Name:     ID: 
 
Email: 

Chapter 1 PreTest

True/False
Indicate whether the statement is true or false.
 

 1. 

Digital technology has changed the way we view privacy.
 

 2. 

The number 9 can be considered a character.
 

 3. 

You should always use a different password for every account.
 

 4. 

Trojans are computer programs that seem to perform one function while actually doing something else.
 

 5. 

The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
 

 6. 

The first digital computer was developed for conducting the census.
 

 7. 

Prior to 1940, the word computer was defined as a person who performs calculations.
 

 8. 

The purpose of a server is to serve computers on a network.
 

 9. 

In the binary number system, 2 is used to represent the value 2.
 

 10. 

An interpreter converts and executes one statement at a time.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

Key factors in making electronic devices increasingly smaller and less expensive include ____.
a.
transistors
c.
a & b
b.
integrated circuits
d.
neither a nor b
 

 12. 

In 1982, the percentages of households that had a computer was ____ percent.
a.
10
c.
50
b.
30
d.
70
 

 13. 

____ allow members to post comments and questions that can be read and responded to by others.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 14. 

____ are where people exchange typed messages in real-time.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 15. 

____ provides a space for interacting with friends.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 16. 

The ____ is a collection of linked documents, graphics, and sounds.
a.
network
c.
cyberspace
b.
Web
d.
Internet
 

 17. 

____ is a term that refers to entities that exist largely within computer networks.
a.
Web
c.
WWW
b.
Internet
d.
Cyberspace
 

 18. 

____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
a.
Digitizing
c.
Scanning
b.
Digital conversion
d.
Rastorization
 

 19. 

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
a.
evolution
c.
convergence
b.
rotation
d.
diversification
 

 20. 

A computer is a multiple purpose device that ____.
a.
stores data
c.
accepts input
b.
processes data
d.
all of the above
 

 21. 

In a computer most processing takes place in ____.
a.
memory
c.
CPU
b.
RAM
d.
mother board
 

 22. 

A set of computer programs that helps a computer monitor itself and function more efficiently is a/an ____.
a.
operating system
c.
application software
b.
system software
d.
Windows
 

 23. 

The master controller for all activities that take place within a computer is ____.
a.
application software
c.
operating system
b.
system software
d.
CPU
 

 24. 

A powerful desktop computer used for high-performance tasks is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 25. 

The type of data that is represented using an infinite scale of values is ____.
a.
information
c.
digital
b.
analog
d.
none of the above
 

 26. 

Digital devices can use ____ as a code to represent character data.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 27. 

The type of code that uses only 7 bits for each character is ____.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 28. 

You might represent ____ as characters.
a.
color dot
c.
social security numbers
b.
bank balance
d.
none of the above
 

 29. 

Data transmission speeds are typically expressed as ____.
a.
bits
c.
hertz
b.
bytes
d.
none of the above
 

 30. 

One thousand bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 31. 

A super-thin slice of semiconducting material packed with microscopic circuit elements is a ____.
a.
integrated circuit
c.
microchip
b.
computer chip
d.
all of the above
 

 32. 

The ____ houses all essential chips and provides connecting circuitry between them.
a.
system board
c.
circuit board
b.
housing board
d.
chip board
 
 
nar001-1.jpg
 

 33. 

The above figure represents two types of chip carriers.  The one on the left is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 34. 

The figure above represents two types of chip carriers.  The one on the right is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 35. 

A ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
a.
compiler
c.
converter
b.
interpreter
d.
instruction
 

 36. 

A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.
a.
compiler code
c.
machine code
b.
interpretercode
d.
instruction set
 

 37. 

The ____ is a command word for an operation such as add, compare or jump.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 38. 

The ____ fetches each instruction.
a.
op code
c.
ALU
b.
operand
d.
control unit
 
 
nar002-1.jpg
 

 39. 

The above figure represents the instruction cycle.  The first step is Box A and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 40. 

The above figure represents the instruction cycle.  The fourth step is Box D and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 41. 

A ____ uses password-cracking software.
a.
brute force attack
c.
phishing
b.
sniffing
d.
cracker
 

 42. 

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
a.
brute force
c.
phishing
b.
sniffing
d.
cracking
 

 43. 

____ tools that disguise a person’s identity online.
a.
Anonymizer
c.
ID free
b.
Free ID
d.
Cloaking
 

 44. 

In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 45. 

A term which refers to a skilled programmer or to a person who manipulates computers with malicious intent is a ____.
a.
black hat
c.
hacker
b.
cracker
d.
both b and c
 

 46. 

A named collection of data that exists on a storage medium.
a.
memory
c.
file name
b.
file
d.
none of the above
 
 
Case-Based Critical Thinking Questions

Case 1-1
Karen is trying to get organized and one of her issues is that she has too many electronic devices.  She wants to reduce the number of devices and still maintain the same degree of functionality.
 

 47. 

Karen thinks she might need a device that in addition to her appointment book she needs features such as email, Web access, a camera, and a GPS.  You suggest she consider a ____.
a.
iPod
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 
 
Case-Based Critical Thinking Questions

Case 1-2
Mike and Andre are discussing how quickly technology changes.  They are discussing how it seems devices are merging to create new products especially in the technology field.  They understand this is a process called convergence.
 

 48. 

An example of an old form of convergence is ____.
a.
clock radio
c.
television
b.
cell phone
d.
microwave oven
 

 49. 

A barrier to the rapid deployment of many products resulting from convergence is ____.
a.
technology breakthroughs
c.
people aren’t ready
b.
legal issues
d.
both b and c
 
 
Case-Based Critical Thinking Questions

Case 1-3
Jim has just purchased a new computer and it has made him think about how it works.  He is particularly  interested in how information is processed and stored in his computer.  He has come to you for help.
 

 50. 

Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.
a.
an op code and operand
c.
basic instructions such as add
b.
a series of 0s and 1s
d.
all of the above
 

Completion
Complete each statement.
 

 51. 

An ongoing process of social, political, and economic change brought about by digital technology is the digital ____________________.
 

 

 52. 

Probably the most significant force driving research into fast computers and more sophisticated graphics processing is computer ____________________.
 

 

 53. 

The expectation that a person’s information will not be collected or divulged without permission is ____________________.
 

 

 54. 

The ownership of certain types of information, ideas, or representations is intellectual ____________________.
 

 

 55. 

A term that refers to the gap between people who have access to technology and those who do not is the digital ____________________.     
 

 

 56. 

The manipulation of data is ____________________.
 

 

 57. 

The term that refers to the form in which data is stored, processed, and transmitted is data ____________________.
 

 
 
nar006-1.jpg
 

 58. 

In the figure above, the type of sound wave indicated by A is ____________________.
 

 

 59. 

Identifying a person by personal attributes such as fingerprints or retina patterns is called ____________________.
 

 

 60. 

Hackers can guess your password by stepping through a dictionary.  This process is called a dictionary ____________________.
 

 



 
         Start Over