True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
First-generation computers use vacuum tube technology.
|
|
|
2.
|
Second-generation computers were characterized by their use of operating
systems.
|
|
|
3.
|
High-level languages were developed for first generation computers.
|
|
|
4.
|
One of the few remaining mini-computers is the IBM AS/400.
|
|
|
5.
|
Programming the first commercial micro-computers were accomplished by flipping
switches.
|
|
|
6.
|
It is less expensive to replace software with brand-new software than to
purchase an upgrade.
|
|
|
7.
|
In the United States, the IT industry is regulated by the FCC.
|
|
|
8.
|
The number of telecommuting IT workers is increasing.
|
|
|
9.
|
Your web based resume should fully utilize multimedia to demonstrate you
capabilities. Companies are expecting IT resumes to contain all aspects of multimedia.
|
|
|
10.
|
To reduce cell phone radiation you should use your hands-free devices.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
11.
|
A step by step process by which numbers are manipulated is a(n) ____.
a. | algorithm | c. | calculation | b. | computer | d. | abacus |
|
|
|
12.
|
The type of manual calculator first used in ancient Rome, Greece, India, China
and Japan is called a/n ____.
a. | slide rule | c. | abacus | b. | algorithm | d. | Napier’s
Bones |
|
|
|
13.
|
A calculator that implements instructions to perform calculations is a
____.
a. | slide rule | c. | mechanical calculator | b. | abacus | d. | algorithm |
|
|
|
14.
|
The first mass-produced calculator was the ____.
a. | Pascaline | c. | de Colmar’s Arithmometer | b. | Leibniz | d. | IBM
calculator |
|
|
|
15.
|
Punched cards were first used for ____.
a. | input to a computer | c. | census taking | b. | controlling colors and patterns of
yarn | d. | early forms of
electronic voting |
|
|
|
16.
|
The U.S. Census Bureau held a competition to find a way to tabulate the 1890
census. The Hollerith Tabulating Machine won. The company is now known as ____.
|
|
|
17.
|
An experimental device that typically must be further developed and perfected
before going into production is called a ____.
a. | alpha | c. | prototype | b. | beta | d. | omega |
|
|
|
18.
|
The first electronic computer to use vacuum tubes instead of switches was the
____.
a. | ABC | c. | Enigma | b. | Z3 | d. | Mark 1 |
|
|
|
19.
|
IBM created a computer that integrated 73 IBM Automatic Accounting Machines into
a single unified computing unit called the ____.
a. | ABC | c. | Enigma | b. | Z3 | d. | Harvard Mark 1 |
|
|
|
20.
|
The electronic device used to decode messages encrypted by the Germans was the
____.
a. | COLOSSUS | c. | Enivac | b. | Enigma | d. | UNIVAC |
|
|
|
21.
|
Computers characterized by their use of vacuum tubes are considered ____
generation.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
22.
|
A vacuum tube can have ____ states.
a. | one | c. | three | b. | two | d. | unlimited |
|
|
|
23.
|
Computers characterized by their use of transistors are considered ____
generation.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
24.
|
The first IBM PCs used ____ as an operating system.
a. | MS-DOS | c. | Windows | b. | PC-DOS | d. | IBM-DOS |
|
|
|
25.
|
By the mid-1990s, IBM-compatible computer systems accounted for more than ____
percent of all personal computer sales.
|
|
|
26.
|
Segments of the IT industry include ____.
a. | Software publishers | d. | a, b, and c | b. | Service companies | e. | a & c only | c. | Computer
retailers | f. | b & c
only |
|
|
|
27.
|
World-wide consumers spend more than ____ dollars on information technology each
year.
a. | 1 billion | c. | 1 trillion | b. | 10 billion | d. | 10 trillion |
|
|
|
|
|
|
28.
|
The file cycle of a new computer model is shown above. In the figure
above, Box B represents ____.
a. | Introduction | c. | Product Development | b. | Product Announcement | d. | Product Design |
|
|
|
29.
|
A set of testing conducted by a team of off-site testers is called ____.
a. | white box testing | c. | alpha testing | b. | black box testing | d. | beta testing |
|
|
|
30.
|
The ____ tier of the computer industry consists of large companies.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
31.
|
The ____ tier of the computer industry consists of companies falling below the
cutoff for identifiable market share.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
|
|
|
32.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box A represents ____.
a. | Distribution centers | c. | Mail-order suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
33.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box C represents ____.
a. | Distribution centers | c. | Mail-order Suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
34.
|
____ tends to be small local shops or national chains that specialize in the
sale of microcomputer software and hardware.
a. | Computer retail store | c. | Large box stores | b. | Computer specialty store | d. | None of the
above |
|
|
|
35.
|
____ refers to hardware manufacturers that sell their products directly to
consumers.
a. | Manufacturer direct | c. | VAR | b. | Mail-order | d. | All of the
above |
|
|
|
36.
|
A ____ investigate the requirements of a business or organization, its
employees, and its customers in order to plan and implement new or improved customer service.
a. | system designer | c. | systems analyst | b. | information analyst | d. | programmer |
|
|
|
37.
|
All of the following are essential for secure business data transmitted over the
Internet except ____.
a. | virtual private network | c. | secure
connections | b. | encryption | d. | high speed connection |
|
|
|
38.
|
Careers in computer ____ focuses on the design of computer hardware.
a. | engineering | c. | design | b. | science | d. | construction |
|
|
|
39.
|
____ degrees focus on applying computers to business problems.
a. | Information system | c. | Information management | b. | Information
technology | d. | Information
analysis |
|
|
|
40.
|
Resumes should be in a ____ format.
a. | pdf | c. | doc | b. | xml | d. | all of the
above |
|
|
|
41.
|
The ____ Act enhances the authority of Law enforcement agents to prevent various
terrorist acts such as monitoring electronic communication without a warrant.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
42.
|
To get maximum exposure for your resume in an online job database you should
focus on ____ type of words.
a. | verbs | c. | adjectives | b. | nouns | d. | all the above |
|
|
|
43.
|
The ____ Act makes it a criminal offense to knowingly access a computer without
authorization.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
44.
|
The ____ Act establishes an agency to monitor threats to the communication
infrastructure.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
|
|
|
45.
|
The figure above represents a CRT; in this drawing Box B points to the
____.
a. | panel glass | c. | magnetic shield | b. | phosphor screen | d. | frame |
|
|
|
46.
|
The figure above represents a CRT; in this drawing Box C points to the
____.
a. | panel glass | c. | frame | b. | phosphor screen | d. | electron beam |
|
|
|
47.
|
The figure above represents a CRT; in this drawing Box D points to the
____.
a. | electron beam | c. | inner magnetic shield | b. | electronic
gun | d. | none of the
above |
|
|
|
Case-Based Critical Thinking Questions
Case 9-2 Jimmy recently
graduated and is looking for his first full-time job. He has turned to you for help.
Jimmy knows you recently graduated and got a new job. He thinks you can give him some advise to
help with his search.
|
|
|
48.
|
You tell Jimmy that the elements of an effective resume include ____.
a. | it should be easy to read | c. | you should be sure and make the
resume flash to get attention | b. | it should contain as much multimedia as
possible | d. | all of the
above |
|
|
|
49.
|
You tell Jimmy there are automated programs that search one or more databases
and notifies you when it finds any leads. This program is called a ____.
a. | metasearch tool | c. | job search page | b. | job search engine | d. | job search
agent |
|
|
|
Case-Based Critical Thinking Questions
Case 9-3 Susan is
concerned about some of the laws affecting the IT industry. She is particularly interested in
issues related to copyright and copyright violations. She can’t afford to go to an
attorney but knows you have done some research on this topic and might be able to help.
|
|
|
50.
|
Susan asks which act she should investigate that makes it illegal to circumvent
copy-protection technologies.
a. | Unites States Copyright Act | c. | Fair Use
Doctrine | b. | Digital Millennium Copyright Act | d. | CAN-SPAM Act |
|
Completion Complete each
statement.
|
|
|
51.
|
A vacuum tube is an electronic device that controls the flow of
____________________.
|
|
|
52.
|
A computer language which used 0s and 1s for programming is called
____________________ language.
|
|
|
53.
|
Devices that regulate current or voltage flow and act as a switch for electronic
signals are ____________________.
|
|
|
54.
|
The type of circuit technology that made it possible to pack the equivalent of
thousands of vacuum tubes into a single chip is called ____________________.
|
|
|
55.
|
The use of components or labor from outside suppliers is called
____________________.
|
|
|
56.
|
The sharp rise in the stock value of the dot com industry is called the dot com
____________________.
|
|
|
57.
|
Publicizing information about new product features takes place in the phase
known as product ____________________.
|
|
|
58.
|
Any person whose primary occupation involves the design, configuration,
analysis, development, modification, testing, or security of computer hardware or software is a
computer ____________________.
|
|
|
59.
|
The type of exam that is an objective test that verifies one’s level of
knowledge about a particular technology or subject is a ____________________.
|
|
|
60.
|
A database that contains thousands of job openings posted by employers is
an online job ____________________.
|