foundations of technology
Foundations of Technology challenges members to demonstrate their understanding of fundamental technology concepts through an objective test. This event covers topics such as hardware, software, networking, cybersecurity, and emerging technologies used in modern business environments.
Event Overview
Division: Collegiate
Event Type: Individual
Event Category: Objective Test, 100-multiple choice questions (breakdown of question by competencies below)
Objective Test Time: 50 minutes
Career Cluster Framework Connection: Digital Technology
NACE Competency Alignment: Career & Self-Development, Critical Thinking, Technology
Items Competitor Must Provide: Pencil, Computer, Conference-provided nametag, Photo identification, Attire that meets the Florida FBLA Dress Code.
Only for members who have had no more than six credit hours on a semester schedule, or the equivalent of quarter hours, of technology instruction at the collegiate level by May 1 of the current year.
Knowledge Areas
· Foundations of Computer Systems
· Data and AI Foundations
· Hardware and Software Foundations
· Networking Systems and Protocols
· Ethics and Technology
· Programming and Algorithms
· Security Foundations
Test questions are based on the knowledge areas and objectives outlined for this event. Detailed objectives can be found in the study guide included in these guidelines.
State
Eligibility
· FBLA membership dues are paid by 11:59 pm Eastern Time on February 1st of the current program year.
· Members must be registered for the SLC and pay the state conference registration fee in order to participate in competitive events.
· Members must stay within the official FBLA housing block of the official FBLA hotel to be eligible to compete.
· Each chapter may submit six students in this event.
· On the state level, each member can compete in up to three different events in the following combinations: three objective tests OR two objective tests and one performance OR two objective tests and one production or one objective test and two production OR one objective test, one performance, and one production. Students may enter the Christopher Heider, Rob Kelleher, Who’s Who event, and one Chapter event (Community Service, State of the Chapter) in addition to their above chosen events.
· Picture identification (physical or digital: driver’s license, passport, state-issued identification, or school-issued identification) matching the conference nametag is required when checking in for competitive events.
· If competitors are late for an objective test, they may be either disqualified or permitted to begin late with no extension of the time as scheduled.
· Participants must adhere to the Florida FBLA dress code established by the Florida Board of Directors or they will not be permitted to participate in the competitive event.
Recognition
· The number of competitors will determine the number of winners. The maximum number of winners for each competitive event is 4.
Event Administration
· This event is an objective test administered prior to the SLC. Advisers will be sent information regarding testing requirements.
· No reference or study materials may be brought to the testing site.
· No calculators may be brought into the testing site; online calculators will be provided through the testing software.
Scoring
· Ties are broken by comparing the correct number of answers to the last 10 questions on the test. If a tie remains, answers to the last 20 questions on the test will be reviewed to determine the winner. If a tie remains, the competitor who completed the test in a shorter amount of time will place higher.
· Results announced at the State Leadership Conference are considered official and will not be changed after the conclusion of the State Leadership Conference.
Americans with Disabilities Act (ADA)
· FBLA complies with the Americans with Disabilities Act (ADA) by providing reasonable accommodations for competitors. Accommodation requests must be submitted through the conference registration system by the official registration deadline. All requests will be reviewed, and additional documentation may be required to determine eligibility and appropriate support.
Penalty Points
· Competitors may be disqualified if they violate the Competitive Event Guidelines or the Honor Code.
Electronic Devices
· Unless approved as part of a documented accommodation, all cell phones, smartwatches, electronic devices, and headphones must be turned off and stored away before the competition begins. Visible devices during the event will be considered a violation of the FBLA Honor Code.
National
If competing at the National level, be sure to see the National guidelines at https://www.fbla.org/collegiate/competitive-events/
Study Guide: Knowledge Areas and Objectives
Foundations of Computer Systems (15 test items)
1. Describe memory organization in computer systems (e.g., memory hierarchy, caches, registers)
2. Describe differences between digital, analog, discrete, and continuous systems
3. Describe different logic gates and their combinations (AND, OR, NOT, NAND, etc.)
4. Discuss methods for backing up a computer system
5. Discuss scheduling algorithms and their performances
6. Describe simple problems and solutions as state machines
7. Describe primary operating system components (e.g., registry, virtual memory, file system)
8. Analyze the functions of operating systems
Data and AI Foundations (15 test items)
1. Discuss probabilistic and logic-based reasoning
2. Describe foundational algorithms for artificial intelligence (e.g., minimax, search algorithms, alpha-beta pruning)
3. Analyze challenges associated with big data systems
4. Discuss data sourcing, acquisition, and processing
5. Discuss the benefits of cloud computing for data processing
6. Discuss the use of data in AI and machine learning
7. Analyze the use and training of large language models (LLMs)
Hardware and Software Foundations (15 test items)
1. Discuss considerations when using peripheral equipment (e.g., external storage, printers, USB)
2. Describe common methods of computer hardware maintenance
3. Discuss the characteristics of different types of computers (e.g., mainframe, PC, mobile)
4. Describe computer components (e.g., CPU, motherboard, GPU)
5. Discuss the functions of RAM and secondary storage (e.g., HDD, SDD)
6. Describe storage devices and configurations (e.g., HDD, SSD, RAID, NAS)
Networking Systems and Protocols (20 test items)
1. Discuss the characteristics of different types of networks (e.g., LAN, MAN, WAN)
2. Explain basic networking protocols (e.g., TCP/IP, UDP, DHCP, SMP)
3. Discuss methods of connectivity (e.g., Ethernet, Wi-Fi, cable)
4. Describe the general architecture of networks (e.g., nodes, connections, switches)
5. Select an appropriate networking architecture for a business (e.g., peer-to-peer, client-server, intranet)
6. Discuss the pros and cons of network topologies (e.g., bus, star, ring)
7. Explain the purpose and mechanics of IP addressing
8. Troubleshoot network maintenance issues (e.g., securing and protecting cable)
9. Discuss common network security techniques (e.g., authorization, authentication)
Ethics and Technology (10 test items)
1. Discuss illegal use of online technology (e.g., piracy, licensing infringement, jailbreaking for illegal purposes)
2. Discuss ethical concerns related to generative AI
3. Discuss the ethics of data brokerage and privacy online
4. Discuss ethical concerns related to AI assistants and LLMs
Programming and Algorithms (15 test items)
1. Discuss the attributes, methods, and variables of classes and objects
2. Discuss characteristics of programming language paradigms (e.g., functional, object-oriented, imperative, declarative)
3. Analyze the time complexity of simple algorithms
4. Interpret blocks of code
5. Describe basic data structures (e.g., arrays, lists, hashmaps)
6. Describe key features of object-oriented programming (e.g., encapsulation, abstraction, polymorphism, inheritance)
7. Describe basic search and sorting algorithms
8. Discuss APIs, modules, and libraries
Security Foundations (10 test items)
1. Discuss the applications of confidentiality, integrity, and availability
2. Evaluate vulnerabilities in a digital system (e.g., human error, authorization, authentication)
3. Describe strategies to defend against common cyber attacks (e.g., DoS, DDoS, virus)
4. Explain how insecure coding practices can lead to vulnerabilities (e.g., buffer overflow, race conditions, SQL injection)
5. Describe the differences between symmetric and asymmetric encryption
6. Discuss the use of hashing in cryptography (SHA-256, blockchain, digital signatures, etc.)