Chapter 1: Review Questions
1. A) A desktop computer might be preferred over a notebook computer, if you
dont need a portable computer, but want a bit more power.
B) Three advantages of a notebook computer over a desktop, is that its
portable, contains long lasting batteries and a bit easier to use.
C)
D) Two occupations where itd be helpful to have a handheld computer is an
auto mechanic and a doctor.
E) Wearable computers are used in the health care industry to monitor health
problems, such as heart rate and respiration flow.
2. A) Three examples of input devices are a keyboard, mouse and DVD drive.
Though they may seem very different, all of them are used to enter data into
the computer.
B) Three examples of output devices are monitors, printers and memory keys.
Each of these convey processed data, but they all do it differently. Printers
and monitors display data, while memory keys store it.
C) Two examples of peripheral devices are printers and webcams. Each of
them are added to make a computer more versatile.
D) Three types of ports are parallel, Bluetooth and FireWire.
3. Expansion Boards: Circuit boards that connect to the motherboard to add
functionality to the computer
CPU: Processes data and controls the flow of data between the computers
other units.
ALU: Performs arithmetic and logical operations.
Bus: A set of circuits that connect the CPU to other components
Integrated circuits: Stores data electronically.
4.
5. Cache Memory is used to store frequently used data so it can be quickly
retrieved by an app.
6. A) Operating system software preforms many tasks, such as controlling
processing and peripherals while applications software has one specific task,
such as a word processor.
B) Linux, Windows and Mac OS X are three different operating systems.
C) Environment refers to a computers hardware and software set up.
D) Another word for the word environment is platform.
7. A utility program is a program that manages input/output, read/write to
memory manages the processor, maintains system security and manages files and
disks.
8. Cross-platform connectivity is important to many computer users, because it
allows them to link and share data with different computers.
9. A) Low programming language can be used to directly communicate with
the computer but is harder to use, while high level programming language needs
its source code to be converted into machine language, but is easier to use.
B) Three high level programming languages are Pascal, Basic and Fortran.
C) A compiler is a program that converts an entire program into machine
code before the program is executed, while an interpreter translates and
executes an instruction before moving on to the next instruction.
D) An advantage of using an object-oriented programming language is that it
allows programmers to create modules that can be used again and again in a
variety of programs.
10. A network:
-Allows users to reliably share and exchange data
-Can reduce costs by sharing devices, like printers
-Provides means of communication such as email for network users.
- Offers security options, like passwords to restrict access to certain files.
11. A) Two common size classifications for networks are LAN and WAN
B) A WAN is used to connect devices over long distances.
12. A) A network operating system is software that allows users to communicate
over the network.
B) A network environment is the configuration of a network.
13. Two common network architecture models are a peer-to-peer network and a
server network.
With a peer-to-peer network, every computer on
the network is equal in terms of responsibilities and resources. A server network has
a group of computers (called clients) connected to a server. A server is a computer
with more RAM a bigger hard disk and occasionally multiple CPUs to manage
network functions.
14. A) Physical topology refers to the arrangement of the nodes on a network.
B) A node is a location on the network with a device able to process
information, like a printer or computer.
C) Star topology uses a hub.
D) A ring topology connects every node to form a closed loop.
E) Physical topology refers to the arrangement of the nodes on a network
while logical topology refers to the way data is passed between nodes on a network.
15. All of the netiquette rules apply in the classroom.
16. Binary was adopted for use in computers, because the electrical circuits on
an IC have only two
states, on and off.
17. A) The decimal equivalent of 1011 is 11
B) The decimal equivalent of 2A is 42
18. Unicode is a digital code that uses a set of 16 1s and 0s to represent every
letter of an alphabet and symbols of every culture.
19. A) 2GB of RAM can store 2,147,483,640 bytes.
B) A 500GB hard drive can store 536,870,910,000 bytes
20. A) An overflow error would occur when the number of bits need to represent
the integer is larger than 4 bytes.
B) Real numbers are numbers that contain decimal points.
C) A roundoff error would occur when there isnt enough bits to store the
mantissa.
21. A) A text file is a human-readable file and a binary file is a computerreadable file
B) An extension distinguishes file types because an application adds a
unique extension to the file it creates. A good example of this is DOCX or TXT.
C) Organizing your files into folders will help you keep organized, because all
of your related files are in one place.
22. Two ways storage devices can be classified is: Internal and External. An
example of an internal storage device is a hard disk, while an example of an
external storage device is a memory key.
23. Four rules that should be followed in order to avoid damaging files stored on
disks:
-Keep magnetic media away from magnets. Handle CD/DVDs by the center hole or
by the edges.
-Store CD/DVDs in a jewel case or sleeve to prevent scratches. Keep away from
moisture and extreme temperatures.
24. A) The difference between an intranet and an extranet is that an intranet is
a network used by a single organization, and is only accessible by authorized users.
While an extranet extends an intranet by giving various levels of accessibility to
authorized users of the public.
B) The internet isnt controlled by any one organization.
25. A) A problem associated with using a conventional modem is that it has a
slow access time.
B) The difference between a DSL modem and a cable modem, is that a DSL
uses standard telephone lines, while a cable modem uses a coaxial cable television
network. A DSL has data transmission up to 640 Kbps and data receipt from 1.5 to 9
Mbps while a cable modem has data transmission from 2 to 10 Mbps and data
receipt from 10Mbps to 36 Mbps.
26. A) The most widely used Internet service is the World Wide Web.
B) One benefit of email over standard mail is that it can be received in
seconds from all over the world.
C)nharker@shaw.ca,
nharker(User name) shaw(Host name) .ca(Top-level domain)
D) Two requirements for sending and receiving email messages is an email
address and email software or a web browser for browser based email.
E) One example of a browser based email site is Hotmail
27. A)
B)
28. A) Google, Yahoo, MSN
B) I prefer to use Google, because it feels faster and gets better search
results.
C) Its important to use effective search criteria, otherwise youll get too
many results to be useful.
29. A) Miami Restaurants
B) Art Museums Montreal, Canada
C) Surrey clothing stores
D) Alligators -crocodiles
E) James Patterson
F) Garbage in garbage out
G) George Washington, John Adams -Thomas Jefferson
H) Florida travel -Orlando
30. Files should only be downloaded from authentic sites, because
downloadable files can often have viruses.
31. A) Four questions to answer when evaluating a website source: -Does the
content have any evidence of Bias? Is the source credible? Is it accurate? Are
their claims supported?
B) Its necessary to cite sources, so that the original author gets credit and
so the reader can locate the cited information.
C) Perez, Tara. Clewiston Kite Surfing Emcschool N.P N.D August 2, 2012
<http://www.emcschool.net/kitesurf/color.txt.>
32. A) Online profiling is the collection of data about consumers visiting a site.
B) A cookie is a text file created by the server computer when a user enters
information into a website.
C) Web beacons are tiny, transparent graphics located on web pages or emails that are used with cookies to collect data about web page users or email
senders.
D) An outside advertising company usually monitors the information
collected by web beacons.
33. <https://www.google.com/policies/privacy/>
34. One law that helps protect the privacy of an individual is the SAFE act.
(Safety and Freedom through Encryption Act) This law allows one to use any type of
encryption to protect their confidential information.
35. Schools have developed an Acceptable Use Policy due to copyright,
unproductive use, and internet content.
36. You can check the files used to make the credit determination if you believe
the data is inaccurate. If any of the information is incorrect, you can have it
changed.
37. A) A federal government authority must have a subpoena, summons or
search warrant in order to access someones financial records.
B) After releasing someones records, a financial institution must notify the
individual of who has had access to them.
38. A) Copyright infringement is the illegal use or reproduction of data.
B) Computer piracy is a concern to software developers, because making,
testing, marketing and supporting software is expensive. Without compensation,
future development is jeopardized.
C) A computer virus is a program or series of instructions that can replicate
without the users knowledge.
D) Phishing is the act of sending an email to a user, claiming to be a
legitimate business in order to trick the user into giving personal information.
39. The ethical responsibilities an IT professional has includes ensuring the
reliability of computer software they create. They must also consider the impact
they have on computer users and ensure accurate data retrieval from websites
providing real time information.
40. A) False. Hardware refers to the physical components of the computer.
B) True
C) True
D) False. Assembly language is a low level programming language.
E) True
F) False. A client network has a server
G) True
H) False. A conventional modem transmits data slower than a cable modem
I) True
J) False. The present time is referred to as the information age
K) True