Anda di halaman 1dari 6

Chapter 1 Review Question Answers

1.

a) Hardware is the physical components of the computer, such as the monitor and system
unit.
b) Input devices are used to enter data and instructions into the computer, and output
devices are used to convey processed data.
c) A peripheral device is connected to a computer to add versatility.

2.

Five components found on the motherboard are:


Expansion boards, which are circuit boards that connect to the motherboard to add
functionality to the computer.
The Central Processing Unit, which processes data and controls the flow of data.
The bus, which is a set of circuits that connect the CPU to other components.
ROM (Read Only Memory), which contains the most basic operating instructions for
the computer.
RAM (Random Access Memory), which is memory where data and instructions are
stored temporarily.

3.

Data is input into the computers memory, it is processed in the CPU and put back into the
memory, and then the data is output.

4.

a) Operating system software is run automatically when the computer is turned on and
enables the user to communicate with the computer. Applications software allows the
user to perform specic tasks.
b) A multiuser operating system is supported by mainframes and minicomputers
and allows for two or more users at the same time. A multitasking operating
system determines how to divide processor time between running applications. A
multithreading operating system can execute different parts of a single program, called
threads, at the same time.
c) Environment refers to a computers hardware and software conguration.

5.

A utility program is a program that has one clearly dened task, such as managing les
and disks. A device driver is a utility program is needed for printing, viewing graphics,
using a CD/DVD drive, and using peripherals.

6.

Four types of mobile computing devices are: notebooks, tablets, handhelds, and wearables.

7.

A stylus is used to write on a screen.

8.

One type of wearable computer is a wrist-top computer, which is worn like a wrist watch
and contains many features usually found in a handheld PC.

9.

Answers will vary. A possible answer is: Cross-platform connectivity is important to many
computer users because they own more than one computing device, such as a hand-held
device and a desktop computer and they need to be able to share les, e-mail messages,
and so forth between the devices.

10. a) High-level programming languages contain English-like instruction and need to


be compiled or interpreted in order to communicate with the computer. Low-level
languages consist of 0s and 1s and can communicate directly with the computer.
b) Answers will vary. A possible answer is: Three high level programming languages are
Fortran, C, and Basic.
A Guide to Programming in Java, Second Edition
2007 Lawrenceville Press

c) A compiler is a program that converts an entire program into machine code before
the program is executed. An interpreter translates and executes an instruction before
moving on to the next instruction in the program.
d) Answers will vary. A possible answer is: One advantage of using an object-oriented
programming language is modules can be created that can be used over and over again
in a variety of programs.
11. Answers will vary. Possible answers include: Four benets of using a network are:
They allow users to reliably share and exchange data.
They can reduce costs by sharing devices such as printers.
They can be set up to allow users access to only specific files.
They simplify the process of creating backup copies of files.
12. a) The two most common size classications for networks are LAN and WAN.
b) A WAN is used to connect devices over large geographical distances.
13. a) A network operating system is software that allows users and devices to communicate
over a network.
b) A network environment refers to a set of networked computers running an operating
system that can handle the communication between the computers.
14. Client/server and peer-to-peer are two common network architecture models. A client/
server network consists of a small group of computers, called clients connected to a server.
In peer-to-peer network, each computer on the network is considered equal in terms of
responsibilities and resource sharing.
15. a)
b)
c)
d)
e)

Physical topology refers to the arrangement of the nodes on a network.


A node is a location on the network capable of processing information.
A star topology uses a hub.
A ring topology connects each node to form a closed loop.
Physical topology refers to the arrangement of the nodes on a network, and logical
topology refers to the way data is passed between the nodes on the network.

16. Three netiquette rules are:


Do not attempt to access the account of another user without authorization.
Do not share your password, and change it periodically.
Use appropriate subject matter and language, and be considerate of other peoples
beliefs and opinions.
17. The electrical circuits on an integrated circuit have one of two states, off or on. Therefore,
the binary number system (base 2), which uses only two digits (0 and 1), was adopted for
use in computers. Numbers and letters are represented with a code that consists of eight
binary digits grouped together to represent a single number or letter. Each 0 or 1 in the
binary code is called a bit (BInary digiT) and an 8-bit unit is called a byte.
18. a) The decimal equivalent of 1112 is 7.
b) The decimal equivalent of 2C16 is 44.
19. Unicode is a digital code that can be used to represent every letter of an alphabet and
symbols of every culture (=, @, , and so on). Unicode uses a set of sixteen 1s and 0s to
form a 16-bit binary code for each symbol.

Chapter 1

A Guide to Programming in Java, Second Edition


2007 Lawrenceville Press

20. a) 512 MB of RAM can store 536,870,912 bytes of data.


b) A 40 GB hard drive can store 42,949,672,960 bytes of data.
21. Bits grouped in units of 16 to 64 are called words.
22. An overow error occurs when the number of bits that are needed to represent the integer
is greater than the size of four bytes.
23. a) Real numbers are numbers that contain decimal points.
b) A roundoff error occurs when there are not enough bits to store the signicand.
24. a) Human-readable files are called text files, and computer-readable files are called binary
files.
b) An application adds a unique file name extension to the files it creates making it
possible to distinguish between file types. For example, a DOC file is created in
Microsoft Word.
c) Answers will vary. A possible answer is: Organizing les into folders is considered a good
practice because it keeps related les together.
25. Storage devices can be classied as internal, external, and as removable media. A hard
disk is typically an internal device but can also be external. A keychain or memory stick is
an example of removable media.
26. Three storage device technologies are magnetic, optical, and solid state technology:
Magnetic technology uses a mechanical drive with tiny electromagnetic heads for
reading and writing data to media. The media required with magnetic technology is a
disk, usually made of aluminum or Mylar, coated with iron oxide. The media required
with magnetic technology is a disk, usually made of aluminum or Mylar, coated with
iron oxide.
Optical technology uses a drive with a laser and an optoelectronic sensor. The media
required with optical technology is a compact disc made of polycarbonate plastic. A
CD-R (CD-Recordable) disc is used for storing files.
Solid state technology allows for the smallest, most portable storage devices because
the technology requires no moving parts. The media is Flash memory, which consists
of a grid with two tiny transistors at each cell.
27. Four rules that should be followed to avoid damaging les stored on disks or CD/DVDs
are:
Never attempt to open a case containing a disk.
Keep magnetic media away from magnets.
Handle CD/DVDs by the center hole or by the edges.
Keep media away from moisture and extreme temperatures.
28. a) An intranet is a network that is used by a single organization, such as a corporation or
school, and is only accessible by authorized users. An extranet is an extended intranet
that provides various levels of access to authorized members of the public.
b) No one person or organization controls the Internet.
29. Answers will vary. A possible answer is: Three telecommunications options are: a
conventional modem, a DSL (Digital Subscriber Line), and a cable modem.

Chapter 1

A Guide to Programming in Java, Second Edition


2007 Lawrenceville Press

30. a) A good choice of connection line for a business that needed constant access to the
Internet would be Leased/Dedicated lines because they allow for a permanent
connection that is always active and the cost is usually a xed monthly fee.
b) A cable modem uses a coaxial cable instead of analog phone lines.
31. The most widely used Internet service is the World Wide Web (WWW).
32. a) E-mail is an Internet service that allows an individual with an e-mail account to send
messages to another person with an e-mail account.
b) One benet of e-mail over standard mail is that e-mail can be received in a matter of
seconds, even if the recipient is located half way around the world.
c) Answers will vary. A possible answer is: For the e-mail address student@lpdatales.com,
student is the user name, lpdatales.com is thedomain name.
d) An e-mail address and an e-mail client are required for sending and receiving e-mail
messages.
e) Yahoo! Mail is an example of a Web-based e-mail client.
33. a) E-mail messages are not private and are easily accessible for others to read, similar
to how a postcard contains a message that can be read by anyone who handles the
postcard.
b) Answers will vary. Possible answers include: Three examples of e-mail etiquette are:
Use manners by including please and thank you and appropriately addressing
individuals as Mr., Ms., Mrs., Dr., and so on.
Be concise. Write in short, complete sentences.
Be professional. Use proper spelling and grammar.
c) Answers will vary. Possible answers include: Three examples of e-mail ethics are:
Use appropriate subject matter and language.
Be considerate of other peoples beliefs and opinions.
Respond to e-mail messages in a timely manner.
34. a) A search engine is is used to locate information on the Web.
b) Answers will vary. A possible answer is: Yahoo!, Google, and Ask are three commonly
used search engines.
c) Answers will vary. A possible answer is: I prefer to use Yahoo! because I like the option of
using directories or subject trees that Yahoo! offers.
d) Search criteria are words or phrases used in a search.
35. Answers will vary. Possible answers include: The search criteria is:
a) restaurants +Los Angeles
b) art +museum +boston
c) auto +repair +montreal
d) mosquitoes +bees ants
e) jane +austen
f) to each his own
g) george +washington +john +adams thomas jefferson
h) travel +ireland dublin
36. The three logical operators than can be used in search criteria are AND, OR, and NOT.
37. a) Downloading is the process of copying a file from a Web site to the users computer.
b) Files should only be downloaded from known, authentic Web sites since downloadable
files are often associated with viruses.
Chapter 1

A Guide to Programming in Java, Second Edition


2007 Lawrenceville Press

38. a) Four questions to answer when evaluating a Web site source are:
On what date was the Web page last updated?
Is the information incorrect or incomplete in order to give a particular or slanted view
of a topic?
Is the information truthful and trustworthy?
Does the author present his or her credentials?
b) It is necessary to cite sources to give credit to the original author and allow the reader
to locate the cited information.
c) Perez, Tara. Kite Colors Online posting. 1 July 2009. Clewiston Kite Surng
Discussion Group. 2 Aug. 2009 <http://www.lpdatales.com/kitesurf/color.txt>.
39. Online proling is a marketing technique of collecting data about consumers visiting a
Web site.
40. A cookie is a text le created by the server computer when a user enters information into a
Web site.
41. a) Web beacons are tiny, transparent graphics located on Web pages or in e-mail messages
that are used in combination with cookies to collect data about Web page users or
e-mail senders.
b) The information collected by Web beacons is usually monitored by an outside
advertising company.
42. Answers will vary.
43. The Electronic Communications Privacy Act of 1986 (ECPA) makes it a crime to access
electronic data without authorization and also prohibits unauthorized release of such data.
44. a) Answers will vary. A possible answer is: Three reasons why many schools have developed
an Acceptable Use Policy are: Internet content, unproductive use, and copyright.
b) Answers will vary. A possible answer is: Do not access another users account.
45. Under the Fair Credit Reporting Act, if you are denied credit you are allowed to see the
les used to make the credit determination.
46. a) A subpoena is necessary for a federal government authority to access an individuals
nancial records.
b) A nancial institution must notify the individual of who has had access to the
individuals records.
47. a) Copyright infringement includes duplication of computer software when copies are
being used by individuals who have not paid for the software.
b) Piracy is the distribution of illegal copies of software.
c) A virus is a program or series of instructions that can replicate without the users
knowledge.
d) Phishing is the act of sending an e-mail to a user falsely claiming to be a legitimate
business in an attempt to trick the user into revealing personal information that could
be used for crimes, such as identity theft.
48. An IT professional has ethical responsibilities related to system reliability, since
businesses, schools, and organizations rely on IT professionals to maintain their computer
systems. They also have an ethical responsibility to ensure the reliability of computer
software, making sure that it is appropriately tested.
Chapter 1

A Guide to Programming in Java, Second Edition


2007 Lawrenceville Press

49. a)
b)
c)
d)
e)
f)
g)
h)
i)
j)

True.
True.
False. A peer-to-peer network does not have a server.
False. A LANs logical topology is not always the same as its physical topology.
False. The hexadecimal system is base 16.
True.
True.
False. A cable modem transmits data faster than a conventional modem.
False. E-mail messages are easily viewed by others.
False. Information found at a Web site should always be questioned until the source is
verified.
k) True.
l) False. A virus is not harmless nor is it a computer game.

Chapter 1

A Guide to Programming in Java, Second Edition


2007 Lawrenceville Press

Anda mungkin juga menyukai