Anda di halaman 1dari 10

Chapter 1 questions Jake Brand

1. A) Describe a situation where a desktop computer might be preferred over a notebook


computer.

A: Downloading a large file.

B) List three advantages of purchasing a notebook computer instead of a desktop computer.

A: Notebook computers are portable, small, wireless

C) Describe a situation or user that would prefer a tablet PC over a notebook computer.

A: Someone who doesn't have to type often.

D) Describe two occupations where it would be useful to have a hand-held computer.

A: Retail jobs because you move around a lot and any jobs that require you to travel often.

E) Describe how wearable computers are used in health care industry.

A: Wearable computers can track your heartbeat, movement and respiration flow.

2. A) List and compare three input devices.

A: Keyboard to type, mouse to select things and DVD drive to input DVDs

B) List and compare thee output devices.

A: Monitors display data, memory keys store data and speakers output sound.

C) List and describe two peripheral.

A: Webcam take pictures or videos and microphones record sound.

D) List three types of ports.

A: USB, Bluetooth, and FireWire.

3. List and describe five components found on the motherboard.

A: Expansion Boards adds functionality to the board, the CPU processes data and controls
the flow of data, A bus transports data to hardware devices on the motherboard, ICs store
data electronically.
4. Describe the flow of data between the components found on the motherboard.

A: Input sends data to the memory, the memory then send data to the CPU and the CPU
send data back finally the memory sends data to the Output.

5. What is cache memory used for?

A: Memory cache stores frequently used data.

6. A) Describe one difference between operating system software and applications software.

A: Operating system is run when the system turns on and application software is used for a
specific task.

B) List three different operating systems.

A: Windows, Mac OS X, and Linux

C) What does environment refer to?

A: It references to a computers hardware and software configuration.

D) What is another word for environment?

A: Hardware requirements

7. What is a utility program? Give an example.

A: Utility programs manage input and output, read and write memory, manage the
processor, maintain system security, and manage files and disks. A device Driver is a utility
program.

8. Why is cross-platform connectivity important to many computer users?

A: So people can share information and help each other.

9. A) What is the difference between low and high level programming languages?

A: Low level program languages use 0s and 1s whereas high level programing languages
have English like instructions.

B) List three different operating systems.

A: C, Basic, and COBOL

C) What is the difference between a compiler and an interpreter?


A: A compiler is a program that converts a program into computer code before running the
program, An interpreter translates and executes an instruction before moving on to the next
instruction.

D) List an advantage of using an object-oriented programming language.

A: It allowed programmers to create modules to that can be used over and over again in a
variety of programs.

10. List four benefits of using a network.

A: Allows users to reliably share and exchange data, can reduce costs be sharing devices,
simplifies file management through centralized software updates and file backups, provides
communication tools such as e-mail for network users.

11. A) What are the two common size classifications for networks?

A: LAN and A WAN

B) What size classification is used to connect devices over large geographical distances?

A: A WAN

12. A) What is a network operating system?

A: It is a software that lets users and devices to communicate over the network

B) What does a network environment refer to?

A: The software and hardware that make a network.

13. Describe two common network architecture models.

A:Peer to peer each computer on the network is considered equal and client/server consist

14. A) What does physical topology refer to?

A: It refers to the arrangement of nodes on a network.

B) What is a node?

A: A location on a network capable of processing information.

C) Which topology uses a hub?

A: Star topology
D) Which topology connects each node to form a closed loop?

A: Ring topology

E) What is the difference between physical and logical topology?

A: Logical is the way data is passed through the nodes and physical is how nodes are
arranged

15. What etiquette rules apply in your classroom?

A: Do not try to access the account of another without their permission, do not share your
password, and use appropriate subject matter and respect others beliefs and opinions.

16. Explain why the binary number system was adopted for use in computers.

A: Electrical circuits on an IC have one of two states off or on.

17. A) What is the decimal equivalent of 10112?

A: 11

B) What is the decimal equivalent of 2A16?

A: 42

18. What is Unicode?

A: Unicode is a 16 digit code consisting of 1s and 0s for each letter and symbol.

19. A) How many bytes of data can 2 GB or RAM store?

A: 2,147,483,640 bytes

B) How many bytes of data can a 500GB hard drive store?

A: 536870910000 bytes

20. A) When would an overflow error occur?

A: When the number of bits that are needed to represent the integer is greater than the size
of 4 bytes

B) What are real numbers?

A: Numbers that contain decimals


C) When would a round off error occur?

A: When there is not enough bits to store the mantissa

21. A) What is the difference between a text file and a binary file?

A: Human readable files are called text files and computer readable files are called binary
files

B) Explain how an extension distinguishes file types.

A: Write the name of the file then a period in front of the extension.

C) Describe how organizing your files into folders would help you stay orginized.

A: You can find files a lot faster if they are in folders.

22. List two ways storage devices can be classified and give an example of a storage device
in each category.

A: Internal such as a hard disk and removable like a DVD

23. List four rules that should be followed to avoid damaging files stored on disks or
CD/DVDs

A: Keep magnetic media away from magnets, handle CD/DVDs by the center or edges,
store CD/DVDs in a jewel case or sleeve to prevent scratches, and keep media away from
moisture and extreme temperatures.

24. A) What is the difference between an intranet and a extranet?

A: Intranet only registered users can use it and with extranet provides a various levels of
accessibility.

B) Who controls the internet?

A: It is not controlled by any one organization.

25. A) What problem is associated with using a conventional modem?

A: It has a slow access time

B) Describe the differences between a DSL modem and a cable modem.

A: The DSL modem uses standard telephone lines to transmit data and cable modems use
a coaxial cable to transmit data.
26. A) What is the most widely used Internet service?

A: The World Wide Web

B) List one benefit of e-mail over standard mail.

A: An e-mail can be received in seconds

C) Write your e-mail address and label the parts of your address.

A: Jakeb0720@gmail.com Jakeb0720 is the username, gmail is domain name and .com is


the top-level domain.

D) What are the two requirements for sending and receiving e-mail messages?

A: You need an email address and a email software

E) List one example of a browser-based e-mail site.

A: Google

27. A) Explain why sending an e-mail message should be thought as the same as sending a
postcard.

A: You use the same rules of writing like manners.

B) Discuss with a partner and then summarize issues that could occur if e-mail etiquette is
not followed in the workplace.

A: It could lead to consequences such as being fired from your job.

28. A) List three commonly used search engines.

A: Google, Yahoo and Msn

B) Which search engine did you prefer to use, and why?

A: I prefer google because I have only really used google

C) Describe the importance of using effective search criteria.

A: If you use search criteria it makes it a lot faster to find what you are looking for

29. Write search criteria to locate web pages that contain the following information:

A) Restaurants in Miami
A: Miami +restaurants

B) Art museums in Montreal, Canada

A: Montreal, Canada +art museums

C) Clothing stores in your city

A: Surrey + clothing stores

D) Alligators, but not crocodiles

A: Alligators -crocodiles

E) The author James Patterson

A: James Patterson +author

F) The phrase garbage in garbage out

A: Garbage in garbage out +phrase

G) George Washington and John Adams, but not Thomas Jefferson

A: George Washington +John Adams Thomas Jefferson

H) Travel to Florida but not Orlando

A: Travel to Florida Orlando

30. Why should files only be downloaded from authentic sites?

A: You dont know if what it says you are downloading is actually what it is.

31. A) List four questions to answer when evaluating a website source.

A: Does it have an authors name? Does it have a Publisher? Does it have a last updated
date? Does it provide the URL?

B) Why is it necessary to cite sources?


A: It gives the original author credit and allows readers to locate the cited information.

C) On August 2, 2012 you accessed a posting on the Clewiston Kite Surfing discussion list
at http://www.emcschool.net/kitesurf/color.txt.The posting was made by Tara Perez on the
topic of kite colors. Write a citation for a research paper that quotes Taras posting.
A: Perez, Tara. Topic of kite colors. Clewiston Kite Surfing. n.d, August 2, 2012.
http://www.emcschool.net/kitesurf/color.txt

32. A) What is online profiling?

A: A marketing technique that collects data about consumers.

B) What is a cookie?

A: A text file created by the server computer when a user enters information on a website.

C) What is a web beacon?

A: A tiny transparent graphic on a web page used to collect data on the web page user.

D) Who usually monitors the information collected by web beacons?

A: By an outside advertising company.

33. Locate a websites privacy policy and document its contents.

A: In it said what information they collected and why and how they use the information.

34. Name and briefly describe one law that helps protect the privacy of an individual.

A: The Electronic Communications Privacy Act makes it a crime to access electronic data
without authorization.

35. List three reasons why many schools have developed an Acceptable Use Policy.

A: So students use the internet responsibly, they are not sharing personal information about
themselves and students cannot download anything to damage the computers.

36. What can you do if you are turned down for credit at a bank and believe the data used to
deny credit is inaccurate?

A: You can see the information collected about yourself.

37. A) What is necessary for a federal government authority to access an individual's


financial records?

A: A search warrant

B) What must a financial institution do after releasing an individual's records?

A: The financial institution must notify the individual who has had access to them
38. A) What is a copyright infringement?

A: The illegal use or reproduction of data.

B) Why is computer piracy such a concern to software developers?

A: Software developers spend a lot of time and money making software so when people get
it for free it hurts them financially.

C) What is a computer virus?

A: A program or series of instructions that can replicate without the users knowledge.

D) Describe phishing.

A: The act of sending an e-mail claiming to be a business to trick the user into revealing
personal information.

39. What ethical responsibilities does an IT professional have?

A: The responsibility of the IT professional includes using the appropriate tools and methods
to test and evaluate programs before disputation.

40. Determine if each of the following are true or false. If false, explain why.

A) Software refers to the physical components of the computer.

A: False software is the programs on your computer

B) Linux is an operating system.

A: True

C) A utility program has one clearly defined task.

A: True

D) Assembly language is a high-level programing language.

A: False assembly language is a low level programing language.

E) A WAN connects devices over large geographical distances.

A: True

F) A peer-to-peer network has a server.


A: False each computer connects to each other

G) The binary number system uses only 1s and 0s.

A: True

H) A conventional modem transmits data faster than a cable modem.

A: False a cable modem transmits data faster than a conventional modem.

I) an e-mail address is required to send e-mail messages.

A: True

J) The present time is referred to as the industrial age.

A: False the industrial era began in the 18th century.

K) Ergonomics is the science that studies safe work environments.

A: True

Anda mungkin juga menyukai