If you can't read please download the document
Upload
jahwall12
View
31
Download
6
Embed Size (px)
Citation preview
Exam Review Lessons 3-10Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Some companies use spyware to ____. a. trace stolen equipment b. monitor employee personal computer use c. designate a schedule for backing up data d. sound an alarm if equipment is moved
____
2. ____ can occur when older systems are discarded and the data is not deleted. a. Encryption c. Data theft b. Backup d. Viruses
____
3. The ____ process makes data unreadable unless or until it is decrypted. a. backup c. connectivity b. troubleshooting d. encryption
____
4. People who use remote software on stolen systems to connect to the organizations network and bypass the companys security measures are called ____. a. firewalls c. spikers b. hackers d. bugs
____
5. To back up files, you should save them to ____. a. the main system c. an independent storage device b. the organizations network d. a notebook computer
____
6. Employees accessing company computers for personal use is considered ____. a. part of the job c. theft b. a relaxing break d. confidential
____
7. For optimal performance, the relative humidity of the computer room should be above 20 percent and below ____. a. sea level c. the dew point b. the temperature d. 30 percent
____
8. What environmental factor should be considered when taking a cold notebook computer from an airconditioned office into an automobile on a sunny day? a. Humidity c. Power loss b. Magnetic fields d. Water damage
____
9. Data on a hard drive is stored in small ____ dots on the disk. a. water-proof c. removable b. magnetic d. battery-powered
____ 10. Damaged cables can ____. a. prevent peripheral devices from communicating with the computer b. cause a hard drive crash ____ 11. There are ____ basic types of UPS systems. a. two b. four
c. cause power spikes d. conduct static electricity
c. five d. twelve
____ 12. Which type of hardware issue would you evaluate using a boot disk? a. Printer problem c. Loss of network connectivity b. Display problem ____ 13. If media is damaged by water, first ____. a. restart the computer b. place it in an airtight plastic bag d. Crashed hard drive
c. dry it d. any of the above
____ 14. What is the first step in trying to recover data from damaged media? a. Test the media to see how much damage has occurred. b. Turn the computer on. c. Open the computer case to visually inspect it. d. Move the media to a secure environment. ____ 15. If the printed image is faded, this could indicate ____. a. the toner is low c. economy mode printing is turned on b. the print density is set too low d. any of the above ____ 16. When a hardware device such as a printer or monitor does not work, it could be ___. a. a software problem c. a mechanical problem b. an electrical problem d. any of the above
____ 17. You would use the DOS ping command to test for which issue? a. Display problems c. Paper jams b. Connectivity d. Crashed hard drive
____ 18. What window do you use to execute a ping command?
a. Accessories b. All Programs FIGURE 3-1
c. Command Prompt d. Test Connection
____ 19. The device shown in Figure 3-1 above would be used for ____. a. backing up data c. preventing data loss due to power outages b. protecting against power spikes d. monitoring the humidity in a computer room
FIGURE 3-2
____ 20. Figure 3-2 above shows ____. a. a video card problem b. a driver giving instructions to the operating system
c. the results of a ping command d. a loss of Internet connectivity
Case 3-1 Britton lives in a rural area that sometimes experiences electrical power failure or fluctuations. He wants to safeguard his computer system against power outages. ____ 21. To protect against power spikes, Britton would use a(n) ____. a. standby power system (SPS) c. surge suppressor b. driver d. separate thermostat
____ 22. Britton could install an uninterruptible power supply (UPS) to keep his computer running for several ____ following a power outage. a. minutes c. hours b. days d. weeks
Case 3-2 Sylvia is the network administrator for the organization where she works. One of her duties is to ensure the right balance of physical and environmental conditions in the computer room. ____ 23. For optimal system reliability, Sylvia keeps the temperature in the computer room between ____ degrees. a. 62 to 68 c. 78 to 85 b. 68 to 75 d. 85 to 92
____ 24. Sylvia had a tile floor installed in the computer room to help prevent ____. a. water damage c. humidity b. static electricity d. theft
____ 25. Unorganized and unprotected cables can create ____. a. fragmented files c. exposed corona wires b. clogged ink jets d. safety hazards
____ 26. If the peripheral devices are not communicating with the computer, what might help? a. Adding computer memory c. Spraying compressed air b. A cable management kit d. A 50-50 percent solution of water and vinegar
____ 27. One of the best ways to cut down on computer repair is ____. a. by using cable management kits c. through preventative maintenance
b. by purchasing an ergonomic keyboard
d. to replace the power supply regularly
____ 28. You should clean a computer more frequently if it ____. a. has a wireless keyboard c. is an older model b. is in a dusty environment d. is used every day
____ 29. If you spill liquid onto the keyboard, the first step is to ____. a. spray it with compressed air c. turn off the computer b. turn it upside down ____ 30. A mouse with a ball is a(n) ____ mouse. a. wireless b. mechanical d. shake it to remove the liquid
c. ergonomic d. laser
____ 31. Wearing latex gloves can help protect your hands while ____. a. deleting cookies from the hard drive c. cleaning a printer b. installing additional memory ____ 32. Data stored in RAM is ____. a. temporary b. permanent d. managing computer cables
c. inaccessible d. damaged
____ 33. Which of the following should be considered when selecting a keyboard? a. Design c. Comfort b. Performance d. All of the above
____ 34. You would most likely find a touchpad on ____. a. a laser printer c. a notebook computer b. the motherboard d. an ergonomic keyboard
____ 35. Disk ____ is one of the more time-consuming elements in a computers performance. a. defragmentation c. cleanup b. seek time d. deletion
____ 36. The option to defragment your hard drive is found in the ____ window. a. Control Panel c. System and Maintenance b. Disk Cleanup Options d. Network and Internet
____ 37. Generally, you access the Recycle Bin through an icon located ____. a. on the desktop c. on the shortcut menu b. on the hard drive d. in the Properties dialog box
____ 38. What is displayed when you right-click the Recycle Bin icon and then click Empty Recycle Bin? a. A list of delete files c. A shortcut menu b. The Recycle Bin Properties dialog box d. A warning box
____ 39. ____ normally exist only during the current session of the software program. a. Cookies c. Fragmented files b. Temporary files d. all of the above
____ 40. Click the Start button, point to All Programs, click Accessories, click ____, and then click Disk Cleanup to display the Disk Cleanup Options dialog box. a. OK c. System and Maintenance b. Control Panel ____ 41. Primarily, cookies are used ____. a. to gather information about your surfing habits b. to threaten your computers security d. System Tools
c. to free memory for other programs d. for printing
____ 42. Which of the following is a maintenance or repair that should be performed by a computer professional? a. Replacing or adding additional RAM c. Defragmenting the hard drive b. Cleaning an inkjet printer FIGURE 4-1 d. Emptying the Recycle Bin
____ 43. The blue sectors shown in Figure 4-1 above represent ____. a. a fragmented file c. the processing cycle b. a contiguous file FIGURE 4-2 d. adjacent clusters
____ 44. Figure 4-2 above shows ____. a. corona wires
c. how to maintain a laser printer
b. RAM chips on a motherboard
d. cable management
Case 4-1 Sierra has owned her computer for almost two years and decides to upgrade it so that she can increase her output and production. ____ 45. Which purchase would provide Sierra the best value for increasing overall computer performance? a. A cable management kit c. Additional computer memory b. A touchpad d. Corona wires
____ 46. If Sierra wants to move around as necessary and not be bound to her desk, she should purchase ____. a. an ergonomic keyboard c. a touchpad b. a wireless keyboard d. RAM chips
Case 4-2 Dane wants his computer to run faster and more efficiently, so he establishes a regular maintenance schedule using the utilities that come with Microsoft Windows. ____ 47. To delete temporary files and other files that are not needed, Dane would use ____. a. Disk Cleanup c. the defragmentation utility b. the Recycle Bin d. the self-cleaning mode
____ 48. Dane can use the Delete Browsing History dialog box to delete ____. a. files from the Recycle Bin c. cookies b. fragmented files d. system properties
____ 49. Which of the following is the best illustration of the problem-solving process? a. A phone book c. A ruler b. A road map d. A compass
____ 50. Which of the following is NOT part of the first step of the problem-solving process? a. Ensure that you actually have a problem. b. Identify what the problem is. c. Start with the most obvious or simplest possibilities and troubleshoot from there. d. Collect all the available data regarding the situation. ____ 51. Which step of the problem-solving process are you performing if you are asking questions, using what-if statements, and clarifying the current situation? a. First c. Third b. Second d. Fourth
____ 52. After you define the problem, you need to ____. a. collect all the facts c. ask someone else to verify that it is a problem b. test each solution one at a time d. look for help and advice from an expert source
____ 53. Attempting to reproduce the problem is part of ____. a. defining the problem c. identifying possible solutions b. investigating and analyzing the problem ____ 54. The investigation and analysis step ____. a. determines what the real issue is b. alleviates the problem d. selecting and implementing a solution
c. provides information needed to make an accurate decision d. determines the likely outcome
____ 55. Asking what you should do differently is the kind of question you should ask to ____. a. diagnose the problem c. implement a solution b. identify possible solutions d. confirm the solution
____ 56. If you identify more than one possible solution, critique and test each one at a time to determine ____. a. if you can reproduce the problem c. its likely outcome b. if a problem actually exists d. if you need to return to the previous step
____ 57. When implementing a solution, if you are not sure about the consequences of your actions, ____. a. attempt the action and record the results c. stop the problem-solving process b. look for help and advice from an expert source d. combine it with another solution
____ 58. After putting a selected solution into place, the next step is to ____. a. document the problem and solution c. evaluate its performance b. consult the hardware or software documentation d. refer to the notes you took in Step 1
____ 59. If your selected solution does not work at all, go to the ____ step and ask better questions before trying new solutions. a. first c. previous b. last d. next
____ 60. The Troubleshooting link is found in the ____ window. a. Control Panel c. Windows Help and Support
b. Ask Someone
d. Troubleshooting in Windows
____ 61. Which action should occur before you purchase a computer? a. Maintaining c. Discarding b. Repairing d. Researching
____ 62. Which type of computer would be a good choice if you are a home user with limited funds? a. Windows c. Linux PC b. Macintosh d. Any of the above
____ 63. The terms of guaranteed repair or replacement for a computer that doesnt meet certain specifications would be located on the ____. a. box c. warranty b. support agreement d. software documentation
____ 64. Which of the following information would NOT be found in a computer warranty? a. If there is software coverage c. The terms of the support agreement b. When technical support is available d. Whether on-site repair is available
____ 65. A general rule is that the useful life of a computer for the general public is ____. a. two to three years c. three to five years b. two to four years d. three to ten years
____ 66. If you need to dispose of a computer that is still usable, the best option is to ____ it. a. donate c. recycle b. discard FIGURE 5-1 d. upgrade
____ 67. To display the window shown in Figure 5-1 above, ____ and then click Help and Support. a. right-click the desktop c. double-click the Troubleshooting link b. click the Start button FIGURE 5-2 d. open your browser
____ 68. By performing the activity shown in Figure 5-2 above, you should be able to determine ____. a. the useful life of the computer c. when technical support is available b. where to discard old equipment d. how often to perform regularly scheduled maintenance
Case 5-1 Valessa is having difficulty sending e-mail. A co-worker suggests that she use the problem-solving process to troubleshoot the issue. ____ 69. What is the first thing Valessa should do? a. Try sending another email b. Call technical support c. Make sure the computer is turned on and connected to the Internet d. Write down the symptoms and any possible solutions ____ 70. Before moving to the next step, Valessa should ____. a. report back to her co-worker c. try sending e-mail from a different computer b. fully complete the first step d. test all possible solutions Case 5-2 Cades grandmother has never owned a computer. Cade is trying to help her decide what type of computer to purchase for her own personal use. ____ 71. To help his grandmother select which computer to purchase, Cades first task should be to ____.
a. let his grandmother try his computer b. ask her what she will be using the computer for
c. find out how much money she wants to spend d. discuss backup procedures with her
____ 72. Keyboards, scanners, and microphones are examples of ____. a. software programs c. output devices b. input devices ____ 73. Another word for software is ____. a. input b. output d. utilities
c. program d. system
____ 74. Using the analogy of a book when talking about a computer, the pages and ink of a book would be like the ____ of a computer. a. software c. bundleware b. hardware d. software license
____ 75. After writing an algorithm for solving a problem very plainly, the next step would be to rewrite the steps in ____. a. a flowchart c. a programming language b. machine language d. the quality control process
____ 76. What process involves running systematic tests, debugging, and beta testing? a. Quality control c. Downloading an update b. Installing software d. Entering data
____ 77. Word processors and database systems are types of ____. a. application software c. utilities b. system software d. operating systems
____ 78. ____ software includes authoring, animation, music, and virtual reality. a. Education, home, and personal c. Workgroup computing b. Multimedia d. System
____ 79. Which task can you perform in the Word Options dialog box? a. Add and remove buttons from the Quick c. Create an algorithm Access Toolbar b. Scan a document and print a copy d. Report bugs in the software
____ 80. ____ provides a graphical user interface (GUI) you use to control the computer. a. An input device c. Application software b. An operating system d. A flowchart
____ 81. Which of the following is not an operating system? a. Microsoft Windows c. Visual Basic b. Linux d. Mac OS
____ 82. A disk defragmenter is an example of a(n) ____. a. operating system c. language translator b. utility d. compiler
____ 83. ____ is a recently developed software delivery method where an application is licensed for use as a service. a. SaaS c. Open source b. ASP d. Bundleware
____ 84. Which software modification generally involves radical changes to the product? a. Upgrade c. Update b. Patch d. Service pack
____ 85. ____ is software that is included with the purchase of a new computer. a. Open source c. Shareware b. Freeware ____ 86. Software piracy is ____. a. preventable by copyrighting the software b. almost impossible to stop d. Bundleware
c. the authorized copying of software d. the responsibility of the manufacturer
Case 6-1 Olivia works as a network manager for a financial services company. Part of her job is to manage software purchases and installation. ____ 87. To give her company the right to install a program on a server that can be accessed by a specific number of computers, Olivia would need to acquire a ____. a. network license c. service pack b. single-use license d. Web application
Case 6-2 Dontray works as a programmer for a software development firm. He writes the steps of an algorithm in a computer programming language or code.
____ 88. Dontray follows rules for how words are used together, called ____. a. input c. logic b. syntax d. sequence
____ 89. If Dontray makes a mistake in the code, it can be found and corrected by ____. a. using a flowchart c. downloading an update b. releasing the software to the public d. debugging
____ 90. Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data? a. Word c. Excel b. PowerPoint d. Access
____ 91. The 6 by 6 rule refers to six lines of text, six words per line when creating a ____. a. word-processing document c. presentation slide b. spreadsheet ____ 92. The rows in an Access table are called ____. a. cells b. records d. database table
c. fields d. objects
____ 93. A ____ asks a question about the data stored in the table. a. query c. form b. record d. primary key
____ 94. After creating a table, the next step is to ____. a. add records c. create a table template b. add fields d. create a report
____ 95. ____ is a popular photo/image-editing program. a. Adobe Photoshop c. 3D Studio Max b. Corel Painter d. QuickTime
____ 96. ____ programs help you perform computer housekeeping chores. a. Multimedia c. Utility b. Spreadsheet d. Database
____ 97. What type of programs reduce the amount of disk space a file requires? a. Backup programs c. Antivirus programs
b. File compression programs
d. Widgets
____ 98. What type of software would you use to attend online meetings and share desktop presentations? a. Computer-aided design (CAD) c. Project management b. Groupware d. Web conferencing
Case 7-1 Drake just installed the Microsoft Office suite on his computer. He is learning more about each program so he can choose the one that is appropriate for each task. ____ 99. Drake would choose PowerPoint if he wanted to ____. a. use a text editor c. present information in a slide show b. prepare a budget d. create a select query
Case 7-2 Celeste is a graphic designer that works with several different graphics programs. She uses a variety of types of images, depending on the project. ____ 100. What kind of image does Celeste use when she needs to adjust the resolution to the highest quality? a. Bitmap c. Animated b. QuickTime d. Vector
____ 101. Which of the following is not a task performed by the operating system? a. Coordinate the activities of the computer b. Manage resources for applications c. Restrict access allowed to system administrators d. Perform system and file maintenance tasks ____ 102. Keeping track of files and directories is a job performed by ____. a. a driver c. an emulation card b. an operating system d. application software ____ 103. The ____ identifies sections of a disk that are not being used. a. file system c. user b. driver d. microprocessor
____ 104. Which of the following is a peripheral device? a. Motherboard c. Smart phone b. Microprocessor d. Printer
____ 105. ____ was developed by a group of programmers at AT&T. a. Mac c. Windows b. UNIX d. BlackBerry
____ 106. Which of the following statements is true about the Linux operating system? a. It has a reputation for being unstable and crashing frequently. b. It is an open source program that is free. c. It runs on more personal computers worldwide than other operating systems. d. It contains a processor manufactured by Motorola. ____ 107. The operating system on most small devices and smart phones resides on a ____. a. motherboard c. Bluetooth device b. ROM chip d. widget ____ 108. ____ is a scaled-down version of the Windows operating system. a. Embedded Linux c. Symbian OS b. Palm OS d. Windows Embedded CE
____ 109. To save a file in text format or Rich Text Format, you use the ____ command in your word-processing program. a. Convert c. Save As b. Text d. Share
____ 110. A Rich Text Format file can be transferred ____. a. across a network c. to a mobile device b. to a Linux server d. any of the above
____ 111. A(n) ____ is a collection of information that determines which files you can access and which settings you use. a. network c. operating system b. user account d. file system
____ 112. Without administrative rights, you cannot ____. a. install software c. access your user account b. browse the Internet d. type a password
____ 113. To have administrative rights, you must know ____. a. what software is installed on the computer c. how many users accounts exist b. the administrative password d. the network settings
____ 114. If a copy of a Windows program does not run on a computer with a Macintosh operating system, this is an example of ____. a. file corruption c. an unstable system b. incompatibility d. none of the above
____ 115. If your operating system unexpectedly shuts down, what might help solve the problem? a. Installing an emulation card c. Rebooting the system b. Using a system utility FIGURE 8-2 d. Performing diagnostic testing
____ 116. To display the menu shown in Figure 8-2 above, you would click the ____ button. a. Office c. Open b. Start d. Help
Case 8-1 Catarina uses the UNIX operating system on her computer because it is a multitasking portable operating system that can run on just about any hardware platform. ____ 117. Catarinas profession is most likely to be which of the following? a. Teacher c. Scientist b. Receptionist d. Nurse
____ 118. If Catarina wanted to use a variant of the UNIX operating system instead, she would choose ____. a. Mac OS c. Windows b. Linux d. Palm OS
Case 8-2 Sergio is an accountant who works on a computer with a Windows operating system. But many of his clients are artists and designers who use Macintosh computers. ____ 119. Which of the following is a hardware solution that Sergio could add to the motherboard of his computer to run a program that is designed for a different operating system? a. Emulation card c. Bluetooth device b. Software emulation program d. ROM chip
____ 120. When saving a word-processing document, which format should Sergio use so that it will be readable by most word-processing programs on different systems? a. Word Template (.dotx) c. Works (.wps) b. Plain Text (.txt) ____ 121. The taskbar is located ____. a. on the Start menu b. at the bottom of the screen d. Web Page (.htm)
c. on the Quick Launch toolbar d. at the top of the screen
____ 122. The Sidebar is a section of the desktop that displays small programs called ____. a. icons c. gadgets b. shortcuts d. drivers
____ 123. The Recycle Bin stores discarded items until ____. a. another user logs on c. the end of the day b. the computer is shut down d. you empty it
____ 124. ____ an empty space on the desktop to display a shortcut menu.
a. Click b. Double-click
c. Right-click d. Press Shift and click
____ 125. The Change desktop icons link is located in the ____. a. Task Manager c. Help and Support Center b. Personalization window d. Computer window
____ 126. To start a program in Windows Vista, click the ____ and then click the program name. a. Start button c. title bar b. taskbar d. desktop
____ 127. You can recognize the active window because its ____ is a different color or intensity. a. Close button c. bottom border b. title bar d. scroll bar
____ 128. Windows Vista is available for purchase in ____ different versions. a. two c. eight b. four ____ 129. Shortcuts contain ____ on their icon. a. exclamation points b. number signs d. ten
c. crosses d. arrows
____ 130. To create a desktop folder, right-click a blank space on the desktop, point to ____, and then click Folder to display a new folder. a. Create c. New b. Folder d. any of the above
____ 131. Which type of files are essential files necessary for running Windows? a. System files c. Data files b. Application files d. None of the above
____ 132. When you right-click a file in the Recycle Bin and click Restore, the file is restored ____. a. to the desktop c. to the Computer window b. to its original location ____ 133. In the _____, you can choose to hide a file. a. Search pane d. to a new folder
c. Properties dialog box
b. Computer window
d. Program Files folder
____ 134. Windows Vista allows filenames with up to ____ characters. a. 8 c. 255 b. 122 d. 512
Case 9-1 Eli is working on his computer when suddenly the application he is using stops functioning and will not respond. He cannot close the program or perform any other tasks in Windows. ____ 135. Eli should use the ____ to close the unresponsive program. a. Log Off option c. Computer window b. Task Manager d. Windows Sidebar
____ 136. Which of the following options is located in the System and Maintenance category of the Control Panel? a. Administrative Tools c. Windows Firewall b. Windows Defender d. Folder Options
____ 137. Which of the following tasks can you perform using the Appearance and Personalization window of the Control Panel? a. Change your e-mail profile c. Adjust the screen resolution b. See a list of installed software d. Set power options
____ 138. The Ease of Access category of the Control Panel is helpful for users with a ____. a. laptop c. wireless Internet connection b. vision, hearing, or mobility disability d. standard user account
____ 139. The Wait text box in the Screen Saver Settings dialog box allows you to enter the number of minutes ____. a. that the screen saver will display before turning off b. before a different screen saver is displayed c. before the screen saver starts d. that you want to preview the screen saver ____ 140. You can display the Mouse Properties dialog box from which window in the Control Panel? a. System and Maintenance c. Hardware and Sound b. Ease of Access d. Appearance and Personalization ____ 141. Installing new or updated software from a CD or DVD is a simple process that starts by ____. a. making a backup copy c. inserting the CD or DVD into the computer
b. recording the product key
d. registering the software
____ 142. A(n) ____ is a fix for a specific problem in the software. a. download c. update b. upgrade d. none of the above
____ 143. Which factor is eliminated when subscribing to an SaaS application? a. Hardware c. Upkeep b. Installation fees d. All of the above
____ 144. If a file cannot be read by an application, you can check it by right-clicking the filename and then clicking ____. a. Encrypt c. General b. Properties FIGURE 10-1 d. Advanced
____ 145. The options shown in Figure 10-1 above can be located in the ____ category of the Control Panel. a. Ease of Access c. Security b. System and Maintenance FIGURE 10-2 d. Network and Internet
____ 146. The dialog box shown in Figure 10-2 above can be opened from the ____ window. a. Hardware and Sound c. Appearance and Personalization b. Programs d. User Accounts
Case 10-1 Lakisha has just moved to a different work station in her office. She is on a network and needs to add a new local printer to her computer and change the default printer. ____ 147. Lakisha should access the ____ category of the Control Panel in order to add or remove printers. a. Hardware and Sound c. Programs b. Network and Internet d. User Accounts
____ 148. To change the default printer, Lakisha would select the printer in the Printers window and then ____. a. open the Printing Preferences dialog box b. click the Set as default button on the toolbar c. type the printers location in the Address bar d. start the Add Printer Wizard Case 10-2
Rupert has been assigned a new project at work and needs to install additional software on his computer in order to have access to the programs that he needs to complete the project. ____ 149. If Rupert installs the software himself, it can be assumed that he has a(n) ____ account on his computer. a. administrator c. guest b. standard d. family ____ 150. When Rupert inserts the installation disc into the appropriate drive, most likely a(n) ____ dialog box will be displayed. a. Run Setup c. Program Information b. Open with WinZip d. AutoPlay
Exam Review Lessons 3-10 Answer Section
MULTIPLE CHOICE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: B C D B C C C A B A A D B D D D B C B C C A B B D B C B C B C A D C B C A D B PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-56 Mod1-56 Mod1-57 Mod1-57 Mod1-58 Mod1-59 Mod1-59 Mod1-59 Mod1-60 Mod1-61 Mod1-61 Mod1-62 Mod1-58 Mod1-62 Mod1-57 Mod1-58 Mod1-56 Mod1-57 Mod1-68 Mod1-68 Mod1-69 Mod1-69 Mod1-69 Mod1-69 Mod1-70 Mod1-73 Mod1-75 Mod1-76 Mod1-77 Mod1-78 Mod1-79 Mod1-79 Mod1-80
TOP: TOP: TOP: TOP:
Critical Thinking Critical Thinking Critical Thinking Critical Thinking
40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86.
ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:
D A A A B C B A C B D A A B C B C B C A C D C C C C A B C C B B B C B C A A B A B C B A A D B
PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:
Mod1-81 Mod1-82 Mod1-84 Mod1-77 Mod1-73 Mod1-72 Mod1-75 Mod1-80 Mod1-82 Mod1-90 Mod1-90 Mod1-90 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-92 Mod1-92 Mod1-95 Mod1-98 Mod1-99 Mod1-99 Mod1-100 Mod1-101 Mod1-101 Mod1-95 Mod1-100 Mod1-90 Mod1-93 Mod1-99 Mod1-106 Mod1-106 Mod1-107 Mod1-108 Mod1-109 Mod1-110 Mod1-110 Mod1-111 Mod1-113 Mod1-113 Mod1-114 Mod1-114 Mod1-115 Mod1-119 Mod1-119
TOP: TOP: TOP: TOP:
Critical Thinking Critical Thinking Critical Thinking Critical Thinking
TOP: Critical Thinking TOP: Critical Thinking TOP: Critical Thinking
87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132.
ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:
A B D C C B A B A C B D C D C B A D B B B D C D B A B B C B C B A B B C D C B A B B D C A B
PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:
Mod1-114 Mod1-109 Mod1-109 Mod1-127 Mod1-133 Mod1-135 Mod1-135 Mod1-135 Mod1-139 Mod1-140 Mod1-140 Mod1-141 Mod1-130 Mod1-138 Mod1-146 Mod1-146 Mod1-146 Mod1-146 Mod1-149 Mod1-149 Mod1-150 Mod1-151 Mod1-152 Mod1-152 Mod1-152 Mod1-152 Mod1-153 Mod1-154 Mod1-154 Mod1-155 Mod1-149 Mod1-149 Mod1-151 Mod1-151 Mod1-167 Mod1-167 Mod1-167 Mod1-167 Mod1-168 Mod1-171 Mod1-171 Mod1-171 Mod1-172 Mod1-173 Mod1-176 Mod1-177
TOP: Critical Thinking TOP: Critical Thinking TOP: Critical Thinking
TOP: Critical Thinking TOP: Critical Thinking
TOP: TOP: TOP: TOP:
Critical Thinking Critical Thinking Critical Thinking Critical Thinking
133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150.
ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:
C C B A C B C C C C D B C C A B A D
PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:
Mod1-180 Mod1-181 Mod1-165 Mod1-190 Mod1-193 Mod1-194 Mod1-195 Mod1-199 Mod1-205 Mod1-207 Mod1-208 Mod1-211 Mod1-190 Mod1-195 Mod1-202 Mod1-203 Mod1-208 Mod1-205
TOP: Critical Thinking
TOP: TOP: TOP: TOP:
Critical Thinking Critical Thinking Critical Thinking Critical Thinking