Name: 
 

Chapter 1 - Study Guide



True/False
Indicate whether the statement is true or false.
 

 1. 

Digital technology has changed the way we view privacy.
 

 2. 

Because of increased versatility, a videogame console is now considered a personal computer.
 

 3. 

The number 9 can be considered a character.
 

 4. 

Because most digital devices are electronic, bytes take the form of electrical pulses.
 

 5. 

Semiconductor materials are substances with properties between substances like copper and wood.
 

 6. 

To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.
 

 7. 

You should always use a different password for every account.
 

 8. 

Trojans are computer programs that seem to perform one function while actually doing something else.
 

 9. 

The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
 

 10. 

The first digital computer was developed for conducting the census.
 

 11. 

MySpace and Facebook are examples of social networks.
 

 12. 

Prior to 1940, the word computer was defined as a person who performs calculations.
 

 13. 

An operating system is an example of application software.
 

 14. 

The purpose of a server is to serve computers on a network.
 

 15. 

In the binary number system, 2 is used to represent the value 2.
 

 16. 

A compiler converts all statements in a program to machine language in a single batch.
 

 17. 

An interpreter converts and executes one statement at a time.
 

 18. 

The op code specifies the data.
 

 19. 

The operand is a command word for an operation.
 

 20. 

All computers are case sensitive.
 

Modified True/False
Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true.
 

 21. 

Digital technology has made it easy to produce copies of music with no loss of quality from the original. _________________________

 

 22. 

Free source projects promote copying, free distribution, peer review and user modifications. _________________________

 

 23. 

An area where data can be left on a permanent basis is memory. _________________________

 

 24. 

The set of instructions that tells a computer how to carry out processing tasks is a computer program. _________________________

 

 25. 

The term server can refer to a combination of hardware and software. _________________________

 

 26. 

A light switch is like a(n) analog device. _________________________

 

 27. 

DIPs and PGAs are both shapes of integrated circuits. _________________________

 

 28. 

A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms. _________________________

 

 29. 

Minicomputers were used for small businesses. _________________________

 

 30. 

A super computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. _________________________

 

 31. 

A mainframe computer specializes in computer intensive problems. _________________________

 

 32. 

The results of statements that have been compiled are called object code. _________________________

 

 33. 

A set of machine language instructions for a program is called source code. _________________________

 

 34. 

The ALU uses registers to hold data that is being processed. _________________________

 

 35. 

A keylogger is a form of malicious code. _________________________

 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 36. 

Digital electronics use ____ to represent data.
a.
circuits
c.
transistors
b.
switches
d.
components
 

 37. 

Key factors in making electronic devices increasingly smaller and less expensive include ____.
a.
transistors
c.
a & b
b.
integrated circuits
d.
neither a nor b
 

 38. 

The first digital computers were built during World War II for ____.
a.
census taking
c.
communication
b.
code breaking
d.
troop placement
 

 39. 

Initially sales were slow for the personal computer because of ____.
a.
price
c.
lack of software
b.
size
d.
lack of availability
 

 40. 

In 1982, the percentages of households that had a computer was ____ percent.
a.
10
c.
50
b.
30
d.
70
 

 41. 

A global computer network originally developed as a military project is the ____.
a.
World Wide Web
c.
Wide-area network
b.
Internet
d.
Local-area network
 

 42. 

____ allow members to post comments and questions that can be read and responded to by others.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 43. 

____ are where people exchange typed messages in real-time.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 44. 

____ provides a space for interacting with friends.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 45. 

A group of computers linked by wired or wireless technology is a ____.
a.
network
c.
cyberspace
b.
web
d.
Internet
 

 46. 

The ____ is a collection of linked documents, graphics, and sounds.
a.
network
c.
cyberspace
b.
Web
d.
Internet
 

 47. 

____ is a term that refers to entities that exist largely within computer networks.
a.
Web
c.
WWW
b.
Internet
d.
Cyberspace
 

 48. 

____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
a.
Digitizing
c.
Scanning
b.
Digital conversion
d.
Rastorization
 

 49. 

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
a.
evolution
c.
convergence
b.
rotation
d.
diversification
 

 50. 

More than ____ percent of cameras sold today are digital.
a.
80
c.
90
b.
85
d.
99
 

 51. 

Digital imaging has had an effect in the following areas ____.
a.
medicine
c.
photo processing
b.
photography
d.
all of the above
 

 52. 

A computer is a multiple purpose device that ____.
a.
stores data
c.
accepts input
b.
processes data
d.
all of the above
 

 53. 

In a computer most processing takes place in ____.
a.
memory
c.
CPU
b.
RAM
d.
mother board
 

 54. 

An electronic component that can be programmed to perform tasks is a ____.
a.
CPU
c.
transistor
b.
microprocessor
d.
none of the above
 

 55. 

A set of computer programs that helps a person carry out a task is a/an ____.
a.
operating system
c.
application software
b.
system software
d.
Windows
 

 56. 

A set of computer programs that helps a computer monitor itself and function more efficiently is a/an ____.
a.
operating system
c.
application software
b.
system software
d.
Windows
 

 57. 

The master controller for all activities that take place within a computer is ____.
a.
application software
c.
operating system
b.
system software
d.
CPU
 

 58. 

A ____ is a microprocessor-based computing device.
a.
personal computer
c.
workstation
b.
mainframe
d.
server
 

 59. 

An area of a computer that temporarily holds data waiting to be processed is ____.
a.
CPU
c.
storage
b.
memory
d.
file
 

 60. 

An ordinary personal computer that is connected to a network is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 61. 

A powerful desktop computer used for high-performance tasks is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 62. 

Data becomes ____ when it is presented in a format that people can understand and use.
a.
information
c.
graphs
b.
processed
d.
presentation
 

 63. 

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits is ____.
a.
information
c.
digital
b.
analog
d.
none of the above
 

 64. 

The type of data that is represented using an infinite scale of values is ____.
a.
information
c.
digital
b.
analog
d.
none of the above
 

 65. 

The binary number 10 represents ____ in the decimal number system.
a.
4
c.
10
b.
2
d.
1
 

 66. 

Digital devices can use ____ as a code to represent character data.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 67. 

The type of code that uses only 7 bits for each character is ____.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 68. 

The type of code that uses 8 bits for each character is ____.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 69. 

You might represent ____ as characters.
a.
color dot
c.
social security numbers
b.
bank balance
d.
none of the above
 

 70. 

Data transmission speeds are typically expressed as ____.
a.
bits
c.
hertz
b.
bytes
d.
none of the above
 

 71. 

Storage is typically expressed as ____.
a.
bits
c.
hertz
b.
bytes
d.
none of the above
 

 72. 

One thousand bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 73. 

One million bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 74. 

A billion bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 75. 

A super-thin slice of semiconducting material packed with microscopic circuit elements is a ____.
a.
integrated circuit
c.
microchip
b.
computer chip
d.
all of the above
 

 76. 

The ____ houses all essential chips and provides connecting circuitry between them.
a.
system board
c.
circuit board
b.
housing board
d.
chip board
 

 77. 

C, BASIC, COBOL, and Java are examples of ____ languages.
a.
low-level
c.
system programming
b.
computer
d.
high-level
 

 78. 

The human-readable version of a program is called ____.
a.
source code
c.
human code
b.
program code
d.
system code
 
 
nar001-1.jpg
 

 79. 

The above figure represents two types of chip carriers.  The one on the left is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 80. 

The figure above represents two types of chip carriers.  The one on the right is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 81. 

A ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
a.
compiler
c.
converter
b.
interpreter
d.
instruction
 

 82. 

A(n) ____ converts and executes one statement at a time.
a.
compiler
c.
converter
b.
interpreter
d.
instructions
 

 83. 

A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.
a.
compiler code
c.
machine code
b.
interpretercode
d.
instruction set
 

 84. 

____ can be directly executed by the processors’s circuitry.
a.
machine code
c.
programming language
b.
machine language
d.
none of the above
 

 85. 

The ____ is a command word for an operation such as add, compare or jump.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 86. 

The ____ from an instruction specifies the data.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 87. 

The ____ is the part of the microprocessor that performs arithmetic operations.
a.
op code
c.
ALU
b.
operand
d.
control unit
 

 88. 

The ____ fetches each instruction.
a.
op code
c.
ALU
b.
operand
d.
control unit
 
 
nar002-1.jpg
 

 89. 

The above figure represents the instruction cycle.  The first step is Box A and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 90. 

The above figure represents the instruction cycle.  The second step is Box B and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 91. 

The above figure represents the instruction cycle.  The third step is Box C and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 92. 

The above figure represents the instruction cycle.  The fourth step is Box D and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 93. 

A ____ uses password-cracking software.
a.
brute force attack
c.
phishing
b.
sniffing
d.
cracker
 

 94. 

____ intercepts information sent over computer networks.
a.
Brute force
c.
Phishing
b.
Sniffing
d.
Cracking
 

 95. 

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
a.
brute force
c.
phishing
b.
sniffing
d.
cracking
 

 96. 

____ tools that disguise a person’s identity online.
a.
Anonymizer
c.
ID free
b.
Free ID
d.
Cloaking
 

 97. 

In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 98. 

In terms of an authentication protocol, the phrase ‘something a person possesses refers to ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 99. 

In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 100. 

A term which refers to a skilled programmer or to a person who manipulates computers with malicious intent is a ____.
a.
black hat
c.
hacker
b.
cracker
d.
both b and c
 

 101. 

Password management functions include ____.
a.
generating passwords
c.
providing password strength
b.
tracking passwords
d.
all of the above
 

 102. 

A ____ is a series of characters that becomes a person’s unique identifier.
a.
PIN code
c.
user ID
b.
password
d.
all of the above
 

 103. 

A named collection of data that exists on a storage medium.
a.
memory
c.
file name
b.
file
d.
none of the above
 

 104. 

A compute-intensive problem runs on a ____.
a.
server
c.
super computer
b.
mainframe
d.
super PC
 

 105. 

A problem(s) a hacker can cause after breaking into your computer include(s) ____.
a.
applying for credit in your name
c.
apply for a mortgage using your data
b.
sending embarrassing e-mails
d.
all of the above
 
 
Case-Based Critical Thinking Questions

Case 1-1
Karen is trying to get organized and one of her issues is that she has too many electronic devices.  She wants to reduce the number of devices and still maintain the same degree of functionality.
 

 106. 

Karen needs an appointment book and is considering one that is digital.  You suggest she consider a ____.
a.
PDA
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 

 107. 

Karen thinks she might need a device that in addition to her appointment book she needs features such as email, Web access, a camera, and a GPS.  You suggest she consider a ____.
a.
iPod
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 

 108. 

If Karen were looking for voice communications, full-qwerty keypad, text messaging, email, removable storage, camera, radio and a digital music player, she might consider a ____.
a.
PDA
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 
 
Case-Based Critical Thinking Questions

Case 1-2
Mike and Andre are discussing how quickly technology changes.  They are discussing how it seems devices are merging to create new products especially in the technology field.  They understand this is a process called convergence.
 

 109. 

An example of an old form of convergence is ____.
a.
clock radio
c.
television
b.
cell phone
d.
microwave oven
 

 110. 

A great example of convergence in modern technology is ____.
a.
clock radio
c.
television
b.
cell phones
d.
HD-TV
 

 111. 

A barrier to the rapid deployment of many products resulting from convergence is ____.
a.
technology breakthroughs
c.
people aren’t ready
b.
legal issues
d.
both b and c
 
 
Case-Based Critical Thinking Questions

Case 1-3
Jim has just purchased a new computer and it has made him think about how it works.  He is particularly  interested in how information is processed and stored in his computer.  He has come to you for help.
 

 112. 

Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code.  You tell him it is so that ____.
a.
the code is ready to execute
b.
you can prevent the introduction of new errors
c.
you can put it on a chip
d.
none of the above
 

 113. 

Jim knows that a collection of preprogrammed activities is an instruction set.  He wants to know what an instruction set is designed to do.  You tell him it is designed to ____.
a.
carry out a particular task
b.
allow programmers to use them in creative ways for multiple tasks
c.
limit the number of tasks the computer can perform
d.
allow the program to run on multiple machines
 

 114. 

Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.
a.
an op code and operand
c.
basic instructions such as add
b.
a series of 0s and 1s
d.
all of the above
 

 115. 

When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add.  He wants to know where the result of the add goes.  You tell him it goes to ____.
a.
the ALU
c.
the accumulator
b.
another register
d.
the printer
 

Completion
Complete each statement.
 

 116. 

An ongoing process of social, political, and economic change brought about by digital technology is the digital ____________________.
 

 

 117. 

Probably the most significant force driving research into fast computers and more sophisticated graphics processing is computer ____________________.
 

 

 118. 

The potential downside of convergence is ____________________.
 

 

 119. 

The expectation that a person’s information will not be collected or divulged without permission is ____________________.
 

 

 120. 

The ownership of certain types of information, ideas, or representations is intellectual ____________________.
 

 

 121. 

Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is ____________________.
 

 

 122. 

A term that refers to the gap between people who have access to technology and those who do not is the digital ____________________.     
 

 

 123. 

Symbols that represent facts, objects, and ideas are ____________________.
 

 

 124. 

The manipulation of data is ____________________.
 

 

 125. 

The concept that a series of instructions for a computing task can be loaded into memory is called a stored ____________________.
 

 

 126. 

Any software or digital device that requests data from a server is referred to as a ____________________.
 

 

 127. 

The type of computer that is considered one of the fastest in the world is a ____________________.
 

 

 128. 

A special-purpose microprocessor that is built into the machine it controls is a ____________________.
 

 

 129. 

The term that refers to the form in which data is stored, processed, and transmitted is data ____________________.
 

 
 
nar006-1.jpg
 

 130. 

In the figure above, the type of sound wave indicated by A is ____________________.
 

 

 131. 

In the figure above, as indicated by Box B, the sound wave has been sliced into samples and so has been ____________________.
 

 

 132. 

Eight bits is a ____________________.
 

 

 133. 

A machine language instruction has two parts, the op code and the ____________________.
 

 

 134. 

Identifying a person by personal attributes such as fingerprints or retina patterns is called ____________________.
 

 

 135. 

Hackers can guess your password by stepping through a dictionary.  This process is called a dictionary ____________________.
 

 

Matching
 
 
a.
unicode
g.
pirating
b.
identity theft
h.
case sensitive
c.
ALU
i.
smart phone
d.
download
j.
microchip
e.
source code
k.
blogs
f.
control unit
l.
password manager
 

 136. 

Personal journals posted online for general public access
 

 137. 

The practice of copying a file from a remote computer to a local computer
 

 138. 

The illegal copying and distribution of copyright material
 

 139. 

A digital device with the main feature of voice communication plus additional features
 

 140. 

Provides codes for 65,000 characters.
 

 141. 

Another name for integrated circuit
 

 142. 

Performs arithmetic
 

 143. 

Fetches each instruction
 

 144. 

Differentiates between upper and lower case words
 

 145. 

Unauthorized use and access to personal data
 

 146. 

Stores user IDs with their corresponding password
 

 147. 

Human-readable version of a program
 



 
Check Your Work     Start Over