STUDY GUIDE CHAPTER 1



Similar documents
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

lesson 1 An Overview of the Computer System

Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance

Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.

Basic Concepts of Information Technology (IT)

CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX

The Central Processing Unit:

Fall Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O

Chapter One Introduction to Computer

Chap-02, Hardware and Software. Hardware Model

Software: Systems and Application Software

Definition of Computers. INTRODUCTION to COMPUTERS. Historical Development ENIAC

Overview of MIS Professor Merrill Warkentin

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer

Chapter 1 Basic Introduction to Computers. Discovering Computers Your Interactive Guide to the Digital World

Computer Basics: Chapters 1 & 2

Parts of a Computer. Preparation. Objectives. Standards. Materials Micron Technology Foundation, Inc. All Rights Reserved

Chapter 8 Memory Units

CIS Mid Semester Examinations

Chapter 4 System Unit Components. Discovering Computers Your Interactive Guide to the Digital World

Introduction to Computers and Programming

ELECTRONIC DOCUMENT IMAGING

1.1 Electronic Computers Then and Now

Discovering Computers Living in a Digital World

Main Memory & Backing Store. Main memory backing storage devices

what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?

Computer Literacy. Hardware & Software Classification

MICROPROCESSOR AND MICROCOMPUTER BASICS

Chapter 12 - Software. Unit 1 Role and function of application software

Hardware: Input, Processing, and Output Devices. A PC in Every Home. Assembling a Computer System

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

Computer System: User s View. Computer System Components: High Level View. Input. Output. Computer. Computer System: Motherboard Level

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

1 PERSONAL COMPUTERS

The Hexadecimal Number System and Memory Addressing

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre

2011, The McGraw-Hill Companies, Inc. Chapter 3

Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9. Do Now: Name 3 parts of the computer.

Upon completion of this chapter, you will able to answer the following questions:

Operating System Software

The use of binary codes to represent characters

Receptionist-Small Business Administrator guide

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first

Computer Performance. Topic 3. Contents. Prerequisite knowledge Before studying this topic you should be able to:

Computer Layers. Hardware BOOT. Operating System. Applications

Week One Lecture Note 1.0 INTRODUCTION TO COMPUTER 1.1 WHAT IS COMPUTER?

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals

CPU Organization and Assembly Language

A Computer Glossary. For the New York Farm Viability Institute Computer Training Courses

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

MICROPROCESSOR. Exclusive for IACE Students iacehyd.blogspot.in Ph: /422 Page 1

CHAPTER 1: Our Digital Planet

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Certified Cyber Security Analyst VS-1160

Outline: Operating Systems

STUDY GUIDE CHAPTER 4

Building Applications Using Micro Focus COBOL

İSTANBUL AYDIN UNIVERSITY

Computer Systems Structure Input/Output

1 Computer hardware. Peripheral Bus device "B" Peripheral device. controller. Memory. Central Processing Unit (CPU)

Technical Product Specifications Dell Dimension 2400 Created by: Scott Puckett

Encoding Text with a Small Alphabet

Chapter 1. Computers and You. Computers Are Your Future. Computers & You. Understanding the Computer: Basic Definitions

Variable Data Printing

Multiple Choice Questions(Computer)

Chapter 5: System Software: Operating Systems and Utility Programs

Determining Your Computer Resources

Microprocessor & Assembly Language

TEST CHAPTERS 1 & 2 OPERATING SYSTEMS

Unit A451: Computer systems and programming. Section 2: Computing Hardware 1/5: Central Processing Unit

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

ERA6 OBJECTIVE QUSESTION

International Engineering Journal For Research & Development

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

What really is a Service?

In order to upload a VM you need to have a VM image in one of the following formats:

Lesson Plan. Preparation

Security Evaluation CLX.Sentinel

Threat Events: Software Attacks (cont.)

Chapter 5 System Software: Operating Systems and Utility Programs

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Computer Science PLUS I Volume 1 : Concepts Government of Tamilnadu

Chapter 4 IT Infrastructure: Hardware and Software

Chapter 01: Introduction. Lesson 02 Evolution of Computers Part 2 First generation Computers

Introduction to UNIX and SFTP

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

Introduction to Computer Architecture Concepts

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Transcription:

STUDY GUIDE CHAPTER 1 True/False Indicate whether the statement is true or false. 1. Digital technology has made it easy to produce copies of music with no loss of quality from the original. 2. Free source projects promote copying, free distribution, peer review, and user modifications. 3. An area where data can be left on a permanent basis is memory. 4. The set of instructions that tells a computer how to carry out processing tasks is a computer program. 5. In the past, minicomputers were used for small businesses. 6. A(n) supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. 7. The term server can refer to a combination of hardware and software. 8. A(n) microcomputer specializes in compute-intensive problems. 9. A light switch is like a(n) analog device. 10. DIPs and PGAs are both shapes of integrated circuits. 11. The results of statements that have been compiled are called object code. 12. A set of machine language instructions for a program is called source code. 13. The ALU uses registers to hold data that is being processed. 14. A(n) keylogger is a form of malicious code. 15. A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms. 16. The digital revolution became a significant factor in the 1980s but ended in the 1990s when the dot com bubble burst. 17. The first digital computer was developed for conducting the census. 18. Facebook and Twitter are examples of social networking options. 19. Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not. 20. Prior to 1940, the word computer was defined as a person who performs calculations. 21. An operating system is an example of application software.

22. Because of increased versatility, a videogame console is now considered a personal computer. 23. The purpose of a server is to serve computers on a network. 24. In the binary number system, 2 is used to represent the value 2. 25. The number 9 can be considered a character. 26. Because most digital devices are electronic, bits take the form of electrical pulses. 27. Semiconductor materials are substances with properties between those of a conductor and an insulator. 28. An interpreter converts and executes one statement at a time. 29. The op code in a machine language instruction specifies the data. 30. The operand is a command word for an operation. 31. All computers are case sensitive. 32. Trojans are computer programs that seem to perform one function while actually doing something else. 33. To ensure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday. 34. You should always use a different password for every account. Multiple Choice Identify the choice that best completes the statement or answers the question. 35. The " " represents Internet-based services, such as applications and social media, that are available from computers and handheld digital devices. a. convergence c. link b. cloud d. intranet 36. Facebook is an example of a(n). a. bulletin board c. online chat group b. online social network d. e-mail service 37. Data is based on an input-processing-output cycle. a. distribution c. digitization b. processing d. encoding 38. is an open-source computer operating system that can be modified and freely distributed. a. Windows c. Mac OS b. DOS d. Linux 39. All of the following are examples of output EXCEPT. a. reports c. keyboards b. documents d. music

40. The number system has only two digits: 0 and 1. a. binary c. biennial b. decimal d. octal 41. Which one of the following is most useful for representing the alphabets of multiple languages because it uses sixteen bits and provides codes for 65,000 characters? a. EBCDIC c. ASCII b. Unicode d. Extended ASCII 42. is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices. a. Digitization c. Scanning b. Analog conversion d. Rasterization 43. The first digital computers were built during World War II for. a. census taking c. communication b. code breaking d. troop placement 44. software refers to any software that is installed on a computer s hard disk. a. Local c. Cloud b. Proprietary d. Digital 45. Initially sales were slow for the personal computer because of. a. price c. lack of software b. size d. lack of availability 46. In 1982, the percentage of households that had a computer was closest to percent. a. 10 c. 50 b. 30 d. 70 47. A global computer network originally developed as a military project is the. a. World Wide Web c. Wide-area network b. Internet d. Local-area network 48. When restrictions on commercial use of the were lifted in 1995, companies such as AOL and CompuServe became popular services. a. World Wide Web c. Wide-area network b. Internet d. Local-area network 49. The phase of the digital revolution materialized in the 1990s when the Internet was opened to public use. a. first c. third b. second d. fourth 50. According to the text, a key aspect of is that it adds content and substance to. a. the Web, the Internet c. the Internet, the Web b. convergence, the cloud d. the cloud, local applications 51. During the period from, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications. a. 1982-1985 c. 1990-1995 b. 1985-1990 d. 1995-2010

52. The is a collection of linked documents, graphics, and sounds. a. network c. cyberspace b. Web d. Internet 53. A group of computers linked together to share data and resources is a(n). a. network c. cyberspace b. Web d. Internet 54. computing provides access to information, applications, communications, and storage over the Internet. a. Distance c. Cloud b. Disparate d. Local 55. Technology is a process by which several different technologies with distinct functionality evolve to form a single product. a. evolution c. convergence b. rotation d. diversification 56. media are cloud-based applications designed for social interaction and consumer-generated content. a. Sharing c. Blogging b. Wiki d. Social 57. By 2011, Facebook had million users. a. 200 c. 750 b. 350 d. 950 58. tools cloak a person s identity online. a. Anonymizer c. ID free b. Free ID d. Cloaking 59. A computer is a multiple purpose device that can do all of the following EXCEPT. a. store data c. accept input b. process data d. think independently 60. In a computer, most processing takes place in. a. memory c. the CPU b. RAM d. the motherboard 61. An electronic component that can be programmed to perform tasks is a. a. CPU c. transistor b. microprocessor d. no answers are correct 62. A named collection of data that exists on a storage medium is known as (a). a. memory c. file name b. file d. no answers are correct 63. An area of a computer that temporarily holds data waiting to be processed is. a. the CPU c. storage b. memory d. a file 64. A set of computer programs that helps a person carry out a task is. a. an operating system c. application software b. system software d. Windows 65. A set of computer programs that helps a computer monitor itself and function more efficiently is. a. a software suite c. application software b. system software d. processing software

66. The master controller for all activities that take place within a computer is. a. application software c. the operating system b. system software d. the CPU 67. A(n) is a microprocessor-based computing device designed to meet the computing needs of an individual. a. personal computer c. ALU b. mainframe d. server 68. An ordinary personal computer that is connected to a network is a. a. mainframe c. server b. workstation d. console 69. A powerful desktop computer used for high-performance tasks is a. a. mainframe c. server b. workstation d. console 70. A compute-intensive problem runs on a. a. server c. supercomputer b. miniframe d. super PC 71. Data becomes when it is presented in a format that people can understand and use. a. information c. graphs b. processed d. presentation 72. The binary number 10 represents in the decimal number system. a. 1 c. 10 b. 2 d. 100 73. The type of code that uses only seven bits for each character is. a. ASCII c. EBCDIC b. Extended ASCII d. all answers are correct 74. The type of code that uses eight bits for each character is. a. ASCII c. EBCDIC b. Extended ASCII d. all answers are correct 75. Digital devices can use as a code to represent character data. a. ASCII c. EBCDIC b. Extended ASCII d. all answers are correct 76. You might represent using character codes. a. color dots c. Social Security numbers b. bank balances d. no answers are correct 77. Data transmission speeds are typically expressed as. a. bits c. hertz b. bytes d. no answers are correct 78. Storage is typically expressed as. a. bits c. hertz b. bytes d. no answers are correct 79. 1,024 bytes is a. a. kilobyte c. gigabyte b. megabyte d. terabyte

80. 1,048,576 bytes is a. a. kilobyte c. gigabyte b. megabyte d. terabyte 81. 1,073,741,824 bytes is a. a. kilobyte c. gigabyte b. megabyte d. terabyte 82. A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n). a. integrated circuit c. microchip b. computer chip d. all answers are correct 83. The houses all essential chips and provides connecting circuitry between them. a. system board c. circuit breaker b. housing structure d. chip set 84. C, BASIC, COBOL, and Java are examples of programming languages. a. low-level c. system b. computer d. high-level 85. The human-readable version of a program is called. a. source code c. human code b. program code d. system code 86. A(n) converts all the statements in a program in a single batch; the resulting collection of instructions is placed in a new file. a. compiler c. converter b. interpreter d. instruction 87. A(n) converts and executes one statement at a time. a. compiler c. converter b. interpreter d. instruction 88. A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n). a. compiler code c. machine code b. interpreter code d. instruction set 89. The in machine language is a command word for an operation such as add, compare, or jump. a. op code c. ALU b. operand d. instruction code 90. The from an instruction specifies the data. a. op code c. ALU b. operand d. instruction code 91. In terms of an authentication protocol, the phrase something a person knows refers to. a. a password c. biometrics b. an ID card d. no answers are correct 92. A is a series of characters that becomes a person s unique identifier. a. PIN code c. user ID b. password d. all answers are correct

93. In terms of an authentication protocol, the phrase something a person possesses could refer to. a. a password c. biometrics b. an ID card d. no answers are correct 94. In terms of an authentication protocol, the phrase something a person is refers to a(n). a. password c. biometric device b. ID card d. no answers are correct 95. A problem a hacker can cause after breaking into your computer might be. a. applying for credit in your name c. applying for a mortgage using your data b. sending embarrassing e-mails d. all answers are correct 96. A term which can refer to a person who manipulates computers with malicious intent is. a. black hat c. hacker b. cracker d. all answers are correct 97. A attack uses password-cracking software. a. brute force c. phishing b. sniffing d. cracker 98. intercepts information sent over computer networks. a. Brute force c. Phishing b. Sniffing d. Cracking 99. A hacker posing as a legitimate representative of an official organization such as your bank is an example of. a. brute force c. phishing b. sniffing d. cracking 100. Password management functions include all of the following EXCEPT. a. generating passwords c. providing password strength b. tracking passwords d. recording keystrokes