C) Describe a situation or user that would prefer a tablet PC over a notebook computer.
A: Retail jobs because you move around a lot and any jobs that require you to travel often.
A: Wearable computers can track your heartbeat, movement and respiration flow.
A: Keyboard to type, mouse to select things and DVD drive to input DVDs
A: Monitors display data, memory keys store data and speakers output sound.
A: Expansion Boards adds functionality to the board, the CPU processes data and controls
the flow of data, A bus transports data to hardware devices on the motherboard, ICs store
data electronically.
4. Describe the flow of data between the components found on the motherboard.
A: Input sends data to the memory, the memory then send data to the CPU and the CPU
send data back finally the memory sends data to the Output.
6. A) Describe one difference between operating system software and applications software.
A: Operating system is run when the system turns on and application software is used for a
specific task.
A: Hardware requirements
A: Utility programs manage input and output, read and write memory, manage the
processor, maintain system security, and manage files and disks. A device Driver is a utility
program.
9. A) What is the difference between low and high level programming languages?
A: Low level program languages use 0s and 1s whereas high level programing languages
have English like instructions.
A: It allowed programmers to create modules to that can be used over and over again in a
variety of programs.
A: Allows users to reliably share and exchange data, can reduce costs be sharing devices,
simplifies file management through centralized software updates and file backups, provides
communication tools such as e-mail for network users.
11. A) What are the two common size classifications for networks?
B) What size classification is used to connect devices over large geographical distances?
A: A WAN
A: It is a software that lets users and devices to communicate over the network
A:Peer to peer each computer on the network is considered equal and client/server consist
B) What is a node?
A: Star topology
D) Which topology connects each node to form a closed loop?
A: Ring topology
A: Logical is the way data is passed through the nodes and physical is how nodes are
arranged
A: Do not try to access the account of another without their permission, do not share your
password, and use appropriate subject matter and respect others beliefs and opinions.
16. Explain why the binary number system was adopted for use in computers.
A: 11
A: 42
A: Unicode is a 16 digit code consisting of 1s and 0s for each letter and symbol.
A: 2,147,483,640 bytes
A: 536870910000 bytes
A: When the number of bits that are needed to represent the integer is greater than the size
of 4 bytes
21. A) What is the difference between a text file and a binary file?
A: Human readable files are called text files and computer readable files are called binary
files
A: Write the name of the file then a period in front of the extension.
C) Describe how organizing your files into folders would help you stay orginized.
22. List two ways storage devices can be classified and give an example of a storage device
in each category.
23. List four rules that should be followed to avoid damaging files stored on disks or
CD/DVDs
A: Keep magnetic media away from magnets, handle CD/DVDs by the center or edges,
store CD/DVDs in a jewel case or sleeve to prevent scratches, and keep media away from
moisture and extreme temperatures.
A: Intranet only registered users can use it and with extranet provides a various levels of
accessibility.
A: The DSL modem uses standard telephone lines to transmit data and cable modems use
a coaxial cable to transmit data.
26. A) What is the most widely used Internet service?
C) Write your e-mail address and label the parts of your address.
D) What are the two requirements for sending and receiving e-mail messages?
A: Google
27. A) Explain why sending an e-mail message should be thought as the same as sending a
postcard.
B) Discuss with a partner and then summarize issues that could occur if e-mail etiquette is
not followed in the workplace.
A: If you use search criteria it makes it a lot faster to find what you are looking for
29. Write search criteria to locate web pages that contain the following information:
A) Restaurants in Miami
A: Miami +restaurants
A: Alligators -crocodiles
A: You dont know if what it says you are downloading is actually what it is.
A: Does it have an authors name? Does it have a Publisher? Does it have a last updated
date? Does it provide the URL?
C) On August 2, 2012 you accessed a posting on the Clewiston Kite Surfing discussion list
at http://www.emcschool.net/kitesurf/color.txt.The posting was made by Tara Perez on the
topic of kite colors. Write a citation for a research paper that quotes Taras posting.
A: Perez, Tara. Topic of kite colors. Clewiston Kite Surfing. n.d, August 2, 2012.
http://www.emcschool.net/kitesurf/color.txt
B) What is a cookie?
A: A text file created by the server computer when a user enters information on a website.
A: A tiny transparent graphic on a web page used to collect data on the web page user.
A: In it said what information they collected and why and how they use the information.
34. Name and briefly describe one law that helps protect the privacy of an individual.
A: The Electronic Communications Privacy Act makes it a crime to access electronic data
without authorization.
35. List three reasons why many schools have developed an Acceptable Use Policy.
A: So students use the internet responsibly, they are not sharing personal information about
themselves and students cannot download anything to damage the computers.
36. What can you do if you are turned down for credit at a bank and believe the data used to
deny credit is inaccurate?
A: A search warrant
A: The financial institution must notify the individual who has had access to them
38. A) What is a copyright infringement?
A: Software developers spend a lot of time and money making software so when people get
it for free it hurts them financially.
A: A program or series of instructions that can replicate without the users knowledge.
D) Describe phishing.
A: The act of sending an e-mail claiming to be a business to trick the user into revealing
personal information.
A: The responsibility of the IT professional includes using the appropriate tools and methods
to test and evaluate programs before disputation.
40. Determine if each of the following are true or false. If false, explain why.
A: True
A: True
A: True
A: True
A: True
A: True