Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
18 views

Computer Problem Solving

Uploaded by

reivax1242
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Computer Problem Solving

Uploaded by

reivax1242
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

NEW YORK STATE FBLA

COMPUTER PROBLEM SOLVING


2014
PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO

Test Directions

1. Complete the information requested on the answer sheet.

PRINT YOUR NAME on the “Name” line.


PRINT the name of the event, COMPUTER PROBLEM SOLVING on the
“Subject” line.
PRINT the name of your CHAPTER on the “DATE” line.

2. All answers will be recorded on the answer sheet.


Please do not write on the test booklet.

Scrap paper will be provided.

3. Read each question completely before answering. With a NO. 2 pencil,


blacken in your choices completely on the answer sheet. Do not make any
other marks on the answer sheet, or the scoring machine will reject it.

4. You will be given 60 minutes for the test. You will be given a starting signal
and a signal after 50 minutes have elapsed.

Tie will be broken using the last 10 questions of the test.


2014 NYS FBLA SLC 2
COMPUTER PROBLEM SOLVING
1. Which standard defines wireless?
a. 802.11 c. 802.3
b. 802.7 d. 802.9

2. A 3xx POST error code indicates a problem with the:


a. Mouse
b. Video adapter
c. Floppy drive
d. Keyboard

3. Your client's computer refuses to connect to the network. You observe the NIC light is not ON and then use a
different cable. What should you do next?
a. Re-enter the username and password
b. Attempt to log in to the server again observing the NIC light status.
c. Check the power supply.
d. All of the above.

4. Maximum USB cable length is:


a. 5 meters
b. 10 meters
c. 18 meters
d. 25 meters

5. Which of the following would not need to be updated as part of your critical system drivers that would assist
in an issue where the machine keeps restarting?
a. Graphics card c. Network card
b. Motherboard d. Sound card

6. If you’re not running your Web browser and are still getting pop-up ads on your desktop you most likely
installed:
a. Adware. c. Anti-malware.
b. Antivirus software. d. All of the above.

7. Which of the following is a reason your computer will not print?


a. Printer’s drivers are up to date. c. The printer is set to work offline.
b. It has enough paper. d. All of the above.

8. What is the best way to figure out which performance-killers you can safely disable on your computer?
a. Check that all the wires are plugged in correctly.
b. Check the startup item and manufacturer columns in the system configuration.
c. Un-install and reinstall the operating system.
d. Check in the control panel, under the devices and printers.

9. A drawback of wireless networking is:


a. Cable length.
b. FDDI.
c. Security.
d. TCP/IP.
2014 NYS FBLA SLC 3
COMPUTER PROBLEM SOLVING
10. Which type is used for a hard drive?
a. Type I. c. Type III.
b. Type II. d. Type IV.

11. Which one of the following laser printer components is responsible for using heat and pressure to melt and
bond the toner to the paper?
a. Drum
b. Fusing unit
c. Pickup roller
d. Transfer corona wire

12. To restore the original registry settings when you first installed Windows, from the Emergency Repair Disk,
which option would you use to restore the registry?
a. Press A for repair all.
b. Press F for fast repair.
c. Press M for manual repair.
d. Press R for registry repair.

13. How many keys are used in public key encryption to encrypt and decrypt data?
a. One c. Three
b. Two d. Four

14. When setting up a user’s workstation, the angle of his/her forearm to his/her body should be at which degree?
a. 30
b. 45
c. 90
d. 180.

15. What term defines a computer crime where one person masquerades as someone else?
a. Spoofing c. Cloning
b. Spooling d. Identity theft

16. Which of the following files is a compression one or more items into a smaller archive?
a. HTML file c. Word file
b. Portable Document File d. Zip file

17. Which of the following terms is used to help people evaluate information found online?
a. RADCAB c. WYSIWYG
b. QWERTY d. All of the above.

18. Which one of the following is not listed by the FBI National Computer Crime Squad (NCCS) as a computer
crime?
a. Installation of network monitoring software
b. Major computer network intrusion
c. Pirated software
d. Intrusion of the public phone system
2014 NYS FBLA SLC 4
COMPUTER PROBLEM SOLVING
19. Computer ethics include which of the following?
a. Intellectual property rights c. Privacy concerns
b. How computers affect society d. All of the above

20. Access points that use Wi-Fi are also called:


a. Networks c. Points
b. Base stations d. None of the above

21. IRQ2 is used with which of the following?


a. COM1 c. LPT1
b. COM2 d. Used to cascade second IRQ controller

22. Which of the following is port address for serial port COM1?
a. 2F8-2FF
b. 320-32F
c. 3F0-3F7
d. 3F8-3FF

23. A parity error usually indicates a problem with which of the following?
a. USB ports c. Memory
b. Motherboard d. Cooling fan

24. You are reported that the monitor at a client’s place is having a problem. You are about to remove the cover
of the monitor. What do you do just before opening the monitor cover?
a. Connect the monitor as well as the wrist strap to the ground.
b. Wear wrist strap to prevent ESD damage to the monitor.
c. Make sure that the ESD is grounded properly.
d. Make sure that the power is switched off and the power cord is plugged out

25. Your monitor screen is a light green color, what could be the problem?
a. The graphics card is starting to go. c. A pin is bent on the video cable connector.
b. The website is that color. d. None of the above.

26. Which of the following is programmed by burning fuses within the memory, meaning that it can only be
programmed once?
a. PROM c. BIOS
b. RAM d. FMEM

27. The purpose of an operating system is:


a. To organize and control hardware and software so that the device it lives in behaves in a
flexible but predictable way.
b. Manage how much data you can send through a network or modem connection.
c. To identify SCSI devices.
d. All of the above.
e. None of the above.

28. Which control signal on a serial cable, indicates that the data set is ready?
a. CTS c. DTR
b. DSR d. RTS
2014 NYS FBLA SLC 5
COMPUTER PROBLEM SOLVING

29. What is the maximum color depth of an SVGA monitor?


a. 256 colors c. 64 K colors
b. 1024 colors d. 16 million colors

30. Which function key is pressed to bypass CONFIG.SYS, and AUTOEXEC.BAT during the DOS boot
process?
a. F4 c. F6
b. F5 d. F8

31. __________ is when a computer becomes low on RAM while running applications so it temporarily uses hard
drive space for additional memory?
a. Recycling c. Swapping
b. Redirecting d. Thrashing

32. This is not a basic type of virus?


a. boot-sector
b. file infector
c. iMule infector
d. trojan horse

33. A CMOS virus is an example of this type of virus:


a. boot-sector c. iMule infector
b. file infector. d. trojan horse

34. While booting up, a client’s computer shows an error message with a code 201. What is the likely cause?
a. The CMOS battery is bad.
b. The CPU is bad
c. The Hard disk is bad.
d. The Memory test has failed.

35. The physical sector in any bootable hard disk contains which of the following?
a. File structure
b. Data structure
c. MBR
d. LBR

36.Which of the following DRAM types is fastest?


a. BEDO DRAM c. EDO DRAM
b. Conventional DRAM d. FPM DRAM

37. What’s the best way to protect your hard drive data?
a. Regular backups
b. Run a regular diagnostic
c. Run chkdsk at least once a week
d. Run scandisk at least once a week
2014 NYS FBLA SLC 6
COMPUTER PROBLEM SOLVING
38. ECC is used to verify data transmissions by locating and correcting transmission errors. What does ECC
stand for?
a. Error Correction Code
b. Extension Correction Code
c. Error Code Chip
d. Extension Compilation Code

39. What is the cloud?


a. Storage on the Internet. c. Storage on your USB.
b. Storage on your personal computer. d. All of the above.

40. Which of the following is an example of a personal computer?


a. Desktop
b. Laptop
c. ATM
d. Calculator
e. All of the above

41. Specialized computers would include:


a. iPads
b. Smartphones
c. Video game consoles
d. All of the above
e. None of the above

42. The process that verifies that your login and password are correct is?
a. ACL c. Authentication
b. Access control d. Verification

43. What is the difference between a Search Engine and a Directory?


a. Search engines have a search box while directories are not searchable.
b. Search engines are free while Directories charge money for their services.
c. Most search engines use spiders while directories do not.
d. Webmaster can submit their resource to a search engine, but not to a directory.

44. ISDN stands for:


a. Inferior Sector Data Net c. Integrated Services Digital Network
b. Interior Sector Direct None d. Internal Select Data Nulls

45. Which one of the following terms refers to the snapshot of the system state that is used during a system
restore?
a. Event log c. Registry backup
b. Restore point d. System console

46. Which utility enables you to reset a computer’s network adapter?


a. Network map c. IPCONFIG
b. Windows Network Diagnostics d. Local area connection
2014 NYS FBLA SLC 7
COMPUTER PROBLEM SOLVING
47. Which component is not part of the Windows Security Center
a. Computer management c. Automatic updates
b. Windows Firewall d. Malware protection

48. A good example of firmware is:


a. Windows 95 c. DOS
b. ROM BIOS d. CONFIG.SYS

49. The “brain” of a microcomputer system is called:


a. Chipset c. RAM
b. Coprocesesor d. Microprocessor

50. How many devices can be daisy chained to a USB port?


a. 7 c. 127
b. 15 d. 255

51. How many bites make up a byte?


a. 4
b. 8
c. 16
d. 32

52. Which of the following is the first cache the CPU uses?
a. L2 memory
b. RAM
c. L1 memory
d. Cache memory

53. This is an ultra high-performance computer made for high volume, processor-intensive computing, typically
used by large businesses and for scientific purposes. What is it?
a. Mainframe c. Laptop
b. CPU d. Network

54. How many pins a DIN-5 connector will have?


a. 3
b. 4
c. 5
d. 9

55. How many devices, a 16-bitt SCSI-2 can support?


a. 7
b. 8
c. 14
d. 16

56. What is the command syntax for assigning “Hidden” attribute to file c:\myfile?
a. ATTRIB +R C:\MYFILE c. ATTRIB –H C:\MYFILE
b. ATTRIB +H C:\MYFILE d. ATTRIB H C:\MYFILE
2014 NYS FBLA SLC 8
COMPUTER PROBLEM SOLVING
57. Which of the following is not allowed to be set using the ATTRIB command?
a. System c. Read-only
b. Hidden d. All of the above

58. When Windows 95/98 boots successfully, it creates two back up files for the Registry. Which are those two
back up Registry files?
a. REG0.DAT, REG1.DAT c. USER.DA0, SYSTEM.DA0
b. USER.DAT, SYSTEM.DAT d. REG_BACK.DAT, REG_SYS.DAT

59. Your customer has bought a second hard disk and added it to an existing computer. The first hard disk is
having one primary partition and one Extended partition. The extended partition is divided into two logical
drives D and E. When you install the second hard drive and format it, what would be the drive letter assigned
to the first logical drive on the extended partition of first hard disk? (Assume that the second hard disk has
one primary partition and only one logical drive on the Extended partition.)
a. “D”
b. “E”
c. “F”
d. “G”

60. Which processor has first combined the L2 system cache inside the processor CPU package?
a. 80486
b. Pentium
c. Pentium Pro
d. Pentium III

61. Which of the following is not required for DOS to boot?


a. COMMAND.COM c. IO.SYS
b. MSDOS.SYS d. AUTOEXEC.BAT

62. What are the two files that the Windows 95 registry is comprised of?
a. SYSTEM.COM, SYSTEM.DAT
b. SYSTEM.DAT, USER.DAT
c. USER.DAT, IOSYS.COM
d. IOSYS.COM, SYSTEM.COM

63. You have loaded Windows 3.1 into the primary partition on your computer, and made it the default Operating
System. You have formatted one of the logical drives in the Extended partition. Which file system would
have been installed?
a. FAT16
b. FAT32
c. VFAT
d. NTFS

64. A programming error that causes a program to behave in an unexpected way is a:


a. Bug c. Bus
b. Chip d. Cookie
2014 NYS FBLA SLC 9
COMPUTER PROBLEM SOLVING
65. With data transfers, if you are on the receiving end, you are __________, and if you are on the sending end,
you are __________.
a. uploading, downloading c. uploading, deleting
b. downloading, uploading d. deleting, uploading

66. Which of the following is not a peripheral?


a. Keyboard c. Printer
b. Mouse d. Screen

67. Cyberspoofing is a crime in which a person


a. creates a virus to disrupt someone else’s computer network.
b. commits cyberextortion or blackmail.
c. falsely adopts the identity of someone else in order to commit fraud.
d. uses a computer to steal data stored in digital format.

68. Inserting and removing Tablet PCs from their stations without having power to them down is called
a. Hot swapping c. Hot docking
b. Abrupt hot swapping d. Surprise hot docking

69. If someone creates a phony Web site that simulates a real bank and sends false e-mails, it is called
a. cyberblackmail. c. cyberspoofing.
b. cyberphishing. d. cyberpiracy.

70. The feature that allows notebooks to control power usage, allowing a device to turn on a notebook or allowing
a notebook to turn on a device, is called?
a. Advanced Control and Power Integration (ACPI)
b. Advanced Configuration and Power Interface (ACPI)
c. Power Options
d. Power Management

71. Of the various connections and ports located on the back of a laptop, which one would be unlikely to find?
a. IDE connector
b. USB connector
c. Microphone jack
d. Compact Flash card slot

72. Alice is considering the purchase of an iPad but needs help deciding which features to consider. She is trying
to match how she will use it with the features available in commercial products. Of the questions below,
which one is least likely to be helpful in assisting Alice in her decision making?
a. How easy is the iPad to use? c. What applications come with the iPad?
b. Can the iPad use e-mail and the Web? d. Is the operating system software Windows
or Linux based?

73. Harmful software is sometimes known as __________ software.


a. Maladjusted
b. Malignant
c. Malicious
d. Malevolent
2014 NYS FBLA SLC 10
COMPUTER PROBLEM SOLVING
74. The term ____ is a generic term for anyone who intends to access a computer system without permission.
a. Cracker c. Hijacker
b. Hacker d. Smacker

75. __________ should be turned on to ensure your computer has the most up-to-date security fixes, critical
updates, and operating system.
a. Disk clean up c. Windows Automatic Updates
b. Disk defragmenter d. Windows Control Panel

76. A common symptom of malware is when your


a. messages do not appear unexpectedly
b. computer runs faster than normal
c. computer runs much slower than normal
d. programs run fast

77. __________ regulate or condition the power to provide continuous voltage during brownouts.
a. Data line protectors
b. Power conditioners
c. Surge suppressors
d. UPSs

78. The CIPHER command is used for file and folder


a. coding.
b. compressing.
c. decompressing.
d. encryption.
79. Breanne wants to make sure that her laptop has the most recent versions of files she needs at the conference.
What component of Windows Vista should she use to reconcile the files on her desktop with the versions of
the same files on her laptop?
a. Mobility Center
b. Network and Sharing Center
c. Remote Desktop Connection
d. Sync Center

80. In older monitors a buildup of bad magnetism would cause the monitor have a loss of color accuracy. By
pushing the __________ button your monitor would make a buzzing noise and cause the screen to go – in
order to get the bad magnetism out of your screen. Newer screens automatically __________ the screen and
magnetism doesn't build up in flat screen displays so they don’t have it. Which button is this referring to?
a. Degauss
b. Demagnetize
c. Debug
d. None of the above

81. __________ __________ can be used to create books, magazines, newspapers, flyers, pamphlets, and many
other printed documents.
a. Desktop publishing
b. Graphical printing
c. Desktop printing
d. Graphical publishing
2014 NYS FBLA SLC 11
COMPUTER PROBLEM SOLVING

82. A network server uses this protocol to dynamically assign IP addresses to networked computers. What is:
a. DHCP c. DNS
b. TCP/IP d. None of the above.

83. The process of converting something from analog to digital is known as:
a. digitize. c. condense.
b. analyze. d. None of the above.

84. You boot your PC and don’t hear the usual single beep. What should you check first?
a. The power connection. c. The network connection.
b. The speaker. d. The screen resolution.

85. A 4xx, 5xx, or 24 xx POST error code indicates a problem with the:
a. Floppy drive c. Video adapter
b. GUI d. None of the above

86. What is the most likely consequence of a power outage?


a. There are no consequences. c. The screen locks.
b. Fan motor failure. d. Lost data.

87. In the event of a power outage, what is an UPS designed to do?


a. Keep the computer up and running.
b. Shut the computer down safely.
c. Put the computer in to hibernation mode.
d. None of the above.

88. You have shifted your Windows XP machine using an optical mouse to a new glass top table. Now the
mouse stops responding, but you do not see any related error messages either during boot up or in the device
manager. What is the likely cause for the problem?
a. The mouse has died. c. You need to change the mouse settings in the control panel.
b. You need a mouse pad. d. None of the above.

89. What hardware/software must support the plug-and-play concept to ensure that it works properly when
peripheral devices are installed on a server?
I. Plug-and-play operating system
II. Plug-and-play peripheral device
III. Plug-and-play system BIOS
a. I and III only
b. I and II only
c. II and III only
d. I, II and III

90. From the perspective of an end user, what makes the ATX different from the AT?
a. Power button is electrical not mechanical. c. There is no difference.
b. Power button is mechanical not electrical. d. All of the above.
2014 NYS FBLA SLC 12
COMPUTER PROBLEM SOLVING
91. Which of the following is the address of a specific web site or file on the Internet?
a. UPS c. URL
b. URI d. USB

92. Fred is setting up a printer to be shared so in the printer properties dialog box, which tab will restrict users’
rights to this printer?
a. Advanced c. Security
b. General d. Sharing

93. Blaine is considering adding a peripheral device but thinks his BIOS may need to be flashed to accommodate
this upgrade. When should he flash the BIOS?
a. Before changing the CMOS setup c. Before installing any devices
b. After installing all new devices d. After upgrading the operating system

94. If Debra wants to install a networking device that will extend the length to transmit signals farther to
accommodate a new cubicle area in his office building. What type of device should Debra use?
a. Router c. Repeater
b. Switch d. Bridge

95. Marissa is installing a wireless network in one of the branch offices of her company. She needs the wireless
network to operate at 5.0 GHz with a range of 35 to 50 meters. Which IEEE standard equipment type should
Marissa use?
a. 802.11a c. 802.11d
b. 802.11b d. 802.11g

96. Which term below is not a way of regerring to how data is transmitted in “pieces” on the network?
a. Packets
b. Datagrams
c. Envelops
d. Frames

97. Alex is having trouble connecting to the Internet. During troubleshooting, Alex finds that he is able to use the
ping utility to verify connection to sites on the Internet but can only ping them using their IP addresses and
not their domain name. What does Alex conclude based on this information?
a. The default gateway is down. c. DHCP services are down.
b. DNS services are down. d. WAN services are down.

98. Wendy needs to extend the network she manages by connecting two hubs together. She needs a specific type
of cable to accomplish this. Which cable types should Wendy choose?
a. Crossover cable c. Thicknet cable
b. Patch cable d. Thinnet cable

99. What is the acceptable range of pages that can be printed on a dot-matrix printer before it overheats?
a. 50 to 75 c. 95 to 110
b. 70 to 85 d. 100 to 125
2014 NYS FBLA SLC 13
COMPUTER PROBLEM SOLVING
100. Lorrie, an IT tech, gets a call from an employee saying she can't print to the network printer. Lorrie
troubleshoots the issue and he suspects that the firmware on the printer's NIC is having trouble
communicating with TCP/IP network protocol. Which of the options below will give Lorrie the best chance to
solve this problem?
a. Try restarting the printer to reinitialize the TCP/IP settings
b. Check the printer’s CMOS setup to make sure the TCP/IP is enabled.
c. Tray flashing the printer’s BIOS.
d. Open a command window on the user’s computer and try to telnet into the printer.
2014 NYS FBLA SLC 14
COMPUTER PROBLEM SOLVING

ANSWER KEY
1. A 26. A 51. B 76. C
2. D 27. A 52. B 77. B
3. B 28. B 53. A 78. D
4. A 29. D 54. C 79. D
5. D 30. B 55. D 80. A
6. A 31. C 56. B 81. A
7. C 32. C 57. D 82. A
8. B 33. A 58. C 83. A
9. C 34. D 59. B 84. B
10. C 35. C 60. C 85. C
11. B 36. A 61. D 86. D
12. D 37. A 62. B 87. B
13. B 38. A 63. A 88. B
14. C 39. A 64. A 89. D
15. A 40. E 65. B 90. A
16. D 41. D 66. D 91. C
17. A 42. C 67. C 92. C
18. A 43. C 68. D 93. C
19. D 44. C 69. C 94. C
20. B 45. B 70. B 95. A
21. D 46. D 71. C 96. C
22. D 47. A 72. D 97. B
23. C 48. B 73. C 98. A
24. D 49. D 74. B 99. A
25. C 50. C 75. C 100. C

You might also like