Sunteți pe pagina 1din 5

Computer Programming 11: Chapter 1 Questions

Mohammed Toman

1. A) A desktop computer may be preferred at when you don’t need your computer to be mobile
and have a desk to place your tower on or under. Also desktops are usually cheaper with better
specs
B) Three advantages of purchasing a notebook over a desktop is that its portable, all input
devices are included, doesn’t require a desk or surface.
C) Someone who would prefer a tablet over a notebook is if they wanted to more discreetly
carry a PC instead of carrying around a notebook. Also tablets are more comfortably used on
couches and chairs.
D) Two occupations that require handheld devices would be a police officer as they could check
warrants and id more easily. Also stock brokers as they could check it on the go.
E) Wearable computers are used in the health care industry for things like pacemakers and for
checking vitals.

2. A) Keyboards- Used to type out characters and perform specific actions depending on the
software.

Mouse- Used to designate what you want to select and the buttons on it can be programmed to
perform specific actions.

DVD Drive- Used to access information stored on a DVD and translate it into your computer.

3. CPU- Process’s data and scripts

RAM- Temporally stores data for use

Graphics card- Used to render images, videos, Video Games

Transistor- Helps instruct the other components

Sound card- Process’s sound o be heard

4. Input to Memory to output

To the CPU

5. Cache stored data for regularly used sites/programs

6. A) OS software is used for the general GUI of the computer and allows easy access to other
programs while applications can be accessed through the OS and used for other means

B) Linux, Mac OS, Windows

C) Hardware and software configuration


D) Platform

7. Program from the OS used for managing the system like the CPU and memory

8. it’s important as it’s more convenient for users to connect with each other

9. A) Low level programming language is for machine and assembly while high level programming
is used using human language

B) C, C++, Pascal

C) a compiler converts a program into machine code while an interpreter executes and reads an
instruction

D) allows you to quickly put a program together and it’s easier to understand

10. -Communication over a long distance

-Gaming

-Photo Sharing

-Sharing info for work or School

11. A) MAN and WAN

B) WAN

12. A) Low internet speed

B) DSL is faster

13. Ring topology, star topology

14. A) How you lay out the network

B) Node is

C) Star
D) Ring

E) Physical is how there connected through wire. While digital is through node

15. Not attempting to access others accounts and not sharing your passwords among each other

16. In order to represent numbers and letters

17. A) 1110

B) 4210

18. A decoding standard for use with different industries


19. A) 2147483648
B) 536870912000
20. A) When the number of bits needed to represent the integer is greater then four
B) Numbers that have decimal points
C) When there aren’t enough bits to hold the mantissa
21. A) A text file is translated in words or letters that humans understand while binary is in
computer language
B) It tells the computer what type of file it is for translating and processing it
information
C) It would help you to know what is where for quicker access. While also allowing the
computer to more easily find a file as you can narrow it down by folder.
22. Primary storage- RAM
Secondary Storage- Hard Drive
23. -Keep away from extreme temperature and moisture
-Hold it by the sides or middle
-Keep magnets away
-store in a jewel case or sleeve.
24. A) Intranet is used by a single organization
Extranet is an extended network that offers various levels of access
B) It’s a public network
25. A) Slow internet speeds
B) DSL provides always-on high-speed Internet access over a single dedicated telephone
line. Cable modems offer always-on high-speed Internet access over a shared cable
television line.
26. A) Google
B) Quicker to send and get replies
C) www.@gmail.com

Have a Domain and username


D) Gmail
27. A) As its still received by people and can be viewed by the providers
28. A) Yahoo, Bing, Google
B) Google. As I have everything linked to it, like my email and you tube.
C) To help you find what you need more effectively
29. A) Restaurants + Miami
B) Art Museums + Montreal, Canada
C) Clothing stores nearby
D) Alligators – Crocodiles
30. VIRUSES
32. A) Marketing that collects data from users
B) Text file that stores user info
C) Tiny invisible graphic that collects data on the user
D) Advertisers
34. SAFE act. Gives us the ability to use any encryption to protect our data.
35. -Protect other users
-Protect students
-Protect confidential info
36. Change whatever action affected your credit on the records.
37. A) Permit
B) Hide confidential info
38. A) Using a name or image that has been copyrighted
B) Takes revenue
C) Spyware, malware, Trojans. Puts your info and computer in danger
D) An email falsely claiming to be something else requesting money or info
39. To keep your info confidential, not to access anything that doesn’t need to be, and to
keep the computer safe from viruses.
40. A) False, Software refers to programs.
B) True
C) False, it manages a plethora of things
D) False, It’s a low level program
E) True
F) True
G) True
H) False, Cable is faster
I) True
J) False, 1750-1900
K) True

S-ar putea să vă placă și