Activity 2

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 8

TRUE/FALSE

1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without
understanding the technical details of how a computer works.

2. Computer literacy is the knowing about and understanding computers and their uses.

3. A computer does not always do whatever the instructions, or program, tell it to do.

4. Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of
information.

5. The slide rule is considered by many to be the earliest recorded calculating device.

6. Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.

ANS: T PTS: 1 REF: 14


7. The external hardware components are located inside the main box or system unit of the computer.

ANS: F PTS: 1 REF: 14

8. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash
memory cards.

ANS: T PTS: 1 REF: 15

9. To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a
prompt for the user to decide the next course of action.

ANS: F PTS: 1 REF: 16

10. There are application programs that help users write their own programs using a programming language.

ANS: T PTS: 1 REF: 17

11. In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.

ANS: F PTS: 1 REF: 17

12. Systems analysts design computer systems to be used within their companies.

ANS: T PTS: 1 REF: 18

13. The accompanying figure shows a notebook computer.

ANS: F PTS: 1 REF: 23

14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.

15. Tablet PCs can use either a slate or a convertible tablet PC design.

16. A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
ANS: T PTS: 1 REF: 26

17. Many networks use a network server to manage the data flowing through the network devices and the resources on a network.

ANS: T PTS: 1 REF: 27

18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a Web browser to view
Web pages.

ANS: F PTS: 1 REF: 33

19. Most browsers maintain a History list, which is a record of all Web pages visited in the last few weeks.

ANS: T PTS: 1 REF: 34

20. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers
over a network—usually the Internet.

ANS: F PTS: 1 REF: 34

MODIFIED TRUE/FALSE

1. Wireless networking has added to the convenience of home computing, allowing the use of computers in places other than
traditional locations, such as a home office. _________________________

ANS: T PTS: 1 REF: 7

2. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data,
presents the results, and can store the data or results as needed. _________________________

ANS: F, computer

PTS: 1 REF: 10

3. A user inputs data into a computer, and then the computer processes it. _________________________

ANS: T PTS: 1 REF: 11

4. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read
slide rules. _________________________

ANS: F
punched cards
punch cards

PTS: 1 REF: 12

5. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and magnetic
disks and optical discs for storage. _________________________

ANS: T PTS: 1 REF: 14

6. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to launch programs.
_________________________

ANS: T PTS: 1 REF: 17

7. Computer programmers, or end users, are the people who use a computer to obtain information.
_________________________
ANS: F, Computer users

PTS: 1 REF: 17

8. Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors,
which are used to connect a computer to a computer network. _________________________

ANS: F, adapters

PTS: 1 REF: 16

9. Multiple computing typically refers to accessing Web-based applications and data using a personal computer, mobile phone,
or any other Internet-enabled device. _________________________

ANS: F
Grid computing
Cloud computing

PTS: 1 REF: 19

10. The Web is the largest and most well-known computer network in the world. _________________________

ANS: F, Internet

PTS: 1 REF: 27

11. IP addresses and their corresponding domain names are used to identify computers available through the Internet.
_________________________

ANS: T PTS: 1 REF: 30

12. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that
will be handling that person’s e-mail (called a mail server). _________________________

ANS: T PTS: 1 REF: 31

13. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security
numbers or other information needed for identity theft. _________________________

ANS: F, phishing

PTS: 1 REF: 37

14. A(n) acronym is an online world that users can explore. _________________________

ANS: F, virtual world

PTS: 1 REF: 39

15. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of
communications today. _________________________

ANS: F, by the way

PTS: 1 REF: 38

ANS: A PTS: 1 REF: 34


30. With ____, e-mail messages stay on the mail server and are viewed using a Web browser.
a. Internet-based e-mail c. Web-com
b. Web-based e-mail d. program-based e-mail

ANS: B PTS: 1 REF: 35

31. One growing security problem is ____—in which someone else uses your identity, typically to purchase goods or services.
a. identity duplication c. identity theft
b. domain theft d. phishing

ANS: C PTS: 1 REF: 37

32. ____ is an etiquette for guiding online behavior.


a. Net rules c. Internet Rules
b. Web etiquette d. Netiquette

ANS: D PTS: 1 REF: 38

33. ____ refers to typing your entire e-mail message or discussion group post using only capital letters.
a. Spamming c. Calling
b. Phishing d. Shouting

ANS: D PTS: 1 REF: 38

34. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.
a. Spams c. Emoticons
b. Phishes d. Trojan horses

ANS: C PTS: 1 REF: 38

35. There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
a. Spammer c. Phisher
b. Snopes d. Identifier

ANS: B PTS: 1 REF: 39

Case-Based Critical Thinking Questions

Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her
client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.

36. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at
her office. What type of storage device should she use?
a. data projector c. scanner
b. firewire port d. USB flash drive

ANS: D PTS: 1 REF: 15 TOP: Critical Thinking

37. Sarah needs to prepare a simple Web page for her business. What type of application program should she use?
a. spreadsheet c. scripting language
b. word processing d. BASIC

ANS: C PTS: 1 REF: 17 TOP: Critical Thinking


38. What kind of computer would most likely fit Sarah’s needs?
a. midrange server c. notebook
b. embedded d. docking station

ANS: C PTS: 1 REF: 23 TOP: Critical Thinking

Case-Based Critical Thinking Questions

Case 1-2
Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of
the typical systems and applications software that people use. He has always enjoyed working closely with people and has a
good facility for explaining how technical systems work.

39. Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most
likely suggest that Jamie take in college?
a. systems analysis c. computer literacy
b. history of computing d. Java

ANS: D PTS: 1 REF: 17 TOP: Critical Thinking

40. What type of computer-related job would Jamie probably enjoy the most?
a. hardware designer c. systems analyst
b. computer operations personnel d. end user

ANS: B PTS: 1 REF: 18 TOP: Critical Thinking

COMPLETION

1. Computers and traditional devices we use everyday have begun to ____________________ into single units with multiple
capabilities.

ANS: converge

PTS: 1 REF: 6

2. ____________________ are regular appliances with some type of built-in computer technology.

ANS: Smart appliances

PTS: 1 REF: 7

3. ____________________ is a common alternative to traditional classroom learning that allows students to participate from
their current location, instead of physically going to the educational institution.

ANS: Distance learning

PTS: 1 REF: 7-8

4. An emerging payment option is the use of ____________________ systems—systems that allow individuals to pay for
products and services via a mobile phone or other portable device.

ANS: m-commerce

PTS: 1 REF: 10

5. Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries,
and ticketing systems.
ANS: kiosks

PTS: 1 REF: 9

6. The ____________________ being used with a computer determine the tasks the computer is able to perform.

ANS:
programs
software

PTS: 1 REF: 10

7. The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the
information processing cycle.

ANS: IPOS

PTS: 1 REF: 11

8. ____________________—technically an input or output operation, depending on which direction the information is going—
is increasingly considered the fifth primary computer operation.

ANS: Communications

PTS: 1 REF: 11

9. The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great
deal of electricity, and generated a lot of heat.

ANS:
vacuum tubes
glass tubes
tubes

PTS: 1 REF: 12

10. One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think,
reason, and learn.

ANS: artificial intelligence

PTS: 1 REF: 14

11. The physical parts of a computer are collectively referred to as ____________________.

ANS: hardware

PTS: 1 REF: 14

12. HTML is called a(n) ____________________ or scripting language.

ANS: markup

PTS: 1 REF: 17

13. ____________________ are computer professionals whose primary job responsibility is to write the programs that computers
use.

ANS: Programmers

PTS: 1 REF: 18
14. Some midrange servers consist of a collection of individual ____________________ called blades.

ANS: circuit boards

PTS: 1 REF: 25

15. Typically, individual users connect to the Internet by connecting to computers belonging to a(n) ____________________.

ANS:
ISP
Internet service provider
Internet service provider (ISP)
ISP (Internet service provider)

PTS: 1 REF: 27

16. ISP computers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of
the major high-speed networks within a country, called a(n) ____________________.

ANS: backbone network

PTS: 1 REF: 27

17. The World Wide Web refers to one resource—a collection of documents called ____________________—available through
the Internet.

ANS: Web pages

PTS: 1 REF: 28

18. One of the most common online security risks today is your PC becoming infected with (a) ____________________.

ANS:
virus
computer virus
malware program

PTS: 1 REF: 37

19. By their very nature, online communications lend themselves to ____________________. Since recipients usually do not
hear senders’ voices or see their handwriting, it is difficult to know for sure who the sender is.

ANS: anonymity

PTS: 1 REF: 39

20. A(n)____________________ would be used for applications that require extraordinary speed, accuracy, and processing
capabilities—for example, sending astronauts into space, controlling missile guidance systems and satellites, forecasting the
weather, exploring for oil, and assisting with some kinds of scientific research.

ANS: supercomputer

PTS: 1 REF: 26

ESSAY

1. Discuss the role of computers on the job.

ANS:
Although computers have been used on the job for years, their role is continually evolving. Computers were originally used
as research tools for computer experts and scientists and then as productivity tools for office workers. Today, computers are
used by all types of employees in all types of businesses—including corporate executives, retail store clerks, traveling sales
professionals, artists and musicians, engineers, police officers, insurance adjusters, delivery workers, doctors and nurses, auto
mechanics and repair personnel, and professional athletes.

You might also like