Chapter 01 Introduction

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

POINTS:   1

3. A computer does not always do whatever the instructions, or program, REFERENC 15

tell it to do. ES:  

  a. Tru
9. To begin to use a computer, the user first turns on the power by
e
  b. Fals pressing the power button, and then the computer displays a prompt for

e the user to decide the next course of action.


  a. Tru
e
4. Information processing is a vital activity today for all computer users,   b. Fals
as well as for businesses and other organizations. e
  a. Tru ANSWER:   Fals

e e
  b. Fals POINTS:   1

e REFERENC 16
ES:  

5. The slide rule is considered by many to be the earliest recorded 10. There are application programs that help users write their own
calculating device. programs in a form the computer can understand using a programming
  a. Tru language.
e   a. Tru
  b. Fals e
e   b. Fals
e
ANSWER:   Tru
6. Fourth-generation computers witnessed the development of computer e
networks, wireless technologies, and the Internet. POINTS:   1
  a. Tru REFERENC 17
e ES:  
  b. Fals
e 11. In addition to hardware, software, data, and procedures, the fifth
major component of a computer system are codes.
  a. Tru
7. The external hardware components are located inside the main box or
e
system unit of the computer.
  b. Fals
  a. Tru e
e ANSWER:   Fals
  b. Fals e
e POINTS:   1
ANSWER:    Fals REFERENC 17
e ES:  
POINTS:   1
REFERENC 14
12. Systems analysts design computer systems to be used within their
ES:  
companies.
  a. Tru
8. Storage devices are used to store data on or access data from storage
e
media, such as DVD discs and flash memory cards.
  b. Fals
  a. Tru e
e ANSWER:   Tru
  b. Fals e
e POINTS:   1
ANSWER:    Tru REFERENC 18
e ES:  
  a. Tru

13. Embedded computers are computers that host data and programs e

available to a small group of users.   b. Fals


e
  a. Tru
ANSWER:   Tru
e
e
  b. Fals
POINTS:   1
e
REFERENC 34
ANSWER:    Fals
ES:  
e
POINTS:   1
REFERENC 19 20. Satellite communication (more commonly called s-com) is the process

ES:   of exchanging electronic messages between individuals over a network—


usually the Internet.

14. Notebook computers (also called laptops) are about the size of a paper   a. Tru

notebook and open to reveal a screen and keyboard. e


  b. Fals
  a. Tru
e
e
ANSWER:   Fals
  b. Fals
e
e
POINTS:   1
ANSWER:    Tru
REFERENC 35
e
ES:  
POINTS:   1
REFERENC 23
ES:   21. Wireless networking allows the use of computers in virtually any
location. _________________________

15. Tablet computers are typically about the size of a notebook computer ANSWER:   Tru

and are designed to be used with a digital pen/stylus or touch input. e


POINTS:   1
  a. Tru
REFERENC 7
e
ES:  
  b. Fals
e
ANSWER:    Tru 22. A(n) display screen is a programmable, electronic device that accepts

e data, performs operations on that data, presents the results, and stores
POINTS:   1 the data or results as needed. _________________________
REFERENC 23 ANSWER:   False -
ES:   computer
POINTS:   1
REFERENC 10
ES:  
18. Once you have an Internet connection, you are ready to begin
programming the Web—that is, to use a Web browser to view Web pages.
23. A user inputs data into a computer, and then the computer processes
  a. Tru
it. _________________________
e
  b. Fals ANSWER:   Tru

e e
ANSWER:    Fals POINTS:   1
REFERENC 11
e
POINTS:   1 ES:  
REFERENC 33
ES:   24. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter
was the first electromechanical machine that could read slide rules.
19. Web browsers maintain a History list, which is a record of all Web _________________________
pages visited during the period of time specified in the browser settings. ANSWER:   False - punched cards, punch
cards
POINTS:   1 ANSWER:   d
REFERENC 12 POINTS:   1
ES:   REFERENC 8
ES:  

25. Fourth-generation computers typically use a keyboard and mouse for


input, a monitor and printer for output, and hard drives, flash memory 41. ____ occurs when data is entered into the computer.
media, and optical discs for storage. _________________________   a. Outpu b. Processin
ANSWER:    Tru t g
e   c. Input d. Storage
POINTS:   1 ANSWER:   c
REFERENC 14 POINTS:   1
REFERENC 10
ES:  
ES:  

37. In the early 1980s, ____ were invented and computer use increased
42. In addition to the four primary computer operations, today’s
dramatically.
computers almost always perform ____ functions.
  a. printers b. networks
  c. microcomputer d. computer   a. punchin b. communication

s s g s
ANSWER:    c   c. sorting d. programming
POINTS:   1 ANSWER:   b
REFERENC 6 POINTS:   1
REFERENC 11
ES:  
ES:  

38. Computing technologies make it possible to have ____, traditional


43. When data is processed into a meaningful form, it becomes ____.
appliances with some type of built-in computer or communications
technology.   a. informatio b. code
n
  a. design b. smart
  c. a program d. a
appliances computers
database
  c. home computers d. smart
ANSWER:   a
appliances
POINTS:   1
ANSWER:    d
REFERENC 11
POINTS:   1
ES:  
REFERENC 7
ES:  
44. Hollerith’s machine was used to process the 1890 U.S. Census data in
____, as opposed to the decade it usually took to process the data
39. Many schools, particularly college campuses, today have wireless ____
manually.
that allow students to connect their devices wirelessly to the Internet and
to campus resources from anywhere on campus.   a. two and one-half b. six and one-half years
years
  a. hotspots b. hotpoints
  c. four and one- d. eight and one-half
  c. com d. com
half years years
spots points
ANSWER:   a
ANSWER:    a
POINTS:   1
POINTS:   1
REFERENC 12
REFERENC 7
ES:  
ES:  

45. Integrated circuits incorporate many transistors and electronic


40. Access control at many businesses and organizations is provided by
circuits on a single tiny silicon chip, allowing ____ to be even smaller and
____, which allow only authorized individuals to enter an office building,
more reliable than earlier computers.
punch in or out of work, or access the company network via an access
card or a fingerprint or hand scan.   a. second-generation b. third-generation
computers computers
  a. bar codes b. virtual reality glasses
  c. fourth-generation d. fifth-generation
  c. collaboration d. authentication
computers computers
systems systems
ANSWER:    b server
POINTS:   1 ANSWER:   c
REFERENC 13 POINTS:   1
ES:   REFERENC 24
ES:  

46. Common input devices include the keyboard, ____, and integrated


video cameras. 59. A ____ is a collection of computers and other devices that are

  a. printer b. mouse connected in order to enable users to share hardware, software, and data,
  c. speake d. monito as well as to communicate electronically with each other.
r r   a. computer b. database
ANSWER:    b bank
POINTS:   1   c. data bank d. computer
REFERENC 14 network
ES:   ANSWER:   d
POINTS:   1
55. Conventional personal computers that are designed to fit on or next to REFERENC 27

a desk are often referred to as ____. ES:  

  a. desktop b. laptop computers


computers 60. To request a Web page or other resource located on the Internet, use
  c. office computers d. processor its ____.
computers   a. MAC b. menu bar
ANSWER:    a address
POINTS:   1   c. domain ID d. Internet
REFERENC 21 address
ES:   ANSWER:   d
POINTS:   1
56. Ultraportables conforming to Intel’s standards can be marketed as REFERENC 30

____. ES:  

  a. IntelBoo b. Ultrabooks
ks 61. Similar to the way an IP address or domain name uniquely identifies
  c. hybrids d. smallframe a computer on the Internet, a ____ uniquely identifies a specific Web
computers page.
ANSWER:    b   a. universal resource b. Web ID (WID)
POINTS:   1 identifier (URI)
REFERENC 23   c. uniform resource locator d. Web resource identifier
ES:   (URL) (WRI)
ANSWER:   c
57. Hybrid notebook-tablet computers are also called convertible tablets POINTS:   1
or ____. REFERENC 31

  a. 2-in-1 computer b. netbook ES:  

s computers
  c. laptop d. PDAs 62. To contact people using the Internet, you most often use their ____.
computers   a. domain b. e-mail
ANSWER:    a names addresses
POINTS:   1   c. usernames d. passwords
REFERENC 23 ANSWER:   b
ES:   POINTS:   1
REFERENC 31

58. A(n) ____ is a computer used to host programs and data for a ES:  

network.
  a. mainframe b. super server 63. To navigate to a new Web page for which you know the URL, type

computer that URL in the browser’s ____ bar and press Enter.
  c. midrange server d. Internet   a. address  b. domain 
  c. data d. menu  e
ANSWER:    a POINTS:   1
POINTS:   1 REFERENC 6
REFERENC 33 ES:  
ES:  

77. ____________________ are traditional appliances with some type of


66. A variety of problems have emerged from our extensive use
64. There are a number of special Web pages, called ____, available to built-in computer or communications technology.
of computers and related technology, ranging from stress and health
help you locate what you are looking for on the Internet. ANSWER:   Smart to the proliferation of ____ and malware.
concerns,
  a. search sites b. virtual IDs  appliances
  a. wardrivi b. domain
  c. domain d. Internet POINTS:  1
ng theft
sites repositories REFERENC 7
  c. spam d. caching
ANSWER:    a ES:  
ANSWER:   c
POINTS:   1
POINTS:   1
REFERENC 34
78. ____________________
REFERENC 37 is an alternative to traditional classroom
ES:  
learning inES: 
which
  students participate, typically at their own pace, from
their current location instead of physically going to class.
65. ____ is typically free and virtually all ISPs used with personal
ANSWER:   Distance
computers include e-mail service in their monthly fee.
learning
  a. Short Message b. Web-based e-mail POINTS:   1
mail REFERENC 7-8
  c. Web-com d. Program-based e- ES:  
mail
ANSWER:    b
79. Consumer ____________________ are small self-service computer-
POINTS:   1
based stations that provide information or other services to the
REFERENC 35
public, including those used for ATM transactions and bridal registries.
ES:  
ANSWER:   kiosk
s
POINTS:   1
67. ____ refers to guidelines for online behavior. REFERENC 9
  a. Net rules b. Web ES:  
etiquette
  c. Internet d. Netiquette 80. ____________________ payment systems allow individuals to pay for
Rules purchases using a smartphone or other device.
ANSWER:    d
ANSWER:   Mobil
POINTS:   1
e
REFERENC 38
POINTS:   1
ES:  
REFERENC 10
ES:  
68. ____ refers to typing your entire e-mail message or online post using
capital letters.
81. The ____________________ used with a computer determine the tasks
  a. Spammin b. Phishin
that the computer is able to perform.
g g
ANSWER:   program
  c. Calling d. Shoutin
s
g
software
ANSWER:    d
POINTS:   1
POINTS:   1
REFERENC 11
REFERENC 38
ES:  
ES:  

82. The progression of input, processing, output, and storage is sometimes


referred to as the ____________________ cycle or the information
76. Because of ____________________, many devices today are single
processing cycle.
units with multiple computing or Internet capabilities.
ANSWER:   IPO
ANSWER:    convergenc
S Input—entering data into the computer.
POINTS:   1 Processing—performing operations on the data.
REFERENC 11 Output—presenting the results.
ES:   Storage—saving data, programs, or output for future use.
POINTS:   1
REFERENC 10
ES:  
94. One of the most common online security risks today is your computer
TOPICS:    Critical Thinking
becoming infected with a(n) ____________________.
ANSWER:    malware
98. Discuss the development and characteristics of second-generation
program 
computers.
virus
ANSWER:   The second generation of computers began when the
computer virus
POINTS:   1 transistor—a small device made of semiconductor material

REFERENC 37 that acts like a switch to open or close electronic circuits—

ES:   started to replace the vacuum tube. Transistors allowed


second-generation computers to be smaller, less

95. ____________________ are being used with increased frequency in expensive, more powerful, more energy-efficient, and more

text messaging and e-mail exchanged via mobile phones to speed up the reliable than first-generation computers. Typically,

text entry process. programs and data were input on punch cards and


magnetic tape, output was on punch cards and paper
ANSWER:    Abbreviatio
printouts, and magnetic tape was used for storage. Hard
ns
POINTS:   1 drives and programming languages (such as
REFERENC 38 FORTRAN and COBOL) were developed and
ES:   implemented during this generation.
POINTS:   1
REFERENC 13
96. Discuss the role of computers on the job.
ES:  
ANSWER:    Although computers have been used on the job for years,
TOPICS:    Critical Thinking
their role is continually evolving. Computers were originally
used as research tools for computer experts and
scientists, and then as productivity tools for office workers.
Today, computers are used by all types of employees in all
types of businesses—including corporate executives,
retail store clerks, traveling sales professionals, artists and
musicians, engineers, police officers, insurance adjusters,
delivery workers, doctors and nurses, auto mechanics
and repair personnel, and professional athletes. In essence,
the computer has become a universal tool for on-the-job
decision making, productivity, and communications.
Computers are also used extensively for access control at
many businesses and organizations, such as authentication
systems that allow only authorized individuals to enter an
office building, punch in or out of work, or access the
company network via an access card or a fingerprint or
hand scan.
POINTS:   1
REFERENC 8
ES:  
TOPICS:   Critical Thinking

97. Define the four primary operations of a computer.


ANSWER:    The four primary operations of a computer can be defined
as follows:

You might also like