shaped, which is controlled by the mouse. - cursor - codes - diagram - symbol 79. An add-on component to your computer. - hardware - peripheral - software - application 80. Which one of the following is an example of a peripheral? - scanner - spreadsheet - desktop - port 81. What step of information processing sends the information back to you in the manner you need it? - distribution - storage - output - input 82. A port that allows data to be transmitted in a series one after the other, such as the printer and modem ports on a computer. - SCSI port - serial port - LPT1 port - PCI 83. A copy of a file or disk you make for archiving purposes. - hard drive - compiler - disk - backup 84. A program that allows you to change settings in a program. - finder - application - compiler - control panel 85. What is a subdivision of a hard drives surface that is defined and used as a separate drive? - palette - partition - divider - popup menu 86. The **_CPU_** is the brain of the computer. - CPU - hard drive - motherboard - RAM 87. **_Tablet computers_** offer the advantage of being instant-on machines with long battery life but typically have limited storage and alternative operating systems. - Laptop computers - Tablet computers - Desktops - Servers 88. **_Speakers_** are output devices which allow for sound to be produced. - Speakers - Scanners - Printers - Microphones 89. If over time a print device's output becomes lighter and lighter, it may be time to: - unplug the device - replace the toner cartridge - reinstall the drivers - clean the device 90. **_Optical devices_** are devices which read media from CD or DVD media. - Hard drives - Optical devices - SSD's - Scanners 91. **_Rootkit_** is the term used to describe malware that appears, to the user, to perform a desirable function but facilitates unauthorized access to the user's computer system. - Trojan - Rootkit - Worm - Spam 92. A software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed or while the application is being used is known as: - Adware - Trojan - Spam - Virus 93. What type of malware installed on computers collects information about users without their knowledge? - Antivirus - Ad-Aware - Adware - Spyware 94. What is the term for a computer attached to, the Internet that has been compromised by a hacker, a computer virus, or a Trojan horse? - zombie - client - brick - node 95. Who had the Internet first? - financial institutions - military - individuals - schools and hospitals 96. What does URL mean? - world wide web - an http - air well - Universal Resource Locator also known as the address 97. **_Online community_** is a group of people using social media tools and sites on the internet. - Hyper-local community - Online community - Citizens - Bloggers 98. **_EBook_** is an electronic version of a traditional printed book that can be downloaded from the Internet and read on your computer or handheld device. - Digital story - Drupal - EBook - Blog 99. Which is not a web browser? - Netscape Communicator - Internet Explorer - File Zilla - Google Chrome 100. TCP stands for: - Transistor Control Protocol - Transfer Control Peripheral - Transmission Control Protocol - Transmission Control Program 2016 SLC Intro to Information Technology Answers: 1) A 2) D 3) B 4) C 5) D 6) C 7) B 8) C 9) C 10) D 11) D 12) A 13) B 14) C 15) B 16) A 17) C 18) A 19) C 20) C 21) C 22) B 23) B 24) B 25) B 26) B 27) D 28) C 29) A 30) A 31) D 32) B 33) B 34) B 35) C 36) A 37) A 38) B 39) B 40) B 41) D 42) C 43) A 44) B 45) D 46) C 47) A 48) C 49) C 50) D 51) C 52) B 53) B 54) D 55) C 56) D 57) B 58) C 59) C 60) C 61) B 62) A 63) D 64) B 65) B 66) C 67) D 68) C 69) D 70) C 71) C 72) D 73) C 74) A 75) C 76) B 77) D B 79) B 80) A 81) C 82) B 83) D 84) D 85) B 86) A 87) B 88) A 89) B 90) B 91) A 92) A 93) D 94) A 95) B 96) D 97) B 98) C 99) C 100) C