True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
Digital technology has changed the way we view privacy.
|
|
|
2.
|
Because of increased versatility, a videogame console is now considered a
personal computer.
|
|
|
3.
|
The number 9 can be considered a character.
|
|
|
4.
|
Because most digital devices are electronic, bytes take the form of electrical
pulses.
|
|
|
5.
|
Semiconductor materials are substances with properties between substances like
copper and wood.
|
|
|
6.
|
To assure you can remember your password it is a good idea to base it on
information you can easily remember such as your birthday.
|
|
|
7.
|
You should always use a different password for every account.
|
|
|
8.
|
Trojans are computer programs that seem to perform one function while actually
doing something else.
|
|
|
9.
|
The digital revolution became a significant factor in the 1980s but ended in the
1990s with the dot com bubble burst.
|
|
|
10.
|
The first digital computer was developed for conducting the census.
|
|
|
11.
|
MySpace and Facebook are examples of social networks.
|
|
|
12.
|
Prior to 1940, the word computer was defined as a person who performs
calculations.
|
|
|
13.
|
An operating system is an example of application software.
|
|
|
14.
|
The purpose of a server is to serve computers on a network.
|
|
|
15.
|
In the binary number system, 2 is used to represent the value 2.
|
|
|
16.
|
A compiler converts all statements in a program to machine language in a single
batch.
|
|
|
17.
|
An interpreter converts and executes one statement at a time.
|
|
|
18.
|
The op code specifies the data.
|
|
|
19.
|
The operand is a command word for an operation.
|
|
|
20.
|
All computers are case sensitive.
|
Modified True/False Indicate
whether the statement is true or false. If false, change the identified word or phrase to make the
statement true.
|
|
|
21.
|
Digital technology has made it easy to produce copies of music with no
loss of quality from the original. _________________________
|
|
|
22.
|
Free source projects promote copying, free distribution, peer review and
user modifications. _________________________
|
|
|
23.
|
An area where data can be left on a permanent basis is memory.
_________________________
|
|
|
24.
|
The set of instructions that tells a computer how to carry out processing tasks
is a computer program. _________________________
|
|
|
25.
|
The term server can refer to a combination of hardware and software.
_________________________
|
|
|
26.
|
A light switch is like a(n) analog device.
_________________________
|
|
|
27.
|
DIPs and PGAs are both shapes of integrated circuits.
_________________________
|
|
|
28.
|
A(n) account manager stores user IDs with their corresponding passwords
and automatically fills in login forms. _________________________
|
|
|
29.
|
Minicomputers were used for small businesses. _________________________
|
|
|
30.
|
A super computer is a large and expensive computer capable of
simultaneously processing data for hundreds or thousands of users. _________________________
|
|
|
31.
|
A mainframe computer specializes in computer intensive problems.
_________________________
|
|
|
32.
|
The results of statements that have been compiled are called object code.
_________________________
|
|
|
33.
|
A set of machine language instructions for a program is called source
code. _________________________
|
|
|
34.
|
The ALU uses registers to hold data that is being processed.
_________________________
|
|
|
35.
|
A keylogger is a form of malicious code. _________________________
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
36.
|
Digital electronics use ____ to represent data.
a. | circuits | c. | transistors | b. | switches | d. | components |
|
|
|
37.
|
Key factors in making electronic devices increasingly smaller and less expensive
include ____.
a. | transistors | c. | a & b | b. | integrated circuits | d. | neither a nor b |
|
|
|
38.
|
The first digital computers were built during World War II for ____.
a. | census taking | c. | communication | b. | code breaking | d. | troop placement |
|
|
|
39.
|
Initially sales were slow for the personal computer because of ____.
a. | price | c. | lack of software | b. | size | d. | lack of
availability |
|
|
|
40.
|
In 1982, the percentages of households that had a computer was ____
percent.
|
|
|
41.
|
A global computer network originally developed as a military project is the
____.
a. | World Wide Web | c. | Wide-area network | b. | Internet | d. | Local-area
network |
|
|
|
42.
|
____ allow members to post comments and questions that can be read and responded
to by others.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
43.
|
____ are where people exchange typed messages in real-time.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
44.
|
____ provides a space for interacting with friends.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
45.
|
A group of computers linked by wired or wireless technology is a ____.
a. | network | c. | cyberspace | b. | web | d. | Internet |
|
|
|
46.
|
The ____ is a collection of linked documents, graphics, and sounds.
a. | network | c. | cyberspace | b. | Web | d. | Internet |
|
|
|
47.
|
____ is a term that refers to entities that exist largely within computer
networks.
a. | Web | c. | WWW | b. | Internet | d. | Cyberspace |
|
|
|
48.
|
____ is the process of converting text, numbers, sound, photos, and video into
data that can be processed by digital devices.
a. | Digitizing | c. | Scanning | b. | Digital conversion | d. | Rastorization |
|
|
|
49.
|
Technology ____ is a process by which several different technologies with
distinct functionality evolve to form a single product.
a. | evolution | c. | convergence | b. | rotation | d. | diversification |
|
|
|
50.
|
More than ____ percent of cameras sold today are digital.
|
|
|
51.
|
Digital imaging has had an effect in the following areas ____.
a. | medicine | c. | photo processing | b. | photography | d. | all of the
above |
|
|
|
52.
|
A computer is a multiple purpose device that ____.
a. | stores data | c. | accepts input | b. | processes data | d. | all of the
above |
|
|
|
53.
|
In a computer most processing takes place in ____.
a. | memory | c. | CPU | b. | RAM | d. | mother board |
|
|
|
54.
|
An electronic component that can be programmed to perform tasks is a
____.
a. | CPU | c. | transistor | b. | microprocessor | d. | none of the
above |
|
|
|
55.
|
A set of computer programs that helps a person carry out a task is a/an
____.
a. | operating system | c. | application software | b. | system software | d. | Windows |
|
|
|
56.
|
A set of computer programs that helps a computer monitor itself and function
more efficiently is a/an ____.
a. | operating system | c. | application software | b. | system software | d. | Windows |
|
|
|
57.
|
The master controller for all activities that take place within a computer is
____.
a. | application software | c. | operating system | b. | system software | d. | CPU |
|
|
|
58.
|
A ____ is a microprocessor-based computing device.
a. | personal computer | c. | workstation | b. | mainframe | d. | server |
|
|
|
59.
|
An area of a computer that temporarily holds data waiting to be processed is
____.
a. | CPU | c. | storage | b. | memory | d. | file |
|
|
|
60.
|
An ordinary personal computer that is connected to a network is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
61.
|
A powerful desktop computer used for high-performance tasks is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
62.
|
Data becomes ____ when it is presented in a format that people can understand
and use.
a. | information | c. | graphs | b. | processed | d. | presentation |
|
|
|
63.
|
The type of data where text, numbers, graphics, sound, and video have been
converted into discrete digits is ____.
a. | information | c. | digital | b. | analog | d. | none of the
above |
|
|
|
64.
|
The type of data that is represented using an infinite scale of values is
____.
a. | information | c. | digital | b. | analog | d. | none of the
above |
|
|
|
65.
|
The binary number 10 represents ____ in the decimal number system.
|
|
|
66.
|
Digital devices can use ____ as a code to represent character data.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
67.
|
The type of code that uses only 7 bits for each character is ____.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
68.
|
The type of code that uses 8 bits for each character is ____.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
69.
|
You might represent ____ as characters.
a. | color dot | c. | social security numbers | b. | bank
balance | d. | none of the
above |
|
|
|
70.
|
Data transmission speeds are typically expressed as ____.
a. | bits | c. | hertz | b. | bytes | d. | none of the
above |
|
|
|
71.
|
Storage is typically expressed as ____.
a. | bits | c. | hertz | b. | bytes | d. | none of the
above |
|
|
|
72.
|
One thousand bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
73.
|
One million bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
74.
|
A billion bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
75.
|
A super-thin slice of semiconducting material packed with microscopic circuit
elements is a ____.
a. | integrated circuit | c. | microchip | b. | computer chip | d. | all of the
above |
|
|
|
76.
|
The ____ houses all essential chips and provides connecting circuitry between
them.
a. | system board | c. | circuit board | b. | housing board | d. | chip board |
|
|
|
77.
|
C, BASIC, COBOL, and Java are examples of ____ languages.
a. | low-level | c. | system programming | b. | computer | d. | high-level |
|
|
|
78.
|
The human-readable version of a program is called ____.
a. | source code | c. | human code | b. | program code | d. | system code |
|
|
|
|
|
|
79.
|
The above figure represents two types of chip carriers. The one on the
left is a ____.
|
|
|
80.
|
The figure above represents two types of chip carriers. The one on the
right is a ____.
|
|
|
81.
|
A ____ converts all the statements in a program in a single batch and the
resulting collection of instructions is placed in a new file.
a. | compiler | c. | converter | b. | interpreter | d. | instruction |
|
|
|
82.
|
A(n) ____ converts and executes one statement at a time.
a. | compiler | c. | converter | b. | interpreter | d. | instructions |
|
|
|
83.
|
A collection of preprogrammed activities such as addition, subtraction, counting
and comparison is called a(n) ____.
a. | compiler code | c. | machine code | b. | interpretercode | d. | instruction set |
|
|
|
84.
|
____ can be directly executed by the processors’s circuitry.
a. | machine code | c. | programming language | b. | machine language | d. | none of the
above |
|
|
|
85.
|
The ____ is a command word for an operation such as add, compare or jump.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
86.
|
The ____ from an instruction specifies the data.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
87.
|
The ____ is the part of the microprocessor that performs arithmetic
operations.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
88.
|
The ____ fetches each instruction.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
|
|
|
89.
|
The above figure represents the instruction cycle. The first step is Box A
and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
90.
|
The above figure represents the instruction cycle. The second step is Box
B and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
91.
|
The above figure represents the instruction cycle. The third step is Box C
and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
92.
|
The above figure represents the instruction cycle. The fourth step is Box
D and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
93.
|
A ____ uses password-cracking software.
a. | brute force attack | c. | phishing | b. | sniffing | d. | cracker |
|
|
|
94.
|
____ intercepts information sent over computer networks.
a. | Brute force | c. | Phishing | b. | Sniffing | d. | Cracking |
|
|
|
95.
|
A hacker posing as a legitimate representative of an official organization such
as your bank is an example of ____.
a. | brute force | c. | phishing | b. | sniffing | d. | cracking |
|
|
|
96.
|
____ tools that disguise a person’s identity online.
a. | Anonymizer | c. | ID free | b. | Free ID | d. | Cloaking |
|
|
|
97.
|
In terms of an authentication protocol, the phrase ‘something a person
knows’ refers to ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
98.
|
In terms of an authentication protocol, the phrase ‘something a person
possesses refers to ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
99.
|
In terms of an authentication protocol, the phrase ‘something a person
is’ refers to a(n) ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
100.
|
A term which refers to a skilled programmer or to a person who manipulates
computers with malicious intent is a ____.
a. | black hat | c. | hacker | b. | cracker | d. | both b and c |
|
|
|
101.
|
Password management functions include ____.
a. | generating passwords | c. | providing password strength | b. | tracking
passwords | d. | all of the
above |
|
|
|
102.
|
A ____ is a series of characters that becomes a person’s unique
identifier.
a. | PIN code | c. | user ID | b. | password | d. | all of the
above |
|
|
|
103.
|
A named collection of data that exists on a storage medium.
a. | memory | c. | file name | b. | file | d. | none of the
above |
|
|
|
104.
|
A compute-intensive problem runs on a ____.
a. | server | c. | super computer | b. | mainframe | d. | super PC |
|
|
|
105.
|
A problem(s) a hacker can cause after breaking into your computer include(s)
____.
a. | applying for credit in your name | c. | apply for a mortgage using your
data | b. | sending embarrassing e-mails | d. | all of the
above |
|
|
|
Case-Based Critical Thinking Questions
Case 1-1 Karen is trying
to get organized and one of her issues is that she has too many electronic devices. She wants
to reduce the number of devices and still maintain the same degree of functionality.
|
|
|
106.
|
Karen needs an appointment book and is considering one that is digital.
You suggest she consider a ____.
a. | PDA | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
107.
|
Karen thinks she might need a device that in addition to her appointment book
she needs features such as email, Web access, a camera, and a GPS. You suggest she consider a
____.
a. | iPod | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
108.
|
If Karen were looking for voice communications, full-qwerty keypad, text
messaging, email, removable storage, camera, radio and a digital music player, she might consider a
____.
a. | PDA | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
Case-Based Critical Thinking Questions
Case 1-2 Mike and Andre
are discussing how quickly technology changes. They are discussing how it seems devices are
merging to create new products especially in the technology field. They understand this is a
process called convergence.
|
|
|
109.
|
An example of an old form of convergence is ____.
a. | clock radio | c. | television | b. | cell phone | d. | microwave oven |
|
|
|
110.
|
A great example of convergence in modern technology is ____.
a. | clock radio | c. | television | b. | cell phones | d. | HD-TV |
|
|
|
111.
|
A barrier to the rapid deployment of many products resulting from convergence is
____.
a. | technology breakthroughs | c. | people aren’t
ready | b. | legal issues | d. | both b and c |
|
|
|
Case-Based Critical Thinking Questions
Case 1-3 Jim has just
purchased a new computer and it has made him think about how it works. He is particularly
interested in how information is processed and stored in his computer. He has come to you for
help.
|
|
|
112.
|
Jim wants to know why a compiler converts all statements in a program at one
time and places them into an object code. You tell him it is so that ____.
a. | the code is ready to execute | b. | you can prevent the introduction of new errors
| c. | you can put it on a chip | d. | none of the
above |
|
|
|
113.
|
Jim knows that a collection of preprogrammed activities is an instruction
set. He wants to know what an instruction set is designed to do. You tell him it is
designed to ____.
a. | carry out a particular task | b. | allow programmers to use them in creative ways
for multiple tasks | c. | limit the number of tasks the computer can
perform | d. | allow the program to run on multiple machines |
|
|
|
114.
|
Jim wants to know what machine language instructions look like to the machine.
You tell him they appear as ____.
a. | an op code and operand | c. | basic instructions such as add | b. | a series of 0s and
1s | d. | all of the
above |
|
|
|
115.
|
When adding two numbers, Jim knows that each number is going into its own
register and the control unit provides the instructions such as add. He wants to know where the
result of the add goes. You tell him it goes to ____.
a. | the ALU | c. | the accumulator | b. | another register | d. | the printer |
|
Completion Complete each
statement.
|
|
|
116.
|
An ongoing process of social, political, and economic change brought about by
digital technology is the digital ____________________.
|
|
|
117.
|
Probably the most significant force driving research into fast computers and
more sophisticated graphics processing is computer ____________________.
|
|
|
118.
|
The potential downside of convergence is ____________________.
|
|
|
119.
|
The expectation that a person’s information will not be collected or
divulged without permission is ____________________.
|
|
|
120.
|
The ownership of certain types of information, ideas, or representations is
intellectual ____________________.
|
|
|
121.
|
Worldwide economic interdependence of countries that occurs as cross-border
commerce increases and as money flows more freely among countries is ____________________.
|
|
|
122.
|
A term that refers to the gap between people who have access to technology and
those who do not is the digital ____________________.
|
|
|
123.
|
Symbols that represent facts, objects, and ideas are
____________________.
|
|
|
124.
|
The manipulation of data is ____________________.
|
|
|
125.
|
The concept that a series of instructions for a computing task can be loaded
into memory is called a stored ____________________.
|
|
|
126.
|
Any software or digital device that requests data from a server is referred to
as a ____________________.
|
|
|
127.
|
The type of computer that is considered one of the fastest in the world is a
____________________.
|
|
|
128.
|
A special-purpose microprocessor that is built into the machine it controls is a
____________________.
|
|
|
129.
|
The term that refers to the form in which data is stored, processed, and
transmitted is data ____________________.
|
|
|
|
|
|
130.
|
In the figure above, the type of sound wave indicated by A is
____________________.
|
|
|
131.
|
In the figure above, as indicated by Box B, the sound wave has been sliced into
samples and so has been ____________________.
|
|
|
132.
|
Eight bits is a ____________________.
|
|
|
133.
|
A machine language instruction has two parts, the op code and the
____________________.
|
|
|
134.
|
Identifying a person by personal attributes such as fingerprints or retina
patterns is called ____________________.
|
|
|
135.
|
Hackers can guess your password by stepping through a dictionary. This
process is called a dictionary ____________________.
|
Matching
|
|
|
a. | unicode | g. | pirating | b. | identity theft | h. | case sensitive | c. | ALU | i. | smart
phone | d. | download | j. | microchip | e. | source code | k. | blogs | f. | control
unit | l. | password
manager |
|
|
|
136.
|
Personal journals posted online for general public access
|
|
|
137.
|
The practice of copying a file from a remote computer to a local
computer
|
|
|
138.
|
The illegal copying and distribution of copyright material
|
|
|
139.
|
A digital device with the main feature of voice communication plus additional
features
|
|
|
140.
|
Provides codes for 65,000 characters.
|
|
|
141.
|
Another name for integrated circuit
|
|
|
142.
|
Performs arithmetic
|
|
|
143.
|
Fetches each instruction
|
|
|
144.
|
Differentiates between upper and lower case words
|
|
|
145.
|
Unauthorized use and access to personal data
|
|
|
146.
|
Stores user IDs with their corresponding password
|
|
|
147.
|
Human-readable version of a program
|