Name:     ID: 
 
Email: 

PreTest for Chapter 9

True/False
Indicate whether the statement is true or false.
 

 1. 

First-generation computers use vacuum tube technology.
 

 2. 

Second-generation computers were characterized by their use of operating systems.
 

 3. 

High-level languages were developed for first generation computers.
 

 4. 

One of the few remaining mini-computers is the IBM AS/400.
 

 5. 

Programming the first commercial micro-computers were accomplished by flipping switches.
 

 6. 

It is less expensive to replace software with brand-new software than to purchase an upgrade.
 

 7. 

In the United States, the IT industry is regulated by the FCC.
 

 8. 

The number of telecommuting IT workers is increasing.
 

 9. 

Your web based resume should fully utilize multimedia to demonstrate you capabilities.  Companies are expecting IT resumes to contain all aspects of multimedia.
 

 10. 

To reduce cell phone radiation you should use your hands-free devices.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

A step by step process by which numbers are manipulated is a(n) ____.
a.
algorithm
c.
calculation
b.
computer
d.
abacus
 

 12. 

The type of manual calculator first used in ancient Rome, Greece, India, China and Japan is called a/n ____.
a.
slide rule
c.
abacus
b.
algorithm
d.
Napier’s Bones
 

 13. 

A calculator that implements instructions to perform calculations is a ____.
a.
slide rule
c.
mechanical calculator
b.
abacus
d.
algorithm
 

 14. 

The first mass-produced calculator was the ____.
a.
Pascaline
c.
de Colmar’s Arithmometer
b.
Leibniz
d.
IBM calculator
 

 15. 

Punched cards were first used for ____.
a.
input to a computer
c.
census taking
b.
controlling colors and patterns of yarn
d.
early forms of electronic voting
 

 16. 

The U.S. Census Bureau held a competition to find a way to tabulate the 1890 census.  The Hollerith Tabulating Machine won.  The company is now known as ____.
a.
HP
c.
IBM
b.
HTM
d.
HAL
 

 17. 

An experimental device that typically must be further developed and perfected before going into production is called a ____.
a.
alpha
c.
prototype
b.
beta
d.
omega
 

 18. 

The first electronic computer to use vacuum tubes instead of switches was the ____.
a.
ABC
c.
Enigma
b.
Z3
d.
Mark 1
 

 19. 

IBM created a computer that integrated 73 IBM Automatic Accounting Machines into a single unified computing unit called the ____.
a.
ABC
c.
Enigma
b.
Z3
d.
Harvard Mark 1
 

 20. 

The electronic device used to decode messages encrypted by the Germans was the ____.
a.
COLOSSUS
c.
Enivac
b.
Enigma
d.
UNIVAC
 

 21. 

Computers characterized by their use of vacuum tubes are considered ____ generation.
a.
first
c.
third
b.
second
d.
fourth
 

 22. 

A vacuum tube can have ____ states.
a.
one
c.
three
b.
two
d.
unlimited
 

 23. 

Computers characterized by their use of transistors are considered ____ generation.
a.
first
c.
third
b.
second
d.
fourth
 

 24. 

The first IBM PCs used ____ as an operating system.
a.
MS-DOS
c.
Windows
b.
PC-DOS
d.
IBM-DOS
 

 25. 

By the mid-1990s, IBM-compatible computer systems accounted for more than ____ percent of all personal computer sales.
a.
70
c.
90
b.
80
d.
100
 

 26. 

Segments of the IT industry include ____.
a.
Software publishers
d.
a, b, and c
b.
Service companies
e.
a & c only
c.
Computer retailers
f.
b & c only
 

 27. 

World-wide consumers spend more than ____ dollars on information technology each year.
a.
1 billion
c.
1 trillion
b.
10 billion
d.
10 trillion
 
 
nar001-1.jpg
 

 28. 

The file cycle of a new computer model is shown above.  In the figure above, Box B represents ____.
a.
Introduction
c.
Product Development
b.
Product Announcement
d.
Product Design
 

 29. 

A set of testing conducted by a team of off-site testers is called ____.
a.
white box testing
c.
alpha testing
b.
black box testing
d.
beta testing
 

 30. 

The ____ tier of the computer industry consists of large companies.
a.
first
c.
third
b.
second
d.
fourth
 

 31. 

The ____ tier of the computer industry consists of companies falling below the cutoff for identifiable market share.
a.
first
c.
third
b.
second
d.
fourth
 
 
nar002-1.jpg
 

 32. 

The figure shown above represents computer and software marketing channels.  In that figure, Box A represents ____.
a.
Distribution centers
c.
Mail-order suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 33. 

The figure shown above represents computer and software marketing channels.  In that figure, Box C represents ____.
a.
Distribution centers
c.
Mail-order Suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 34. 

____ tends to be small local shops or national chains that specialize in the sale of microcomputer software and hardware.
a.
Computer retail store
c.
Large box stores
b.
Computer specialty store
d.
None of the above
 

 35. 

____ refers to hardware manufacturers that sell their products directly to consumers.
a.
Manufacturer direct
c.
VAR
b.
Mail-order
d.
All of the above
 

 36. 

A ____ investigate the requirements of a business or organization, its employees, and its customers in order to plan and implement new or improved customer service.
a.
system designer
c.
systems analyst
b.
information analyst
d.
programmer
 

 37. 

All of the following are essential for secure business data transmitted over the Internet except ____.
a.
virtual private network
c.
secure connections
b.
encryption
d.
high speed connection
 

 38. 

Careers in computer ____ focuses on the design of computer hardware.
a.
engineering
c.
design
b.
science
d.
construction
 

 39. 

____ degrees focus on applying computers to business problems.
a.
Information system
c.
Information management
b.
Information technology
d.
Information analysis
 

 40. 

Resumes should be in a ____ format.
a.
pdf
c.
doc
b.
xml
d.
all of the above
 

 41. 

The ____ Act enhances the authority of Law enforcement agents to prevent various terrorist acts such as monitoring electronic communication without a warrant.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 

 42. 

To get maximum exposure for your resume in an online job database you should focus on ____ type of words.
a.
verbs
c.
adjectives
b.
nouns
d.
all the above
 

 43. 

The ____ Act makes it a criminal offense to knowingly access a computer without authorization.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 

 44. 

The ____ Act establishes an agency to monitor threats to the communication infrastructure.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 
 
nar003-1.jpg
 

 45. 

The figure above represents a CRT; in this drawing Box B points to the ____.
a.
panel glass
c.
magnetic shield
b.
phosphor screen
d.
frame
 

 46. 

The figure above represents a CRT; in this drawing Box C points to the ____.
a.
panel glass
c.
frame
b.
phosphor screen
d.
electron beam
 

 47. 

The figure above represents a CRT; in this drawing Box D points to the ____.
a.
electron beam
c.
inner magnetic shield
b.
electronic gun
d.
none of the above
 
 
Case-Based Critical Thinking Questions

Case 9-2
Jimmy recently graduated and is looking for his first full-time job.  He has turned to you for help.  Jimmy knows you recently graduated and got a new job.  He thinks you can give him some advise to help with his search.
 

 48. 

You tell Jimmy that the elements of an effective resume include ____.
a.
it should be easy to read
c.
you should be sure and make the resume flash to get attention
b.
it should contain as much multimedia as possible
d.
all of the above
 

 49. 

You tell Jimmy there are automated programs that search one or more databases and notifies you when it finds any leads.  This program is called a ____.
a.
metasearch tool
c.
job search page
b.
job search engine
d.
job search agent
 
 
Case-Based Critical Thinking Questions

Case 9-3
Susan is concerned about some of the laws affecting the IT industry.  She is particularly interested in issues related to copyright and copyright violations.  She can’t afford to go to an attorney but knows you have done some research on this topic and might be able to help.
 

 50. 

Susan asks which act she should investigate that makes it illegal to circumvent copy-protection technologies.
a.
Unites States Copyright Act
c.
Fair Use Doctrine
b.
Digital Millennium Copyright Act
d.
CAN-SPAM Act
 

Completion
Complete each statement.
 

 51. 

A vacuum tube is an electronic device that controls the flow of ____________________.
 

 

 52. 

A computer language which used 0s and 1s for programming is called ____________________ language.
 

 

 53. 

Devices that regulate current or voltage flow and act as a switch for electronic signals are ____________________.
 

 

 54. 

The type of circuit technology that made it possible to pack the equivalent of thousands of vacuum tubes into a single chip is called ____________________.
 

 

 55. 

The use of components or labor from outside suppliers is called ____________________.
 

 

 56. 

The sharp rise in the stock value of the dot com industry is called the dot com ____________________.
 

 

 57. 

Publicizing information about new product features takes place in the phase known as product ____________________.
 

 

 58. 

Any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software is a computer ____________________.
 

 

 59. 

The type of exam that is an objective test that verifies one’s level of knowledge about a particular technology or subject is a ____________________.
 

 

 60. 

A database that contains thousands of  job openings posted by employers is an online job ____________________.
 

 



 
         Start Over