IIT Exam Study Guide

Embed Size (px)

Citation preview

Exam Review Lessons 3-10Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Some companies use spyware to ____. a. trace stolen equipment b. monitor employee personal computer use c. designate a schedule for backing up data d. sound an alarm if equipment is moved

____

2. ____ can occur when older systems are discarded and the data is not deleted. a. Encryption c. Data theft b. Backup d. Viruses

____

3. The ____ process makes data unreadable unless or until it is decrypted. a. backup c. connectivity b. troubleshooting d. encryption

____

4. People who use remote software on stolen systems to connect to the organizations network and bypass the companys security measures are called ____. a. firewalls c. spikers b. hackers d. bugs

____

5. To back up files, you should save them to ____. a. the main system c. an independent storage device b. the organizations network d. a notebook computer

____

6. Employees accessing company computers for personal use is considered ____. a. part of the job c. theft b. a relaxing break d. confidential

____

7. For optimal performance, the relative humidity of the computer room should be above 20 percent and below ____. a. sea level c. the dew point b. the temperature d. 30 percent

____

8. What environmental factor should be considered when taking a cold notebook computer from an airconditioned office into an automobile on a sunny day? a. Humidity c. Power loss b. Magnetic fields d. Water damage

____

9. Data on a hard drive is stored in small ____ dots on the disk. a. water-proof c. removable b. magnetic d. battery-powered

____ 10. Damaged cables can ____. a. prevent peripheral devices from communicating with the computer b. cause a hard drive crash ____ 11. There are ____ basic types of UPS systems. a. two b. four

c. cause power spikes d. conduct static electricity

c. five d. twelve

____ 12. Which type of hardware issue would you evaluate using a boot disk? a. Printer problem c. Loss of network connectivity b. Display problem ____ 13. If media is damaged by water, first ____. a. restart the computer b. place it in an airtight plastic bag d. Crashed hard drive

c. dry it d. any of the above

____ 14. What is the first step in trying to recover data from damaged media? a. Test the media to see how much damage has occurred. b. Turn the computer on. c. Open the computer case to visually inspect it. d. Move the media to a secure environment. ____ 15. If the printed image is faded, this could indicate ____. a. the toner is low c. economy mode printing is turned on b. the print density is set too low d. any of the above ____ 16. When a hardware device such as a printer or monitor does not work, it could be ___. a. a software problem c. a mechanical problem b. an electrical problem d. any of the above

____ 17. You would use the DOS ping command to test for which issue? a. Display problems c. Paper jams b. Connectivity d. Crashed hard drive

____ 18. What window do you use to execute a ping command?

a. Accessories b. All Programs FIGURE 3-1

c. Command Prompt d. Test Connection

____ 19. The device shown in Figure 3-1 above would be used for ____. a. backing up data c. preventing data loss due to power outages b. protecting against power spikes d. monitoring the humidity in a computer room

FIGURE 3-2

____ 20. Figure 3-2 above shows ____. a. a video card problem b. a driver giving instructions to the operating system

c. the results of a ping command d. a loss of Internet connectivity

Case 3-1 Britton lives in a rural area that sometimes experiences electrical power failure or fluctuations. He wants to safeguard his computer system against power outages. ____ 21. To protect against power spikes, Britton would use a(n) ____. a. standby power system (SPS) c. surge suppressor b. driver d. separate thermostat

____ 22. Britton could install an uninterruptible power supply (UPS) to keep his computer running for several ____ following a power outage. a. minutes c. hours b. days d. weeks

Case 3-2 Sylvia is the network administrator for the organization where she works. One of her duties is to ensure the right balance of physical and environmental conditions in the computer room. ____ 23. For optimal system reliability, Sylvia keeps the temperature in the computer room between ____ degrees. a. 62 to 68 c. 78 to 85 b. 68 to 75 d. 85 to 92

____ 24. Sylvia had a tile floor installed in the computer room to help prevent ____. a. water damage c. humidity b. static electricity d. theft

____ 25. Unorganized and unprotected cables can create ____. a. fragmented files c. exposed corona wires b. clogged ink jets d. safety hazards

____ 26. If the peripheral devices are not communicating with the computer, what might help? a. Adding computer memory c. Spraying compressed air b. A cable management kit d. A 50-50 percent solution of water and vinegar

____ 27. One of the best ways to cut down on computer repair is ____. a. by using cable management kits c. through preventative maintenance

b. by purchasing an ergonomic keyboard

d. to replace the power supply regularly

____ 28. You should clean a computer more frequently if it ____. a. has a wireless keyboard c. is an older model b. is in a dusty environment d. is used every day

____ 29. If you spill liquid onto the keyboard, the first step is to ____. a. spray it with compressed air c. turn off the computer b. turn it upside down ____ 30. A mouse with a ball is a(n) ____ mouse. a. wireless b. mechanical d. shake it to remove the liquid

c. ergonomic d. laser

____ 31. Wearing latex gloves can help protect your hands while ____. a. deleting cookies from the hard drive c. cleaning a printer b. installing additional memory ____ 32. Data stored in RAM is ____. a. temporary b. permanent d. managing computer cables

c. inaccessible d. damaged

____ 33. Which of the following should be considered when selecting a keyboard? a. Design c. Comfort b. Performance d. All of the above

____ 34. You would most likely find a touchpad on ____. a. a laser printer c. a notebook computer b. the motherboard d. an ergonomic keyboard

____ 35. Disk ____ is one of the more time-consuming elements in a computers performance. a. defragmentation c. cleanup b. seek time d. deletion

____ 36. The option to defragment your hard drive is found in the ____ window. a. Control Panel c. System and Maintenance b. Disk Cleanup Options d. Network and Internet

____ 37. Generally, you access the Recycle Bin through an icon located ____. a. on the desktop c. on the shortcut menu b. on the hard drive d. in the Properties dialog box

____ 38. What is displayed when you right-click the Recycle Bin icon and then click Empty Recycle Bin? a. A list of delete files c. A shortcut menu b. The Recycle Bin Properties dialog box d. A warning box

____ 39. ____ normally exist only during the current session of the software program. a. Cookies c. Fragmented files b. Temporary files d. all of the above

____ 40. Click the Start button, point to All Programs, click Accessories, click ____, and then click Disk Cleanup to display the Disk Cleanup Options dialog box. a. OK c. System and Maintenance b. Control Panel ____ 41. Primarily, cookies are used ____. a. to gather information about your surfing habits b. to threaten your computers security d. System Tools

c. to free memory for other programs d. for printing

____ 42. Which of the following is a maintenance or repair that should be performed by a computer professional? a. Replacing or adding additional RAM c. Defragmenting the hard drive b. Cleaning an inkjet printer FIGURE 4-1 d. Emptying the Recycle Bin

____ 43. The blue sectors shown in Figure 4-1 above represent ____. a. a fragmented file c. the processing cycle b. a contiguous file FIGURE 4-2 d. adjacent clusters

____ 44. Figure 4-2 above shows ____. a. corona wires

c. how to maintain a laser printer

b. RAM chips on a motherboard

d. cable management

Case 4-1 Sierra has owned her computer for almost two years and decides to upgrade it so that she can increase her output and production. ____ 45. Which purchase would provide Sierra the best value for increasing overall computer performance? a. A cable management kit c. Additional computer memory b. A touchpad d. Corona wires

____ 46. If Sierra wants to move around as necessary and not be bound to her desk, she should purchase ____. a. an ergonomic keyboard c. a touchpad b. a wireless keyboard d. RAM chips

Case 4-2 Dane wants his computer to run faster and more efficiently, so he establishes a regular maintenance schedule using the utilities that come with Microsoft Windows. ____ 47. To delete temporary files and other files that are not needed, Dane would use ____. a. Disk Cleanup c. the defragmentation utility b. the Recycle Bin d. the self-cleaning mode

____ 48. Dane can use the Delete Browsing History dialog box to delete ____. a. files from the Recycle Bin c. cookies b. fragmented files d. system properties

____ 49. Which of the following is the best illustration of the problem-solving process? a. A phone book c. A ruler b. A road map d. A compass

____ 50. Which of the following is NOT part of the first step of the problem-solving process? a. Ensure that you actually have a problem. b. Identify what the problem is. c. Start with the most obvious or simplest possibilities and troubleshoot from there. d. Collect all the available data regarding the situation. ____ 51. Which step of the problem-solving process are you performing if you are asking questions, using what-if statements, and clarifying the current situation? a. First c. Third b. Second d. Fourth

____ 52. After you define the problem, you need to ____. a. collect all the facts c. ask someone else to verify that it is a problem b. test each solution one at a time d. look for help and advice from an expert source

____ 53. Attempting to reproduce the problem is part of ____. a. defining the problem c. identifying possible solutions b. investigating and analyzing the problem ____ 54. The investigation and analysis step ____. a. determines what the real issue is b. alleviates the problem d. selecting and implementing a solution

c. provides information needed to make an accurate decision d. determines the likely outcome

____ 55. Asking what you should do differently is the kind of question you should ask to ____. a. diagnose the problem c. implement a solution b. identify possible solutions d. confirm the solution

____ 56. If you identify more than one possible solution, critique and test each one at a time to determine ____. a. if you can reproduce the problem c. its likely outcome b. if a problem actually exists d. if you need to return to the previous step

____ 57. When implementing a solution, if you are not sure about the consequences of your actions, ____. a. attempt the action and record the results c. stop the problem-solving process b. look for help and advice from an expert source d. combine it with another solution

____ 58. After putting a selected solution into place, the next step is to ____. a. document the problem and solution c. evaluate its performance b. consult the hardware or software documentation d. refer to the notes you took in Step 1

____ 59. If your selected solution does not work at all, go to the ____ step and ask better questions before trying new solutions. a. first c. previous b. last d. next

____ 60. The Troubleshooting link is found in the ____ window. a. Control Panel c. Windows Help and Support

b. Ask Someone

d. Troubleshooting in Windows

____ 61. Which action should occur before you purchase a computer? a. Maintaining c. Discarding b. Repairing d. Researching

____ 62. Which type of computer would be a good choice if you are a home user with limited funds? a. Windows c. Linux PC b. Macintosh d. Any of the above

____ 63. The terms of guaranteed repair or replacement for a computer that doesnt meet certain specifications would be located on the ____. a. box c. warranty b. support agreement d. software documentation

____ 64. Which of the following information would NOT be found in a computer warranty? a. If there is software coverage c. The terms of the support agreement b. When technical support is available d. Whether on-site repair is available

____ 65. A general rule is that the useful life of a computer for the general public is ____. a. two to three years c. three to five years b. two to four years d. three to ten years

____ 66. If you need to dispose of a computer that is still usable, the best option is to ____ it. a. donate c. recycle b. discard FIGURE 5-1 d. upgrade

____ 67. To display the window shown in Figure 5-1 above, ____ and then click Help and Support. a. right-click the desktop c. double-click the Troubleshooting link b. click the Start button FIGURE 5-2 d. open your browser

____ 68. By performing the activity shown in Figure 5-2 above, you should be able to determine ____. a. the useful life of the computer c. when technical support is available b. where to discard old equipment d. how often to perform regularly scheduled maintenance

Case 5-1 Valessa is having difficulty sending e-mail. A co-worker suggests that she use the problem-solving process to troubleshoot the issue. ____ 69. What is the first thing Valessa should do? a. Try sending another email b. Call technical support c. Make sure the computer is turned on and connected to the Internet d. Write down the symptoms and any possible solutions ____ 70. Before moving to the next step, Valessa should ____. a. report back to her co-worker c. try sending e-mail from a different computer b. fully complete the first step d. test all possible solutions Case 5-2 Cades grandmother has never owned a computer. Cade is trying to help her decide what type of computer to purchase for her own personal use. ____ 71. To help his grandmother select which computer to purchase, Cades first task should be to ____.

a. let his grandmother try his computer b. ask her what she will be using the computer for

c. find out how much money she wants to spend d. discuss backup procedures with her

____ 72. Keyboards, scanners, and microphones are examples of ____. a. software programs c. output devices b. input devices ____ 73. Another word for software is ____. a. input b. output d. utilities

c. program d. system

____ 74. Using the analogy of a book when talking about a computer, the pages and ink of a book would be like the ____ of a computer. a. software c. bundleware b. hardware d. software license

____ 75. After writing an algorithm for solving a problem very plainly, the next step would be to rewrite the steps in ____. a. a flowchart c. a programming language b. machine language d. the quality control process

____ 76. What process involves running systematic tests, debugging, and beta testing? a. Quality control c. Downloading an update b. Installing software d. Entering data

____ 77. Word processors and database systems are types of ____. a. application software c. utilities b. system software d. operating systems

____ 78. ____ software includes authoring, animation, music, and virtual reality. a. Education, home, and personal c. Workgroup computing b. Multimedia d. System

____ 79. Which task can you perform in the Word Options dialog box? a. Add and remove buttons from the Quick c. Create an algorithm Access Toolbar b. Scan a document and print a copy d. Report bugs in the software

____ 80. ____ provides a graphical user interface (GUI) you use to control the computer. a. An input device c. Application software b. An operating system d. A flowchart

____ 81. Which of the following is not an operating system? a. Microsoft Windows c. Visual Basic b. Linux d. Mac OS

____ 82. A disk defragmenter is an example of a(n) ____. a. operating system c. language translator b. utility d. compiler

____ 83. ____ is a recently developed software delivery method where an application is licensed for use as a service. a. SaaS c. Open source b. ASP d. Bundleware

____ 84. Which software modification generally involves radical changes to the product? a. Upgrade c. Update b. Patch d. Service pack

____ 85. ____ is software that is included with the purchase of a new computer. a. Open source c. Shareware b. Freeware ____ 86. Software piracy is ____. a. preventable by copyrighting the software b. almost impossible to stop d. Bundleware

c. the authorized copying of software d. the responsibility of the manufacturer

Case 6-1 Olivia works as a network manager for a financial services company. Part of her job is to manage software purchases and installation. ____ 87. To give her company the right to install a program on a server that can be accessed by a specific number of computers, Olivia would need to acquire a ____. a. network license c. service pack b. single-use license d. Web application

Case 6-2 Dontray works as a programmer for a software development firm. He writes the steps of an algorithm in a computer programming language or code.

____ 88. Dontray follows rules for how words are used together, called ____. a. input c. logic b. syntax d. sequence

____ 89. If Dontray makes a mistake in the code, it can be found and corrected by ____. a. using a flowchart c. downloading an update b. releasing the software to the public d. debugging

____ 90. Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data? a. Word c. Excel b. PowerPoint d. Access

____ 91. The 6 by 6 rule refers to six lines of text, six words per line when creating a ____. a. word-processing document c. presentation slide b. spreadsheet ____ 92. The rows in an Access table are called ____. a. cells b. records d. database table

c. fields d. objects

____ 93. A ____ asks a question about the data stored in the table. a. query c. form b. record d. primary key

____ 94. After creating a table, the next step is to ____. a. add records c. create a table template b. add fields d. create a report

____ 95. ____ is a popular photo/image-editing program. a. Adobe Photoshop c. 3D Studio Max b. Corel Painter d. QuickTime

____ 96. ____ programs help you perform computer housekeeping chores. a. Multimedia c. Utility b. Spreadsheet d. Database

____ 97. What type of programs reduce the amount of disk space a file requires? a. Backup programs c. Antivirus programs

b. File compression programs

d. Widgets

____ 98. What type of software would you use to attend online meetings and share desktop presentations? a. Computer-aided design (CAD) c. Project management b. Groupware d. Web conferencing

Case 7-1 Drake just installed the Microsoft Office suite on his computer. He is learning more about each program so he can choose the one that is appropriate for each task. ____ 99. Drake would choose PowerPoint if he wanted to ____. a. use a text editor c. present information in a slide show b. prepare a budget d. create a select query

Case 7-2 Celeste is a graphic designer that works with several different graphics programs. She uses a variety of types of images, depending on the project. ____ 100. What kind of image does Celeste use when she needs to adjust the resolution to the highest quality? a. Bitmap c. Animated b. QuickTime d. Vector

____ 101. Which of the following is not a task performed by the operating system? a. Coordinate the activities of the computer b. Manage resources for applications c. Restrict access allowed to system administrators d. Perform system and file maintenance tasks ____ 102. Keeping track of files and directories is a job performed by ____. a. a driver c. an emulation card b. an operating system d. application software ____ 103. The ____ identifies sections of a disk that are not being used. a. file system c. user b. driver d. microprocessor

____ 104. Which of the following is a peripheral device? a. Motherboard c. Smart phone b. Microprocessor d. Printer

____ 105. ____ was developed by a group of programmers at AT&T. a. Mac c. Windows b. UNIX d. BlackBerry

____ 106. Which of the following statements is true about the Linux operating system? a. It has a reputation for being unstable and crashing frequently. b. It is an open source program that is free. c. It runs on more personal computers worldwide than other operating systems. d. It contains a processor manufactured by Motorola. ____ 107. The operating system on most small devices and smart phones resides on a ____. a. motherboard c. Bluetooth device b. ROM chip d. widget ____ 108. ____ is a scaled-down version of the Windows operating system. a. Embedded Linux c. Symbian OS b. Palm OS d. Windows Embedded CE

____ 109. To save a file in text format or Rich Text Format, you use the ____ command in your word-processing program. a. Convert c. Save As b. Text d. Share

____ 110. A Rich Text Format file can be transferred ____. a. across a network c. to a mobile device b. to a Linux server d. any of the above

____ 111. A(n) ____ is a collection of information that determines which files you can access and which settings you use. a. network c. operating system b. user account d. file system

____ 112. Without administrative rights, you cannot ____. a. install software c. access your user account b. browse the Internet d. type a password

____ 113. To have administrative rights, you must know ____. a. what software is installed on the computer c. how many users accounts exist b. the administrative password d. the network settings

____ 114. If a copy of a Windows program does not run on a computer with a Macintosh operating system, this is an example of ____. a. file corruption c. an unstable system b. incompatibility d. none of the above

____ 115. If your operating system unexpectedly shuts down, what might help solve the problem? a. Installing an emulation card c. Rebooting the system b. Using a system utility FIGURE 8-2 d. Performing diagnostic testing

____ 116. To display the menu shown in Figure 8-2 above, you would click the ____ button. a. Office c. Open b. Start d. Help

Case 8-1 Catarina uses the UNIX operating system on her computer because it is a multitasking portable operating system that can run on just about any hardware platform. ____ 117. Catarinas profession is most likely to be which of the following? a. Teacher c. Scientist b. Receptionist d. Nurse

____ 118. If Catarina wanted to use a variant of the UNIX operating system instead, she would choose ____. a. Mac OS c. Windows b. Linux d. Palm OS

Case 8-2 Sergio is an accountant who works on a computer with a Windows operating system. But many of his clients are artists and designers who use Macintosh computers. ____ 119. Which of the following is a hardware solution that Sergio could add to the motherboard of his computer to run a program that is designed for a different operating system? a. Emulation card c. Bluetooth device b. Software emulation program d. ROM chip

____ 120. When saving a word-processing document, which format should Sergio use so that it will be readable by most word-processing programs on different systems? a. Word Template (.dotx) c. Works (.wps) b. Plain Text (.txt) ____ 121. The taskbar is located ____. a. on the Start menu b. at the bottom of the screen d. Web Page (.htm)

c. on the Quick Launch toolbar d. at the top of the screen

____ 122. The Sidebar is a section of the desktop that displays small programs called ____. a. icons c. gadgets b. shortcuts d. drivers

____ 123. The Recycle Bin stores discarded items until ____. a. another user logs on c. the end of the day b. the computer is shut down d. you empty it

____ 124. ____ an empty space on the desktop to display a shortcut menu.

a. Click b. Double-click

c. Right-click d. Press Shift and click

____ 125. The Change desktop icons link is located in the ____. a. Task Manager c. Help and Support Center b. Personalization window d. Computer window

____ 126. To start a program in Windows Vista, click the ____ and then click the program name. a. Start button c. title bar b. taskbar d. desktop

____ 127. You can recognize the active window because its ____ is a different color or intensity. a. Close button c. bottom border b. title bar d. scroll bar

____ 128. Windows Vista is available for purchase in ____ different versions. a. two c. eight b. four ____ 129. Shortcuts contain ____ on their icon. a. exclamation points b. number signs d. ten

c. crosses d. arrows

____ 130. To create a desktop folder, right-click a blank space on the desktop, point to ____, and then click Folder to display a new folder. a. Create c. New b. Folder d. any of the above

____ 131. Which type of files are essential files necessary for running Windows? a. System files c. Data files b. Application files d. None of the above

____ 132. When you right-click a file in the Recycle Bin and click Restore, the file is restored ____. a. to the desktop c. to the Computer window b. to its original location ____ 133. In the _____, you can choose to hide a file. a. Search pane d. to a new folder

c. Properties dialog box

b. Computer window

d. Program Files folder

____ 134. Windows Vista allows filenames with up to ____ characters. a. 8 c. 255 b. 122 d. 512

Case 9-1 Eli is working on his computer when suddenly the application he is using stops functioning and will not respond. He cannot close the program or perform any other tasks in Windows. ____ 135. Eli should use the ____ to close the unresponsive program. a. Log Off option c. Computer window b. Task Manager d. Windows Sidebar

____ 136. Which of the following options is located in the System and Maintenance category of the Control Panel? a. Administrative Tools c. Windows Firewall b. Windows Defender d. Folder Options

____ 137. Which of the following tasks can you perform using the Appearance and Personalization window of the Control Panel? a. Change your e-mail profile c. Adjust the screen resolution b. See a list of installed software d. Set power options

____ 138. The Ease of Access category of the Control Panel is helpful for users with a ____. a. laptop c. wireless Internet connection b. vision, hearing, or mobility disability d. standard user account

____ 139. The Wait text box in the Screen Saver Settings dialog box allows you to enter the number of minutes ____. a. that the screen saver will display before turning off b. before a different screen saver is displayed c. before the screen saver starts d. that you want to preview the screen saver ____ 140. You can display the Mouse Properties dialog box from which window in the Control Panel? a. System and Maintenance c. Hardware and Sound b. Ease of Access d. Appearance and Personalization ____ 141. Installing new or updated software from a CD or DVD is a simple process that starts by ____. a. making a backup copy c. inserting the CD or DVD into the computer

b. recording the product key

d. registering the software

____ 142. A(n) ____ is a fix for a specific problem in the software. a. download c. update b. upgrade d. none of the above

____ 143. Which factor is eliminated when subscribing to an SaaS application? a. Hardware c. Upkeep b. Installation fees d. All of the above

____ 144. If a file cannot be read by an application, you can check it by right-clicking the filename and then clicking ____. a. Encrypt c. General b. Properties FIGURE 10-1 d. Advanced

____ 145. The options shown in Figure 10-1 above can be located in the ____ category of the Control Panel. a. Ease of Access c. Security b. System and Maintenance FIGURE 10-2 d. Network and Internet

____ 146. The dialog box shown in Figure 10-2 above can be opened from the ____ window. a. Hardware and Sound c. Appearance and Personalization b. Programs d. User Accounts

Case 10-1 Lakisha has just moved to a different work station in her office. She is on a network and needs to add a new local printer to her computer and change the default printer. ____ 147. Lakisha should access the ____ category of the Control Panel in order to add or remove printers. a. Hardware and Sound c. Programs b. Network and Internet d. User Accounts

____ 148. To change the default printer, Lakisha would select the printer in the Printers window and then ____. a. open the Printing Preferences dialog box b. click the Set as default button on the toolbar c. type the printers location in the Address bar d. start the Add Printer Wizard Case 10-2

Rupert has been assigned a new project at work and needs to install additional software on his computer in order to have access to the programs that he needs to complete the project. ____ 149. If Rupert installs the software himself, it can be assumed that he has a(n) ____ account on his computer. a. administrator c. guest b. standard d. family ____ 150. When Rupert inserts the installation disc into the appropriate drive, most likely a(n) ____ dialog box will be displayed. a. Run Setup c. Program Information b. Open with WinZip d. AutoPlay

Exam Review Lessons 3-10 Answer Section

MULTIPLE CHOICE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: B C D B C C C A B A A D B D D D B C B C C A B B D B C B C B C A D C B C A D B PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-55 Mod1-56 Mod1-56 Mod1-57 Mod1-57 Mod1-58 Mod1-59 Mod1-59 Mod1-59 Mod1-60 Mod1-61 Mod1-61 Mod1-62 Mod1-58 Mod1-62 Mod1-57 Mod1-58 Mod1-56 Mod1-57 Mod1-68 Mod1-68 Mod1-69 Mod1-69 Mod1-69 Mod1-69 Mod1-70 Mod1-73 Mod1-75 Mod1-76 Mod1-77 Mod1-78 Mod1-79 Mod1-79 Mod1-80

TOP: TOP: TOP: TOP:

Critical Thinking Critical Thinking Critical Thinking Critical Thinking

40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86.

ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:

D A A A B C B A C B D A A B C B C B C A C D C C C C A B C C B B B C B C A A B A B C B A A D B

PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:

Mod1-81 Mod1-82 Mod1-84 Mod1-77 Mod1-73 Mod1-72 Mod1-75 Mod1-80 Mod1-82 Mod1-90 Mod1-90 Mod1-90 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-91 Mod1-92 Mod1-92 Mod1-95 Mod1-98 Mod1-99 Mod1-99 Mod1-100 Mod1-101 Mod1-101 Mod1-95 Mod1-100 Mod1-90 Mod1-93 Mod1-99 Mod1-106 Mod1-106 Mod1-107 Mod1-108 Mod1-109 Mod1-110 Mod1-110 Mod1-111 Mod1-113 Mod1-113 Mod1-114 Mod1-114 Mod1-115 Mod1-119 Mod1-119

TOP: TOP: TOP: TOP:

Critical Thinking Critical Thinking Critical Thinking Critical Thinking

TOP: Critical Thinking TOP: Critical Thinking TOP: Critical Thinking

87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132.

ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:

A B D C C B A B A C B D C D C B A D B B B D C D B A B B C B C B A B B C D C B A B B D C A B

PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:

Mod1-114 Mod1-109 Mod1-109 Mod1-127 Mod1-133 Mod1-135 Mod1-135 Mod1-135 Mod1-139 Mod1-140 Mod1-140 Mod1-141 Mod1-130 Mod1-138 Mod1-146 Mod1-146 Mod1-146 Mod1-146 Mod1-149 Mod1-149 Mod1-150 Mod1-151 Mod1-152 Mod1-152 Mod1-152 Mod1-152 Mod1-153 Mod1-154 Mod1-154 Mod1-155 Mod1-149 Mod1-149 Mod1-151 Mod1-151 Mod1-167 Mod1-167 Mod1-167 Mod1-167 Mod1-168 Mod1-171 Mod1-171 Mod1-171 Mod1-172 Mod1-173 Mod1-176 Mod1-177

TOP: Critical Thinking TOP: Critical Thinking TOP: Critical Thinking

TOP: Critical Thinking TOP: Critical Thinking

TOP: TOP: TOP: TOP:

Critical Thinking Critical Thinking Critical Thinking Critical Thinking

133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150.

ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS:

C C B A C B C C C C D B C C A B A D

PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS:

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF:

Mod1-180 Mod1-181 Mod1-165 Mod1-190 Mod1-193 Mod1-194 Mod1-195 Mod1-199 Mod1-205 Mod1-207 Mod1-208 Mod1-211 Mod1-190 Mod1-195 Mod1-202 Mod1-203 Mod1-208 Mod1-205

TOP: Critical Thinking

TOP: TOP: TOP: TOP:

Critical Thinking Critical Thinking Critical Thinking Critical Thinking