Future Business Leaders of America
2015 – 2016 Team Open Testing
COMPUTER CONCEPTS/INTERNET
CONCEPTS/SOCIAL MEDIA CONCEPTS –
MIDDLE LEVEL
Your team may work together but you may not refer to other reference materials or
other individuals outside of your team in answering the questions. You must
return your answer sheet within 30 minutes to be eligible.
1. Complete the information requested on the answer sheet or your test will not be graded.
NEATLY PRINT YOUR NAME on the first line following the word “NAME”. If there is more than one member of a team, PRINT all of your names on the back on the signature line.
Write the name of your SCHOOL on the “DATE” line (Spell out your school name).
2. All answers will be recorded on the answer sheet.
3. Read each question carefully before answering. When you have decided which answer is correct, find the space on the answer sheet following the number of the problem. With a pencil, BLACKEN THE ENTIRE SPACE in the proper column. Do not make any other marks on the answer sheet as the scoring machine will reject it.
4. Read each question carefully. You may be asked to give more than one answer per question. 5. Be sure to use a #2 pencil with an eraser.
6. You are allowed 30 minutes for completing the test.
7. If you are given TRUE/FALSE questions, answer True questions in the “A” column and False questions in the “B” column.
8. When you are finished with your test, bring it to your test proctor and you may leave. Ties will be broken based on the order the test was submitted.
DO NOT WRITE ON THIS TEST! This test will be reused.
If you write on it, your team will be disqualified.
Results will be announced at the Fall Leadership Conference for those tests taken at Rally.
2015 Georgia FBLA Team Open Testing – Computer Concepts/Internet Concepts/Social Media Concepts – Middle Level
1) <title></title> is an example of ____. A) C++
B) HTML C) Cobol D) Basic
2) 202.3.104.55 is an example of a(n) ____. A) ISP
B) IP address C) Binary code
D) Microsoft code for downloading
3) A computer ___ designs and tests new hardware products, such as computer chips, circuit boards, computers, and peripheral devices.
A) Engineer B) Programmer C) Operator D) Specialist
4) A computer ___ is two or more computers or devices that are connected for the purpose of sharing data and programs.
A) Panel B) Matrix C) PDA D) Network
5) A library keeps a file that includes the title, author and subject of each of its books. Which type of software is best for this task?
A) Word processing B) Database
C) Graphics D) Spreadsheet
6) A monitor’s viewable size is the ____ measurement of the actual viewing area provided by the monitor. A) Area
B) Vertical C) Horizontal D) Diagonal
7) A personal computer that requests data from a server is called a ____. A) PDA
B) Circuit C) Client D) Mask
8) A program is a list of instructions ___. A) That makes the computer think
B) Written in a special language that the computer understands C) Written in English that tells the computer what to do
D) Written in BASIC that makes the computer think 9) A programmer’s ethical responsibility is to ____.
A) Only write programs that protect human life
B) Not create programs for robots because they replace people C) Ensure that the software will perform as well as a human D) Ensure, as best as he/she can, the reliability of the software
10) A ___ is a device that is connected to at least two networks – sort of like a spider sitting in the middle of a web.
A) Hub B) Gateway C) Repeater D) Router
11) A(n) ___ typically maintains the devices that provide subscribers with e-mail and access to the Web. A) ISP
B) Modem C) DNS
D) Workstation
12) A(n) ____ is text that you specify to automatically appear in the top margin of every page. A) Structure
B) Footer C) Header D) Abbreviation
13) A(n) ____ system, such as Windows, UNIX, or Mac OS, is essentially the master controller for all of the activities that take place within a computer system.
A) Panel B) Operating C) Matrix D) Control
14) An unauthorized group of instructions inserted into a software program in order to disrupt or destroy the program is called ____.
A) Virus B) Sensor C) Password D) Code
15) Data is processed in the ____. A) Central processing unit B) Personal digital assistant C) Storage unit
D) Memory chip
16) Eliminating processing or logic errors from a program is called ____. A) Logic checking
B) Testing
C) Desk checking D) Debugging
17) Every web page has a unique address called a(n) ____. A) Protocol
B) FTP C) URL D) HTTP
18) Google is an example of ____. A) e-mail
B) Phishing C) Spam
D) A search engine
19) How many characters can you use in a Twitter post? A) 100 characters
B) Unlimited C) 200 characters D) 140 characters
20) In a spreadsheet, the term “global format” refers to ___. A) One cell
B) All cells C) One row D) All documents
21) Most digital cameras store photographic images in ____ format(s). A) JPEG
B) TIFF C) GIF D) AIFF
22) PowerPoint is a powerful presentation ____ program. A) Graphics
B) Database C) Spreadsheet D) Word processing
23) Small Java applications are called Java ____. A) Fragments
B) Frames C) Applets D) Servers 24) Spam is ____.
A) A web browser B) Unsolicited email C) A virus
D) A picture
25) Systems software refers to the computer’s ____ system. A) Productivity
B) Computing C) Application D) Operating
26) The 1990’s spawned a group of Internet-based companies that are referred to as ____. A) Cyber coms
B) Dot coms C) Intercoms D) Net coms
27) The intersection of a row and column in a spreadsheet is called a ___. A) Cell
B) Value C) Formula D) Range
28) The latest iPad is the ____. A) iPad mini
B) iPad Air
C) iPad 4th Generation D) iPad
29) The title of a spreadsheet or the identifier for a column or row is called a ____. A) Format
B) Default C) Label D) Legend
30) The Web is based on the concept of ____, a collection of documents that can be related by links. A) Ports
B) Cookies C) Tags D) Hypertext
31) The ____ is the communications network that carries Web data. A) Java Virtual Network
B) Internet C) WC3 D) Intranet
32) This is the area of a computer that temporarily holds data that is waiting to be processed. A) Memory
B) Output C) Input D) Storage
33) What connects several nodes of a LAN? A) Gateway
B) Router C) Hub D) Repeater
34) What is the permanent memory built into your computer called? A) CPU
B) ROM C) CD-ROM D) RAM
35) What numbering system do computers use for data processing? A) Decimal
B) Hexadecimal C) Binary D) Octal
36) When Virtual Basic saves a file, it adds the extension _____ to the file name. A) .prg
B) .exc C) .vbp D) .frm
37) Which database command is used to find a specific piece of information? A) Report
B) Query C) Insert D) Replicate
38) Which is an example of a public computer data network? A) URL
B) Web browser C) World Wide Web D) Search engine
39) Which of the following is famous for manufacturing computer processors? A) Sony
B) Apple
C) Macromedia D) Intel
40) Which software is best for creating logo designs? A) Telecommunications
B) Graphics C) Database D) Spreadsheet
41) Who owns YouTube? A) LinkedIn
B) Facebook C) Google D) Wiki
42) You need to manage your video publicity settings to ___if you want only people who has the link to the video to view the video.
A) non-public B) public C) unlisted D) private
43) Which of the following is the world’s most popular blogging platforms? A) ooVoo
B) Tumblr C) Twitter D) Instagram
44) What is Snapchat’s most popular feature? A) Widgets
B) Podcast C) Vlogging D) Stories
45) What is the most popular & frequently used social media platform among teens? A) Facebook
B) Twitter C) Tumblr D) Snapchat
46) Which of the following is the number one social network for job searches? A) Facebook
B) YouTube C) LinkedIn D) Google+
47) The number of accounts that a Twitter handle is a(n) ___. A) following
B) hashtag C) impression D) thread
48) Tweeterboxes is a slang term to refer to Twitter users who ___. A) tweet within a time frame daily
B) tweet outside the box C) use Twitter to network D) tweet excessively
49) What is an image that represents a person online such as social networks, commenting platforms and forums?
A) avatar B) digg C) hashtag D) emojis
50) Emoji was created in ___. A) China
B) Japan C) the USA D) Germany
2015 RALLY – COMPUTER CONCEPTS/INTERNET CONCEPTS/SOCIAL MEDIA CONCEPTS – MIDDLE LEVEL 1) B 2) B 3) A 4) D 5) B 6) D 7) C 8) B 9) D 10 ) D 11 ) A 12 ) C 13 ) B 14 ) A 15 ) A 16 ) D 17 ) C 18 ) D 19 ) D 20 ) B 21 ) A 22 ) A 23 ) C 24 ) B 25 ) D 26 ) B 27 ) A 28 ) B 29 ) C 30 ) D 31 ) B 32 ) A
33 ) C 34 ) B 35 ) C 36 ) C 37 ) B 38 ) C 39 ) D 40 ) B 41 ) C 42 ) C 43 ) B 44 ) D 45 ) A 46 ) C 47 ) A 48 ) D 49 ) A 50 ) B