Sunteți pe pagina 1din 12

Chapter 1: Introduction to the World of Compute rs

TRUE/FALSE

1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a
computer without understanding the technical details of how a computer works.

ANS: T

2. Computer literacy is knowing about and understanding computers and their uses.

ANS: T

3. A computer does not always do whatever the instructions, or program, tell it to do.

ANS: F

4. Information processing is a vital activity today because the success of many businesses depends
heavily on the wise use of information.

ANS: T

5. The slide rule is considered by many to be the earliest recorded calculating device.

ANS: F

6. Fourth-generation computers witnessed the development of computer networks, wireless technologies,


and the Internet.

ANS: T

7. The external hardware components are located inside the main box or system unit of the computer.

ANS: F
8. Storage devices are hardware used to store data on or access data from storage media, such as CD
discs, DVD discs, or flash memory cards.

ANS: T

9. To begin to use a computer, the user first turns on the power by pressing the power button, and then
the computer displays a prompt for the user to decide the next course of action.

ANS: F

10. There are application programs that help users write their own programs using a programming
language.

ANS: T

11. In addition to hardware, software, data, and procedures, the fifth major component of a computer
system are codes.
ANS: F

12. Systems analysts design computer systems to be used within their companies.

ANS: T

13. The accompanying figure shows a notebook computer.

ANS: F

14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen
and keyboard.

ANS: T

15. Tablet PCs can use either a slate or a convertible tablet PC design.

ANS: T

16. A mainframe computer is the standard choice for large organizations that need to manage large
amounts of centralized data.

ANS: T

17. Small office networks enable workers to access company records stored on a network server.

ANS: T
18. Once you have an Internet connection, you are ready to begin programming the Webthat is, using a
Web browser to view Web pages.
ANS: F
19. Web browsers maintain a History list, which is a record of all Web pages visited during the period of
time specified in the browser settings.
ANS: T
20. Satellite communication (more commonly called s-com) is the process of exchanging electronic
messages between computers over a networkusually the Internet.
ANS: F
MODIFIED TRUE/FALSE

1. Wireless networking allows the use of computers in virtually any location.


_

ANS: T
2. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs
operations on that data, presents the results, and can store the data or results as needed.
_
ANS: F, computer

PTS: 1

3. A user inputs data into a computer, and then the computer processes it. _

ANS: T
4. Dr. Herman Holleriths Punch Card Tabulating Machine and Sorter was the first electromechanical
machine that could read slide rules.

ANS: F
punched cards
punch cards

PTS: 1

5. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for
output, and hard drives, flash memory media, and optical discs for storage.
_

ANS: T

6. The Start button is used to open the Start menushown in the accompanying figurewhich is used to
launch programs.

ANS: T
7. Computer programmers are the people who use a computer to obtain information.
_
ANS: F, users

8. Communications hardware includes modems, which are used to connect a computer to the Internet and
network projectors, which are used to connect a computer to a computer network.
_
ANS: F, adapters

9. Mult iple computing typically refers to accessing Web-based applications and data using a personal
computer, mobile phone, or any other Internet-enabled device. _

ANS: F
Grid
Cloud

10. The ISP is the largest and most well-known computer network in the world.
_
ANS: F, Internet

11. IP addresses and their corresponding domain names are used to identify computers available through
the Internet.

ANS: T

12. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name
for the computer that will be handling that persons e-mail (called a mail server).
_
ANS: T

13. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to
obtain social security numbers or other information needed for identity theft.
_

ANS: F, phishing
14. In cloud worlds, online users can explore anonymously. __

ANS: F, virtual
15. Abbreviations or acronyms, such as BTW for between the words, are commonly used to save time in
all types of communications today. _

ANS: F, by the way

MULTIPLE CHOICE

1. Fifty years ago, computers were used primarily by researchers and _ .


a. musicians c. writers
b. scientists d. designers
ANS: B

2. In the early 1980s, things began to change. _ were invented and computer use increased
dramatically.
a. Printers c. Microcomputers
b. Networks d. Computers
ANS: C

3. Computing technologies make it possible to have _ , traditional appliances with some type of
built-in computer or communications technology.
a. design appliances c. home computers
b. smart computers d. smart appliances
ANS: D

4. A growing number of college campuses have wireless _ on campus that allow students to use their
PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
a. hotspots c. com spots
b. hotpoints d. com points
ANS: A

5. As shown in the accompanying figure, the computer is used extensively for access control at many
organizations, such as _ that allow individuals to enter the office building, punch in or out of work,
or access the company network by providing the proper credentials or being authenticated via a
fingerprint or hand scan.
a. bar codes c. collaboration systems
b. virtual reality glasses d. authentication systems
ANS: D

6. _ occurs when data is entered into the computer.


a. Output c. Input
b. Processing d. Storage
ANS: C

7. In addition to the four primary computer operations, todays computers typically also perform __
functions.
a. calculations c. sorting
b. Communications d. programming
ANS: B
8. When data is processed into a meaningful form, it becomes .
a. Information c. a program
b. Code d. a database
ANS: A
9. Holleriths machine was used to process the 1890 U.S. Census data and was able to complete the task
in __ , instead of the decade it usually took to process the data by hand.
a. two and a half years c. four and a half years
b. three and a half years d. five and a half years
ANS: A

10. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing __ to be even smaller and more reliable than earlier computers.
a. second-generation computers c. fourth-generation computers
b. third-generation computers d. fifth-generation computers
ANS: B

11. Common input devices include the keyboard and _ _.


a. printer c. speaker
b. mouse d. monitor
ANS: B

12. Two of the most common types of communications hardware are _ and network adapters.
a. ports c. monitors
b. slide rules d. modems
ANS: D
13. The term _ refers to the programs or instructions used to tell the computer hardware what to do.
a. Hardware c. software
b. Port d. adapter
ANS: C

14. The Windows _ _ shown in the figure above contains the following objects: Windows, Icons, Menus,
Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
a. Command c. general menu
b. Toolbox d. desktop
ANS: D
15. Programming languages come in many varietiesfor example, BASIC, Visual Basic, Pascal,
COBOL, C++, and .
a. TCP/IP c. PDF
b. Rextore d. Java
ANS: D

16. _ consists of programs designed to allow people to perform specific tasks using a computer, such
as creating letters, preparing budgets, and managing inventory.
a. Cloud storage c. Java Script
b. HTML d. Application software
ANS: D

17. A _ is loosely defined as a very small device that has some built-in computing or Internet
capability.
a. mainframe computer c. mobile device
b. midrange server d. personal computer
ANS: C

18. A personal computer (PC) or _ is a small computer system designed to be used by one person at a
time.
a. processor c. microchip
b. microcomputer d. small processor
ANS: B

19. Conventional PCs are often referred to as because the complete computer system fits on or next
to a desk.
a. desktop computers c. super computers
b. laptop computers d. processor computers
ANS: A

20. The accompanying figure corresponds to the style for desktop PCs.
a. all-in-one case c. desktop case
b. tower case d. sub case
ANS: A

21. Most notebooks follow the traditional _ _ design in which the monitor is on the inside top half of the
PC, and the keyboard and touch pad are on the inside bottom half.
a. clamshell c. IBM
b. Microsoft d. book
ANS: A
22. Ultra-mobile PCs are also called _ _.
a. mini computers c. range computers
b. handheld computers d. frame computers
ANS: B

23. A(n) _ is a medium-sized computer used to host programs and data for a small network.
a. mainframe computer c. midrange server
b. super server d. Internet server
ANS: C

24. A _ is a collection of hardware and other devices that are connected together so that users can share
hardware, software, and data, as well as electronically communicate with each other.
a. computer bank c. data bank
b. Database d. computer network
ANS: D

25. _ are unique numeric or text-based addresses used to identify resources accessible through the
Internet, such as computers, Web pages, and people.
a. Computer addresses c. Domain IDs
b. Machine IDs d. Internet addresses
ANS: D

26. Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a
_ uniquely identifies a Web page.
a. universal resource identifier (URI) c. uniform resource locator (URL)
b. Web ID (WID) d. Web resource identifier (WRI)
ANS: C

27. To contact people using the Internet, you most often use their _ _.
a. domain names c. usernames
b. e-mail addresses d. passwords
ANS: B
28. To navigate to a new Web page for which you know the URL, type that URL in the browsers _
and press Enter.
a. Address bar c. Address button
b. Domain bar d. Name button
ANS: A
29. There are a number of special Web pages, called _ _, available to help you locate what you are
looking for on the Internet.
a. search sites c. domain sites
b. domain identifications d. Internet repositories
ANS: A

30. _ is typically free and provided by virtually all ISPs used with personal computers.
a. Short Message mail c. Web-com
b. Web-based e-mail d. Program-based e-mail
ANS: B
31. One online security problem is __ , in which someone else uses your identity, typically to purchase
goods or services.
a. identity duplication c. identity theft
b. domain theft d. phishing
ANS: C

32. _ refers to guidelines for online behavior.


a. Net rules c. Internet Rules
b. Web etiquette d. Netiquette
ANS: D

33. _ refers to typing your entire e-mail message or discussion group post using only capital letters.
a. Spamming c. Calling
b. Phishing d. Shouting
ANS: D

34. _ are illustrations of faces showing smiles, frowns, and other expressions that are created with
keyboard symbols.
a. Spams c. Emoticons
b. Phishes d. Trojan horses
ANS: C

35. There are independent Web sites (such as the _ Web site) that report on the validity of current
online rumors and stories.
a. Spammer c. Phisher
b. Snopes d. Identifier
ANS: B
Case-Base d Critical Thinking Questions
Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she
can keep track of her clients accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties.

36. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy
these to the computer at her office. What type of storage device should she use?
a. data projector c. scanner
b. firewire port d. USB flash drive
ANS: D
37. Sarah has hired a programmer to create a Web page for her business. What type of programming
language will the programmer use?
a. Python c. XHTML
b. COBAL d. BASIC
ANS: C
38. What kind of computer would most likely fit Sarahs needs?
a. midrange server c. notebook
b. embedded d. docking station
ANS: C
Case-Base d Critical Thinking Questions

Case 1-2
Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and
has a broad knowledge of the typical systems and applications software that people use. He has always
enjoyed working closely with people and has a good facility for explaining how technical systems
work.

39. Jamies mother is a computer programmer and would like Jamie to follow in her footsteps. What
course would she most likely suggest that Jamie take in college?
a. systems analysis c. computer literacy
b. history of computing d. Java
ANS: D

40. What type of computer-related job would Jamie probably enjoy the most?
a. hardware designer c. systems analyst
b. computer operations personnel d. end user
ANS: B

COMPLETION

1. Computers and traditional devices we use everyday have begun to _ _ into single
units with multiple capabilities.

ANS: converge
2. _ _ are regular appliances with some type of built-in computer technology.

ANS: Smart appliances

PTS: 1 REF: 7
3. _ _ is a common alternative to traditional classroom learning that allows students
to participate from their current location, instead of physically going to the educational institution.

ANS: Distance learning


4. An emerging payment option is the use of payment systemssystems that
allow individuals to pay for products and services via a mobile phone or other portable device.

ANS: mobile

5. Consumer _ _ are small self-service computer-based stations, such as ATM


machines, bridal registries, and ticketing systems.

ANS: kiosks

6. The being used with a computer determine the tasks the computer is able to
perform.

ANS:
programs
software
7. The progression of input, processing, output, and storage is sometimes referred to as the
_ _ cycle or the information processing cycle.

ANS: IPOS

8. _ _technically an input or output operation, depending on which direction the


information is goingis increasingly considered the fifth primary computer operation.

ANS: Communications

9. The first computers were powered by thousands of that needed replacing


constantly, required a great deal of electricity, and generated a lot of heat.

ANS:
vacuum tubes
glass tubes
tubes

10. One common opinion is that fifth-generation computers will be based on ,


allowing them to think, reason, and learn.

ANS: artificial intelligence

11. The physical parts of a computer are collectively referred to as _ .

ANS: hardware

12. HTML is called a(n) or scripting language.

ANS: markup

13. _ _ are computer professionals whose primary job responsibility is to write the
programs that computers use.

ANS: Programmers

14. Some midrange servers consist of consist of a collection of individual compact, modular servers called
_ _.

ANS: blades
15. Typically, individual users connect to the Internet by connecting to servers belonging to a(n)
_ _.

ANS:
ISP
Internet service provider
Internet service provider (ISP)
ISP (Internet service provider)

16. ISP computers are continually connected to a larger network, called a regional network, which, in turn,
is connected to one of the major high-speed networks within a country, called a(n)
_ _ network.

ANS: backbone
17. The World Wide Web refers to one resourcea collection of documents called
_ _available through the Internet.

ANS: Web pages

18. One of the most common online security risks today is your PC becoming infected with (a)
_ _.

ANS:
virus
computer virus
malware program

19. By their very nature, online communications lend themselves to _ _ _. Since


recipients usually do not hear senders voices or see their handwriting, it is difficult to know for sure
who the sender is.

ANS: anonymity

20. A(n) would be used for applications that require extraordinary speed,
accuracy, and processing capabilitiesfor example, sending astronauts into space, controlling missile
guidance systems and satellites, forecasting the weather, exploring for oil, breaking codes, and
designing and testing new products.

ANS: supercomputer

S-ar putea să vă placă și