Activity 2
Activity 2
Activity 2
1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without
understanding the technical details of how a computer works.
2. Computer literacy is the knowing about and understanding computers and their uses.
3. A computer does not always do whatever the instructions, or program, tell it to do.
4. Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of
information.
5. The slide rule is considered by many to be the earliest recorded calculating device.
6. Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
8. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash
memory cards.
9. To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a
prompt for the user to decide the next course of action.
10. There are application programs that help users write their own programs using a programming language.
11. In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
12. Systems analysts design computer systems to be used within their companies.
14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.
15. Tablet PCs can use either a slate or a convertible tablet PC design.
16. A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
ANS: T PTS: 1 REF: 26
17. Many networks use a network server to manage the data flowing through the network devices and the resources on a network.
18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a Web browser to view
Web pages.
19. Most browsers maintain a History list, which is a record of all Web pages visited in the last few weeks.
20. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers
over a network—usually the Internet.
MODIFIED TRUE/FALSE
1. Wireless networking has added to the convenience of home computing, allowing the use of computers in places other than
traditional locations, such as a home office. _________________________
2. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data,
presents the results, and can store the data or results as needed. _________________________
ANS: F, computer
PTS: 1 REF: 10
3. A user inputs data into a computer, and then the computer processes it. _________________________
4. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read
slide rules. _________________________
ANS: F
punched cards
punch cards
PTS: 1 REF: 12
5. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and magnetic
disks and optical discs for storage. _________________________
6. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to launch programs.
_________________________
7. Computer programmers, or end users, are the people who use a computer to obtain information.
_________________________
ANS: F, Computer users
PTS: 1 REF: 17
8. Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors,
which are used to connect a computer to a computer network. _________________________
ANS: F, adapters
PTS: 1 REF: 16
9. Multiple computing typically refers to accessing Web-based applications and data using a personal computer, mobile phone,
or any other Internet-enabled device. _________________________
ANS: F
Grid computing
Cloud computing
PTS: 1 REF: 19
10. The Web is the largest and most well-known computer network in the world. _________________________
ANS: F, Internet
PTS: 1 REF: 27
11. IP addresses and their corresponding domain names are used to identify computers available through the Internet.
_________________________
12. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that
will be handling that person’s e-mail (called a mail server). _________________________
13. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security
numbers or other information needed for identity theft. _________________________
ANS: F, phishing
PTS: 1 REF: 37
14. A(n) acronym is an online world that users can explore. _________________________
PTS: 1 REF: 39
15. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of
communications today. _________________________
PTS: 1 REF: 38
31. One growing security problem is ____—in which someone else uses your identity, typically to purchase goods or services.
a. identity duplication c. identity theft
b. domain theft d. phishing
33. ____ refers to typing your entire e-mail message or discussion group post using only capital letters.
a. Spamming c. Calling
b. Phishing d. Shouting
34. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.
a. Spams c. Emoticons
b. Phishes d. Trojan horses
35. There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
a. Spammer c. Phisher
b. Snopes d. Identifier
Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her
client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.
36. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at
her office. What type of storage device should she use?
a. data projector c. scanner
b. firewire port d. USB flash drive
37. Sarah needs to prepare a simple Web page for her business. What type of application program should she use?
a. spreadsheet c. scripting language
b. word processing d. BASIC
Case 1-2
Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of
the typical systems and applications software that people use. He has always enjoyed working closely with people and has a
good facility for explaining how technical systems work.
39. Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most
likely suggest that Jamie take in college?
a. systems analysis c. computer literacy
b. history of computing d. Java
40. What type of computer-related job would Jamie probably enjoy the most?
a. hardware designer c. systems analyst
b. computer operations personnel d. end user
COMPLETION
1. Computers and traditional devices we use everyday have begun to ____________________ into single units with multiple
capabilities.
ANS: converge
PTS: 1 REF: 6
2. ____________________ are regular appliances with some type of built-in computer technology.
PTS: 1 REF: 7
3. ____________________ is a common alternative to traditional classroom learning that allows students to participate from
their current location, instead of physically going to the educational institution.
4. An emerging payment option is the use of ____________________ systems—systems that allow individuals to pay for
products and services via a mobile phone or other portable device.
ANS: m-commerce
PTS: 1 REF: 10
5. Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries,
and ticketing systems.
ANS: kiosks
PTS: 1 REF: 9
6. The ____________________ being used with a computer determine the tasks the computer is able to perform.
ANS:
programs
software
PTS: 1 REF: 10
7. The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the
information processing cycle.
ANS: IPOS
PTS: 1 REF: 11
8. ____________________—technically an input or output operation, depending on which direction the information is going—
is increasingly considered the fifth primary computer operation.
ANS: Communications
PTS: 1 REF: 11
9. The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great
deal of electricity, and generated a lot of heat.
ANS:
vacuum tubes
glass tubes
tubes
PTS: 1 REF: 12
10. One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think,
reason, and learn.
PTS: 1 REF: 14
ANS: hardware
PTS: 1 REF: 14
ANS: markup
PTS: 1 REF: 17
13. ____________________ are computer professionals whose primary job responsibility is to write the programs that computers
use.
ANS: Programmers
PTS: 1 REF: 18
14. Some midrange servers consist of a collection of individual ____________________ called blades.
PTS: 1 REF: 25
15. Typically, individual users connect to the Internet by connecting to computers belonging to a(n) ____________________.
ANS:
ISP
Internet service provider
Internet service provider (ISP)
ISP (Internet service provider)
PTS: 1 REF: 27
16. ISP computers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of
the major high-speed networks within a country, called a(n) ____________________.
PTS: 1 REF: 27
17. The World Wide Web refers to one resource—a collection of documents called ____________________—available through
the Internet.
PTS: 1 REF: 28
18. One of the most common online security risks today is your PC becoming infected with (a) ____________________.
ANS:
virus
computer virus
malware program
PTS: 1 REF: 37
19. By their very nature, online communications lend themselves to ____________________. Since recipients usually do not
hear senders’ voices or see their handwriting, it is difficult to know for sure who the sender is.
ANS: anonymity
PTS: 1 REF: 39
20. A(n)____________________ would be used for applications that require extraordinary speed, accuracy, and processing
capabilities—for example, sending astronauts into space, controlling missile guidance systems and satellites, forecasting the
weather, exploring for oil, and assisting with some kinds of scientific research.
ANS: supercomputer
PTS: 1 REF: 26
ESSAY
ANS:
Although computers have been used on the job for years, their role is continually evolving. Computers were originally used
as research tools for computer experts and scientists and then as productivity tools for office workers. Today, computers are
used by all types of employees in all types of businesses—including corporate executives, retail store clerks, traveling sales
professionals, artists and musicians, engineers, police officers, insurance adjusters, delivery workers, doctors and nurses, auto
mechanics and repair personnel, and professional athletes.