1.
a) Hardware is the physical components of the computer, such as the monitor and system
unit.
b) Input devices are used to enter data and instructions into the computer, and output
devices are used to convey processed data.
c) A peripheral device is connected to a computer to add versatility.
2.
3.
Data is input into the computers memory, it is processed in the CPU and put back into the
memory, and then the data is output.
4.
a) Operating system software is run automatically when the computer is turned on and
enables the user to communicate with the computer. Applications software allows the
user to perform specic tasks.
b) A multiuser operating system is supported by mainframes and minicomputers
and allows for two or more users at the same time. A multitasking operating
system determines how to divide processor time between running applications. A
multithreading operating system can execute different parts of a single program, called
threads, at the same time.
c) Environment refers to a computers hardware and software conguration.
5.
A utility program is a program that has one clearly dened task, such as managing les
and disks. A device driver is a utility program is needed for printing, viewing graphics,
using a CD/DVD drive, and using peripherals.
6.
Four types of mobile computing devices are: notebooks, tablets, handhelds, and wearables.
7.
8.
One type of wearable computer is a wrist-top computer, which is worn like a wrist watch
and contains many features usually found in a handheld PC.
9.
Answers will vary. A possible answer is: Cross-platform connectivity is important to many
computer users because they own more than one computing device, such as a hand-held
device and a desktop computer and they need to be able to share les, e-mail messages,
and so forth between the devices.
c) A compiler is a program that converts an entire program into machine code before
the program is executed. An interpreter translates and executes an instruction before
moving on to the next instruction in the program.
d) Answers will vary. A possible answer is: One advantage of using an object-oriented
programming language is modules can be created that can be used over and over again
in a variety of programs.
11. Answers will vary. Possible answers include: Four benets of using a network are:
They allow users to reliably share and exchange data.
They can reduce costs by sharing devices such as printers.
They can be set up to allow users access to only specific files.
They simplify the process of creating backup copies of files.
12. a) The two most common size classications for networks are LAN and WAN.
b) A WAN is used to connect devices over large geographical distances.
13. a) A network operating system is software that allows users and devices to communicate
over a network.
b) A network environment refers to a set of networked computers running an operating
system that can handle the communication between the computers.
14. Client/server and peer-to-peer are two common network architecture models. A client/
server network consists of a small group of computers, called clients connected to a server.
In peer-to-peer network, each computer on the network is considered equal in terms of
responsibilities and resource sharing.
15. a)
b)
c)
d)
e)
Chapter 1
Chapter 1
30. a) A good choice of connection line for a business that needed constant access to the
Internet would be Leased/Dedicated lines because they allow for a permanent
connection that is always active and the cost is usually a xed monthly fee.
b) A cable modem uses a coaxial cable instead of analog phone lines.
31. The most widely used Internet service is the World Wide Web (WWW).
32. a) E-mail is an Internet service that allows an individual with an e-mail account to send
messages to another person with an e-mail account.
b) One benet of e-mail over standard mail is that e-mail can be received in a matter of
seconds, even if the recipient is located half way around the world.
c) Answers will vary. A possible answer is: For the e-mail address student@lpdatales.com,
student is the user name, lpdatales.com is thedomain name.
d) An e-mail address and an e-mail client are required for sending and receiving e-mail
messages.
e) Yahoo! Mail is an example of a Web-based e-mail client.
33. a) E-mail messages are not private and are easily accessible for others to read, similar
to how a postcard contains a message that can be read by anyone who handles the
postcard.
b) Answers will vary. Possible answers include: Three examples of e-mail etiquette are:
Use manners by including please and thank you and appropriately addressing
individuals as Mr., Ms., Mrs., Dr., and so on.
Be concise. Write in short, complete sentences.
Be professional. Use proper spelling and grammar.
c) Answers will vary. Possible answers include: Three examples of e-mail ethics are:
Use appropriate subject matter and language.
Be considerate of other peoples beliefs and opinions.
Respond to e-mail messages in a timely manner.
34. a) A search engine is is used to locate information on the Web.
b) Answers will vary. A possible answer is: Yahoo!, Google, and Ask are three commonly
used search engines.
c) Answers will vary. A possible answer is: I prefer to use Yahoo! because I like the option of
using directories or subject trees that Yahoo! offers.
d) Search criteria are words or phrases used in a search.
35. Answers will vary. Possible answers include: The search criteria is:
a) restaurants +Los Angeles
b) art +museum +boston
c) auto +repair +montreal
d) mosquitoes +bees ants
e) jane +austen
f) to each his own
g) george +washington +john +adams thomas jefferson
h) travel +ireland dublin
36. The three logical operators than can be used in search criteria are AND, OR, and NOT.
37. a) Downloading is the process of copying a file from a Web site to the users computer.
b) Files should only be downloaded from known, authentic Web sites since downloadable
files are often associated with viruses.
Chapter 1
38. a) Four questions to answer when evaluating a Web site source are:
On what date was the Web page last updated?
Is the information incorrect or incomplete in order to give a particular or slanted view
of a topic?
Is the information truthful and trustworthy?
Does the author present his or her credentials?
b) It is necessary to cite sources to give credit to the original author and allow the reader
to locate the cited information.
c) Perez, Tara. Kite Colors Online posting. 1 July 2009. Clewiston Kite Surng
Discussion Group. 2 Aug. 2009 <http://www.lpdatales.com/kitesurf/color.txt>.
39. Online proling is a marketing technique of collecting data about consumers visiting a
Web site.
40. A cookie is a text le created by the server computer when a user enters information into a
Web site.
41. a) Web beacons are tiny, transparent graphics located on Web pages or in e-mail messages
that are used in combination with cookies to collect data about Web page users or
e-mail senders.
b) The information collected by Web beacons is usually monitored by an outside
advertising company.
42. Answers will vary.
43. The Electronic Communications Privacy Act of 1986 (ECPA) makes it a crime to access
electronic data without authorization and also prohibits unauthorized release of such data.
44. a) Answers will vary. A possible answer is: Three reasons why many schools have developed
an Acceptable Use Policy are: Internet content, unproductive use, and copyright.
b) Answers will vary. A possible answer is: Do not access another users account.
45. Under the Fair Credit Reporting Act, if you are denied credit you are allowed to see the
les used to make the credit determination.
46. a) A subpoena is necessary for a federal government authority to access an individuals
nancial records.
b) A nancial institution must notify the individual of who has had access to the
individuals records.
47. a) Copyright infringement includes duplication of computer software when copies are
being used by individuals who have not paid for the software.
b) Piracy is the distribution of illegal copies of software.
c) A virus is a program or series of instructions that can replicate without the users
knowledge.
d) Phishing is the act of sending an e-mail to a user falsely claiming to be a legitimate
business in an attempt to trick the user into revealing personal information that could
be used for crimes, such as identity theft.
48. An IT professional has ethical responsibilities related to system reliability, since
businesses, schools, and organizations rely on IT professionals to maintain their computer
systems. They also have an ethical responsibility to ensure the reliability of computer
software, making sure that it is appropriately tested.
Chapter 1
49. a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
True.
True.
False. A peer-to-peer network does not have a server.
False. A LANs logical topology is not always the same as its physical topology.
False. The hexadecimal system is base 16.
True.
True.
False. A cable modem transmits data faster than a conventional modem.
False. E-mail messages are easily viewed by others.
False. Information found at a Web site should always be questioned until the source is
verified.
k) True.
l) False. A virus is not harmless nor is it a computer game.
Chapter 1