True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
Programming the first commercial micro-computers were accomplished by flipping
switches.
|
Modified True/False Indicate
whether the statement is true or false. If false, change the identified word or phrase to make the
statement true.
|
|
|
2.
|
When using a computer, the proper position for your back is leaning
forward slightly. _________________________
|
|
|
3.
|
A tool used for making calculations that was considered essential for
engineering and science students through the 1960s is an abacus.
_________________________
|
|
|
4.
|
RFID chips are used to monitor employee activities.
_________________________
|
|
|
5.
|
A computer designer designs and tests new hardware products.
_________________________
|
|
|
6.
|
In 1947, it was estimated that there would only be a need for 100
electronic computers. _________________________
|
|
|
7.
|
Relocating business processes, such as development and production is called
outsourcing. _________________________
|
|
|
8.
|
A newer version of a software product is called a release.
_________________________
|
|
|
9.
|
Confidentiality is the protecting of proprietary information.
_________________________
|
|
|
10.
|
Product specification and prototypes take place in the product design
phase of the life cycle of a typical hardware product. _________________________
|
|
|
11.
|
Adjusting manufacturing capacity to meet product demand takes place in product
maintenance. _________________________
|
|
|
12.
|
A LCD generates x-rays which are considered harmful.
_________________________
|
|
|
13.
|
An average IT industry employee works an average of 36 hours.
_________________________
|
|
|
14.
|
The Difference Engine was a calculator that operated using steam power.
_________________________
|
|
|
15.
|
Security specialist install and configure antivirus software and
firewalls. _________________________
|
|
|
16.
|
To combat potential health hazards associated with computer use you should try
to take breaks every 20 minutes. _________________________
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
17.
|
The first mass-produced calculator was the ____.
a. | Pascaline | c. | de Colmar’s Arithmometer | b. | Leibniz | d. | IBM
calculator |
|
|
|
18.
|
A ____ investigate the requirements of a business or organization, its
employees, and its customers in order to plan and implement new or improved customer service.
a. | system designer | c. | systems analyst | b. | information analyst | d. | programmer |
|
Completion Complete each
statement.
|
|
|
19.
|
A vacuum tube is an electronic device that controls the flow of
____________________.
|
|
|
20.
|
A computer language which used 0s and 1s for programming is called
____________________ language.
|
|
|
21.
|
Devices that regulate current or voltage flow and act as a switch for electronic
signals are ____________________.
|
|
|
22.
|
In second-generation computers, the operating system was designed to work on one
specific computer ____________________.
|
|
|
23.
|
The type of circuit technology that made it possible to pack the equivalent of
thousands of vacuum tubes into a single chip is called ____________________.
|
|
|
24.
|
The first electronic spreadsheet was ____________________.
|
|
|
25.
|
One of the first Internet-based companies was ____________________.
|
|
|
26.
|
The use of components or labor from outside suppliers is called
____________________.
|
|
|
27.
|
The sharp rise in the stock value of the dot com industry is called the dot com
____________________.
|
|
|
28.
|
Publicizing information about new product features takes place in the phase
known as product ____________________.
|
|
|
29.
|
Rolling out the product at a trade show takes place in the phase called product
____________________.
|
|
|
30.
|
Products that are announced but never produced are referred to as
____________________.
|
|
|
31.
|
Computer hardware and software are sold through outlets called marketing
____________________.
|
|
|
32.
|
Any person whose primary occupation involves the design, configuration,
analysis, development, modification, testing, or security of computer hardware or software is a
computer ____________________.
|
|
|
33.
|
Workers using technology to work from home or an off-site location is
____________________.
|
|
|
34.
|
The type of exam that is an objective test that verifies one’s level of
knowledge about a particular technology or subject is a ____________________.
|
|
|
35.
|
A database that contains thousands of job openings posted by employers is
an online job ____________________.
|
|
|
36.
|
A term that refers to on-the-job choices and actions that reflect a
person’s values is professional ____________________.
|
|
|
37.
|
The term that is used to refer to any energy that is emitted in the form of
waves or particles is ____________________.
|
|
|
38.
|
The study of safe and efficient working environments is
____________________.
|
Matching
|
|
|
a. | security specialist | g. | Oracle, Access, DB2 | b. | A+ certification | h. | web designer | c. | database
administrator | i. | non-compete | d. | AutoCAD Certified User exam | j. | CISSP | e. | metasearch
tool | k. | carpal tunnel
syndrome | f. | network specialist | l. | software applications |
|
|
|
39.
|
A person who analyzes a computer’s vulnerabilities and threats
|
|
|
40.
|
a person who analyzes a company’s data to determine the most effective
way to collect and store it
|
|
|
41.
|
a repetitive stress injury
|
|
|
42.
|
A person who plans, installs, and maintains one or more local area
networks
|
|
|
43.
|
creates, tests, posts and modifies web pages
|
|
|
44.
|
use of 3-D design software
|
|
|
45.
|
certificate exams that you take to demonstrate your skills with a specific
application
|
|
|
46.
|
database system in which professionals have sought certification
|
|
|
47.
|
a certification in computer hardware
|
|
|
48.
|
computer security certification
|
|
|
49.
|
a software program that performs broad-based web searches for jobs
|
|
|
50.
|
clauses that prevent employees from divulging proprietary information to
competitors
|