True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
Digital technology has changed the way we view privacy.
|
|
|
2.
|
In the binary number system, 2 is used to represent the value 2.
|
|
|
3.
|
An interpreter converts and executes one statement at a time.
|
|
|
4.
|
Most processors in today’s personal computers use RISC technology.
|
|
|
5.
|
Currently, hard drive capacity is measured in gigabytes (GB) or terabytes
(TB).
|
|
|
6.
|
DVD-RW technology allows you to write data to a disc, and then later change that
data.
|
|
|
7.
|
A keyboard is an example of a pointing device.
|
|
|
8.
|
Desktop widgets come with a computer and are not available from other
sources.
|
|
|
9.
|
Spreadsheets have built-in formulas.
|
|
|
10.
|
Open source software is copyrighted.
|
|
|
11.
|
Product activation and registration represent the same function with different
names.
|
|
|
12.
|
Antivirus software does not require any updates.
|
|
|
13.
|
In a dual boot system, you must select which operating system to use.
|
|
|
14.
|
The D drive must refer to a CD or DVD drive.
|
|
|
15.
|
One of the reasons Microsoft Windows suffers from the reputation for being the
most vulnerable to viruses, worms and other attacks is because of hackers with anti-establishment
sentiments.
|
|
|
16.
|
A file is deleted when you hit the Delete key.
|
|
|
17.
|
Software specifically designed to do backups of your files also scans the files
for viruses so you don’t have to worry about it.
|
|
|
18.
|
MAC addresses are used for some low-level network functions and can also be
employed to establish network security.
|
|
|
|
|
|
19.
|
When two packets collide in an Ethernet network,, as illustrated in the
accompanying figure, the two devices wait for random time periods before retransmitting to prevent a
collision from reoccurring.
|
|
|
20.
|
Microwaves cannot be aimed in a single direction and have less carrying capacity
than radio waves.
|
|
|
21.
|
A cryptographic algorithm is a word, number, or phrase that must be known to
encrypt or decrypt a message.
|
|
|
22.
|
You must pay for a domain name.
|
|
|
23.
|
You may use an analog modem even if your phone is digital.
|
|
|
24.
|
Any server that creates a cookie on your hard drive can request that cookie the
next time you connect to one of its Web pages.
|
|
|
25.
|
Digital audio is music, speech, and other sounds represented in a binary format
for use in digital devices.
|
|
|
|
|
|
26.
|
Monochrome bitmaps, like the one shown in the accompanying figure, require a lot
of storage space.
|
|
|
|
|
|
27.
|
With vector graphics, like the one found in the accompanying figure, objects may
be layered over other objects.
|
|
|
28.
|
Text contained in a vector graphic image is stored as actual text, not just a
series of colored dots.
|
|
|
29.
|
Because desktop, Web-based, and PDA videos are shown on a small computer screen
at a fairly low resolution, recording with an inexpensive camera will not make a difference on the
quality of the final video.
|
|
|
30.
|
CDs with copy protection cannot be duplicated and music that is ripped to
another format does not play back correctly.
|
|
|
31.
|
DRM technologies such as watermarks and copy generation management are used to
limit how you can use movies you have downloaded.
|
|
|
32.
|
All major companies in the IT industry are headquartered in the Silicon
Valley.
|
|
|
33.
|
It is less expensive to replace software with brand-new software than to
purchase an upgrade.
|
|
|
34.
|
In the United States, the IT industry is regulated by the FCC.
|
|
|
35.
|
In IT, job titles are standardized.
|
|
|
36.
|
Most information systems rely on computers and communications networks to store,
process, and transmit information with far more efficiency than would be possible with manual
systems.
|
|
|
37.
|
A small business might require several information systems be integrated into an
enterprise information system to support a variety of business activities.
|
|
|
38.
|
A modified waterfall SDLC allows overlap between SDLC phases.
|
|
|
39.
|
In the SDLC, the goal of the activities in the planning phase is to create a
list of requirements for the new or revised information system.
|
|
|
40.
|
Acceptance testing is designed to verify that the new information system works
as required.
|
|
|
41.
|
The simplest model for storing data is the flat file.
|
|
|
|
|
|
42.
|
In the accompanying figure, the relationship shown in the top row is a
one-to-many relationship.
|
|
|
43.
|
A relational database stores data in a collection of related tables.
|
|
|
44.
|
Database tables should be indexed by any field or fields that are commonly used
as search fields.
|
|
|
45.
|
The average American is in less than 10 commercial databases.
|
|
|
46.
|
A simple high-level command does the work of multiple low-level commands.
|
|
|
47.
|
One type of control structure is directing.
|
|
|
48.
|
Signed certificates assure the original software is free of viruses and
bugs.
|
|
|
49.
|
It is easy for most consumers to fix a problem that occurs at run-time. That is
why the box appears asking if you want to debug.
|
|
|
50.
|
OO programmers often use flowcharts to plan the classes to be programmed.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
51.
|
An ordinary personal computer that is connected to a network is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
52.
|
A super-thin slice of semiconducting material packed with microscopic circuit
elements is a ____.
a. | integrated circuit | c. | microchip | b. | computer chip | d. | all of the
above |
|
|
|
53.
|
A ____ converts all the statements in a program in a single batch and the
resulting collection of instructions is placed in a new file.
a. | compiler | c. | converter | b. | interpreter | d. | instruction |
|
|
|
54.
|
The ____ is a command word for an operation such as add, compare or jump.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
55.
|
The ____ fetches each instruction.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
Case-Based Critical Thinking Questions
Case 1-3 Jim has just
purchased a new computer and it has made him think about how it works. He is particularly
interested in how information is processed and stored in his computer. He has come to you for
help.
|
|
|
56.
|
When adding two numbers, Jim knows that each number is going into its own
register and the control unit provides the instructions such as add. He wants to know where the
result of the add goes. You tell him it goes to ____.
a. | the ALU | c. | the accumulator | b. | another register | d. | the printer |
|
|
|
|
|
|
57.
|
In the accompanying figure, the item marked B is a(n) ____.
a. | USB port | c. | parallel port | b. | serial port | d. | keyboard port |
|
|
|
58.
|
Software most commonly associated with productivity software is ____.
a. | Windows | c. | Word processing | b. | Real-time players | d. | Browsers |
|
|
|
59.
|
When creating a formula in a spreadsheet, for flexibility, each operand is a
____.
a. | number | c. | cell reference | b. | cell number | d. | location |
|
|
|
60.
|
A shrink wrap license goes into effect as soon as ____.
a. | you use it | c. | you open it | b. | you purchase it | d. | you register it |
|
|
|
61.
|
Portable software is ____.
a. | designed for portable devices | c. | designed to run from removable
storage | b. | licensed only for portable devices | d. | designed to run on portable
devices |
|
|
|
62.
|
Software designed to generate unique musical compositions simply by selecting
the musical style, instrument, key and temp is ____.
a. | ear training | c. | compuer-aided music | b. | notation | d. | MIDI |
|
|
|
63.
|
An extension of .ocx designates a ____ type of file.
a. | configuration | c. | sound | b. | support | d. | database |
|
|
|
|
|
|
64.
|
The figure above is an example of a(n) ____ tool.
a. | file management | c. | find file | b. | explore | d. | file
organization |
|
|
|
65.
|
Information kept about a file includes ____.
a. | size | c. | deletion date | b. | print settings | d. | all the above |
|
|
|
Case-Based Critical Thinking Questions
Case 4-1 Tom and Andy
are discussing file storage. They are working on a major project and want to be sure they can store
their files in a way that they can easily find and share the files.
|
|
|
66.
|
Tom and Andy both have Microsoft Word. It would be best to store their files in
its native format with an extension of ____.
a. | .doc | c. | .rtf | b. | .txt | d. | all the above |
|
|
|
67.
|
The physical arrangement of devices in a network is referred to as its physical
____.
a. | topography | c. | logology | b. | logography | d. | topology |
|
|
|
68.
|
To configure a file server, open a browser from any workstation, enter the file
server’s ____ address, and provide the administrator ID and password.
|
|
|
69.
|
____, also referred to as personal mode, is a type of WPA used on most home
networks.
|
|
|
70.
|
____ is a crucial technology for e-commerce and e-mail.
a. | Symmetric key encryption | c. | Public key
encryption | b. | Network security key | d. | all of the above |
|
|
|
71.
|
Every domain name corresponds to a unique IP address that has been entered into
a ____.
a. | domain database | c. | name server | b. | domain name server | d. | none of the
above |
|
|
|
72.
|
A ____ is a device that connects a computer to a telephone line and converts
computer data signals into signals compatible with DSL.
a. | DSL filter | c. | DSL modem | b. | DSL converter | d. | DSL adapter |
|
|
|
73.
|
____ wireless Internet service is designed to offer Internet access to homes and
businesses by broadcasting data signals over areas large enough to cover most cities.
a. | Mobile | c. | WiFi | b. | Cellular | d. | Fixed |
|
|
|
74.
|
The disadvantage of WAP-enabled devices is their ____.
a. | access speed | c. | battery life | b. | screen size | d. | all of the
above |
|
|
|
|
|
|
75.
|
The figure above is a screenshot of FileZilla, the file to be downloaded is
indicated by ____.
a. | box A | c. | box C | b. | box B | d. | none of the
above |
|
|
|
76.
|
The average “survival time” for an unprotected computer to remain
uncompromised is only ____.
a. | 9 seconds | c. | 9 hours | b. | 9 minutes | d. | 9 days |
|
|
|
77.
|
Data transport rates depend on the technology of the cellular system. The
generation of cellular technology associated with analog voice service is ____.
|
|
|
78.
|
____ is a protocol that works in conjunction with TCP/IP to get Web resources to
your desktop.
|
|
|
79.
|
When your browser fetches pages and graphics to form a Web page, it stores them
in temporary files on your hard drive called a Web ____.
a. | cache | c. | converter | b. | plug-in | d. | source |
|
|
|
80.
|
____ allow a Web site to store information on the client computer for later
retrieval.
a. | Tags | c. | Biscuits | b. | Cookies | d. | Labels |
|
|
|
81.
|
To use POP e-mail you must install e-mail ____ software on your computer.
a. | server | c. | resource | b. | database | d. | client |
|
|
|
Case-Based Critical Thinking Questions
Case 7-2 Jessica likes
to participate in B2C e-commerce, but recently has had a number of friends who have had problems
shopping online. She wonders if it is safe to shop online, and just how much she is compromising her
privacy by doing so. Jessica is justifiably worried about the security of the personal
information and credit card information she regularly supplies while shopping on the Web. In
addition, she knows that merchants who market goods and services over the Internet sometimes secretly
gather information and provide it to advertisers or other interested parties.
|
|
|
82.
|
As Jessica begins her research of just how shopping carts work, she is surprised
to find that many e-commerce sites store information about her Web visits on her hard drive.
What do these sites use to store visit information?
a. | certificate authorities | c. | digital
certificates | b. | cookies | d. | Web
servers |
|
|
|
Case-Based Critical Thinking Questions
Case 7-3 Melissa has
decided to obtain an e-mail account. Although she plans to use the email account to communicate with
her many friends, her main purpose in establishing it is to aid in the search for a job. She has a
list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her
resume, along with a general message, to each of them. She will use the same message for all
recipients.
|
|
|
83.
|
Melissa wants to ensure that the resume she attaches to the e-mail messages she
is sending to the potential employers will successfully make it to them. She should try to
limit the size of the attachment to ____ or less for dial-up connections.
a. | 10 KB | c. | 100 KB | b. | 50 KB | d. | 200 KB |
|
|
|
84.
|
____ compression can be applied to video footage to eliminate redundant or
unnecessary data between frames.
a. | Framed | c. | Key | b. | Temporal | d. | Indexed |
|
|
|
85.
|
____ is the process of recording a broadcast so that it can be played back at a
more convenient time.
a. | Time shifting | c. | Program | b. | Format | d. | Delay |
|
|
|
86.
|
The type of manual calculator first used in ancient Rome, Greece, India, China
and Japan is called a/n ____.
a. | slide rule | c. | abacus | b. | algorithm | d. | Napier’s
Bones |
|
|
|
87.
|
An experimental device that typically must be further developed and perfected
before going into production is called a ____.
a. | alpha | c. | prototype | b. | beta | d. | omega |
|
|
|
88.
|
The general-purpose electronic computer designed to calculate trajectory tables
for the U.S. Army was the ____.
a. | COLOSSUS | c. | ENIAC | b. | Enigma | d. | UNIVAC |
|
|
|
89.
|
A vacuum tube can have ____ states.
a. | one | c. | three | b. | two | d. | unlimited |
|
|
|
90.
|
Factors affecting the success of the IT industry include:
a. | population growth & business globalization | c. | population growth & interest
rate declines | b. | gaining population & business globalization | d. | Internet declines & business
globalization |
|
|
|
|
|
|
91.
|
The file cycle of a new computer model is shown above. In the figure
above, Box C represents ____.
a. | Product Development | c. | Introduction | b. | Product Announcement | d. | Product Design |
|
|
|
|
|
|
92.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box A represents ____.
a. | Distribution centers | c. | Mail-order suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
93.
|
____ is a special type of retailing in which a vendor takes orders by phone or
an Internet site.
a. | Manufacturer direct | c. | VAR | b. | Mail-order | d. | All of the
above |
|
|
|
94.
|
A hypertext version of your resume is called a ____.
a. | web page | c. | web portfolio | b. | web-based resume | d. | web resume |
|
|
|
Case-Based Critical Thinking Questions
Case 9-2 Jimmy recently
graduated and is looking for his first full-time job. He has turned to you for help.
Jimmy knows you recently graduated and got a new job. He thinks you can give him some advise to
help with his search.
|
|
|
95.
|
You advise Jimmy that one of the problems for job hunters using the Internet is
____.
a. | making sure to only apply for jobs that meet his requirements | c. | job titles are
non-standard | b. | posting his resume | d. | all of the above |
|
|
|
96.
|
Which quality of service (QoS) metric is defined as the number of errors
occurring in a particular time interval for a particular function?
a. | response time | c. | user levels | b. | accuracy | d. | capacity |
|
|
|
|
|
|
97.
|
In the SQL query in the accompanying figure, how many tables will be
accessed?
|
|
|
98.
|
A single programmer can, on average, write, test, and document only ____ lines
of code per day.
|
|
|
99.
|
Assembly languages are considered ____ generation languages.
a. | first | c. | third | b. | second | d. | fouth |
|
|
|
100.
|
Microsoft’s ____ technology uses Internet Explorer as the verification
client.
a. | code wrapping | c. | Verisign | b. | Authenticode | d. | DigiSign |
|
Completion Complete each
statement.
|
|
|
101.
|
Probably the most significant force driving research into fast computers and
more sophisticated graphics processing is computer ____________________.
|
|
|
102.
|
Worldwide economic interdependence of countries that occurs as cross-border
commerce increases and as money flows more freely among countries is ____________________.
|
|
|
|
|
|
103.
|
In the figure above, as indicated by Box B, the sound wave has been sliced into
samples and so has been ____________________.
|
|
|
104.
|
____________________ is special high-speed memory that allows the processor to
access data more rapidly than from memory located elsewhere on the motherboard.
|
|
|
105.
|
RAM is ____________________, which means that it requires electrical power to
hold data.
|
|
|
106.
|
The segment of the data bus that connects RAM to peripheral devices is called
the ____________________ bus.
|
|
|
107.
|
Word processing, desktop publishing, and web authoring are the three most
popular types of a kind of production software classified as ____________________.
|
|
|
108.
|
A collection of software applications sold as a single package is called a
software ____________________.
|
|
|
109.
|
The key ingredients necessary to install new software that contains the programs
and data are ____________________.
|
|
|
110.
|
A database that keeps track of your computer’s pheripheral devices,
software preferences, and settings is the Windows____________________.
|
|
|
111.
|
Activities competing for the attention of your computer’s microprocessor
are called ____________________.
|
|
|
112.
|
Microsoft Windows’ two major weaknesses are reliability and
____________________.
|
|
|
113.
|
The ability to use one computer to simulate the hardware and software of another
is called a virtual ____________________.
|
|
|
114.
|
A named collection of data that exists on a storage medium is a computer
____________________.
|
|
|
115.
|
A section of a hard disk drive that is treated as a separate storage unit is a
disk ____________________.
|
|
|
116.
|
A list of files is called a(n) ____________________.
|
|
|
117.
|
The process of creating equivalent electronic storage bins on a disk is
____________________.
|
|
|
118.
|
The arrangement of devices in a network is referred to as its
____________________.
|
|
|
119.
|
A communications ____________________, or link, is a physical path or a
frequency used for signal transmission.
|
|
|
120.
|
High-bandwidth communications systems are sometimes referred to as
____________________.
|
|
|
121.
|
A(n) ____________________ is a parcel of data that is sent across a computer
network.
|
|
|
122.
|
Most wireless networks transport data using ____________________ signals.
|
|
|
123.
|
The term ____________________ was first used in the mid-1960s to describe a
computer system that could store literary documents, link them according to logical relationships,
and allow readers to comment and annotate what they read.
|
|
|
124.
|
Web ____________________ software provides tools specifically designed to enter
and format Web page text, graphics, and links.
|
|
|
125.
|
A series of program instructions (e.g., written in JavaScript or VBScript)
embedded directly into the text of an HTML document is called a(n) ____________________.
|
|
|
126.
|
If you click an ad, a third party can surreptitiously create a(n)
____________________ cookie and use it to track your activities at any site containing banner ads
from that third party.
|
|
|
127.
|
A MIDI-capable sound card contains a(n) ____________________, which is a set of
pre-recorded musical instrument sounds.
|
|
|
128.
|
____________________ works by superimposing a grid over a vector image and
determining the color for each pixel.
|
|
|
129.
|
____________________ cameras capture video data in digital format and attach
directly to a computer.
|
|
|
130.
|
Popular ____________________ include MPEG, Sorenson, Cinepak, DivX, and Windows
Media Video.
|
|
|
131.
|
____________________ video sends a small segment of a video to your computer and
begins to play it. While the segment plays the next segment is sent then played, and so
on, until the video ends.
|
|
|
132.
|
A vacuum tube is an electronic device that controls the flow of
____________________.
|
|
|
133.
|
The first electronic spreadsheet was ____________________.
|
|
|
134.
|
The use of components or labor from outside suppliers is called
____________________.
|
|
|
135.
|
The sharp rise in the stock value of the dot com industry is called the dot com
____________________.
|
|
|
136.
|
Publicizing information about new product features takes place in the phase
known as product ____________________.
|
|
|
137.
|
Computer hardware and software are sold through outlets called marketing
____________________.
|
|
|
138.
|
Some information systems collect and store ____________________ information
generated by the organization itself.
|
|
|
|
|
|
139.
|
The items in the figure above are symbols from a(n) ____________________.
|
|
|
140.
|
A(n) ____________________ diagram depicts the detailed sequence of interactions
that take place for a use case.
|
|
|
141.
|
During the ____________________ phase of the SDLC, the project team supervises
the tasks necessary to construct the new information system.
|
|
|
142.
|
Each column of a relational database table is equivalent to a(n)
____________________.
|
|
|
143.
|
In the context of object-oriented databases, a(n) ____________________ defines a
group of objects by specifying the attributes and methods these objects share.
|
|
|
144.
|
A(n) ____________________ is software optimized for the object-oriented database
model.
|
|
|
145.
|
A(n) ____________________ database is one which is stored on several computers,
on multiple networks, or in different geographical locations.
|
|
|
146.
|
The ____________________ data type is used to store dates in a format that
allows them to be manipulated.
|
|
|
147.
|
A(n) ____________________ represents a value that can change.
|
|
|
148.
|
A template for a group of objects whith similar characteristics is a(n)
____________________.
|
|
|
149.
|
A(n) ____________________ is any class that inherits attributes from a
superclass.
|
|
|
150.
|
A software program that identifies its source and carries a digital certificate
attesting to its authencity is code identified as ____________________.
|