True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
Digital technology has changed the way we view privacy.
|
|
|
2.
|
The number 9 can be considered a character.
|
|
|
3.
|
You should always use a different password for every account.
|
|
|
4.
|
Trojans are computer programs that seem to perform one function while actually
doing something else.
|
|
|
5.
|
The digital revolution became a significant factor in the 1980s but ended in the
1990s with the dot com bubble burst.
|
|
|
6.
|
The first digital computer was developed for conducting the census.
|
|
|
7.
|
Prior to 1940, the word computer was defined as a person who performs
calculations.
|
|
|
8.
|
The purpose of a server is to serve computers on a network.
|
|
|
9.
|
In the binary number system, 2 is used to represent the value 2.
|
|
|
10.
|
An interpreter converts and executes one statement at a time.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
11.
|
Key factors in making electronic devices increasingly smaller and less expensive
include ____.
a. | transistors | c. | a & b | b. | integrated circuits | d. | neither a nor b |
|
|
|
12.
|
In 1982, the percentages of households that had a computer was ____
percent.
|
|
|
13.
|
____ allow members to post comments and questions that can be read and responded
to by others.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
14.
|
____ are where people exchange typed messages in real-time.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
15.
|
____ provides a space for interacting with friends.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
16.
|
The ____ is a collection of linked documents, graphics, and sounds.
a. | network | c. | cyberspace | b. | Web | d. | Internet |
|
|
|
17.
|
____ is a term that refers to entities that exist largely within computer
networks.
a. | Web | c. | WWW | b. | Internet | d. | Cyberspace |
|
|
|
18.
|
____ is the process of converting text, numbers, sound, photos, and video into
data that can be processed by digital devices.
a. | Digitizing | c. | Scanning | b. | Digital conversion | d. | Rastorization |
|
|
|
19.
|
Technology ____ is a process by which several different technologies with
distinct functionality evolve to form a single product.
a. | evolution | c. | convergence | b. | rotation | d. | diversification |
|
|
|
20.
|
A computer is a multiple purpose device that ____.
a. | stores data | c. | accepts input | b. | processes data | d. | all of the
above |
|
|
|
21.
|
In a computer most processing takes place in ____.
a. | memory | c. | CPU | b. | RAM | d. | mother board |
|
|
|
22.
|
A set of computer programs that helps a computer monitor itself and function
more efficiently is a/an ____.
a. | operating system | c. | application software | b. | system software | d. | Windows |
|
|
|
23.
|
The master controller for all activities that take place within a computer is
____.
a. | application software | c. | operating system | b. | system software | d. | CPU |
|
|
|
24.
|
A powerful desktop computer used for high-performance tasks is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
25.
|
The type of data that is represented using an infinite scale of values is
____.
a. | information | c. | digital | b. | analog | d. | none of the
above |
|
|
|
26.
|
Digital devices can use ____ as a code to represent character data.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
27.
|
The type of code that uses only 7 bits for each character is ____.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
28.
|
You might represent ____ as characters.
a. | color dot | c. | social security numbers | b. | bank
balance | d. | none of the
above |
|
|
|
29.
|
Data transmission speeds are typically expressed as ____.
a. | bits | c. | hertz | b. | bytes | d. | none of the
above |
|
|
|
30.
|
One thousand bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
31.
|
A super-thin slice of semiconducting material packed with microscopic circuit
elements is a ____.
a. | integrated circuit | c. | microchip | b. | computer chip | d. | all of the
above |
|
|
|
32.
|
The ____ houses all essential chips and provides connecting circuitry between
them.
a. | system board | c. | circuit board | b. | housing board | d. | chip board |
|
|
|
|
|
|
33.
|
The above figure represents two types of chip carriers. The one on the
left is a ____.
|
|
|
34.
|
The figure above represents two types of chip carriers. The one on the
right is a ____.
|
|
|
35.
|
A ____ converts all the statements in a program in a single batch and the
resulting collection of instructions is placed in a new file.
a. | compiler | c. | converter | b. | interpreter | d. | instruction |
|
|
|
36.
|
A collection of preprogrammed activities such as addition, subtraction, counting
and comparison is called a(n) ____.
a. | compiler code | c. | machine code | b. | interpretercode | d. | instruction set |
|
|
|
37.
|
The ____ is a command word for an operation such as add, compare or jump.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
38.
|
The ____ fetches each instruction.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
|
|
|
39.
|
The above figure represents the instruction cycle. The first step is Box A
and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
40.
|
The above figure represents the instruction cycle. The fourth step is Box
D and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
41.
|
A ____ uses password-cracking software.
a. | brute force attack | c. | phishing | b. | sniffing | d. | cracker |
|
|
|
42.
|
A hacker posing as a legitimate representative of an official organization such
as your bank is an example of ____.
a. | brute force | c. | phishing | b. | sniffing | d. | cracking |
|
|
|
43.
|
____ tools that disguise a person’s identity online.
a. | Anonymizer | c. | ID free | b. | Free ID | d. | Cloaking |
|
|
|
44.
|
In terms of an authentication protocol, the phrase ‘something a person
is’ refers to a(n) ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
45.
|
A term which refers to a skilled programmer or to a person who manipulates
computers with malicious intent is a ____.
a. | black hat | c. | hacker | b. | cracker | d. | both b and c |
|
|
|
46.
|
A named collection of data that exists on a storage medium.
a. | memory | c. | file name | b. | file | d. | none of the
above |
|
|
|
Case-Based Critical Thinking Questions
Case 1-1 Karen is trying
to get organized and one of her issues is that she has too many electronic devices. She wants
to reduce the number of devices and still maintain the same degree of functionality.
|
|
|
47.
|
Karen thinks she might need a device that in addition to her appointment book
she needs features such as email, Web access, a camera, and a GPS. You suggest she consider a
____.
a. | iPod | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
Case-Based Critical Thinking Questions
Case 1-2 Mike and Andre
are discussing how quickly technology changes. They are discussing how it seems devices are
merging to create new products especially in the technology field. They understand this is a
process called convergence.
|
|
|
48.
|
An example of an old form of convergence is ____.
a. | clock radio | c. | television | b. | cell phone | d. | microwave oven |
|
|
|
49.
|
A barrier to the rapid deployment of many products resulting from convergence is
____.
a. | technology breakthroughs | c. | people aren’t
ready | b. | legal issues | d. | both b and c |
|
|
|
Case-Based Critical Thinking Questions
Case 1-3 Jim has just
purchased a new computer and it has made him think about how it works. He is particularly
interested in how information is processed and stored in his computer. He has come to you for
help.
|
|
|
50.
|
Jim wants to know what machine language instructions look like to the machine.
You tell him they appear as ____.
a. | an op code and operand | c. | basic instructions such as add | b. | a series of 0s and
1s | d. | all of the
above |
|
Completion Complete each
statement.
|
|
|
51.
|
An ongoing process of social, political, and economic change brought about by
digital technology is the digital ____________________.
|
|
|
52.
|
Probably the most significant force driving research into fast computers and
more sophisticated graphics processing is computer ____________________.
|
|
|
53.
|
The expectation that a person’s information will not be collected or
divulged without permission is ____________________.
|
|
|
54.
|
The ownership of certain types of information, ideas, or representations is
intellectual ____________________.
|
|
|
55.
|
A term that refers to the gap between people who have access to technology and
those who do not is the digital ____________________.
|
|
|
56.
|
The manipulation of data is ____________________.
|
|
|
57.
|
The term that refers to the form in which data is stored, processed, and
transmitted is data ____________________.
|
|
|
|
|
|
58.
|
In the figure above, the type of sound wave indicated by A is
____________________.
|
|
|
59.
|
Identifying a person by personal attributes such as fingerprints or retina
patterns is called ____________________.
|
|
|
60.
|
Hackers can guess your password by stepping through a dictionary. This
process is called a dictionary ____________________.
|