True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
Digital technology has changed the way we view privacy.
|
|
|
2.
|
Because of increased versatility, a videogame console is now considered a
personal computer.
|
|
|
3.
|
The number 9 can be considered a character.
|
|
|
4.
|
Because most digital devices are electronic, bytes take the form of electrical
pulses.
|
|
|
5.
|
Semiconductor materials are substances with properties between substances like
copper and wood.
|
|
|
6.
|
To assure you can remember your password it is a good idea to base it on
information you can easily remember such as your birthday.
|
|
|
7.
|
You should always use a different password for every account.
|
|
|
8.
|
Trojans are computer programs that seem to perform one function while actually
doing something else.
|
|
|
9.
|
The digital revolution became a significant factor in the 1980s but ended in the
1990s with the dot com bubble burst.
|
|
|
10.
|
The first digital computer was developed for conducting the census.
|
|
|
11.
|
MySpace and Facebook are examples of social networks.
|
|
|
12.
|
Prior to 1940, the word computer was defined as a person who performs
calculations.
|
|
|
13.
|
An operating system is an example of application software.
|
|
|
14.
|
The purpose of a server is to serve computers on a network.
|
|
|
15.
|
In the binary number system, 2 is used to represent the value 2.
|
|
|
16.
|
A compiler converts all statements in a program to machine language in a single
batch.
|
|
|
17.
|
An interpreter converts and executes one statement at a time.
|
|
|
18.
|
The op code specifies the data.
|
|
|
19.
|
The operand is a command word for an operation.
|
|
|
20.
|
All computers are case sensitive.
|
|
|
21.
|
First generation computers were characterized by custom application
programs.
|
|
|
22.
|
Assembly language and machine language are the same.
|
|
|
23.
|
First-generation computers use vacuum tube technology.
|
|
|
24.
|
Second-generation computers were characterized by their use of operating
systems.
|
|
|
25.
|
High-level languages were developed for first generation computers.
|
|
|
26.
|
One of the few remaining mini-computers is the IBM AS/400.
|
|
|
27.
|
Programming the first commercial micro-computers were accomplished by flipping
switches.
|
|
|
28.
|
The first PCs required assembly by the user.
|
|
|
29.
|
Information technology is a large business. It includes any business that
makes use of information technology.
|
|
|
30.
|
All dot com companies are considered part of the IT industry.
|
|
|
31.
|
All major companies in the IT industry are headquartered in the Silicon
Valley.
|
|
|
32.
|
The end of the dot com bubble meant a decline in IT job openings.
|
|
|
33.
|
It is less expensive to replace software with brand-new software than to
purchase an upgrade.
|
|
|
34.
|
In the United States, the IT industry is regulated by the FCC.
|
|
|
35.
|
The number of telecommuting IT workers is increasing.
|
|
|
36.
|
A computer certification will totally prepare a person for a job in the IT
industry.
|
|
|
37.
|
In IT, job titles are standardized.
|
|
|
38.
|
Your web based resume should fully utilize multimedia to demonstrate you
capabilities. Companies are expecting IT resumes to contain all aspects of multimedia.
|
|
|
39.
|
Laws and ethics are really just different words for the same concept.
|
|
|
40.
|
To reduce cell phone radiation you should use your hands-free devices.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
41.
|
Digital electronics use ____ to represent data.
a. | circuits | c. | transistors | b. | switches | d. | components |
|
|
|
42.
|
Key factors in making electronic devices increasingly smaller and less expensive
include ____.
a. | transistors | c. | a & b | b. | integrated circuits | d. | neither a nor b |
|
|
|
43.
|
The first digital computers were built during World War II for ____.
a. | census taking | c. | communication | b. | code breaking | d. | troop placement |
|
|
|
44.
|
Initially sales were slow for the personal computer because of ____.
a. | price | c. | lack of software | b. | size | d. | lack of
availability |
|
|
|
45.
|
In 1982, the percentages of households that had a computer was ____
percent.
|
|
|
46.
|
A global computer network originally developed as a military project is the
____.
a. | World Wide Web | c. | Wide-area network | b. | Internet | d. | Local-area
network |
|
|
|
47.
|
____ allow members to post comments and questions that can be read and responded
to by others.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
48.
|
____ are where people exchange typed messages in real-time.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
49.
|
____ provides a space for interacting with friends.
a. | E-mail | c. | Chat groups | b. | Bulletin boards | d. | Social networks |
|
|
|
50.
|
A group of computers linked by wired or wireless technology is a ____.
a. | network | c. | cyberspace | b. | web | d. | Internet |
|
|
|
51.
|
The ____ is a collection of linked documents, graphics, and sounds.
a. | network | c. | cyberspace | b. | Web | d. | Internet |
|
|
|
52.
|
____ is a term that refers to entities that exist largely within computer
networks.
a. | Web | c. | WWW | b. | Internet | d. | Cyberspace |
|
|
|
53.
|
____ is the process of converting text, numbers, sound, photos, and video into
data that can be processed by digital devices.
a. | Digitizing | c. | Scanning | b. | Digital conversion | d. | Rastorization |
|
|
|
54.
|
Technology ____ is a process by which several different technologies with
distinct functionality evolve to form a single product.
a. | evolution | c. | convergence | b. | rotation | d. | diversification |
|
|
|
55.
|
More than ____ percent of cameras sold today are digital.
|
|
|
56.
|
Digital imaging has had an effect in the following areas ____.
a. | medicine | c. | photo processing | b. | photography | d. | all of the
above |
|
|
|
57.
|
A computer is a multiple purpose device that ____.
a. | stores data | c. | accepts input | b. | processes data | d. | all of the
above |
|
|
|
58.
|
In a computer most processing takes place in ____.
a. | memory | c. | CPU | b. | RAM | d. | mother board |
|
|
|
59.
|
An electronic component that can be programmed to perform tasks is a
____.
a. | CPU | c. | transistor | b. | microprocessor | d. | none of the
above |
|
|
|
60.
|
A set of computer programs that helps a person carry out a task is a/an
____.
a. | operating system | c. | application software | b. | system software | d. | Windows |
|
|
|
61.
|
A set of computer programs that helps a computer monitor itself and function
more efficiently is a/an ____.
a. | operating system | c. | application software | b. | system software | d. | Windows |
|
|
|
62.
|
The master controller for all activities that take place within a computer is
____.
a. | application software | c. | operating system | b. | system software | d. | CPU |
|
|
|
63.
|
A ____ is a microprocessor-based computing device.
a. | personal computer | c. | workstation | b. | mainframe | d. | server |
|
|
|
64.
|
An area of a computer that temporarily holds data waiting to be processed is
____.
a. | CPU | c. | storage | b. | memory | d. | file |
|
|
|
65.
|
An ordinary personal computer that is connected to a network is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
66.
|
A powerful desktop computer used for high-performance tasks is a ____.
a. | mainframe | c. | server | b. | workstation | d. | console |
|
|
|
67.
|
Data becomes ____ when it is presented in a format that people can understand
and use.
a. | information | c. | graphs | b. | processed | d. | presentation |
|
|
|
68.
|
The type of data where text, numbers, graphics, sound, and video have been
converted into discrete digits is ____.
a. | information | c. | digital | b. | analog | d. | none of the
above |
|
|
|
69.
|
The type of data that is represented using an infinite scale of values is
____.
a. | information | c. | digital | b. | analog | d. | none of the
above |
|
|
|
70.
|
The binary number 10 represents ____ in the decimal number system.
|
|
|
71.
|
Digital devices can use ____ as a code to represent character data.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
72.
|
The type of code that uses only 7 bits for each character is ____.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
73.
|
The type of code that uses 8 bits for each character is ____.
a. | ASCII | c. | EBCDIC | b. | Extended ASCII | d. | all of the
above |
|
|
|
74.
|
You might represent ____ as characters.
a. | color dot | c. | social security numbers | b. | bank
balance | d. | none of the
above |
|
|
|
75.
|
Data transmission speeds are typically expressed as ____.
a. | bits | c. | hertz | b. | bytes | d. | none of the
above |
|
|
|
76.
|
Storage is typically expressed as ____.
a. | bits | c. | hertz | b. | bytes | d. | none of the
above |
|
|
|
77.
|
One thousand bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
78.
|
One million bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
79.
|
A billion bytes is a ____.
a. | kilobyte | c. | gigabyte | b. | megabyte | d. | terrabyte |
|
|
|
80.
|
A super-thin slice of semiconducting material packed with microscopic circuit
elements is a ____.
a. | integrated circuit | c. | microchip | b. | computer chip | d. | all of the
above |
|
|
|
81.
|
The ____ houses all essential chips and provides connecting circuitry between
them.
a. | system board | c. | circuit board | b. | housing board | d. | chip board |
|
|
|
82.
|
C, BASIC, COBOL, and Java are examples of ____ languages.
a. | low-level | c. | system programming | b. | computer | d. | high-level |
|
|
|
83.
|
The human-readable version of a program is called ____.
a. | source code | c. | human code | b. | program code | d. | system code |
|
|
|
|
|
|
84.
|
The above figure represents two types of chip carriers. The one on the
left is a ____.
|
|
|
85.
|
The figure above represents two types of chip carriers. The one on the
right is a ____.
|
|
|
86.
|
A ____ converts all the statements in a program in a single batch and the
resulting collection of instructions is placed in a new file.
a. | compiler | c. | converter | b. | interpreter | d. | instruction |
|
|
|
87.
|
A(n) ____ converts and executes one statement at a time.
a. | compiler | c. | converter | b. | interpreter | d. | instructions |
|
|
|
88.
|
A collection of preprogrammed activities such as addition, subtraction, counting
and comparison is called a(n) ____.
a. | compiler code | c. | machine code | b. | interpretercode | d. | instruction set |
|
|
|
89.
|
____ can be directly executed by the processors’s circuitry.
a. | machine code | c. | programming language | b. | machine language | d. | none of the
above |
|
|
|
90.
|
The ____ is a command word for an operation such as add, compare or jump.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
91.
|
The ____ from an instruction specifies the data.
a. | op code | c. | ALU | b. | operand | d. | instruction
code |
|
|
|
92.
|
The ____ is the part of the microprocessor that performs arithmetic
operations.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
93.
|
The ____ fetches each instruction.
a. | op code | c. | ALU | b. | operand | d. | control unit |
|
|
|
|
|
|
94.
|
The above figure represents the instruction cycle. The first step is Box A
and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
95.
|
The above figure represents the instruction cycle. The second step is Box
B and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
96.
|
The above figure represents the instruction cycle. The third step is Box C
and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
97.
|
The above figure represents the instruction cycle. The fourth step is Box
D and represents the ____.
a. | fetch instruction | c. | execute instruction | b. | interpret instruction | d. | increment
pointer |
|
|
|
98.
|
A ____ uses password-cracking software.
a. | brute force attack | c. | phishing | b. | sniffing | d. | cracker |
|
|
|
99.
|
____ intercepts information sent over computer networks.
a. | Brute force | c. | Phishing | b. | Sniffing | d. | Cracking |
|
|
|
100.
|
A hacker posing as a legitimate representative of an official organization such
as your bank is an example of ____.
a. | brute force | c. | phishing | b. | sniffing | d. | cracking |
|
|
|
101.
|
____ tools that disguise a person’s identity online.
a. | Anonymizer | c. | ID free | b. | Free ID | d. | Cloaking |
|
|
|
102.
|
In terms of an authentication protocol, the phrase ‘something a person
knows’ refers to ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
103.
|
In terms of an authentication protocol, the phrase ‘something a person
possesses refers to ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
104.
|
In terms of an authentication protocol, the phrase ‘something a person
is’ refers to a(n) ____.
a. | password | c. | biometrics | b. | ID card | d. | none of the
above |
|
|
|
105.
|
A term which refers to a skilled programmer or to a person who manipulates
computers with malicious intent is a ____.
a. | black hat | c. | hacker | b. | cracker | d. | both b and c |
|
|
|
106.
|
Password management functions include ____.
a. | generating passwords | c. | providing password strength | b. | tracking
passwords | d. | all of the
above |
|
|
|
107.
|
A ____ is a series of characters that becomes a person’s unique
identifier.
a. | PIN code | c. | user ID | b. | password | d. | all of the
above |
|
|
|
108.
|
A named collection of data that exists on a storage medium.
a. | memory | c. | file name | b. | file | d. | none of the
above |
|
|
|
109.
|
A compute-intensive problem runs on a ____.
a. | server | c. | super computer | b. | mainframe | d. | super PC |
|
|
|
110.
|
A problem(s) a hacker can cause after breaking into your computer include(s)
____.
a. | applying for credit in your name | c. | apply for a mortgage using your
data | b. | sending embarrassing e-mails | d. | all of the
above |
|
|
|
Case-Based Critical Thinking Questions
Case 1-1 Karen is trying
to get organized and one of her issues is that she has too many electronic devices. She wants
to reduce the number of devices and still maintain the same degree of functionality.
|
|
|
111.
|
Karen needs an appointment book and is considering one that is digital.
You suggest she consider a ____.
a. | PDA | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
112.
|
Karen thinks she might need a device that in addition to her appointment book
she needs features such as email, Web access, a camera, and a GPS. You suggest she consider a
____.
a. | iPod | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
113.
|
If Karen were looking for voice communications, full-qwerty keypad, text
messaging, email, removable storage, camera, radio and a digital music player, she might consider a
____.
a. | PDA | c. | hand-held computer | b. | smart phone | d. | BlackBerry |
|
|
|
Case-Based Critical Thinking Questions
Case 1-2 Mike and Andre
are discussing how quickly technology changes. They are discussing how it seems devices are
merging to create new products especially in the technology field. They understand this is a
process called convergence.
|
|
|
114.
|
An example of an old form of convergence is ____.
a. | clock radio | c. | television | b. | cell phone | d. | microwave oven |
|
|
|
115.
|
A great example of convergence in modern technology is ____.
a. | clock radio | c. | television | b. | cell phones | d. | HD-TV |
|
|
|
116.
|
A barrier to the rapid deployment of many products resulting from convergence is
____.
a. | technology breakthroughs | c. | people aren’t
ready | b. | legal issues | d. | both b and c |
|
|
|
Case-Based Critical Thinking Questions
Case 1-3 Jim has just
purchased a new computer and it has made him think about how it works. He is particularly
interested in how information is processed and stored in his computer. He has come to you for
help.
|
|
|
117.
|
Jim wants to know why a compiler converts all statements in a program at one
time and places them into an object code. You tell him it is so that ____.
a. | the code is ready to execute | b. | you can prevent the introduction of new errors
| c. | you can put it on a chip | d. | none of the
above |
|
|
|
118.
|
Jim knows that a collection of preprogrammed activities is an instruction
set. He wants to know what an instruction set is designed to do. You tell him it is
designed to ____.
a. | carry out a particular task | b. | allow programmers to use them in creative ways
for multiple tasks | c. | limit the number of tasks the computer can
perform | d. | allow the program to run on multiple machines |
|
|
|
119.
|
Jim wants to know what machine language instructions look like to the machine.
You tell him they appear as ____.
a. | an op code and operand | c. | basic instructions such as add | b. | a series of 0s and
1s | d. | all of the
above |
|
|
|
120.
|
When adding two numbers, Jim knows that each number is going into its own
register and the control unit provides the instructions such as add. He wants to know where the
result of the add goes. You tell him it goes to ____.
a. | the ALU | c. | the accumulator | b. | another register | d. | the printer |
|
|
|
121.
|
A step by step process by which numbers are manipulated is a(n) ____.
a. | algorithm | c. | calculation | b. | computer | d. | abacus |
|
|
|
122.
|
The type of manual calculator first used in ancient Rome, Greece, India, China
and Japan is called a/n ____.
a. | slide rule | c. | abacus | b. | algorithm | d. | Napier’s
Bones |
|
|
|
123.
|
A device consisting of several rods divided into ten squares each labeled with
two numbers with the rods positioned according to the numbers in the calculation is a ____.
a. | slide rule | c. | abacus | b. | algorithm | d. | Napier’s
Bones |
|
|
|
124.
|
A calculator that implements instructions to perform calculations is a
____.
a. | slide rule | c. | mechanical calculator | b. | abacus | d. | algorithm |
|
|
|
125.
|
The first mass-produced calculator was the ____.
a. | Pascaline | c. | de Colmar’s Arithmometer | b. | Leibniz | d. | IBM
calculator |
|
|
|
126.
|
Punched cards were first used for ____.
a. | input to a computer | c. | census taking | b. | controlling colors and patterns of
yarn | d. | early forms of
electronic voting |
|
|
|
127.
|
The U.S. Census Bureau held a competition to find a way to tabulate the 1890
census. The Hollerith Tabulating Machine won. The company is now known as ____.
|
|
|
128.
|
An experimental device that typically must be further developed and perfected
before going into production is called a ____.
a. | alpha | c. | prototype | b. | beta | d. | omega |
|
|
|
129.
|
The first electronic computer to use vacuum tubes instead of switches was the
____.
a. | ABC | c. | Enigma | b. | Z3 | d. | Mark 1 |
|
|
|
130.
|
IBM created a computer that integrated 73 IBM Automatic Accounting Machines into
a single unified computing unit called the ____.
a. | ABC | c. | Enigma | b. | Z3 | d. | Harvard Mark 1 |
|
|
|
131.
|
The electronic device used to decode messages encrypted by the Germans was the
____.
a. | COLOSSUS | c. | Enivac | b. | Enigma | d. | UNIVAC |
|
|
|
132.
|
The general-purpose electronic computer designed to calculate trajectory tables
for the U.S. Army was the ____.
a. | COLOSSUS | c. | ENIAC | b. | Enigma | d. | UNIVAC |
|
|
|
133.
|
The first commercially successful computer was the ____.
a. | COLOSSUS | c. | Enivac | b. | Enigma | d. | UNIVAC |
|
|
|
134.
|
Computers characterized by their use of vacuum tubes are considered ____
generation.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
135.
|
A vacuum tube can have ____ states.
a. | one | c. | three | b. | two | d. | unlimited |
|
|
|
136.
|
Computers characterized by their use of transistors are considered ____
generation.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
137.
|
The birth of the software industry was a result of high-level languages
developed for ____ generation computers.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
138.
|
The first commercially successful minicomputer was the ____.
a. | RCA Spart 7 | c. | DEC PDP-8 | b. | IBM 360 | d. | IBM AS400 |
|
|
|
139.
|
Computers characterized by their use of microprocessors are ____
generation.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
140.
|
The first commercial micro computer was the ____.
a. | Mark 8 | c. | Apple I | b. | MITS Altair | d. | IBM PC |
|
|
|
141.
|
The first IBM PCs used ____ as an operating system.
a. | MS-DOS | c. | Windows | b. | PC-DOS | d. | IBM-DOS |
|
|
|
142.
|
By the mid-1990s, IBM-compatible computer systems accounted for more than ____
percent of all personal computer sales.
|
|
|
143.
|
The popularity of PCs was in large part brought about by ____.
a. | graphical use interface | c. | Internet | b. | mouse | d. | Apple |
|
|
|
144.
|
Narrowly defined, the term computer industry encompasses those companies that
____.
a. | manufacture computers and computer components | c. | develop, produce, sell, and support
computers | b. | manufacture computers, components, peripherals | d. | all of the
above |
|
|
|
145.
|
Segments of the IT industry include ____.
a. | Software publishers | d. | a, b, and c | b. | Service companies | e. | a & c only | c. | Computer
retailers | f. | b & c
only |
|
|
|
146.
|
World-wide consumers spend more than ____ dollars on information technology each
year.
a. | 1 billion | c. | 1 trillion | b. | 10 billion | d. | 10 trillion |
|
|
|
147.
|
Factors affecting the success of the IT industry include:
a. | population growth & business globalization | c. | population growth & interest
rate declines | b. | gaining population & business globalization | d. | Internet declines & business
globalization |
|
|
|
|
|
|
148.
|
The file cycle of a new computer model is shown above. In the figure
above, Box A represents ____.
a. | Introduction | c. | Product Development | b. | Product Announcement | d. | Product Design |
|
|
|
149.
|
The file cycle of a new computer model is shown above. In the figure
above, Box B represents ____.
a. | Introduction | c. | Product Development | b. | Product Announcement | d. | Product Design |
|
|
|
150.
|
The file cycle of a new computer model is shown above. In the figure
above, Box C represents ____.
a. | Product Development | c. | Introduction | b. | Product Announcement | d. | Product Design |
|
|
|
151.
|
The file cycle of a new computer model is shown above. In the figure
above, Box D represents ____.
a. | Introduction | c. | Maintenance | b. | Product Design | d. | Product
Announcement |
|
|
|
152.
|
The first phase of testing generally carried out by software publishers in-house
test team is called ____.
a. | white box testing | c. | alpha testing | b. | black box testing | d. | beta testing |
|
|
|
153.
|
A set of testing conducted by a team of off-site testers is called ____.
a. | white box testing | c. | alpha testing | b. | black box testing | d. | beta testing |
|
|
|
154.
|
Microsoft’s share of the total personal computer operating system market
is about ____.
a. | 80 % | c. | 90 % | b. | 85 % | d. | 95 % |
|
|
|
155.
|
The ____ tier of the computer industry consists of large companies.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
156.
|
The ____ tier of the computer industry consists of companies falling below the
cutoff for identifiable market share.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
157.
|
The ____ tier of companies sell primarily through mail order.
a. | first | c. | third | b. | second | d. | fourth |
|
|
|
|
|
|
158.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box A represents ____.
a. | Distribution centers | c. | Mail-order suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
159.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box B represents ____.
a. | Distribution centers | c. | Mail-order suppliers | b. | Value-added Resellers | d. | Retail stores |
|
|
|
160.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box C represents ____.
a. | Distribution centers | c. | Mail-order Suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
161.
|
The figure shown above represents computer and software marketing
channels. In that figure, Box D represents ____.
a. | Distribution centers | c. | Mail-order Suppliers | b. | Value-added Resellers | d. | Retail Stores |
|
|
|
162.
|
____ tends to be small local shops or national chains that specialize in the
sale of microcomputer software and hardware.
a. | Computer retail store | c. | Large box stores | b. | Computer specialty store | d. | None of the
above |
|
|
|
163.
|
____ is a special type of retailing in which a vendor takes orders by phone or
an Internet site.
a. | Manufacturer direct | c. | VAR | b. | Mail-order | d. | All of the
above |
|
|
|
164.
|
____ refers to hardware manufacturers that sell their products directly to
consumers.
a. | Manufacturer direct | c. | VAR | b. | Mail-order | d. | All of the
above |
|
|
|
165.
|
A ____ combines commercially available products with speciality hardware or
software.
a. | manufacturer direct | c. | VAR | b. | mail-order | d. | All of the
above |
|
|
|
166.
|
Most IS/T departments are headed by a ____.
a. | Chief Information Officer | c. | Chief Technology
Officer | b. | Chief Operating Officer | d. | Chief Systems Officer |
|
|
|
167.
|
A ____ investigate the requirements of a business or organization, its
employees, and its customers in order to plan and implement new or improved customer service.
a. | system designer | c. | systems analyst | b. | information analyst | d. | programmer |
|
|
|
168.
|
A person who designs, codes, and tests computer programs is a ____.
a. | computer specialist | c. | computer analyst | b. | computer programmer | d. | computer
technician |
|
|
|
169.
|
A person who creates documentation for large programming projects is a
____.
a. | program documentation | c. | computer specialist | b. | program analyst | d. | technical
writer |
|
|
|
170.
|
It is anticipated that the highest future demand for computer professionals will
be in the area of ____.
a. | technical support | d. | technical writers | b. | security specialist | e. | a & b | c. | computer
engineers | f. | c &
d |
|
|
|
171.
|
Advantages of telecommuting include all the following except ____.
a. | no commute time | c. | data security | b. | increased productivity | d. | all are
advantages |
|
|
|
172.
|
All of the following are essential for secure business data transmitted over the
Internet except ____.
a. | virtual private network | c. | secure
connections | b. | encryption | d. | high speed connection |
|
|
|
173.
|
Careers in computer ____ focuses on the design of computer hardware.
a. | engineering | c. | design | b. | science | d. | construction |
|
|
|
174.
|
Careers in computer ____ focuses on computer architecture and programming
computers to make them work effectively and efficiently.
a. | engineering | c. | design | b. | science | d. | construction |
|
|
|
175.
|
____ degrees focus on applying computers to business problems.
a. | Information system | c. | Information management | b. | Information
technology | d. | Information
analysis |
|
|
|
176.
|
____ degrees focus on the computer equipment and software used by
businesses.
a. | Information systems | c. | Information management | b. | Information
technology | d. | Information
analysis |
|
|
|
177.
|
Resumes should be in a ____ format.
a. | pdf | c. | doc | b. | xml | d. | all of the
above |
|
|
|
178.
|
The ____ Act enhances the authority of Law enforcement agents to prevent various
terrorist acts such as monitoring electronic communication without a warrant.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
179.
|
To get maximum exposure for your resume in an online job database you should
focus on ____ type of words.
a. | verbs | c. | adjectives | b. | nouns | d. | all the above |
|
|
|
180.
|
A hypertext version of your resume is called a ____.
a. | web page | c. | web portfolio | b. | web-based resume | d. | web resume |
|
|
|
181.
|
The ____ Act makes it a criminal offense to knowingly access a computer without
authorization.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
182.
|
The ____ Act extends telephone wiretap laws by restricting government agents and
unauthorized third parties from tapping into data transmissions without a search warrant.
a. | Homeland Security | c. | USA Patriot Act | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
183.
|
The ____ Act establishes an agency to monitor threats to the communication
infrastructure.
a. | Homeland Security | c. | USA Patriot | b. | Electronic Communications
Privacy | d. | Computer Fraud and
Abuse |
|
|
|
|
|
|
184.
|
The figure above represents a CRT; in this drawing Box A points to the
____.
a. | panel glass | c. | magnet shield | b. | phosphor screen | d. | frame |
|
|
|
185.
|
The figure above represents a CRT; in this drawing Box B points to the
____.
a. | panel glass | c. | magnetic shield | b. | phosphor screen | d. | frame |
|
|
|
186.
|
The figure above represents a CRT; in this drawing Box C points to the
____.
a. | panel glass | c. | frame | b. | phosphor screen | d. | electron beam |
|
|
|
187.
|
The figure above represents a CRT; in this drawing Box D points to the
____.
a. | electron beam | c. | inner magnetic shield | b. | electronic
gun | d. | none of the
above |
|
|
|
|
|
|
188.
|
Carpal tunnel syndrome is a condition whose effects are made worse by keyboard
use. The figure above represents a hand. Box A indicates the ____.
a. | median nerve | c. | carpal bones | b. | transverse carpal ligament | d. | tendons and
sheaths |
|
|
|
189.
|
Carpal tunnel syndrome is a condition whose effects are made worse by keyboard
use. The figure above represents a hand. Box B indicates the ____.
a. | median nerve | c. | carpal bones | b. | transverse carpal ligament | d. | tendons and
sheaths |
|
|
|
190.
|
Carpal tunnel syndrome is a condition whose effects are made worse by keyboard
use. The figure above represents a hand. Box C indicates the ____.
a. | median nerve | c. | carpal bones | b. | transverse carpal ligament | d. | tendons and
sheaths |
|
|
|
Case-Based Critical Thinking Questions
Case 9-1 John is
considering getting a college degree in the IT field. He is confused about which degree he
needs. Connie said she would help him decide.
|
|
|
191.
|
John is interested in advancement opportunities when he graduates. Connie
should advise him that it would be best to get at least a ____ degree.
a. | Associates | c. | Bachelors | b. | Graduate | d. | Certificates (he really doesn’t need a
degree) |
|
|
|
192.
|
John thinks he would like to focus his studies on programming
computers. He is not interested in the hardware aspects. Connie should tell him he needs
to major in ____.
a. | Computer engineering | c. | Information systems | b. | Computer science | d. | Information
technology |
|
|
|
193.
|
John is also interested in the application of computers to business
processes. If he wants to focus on computer equipment and software used by businesses and
organizations, Connie should advise him to major in ____.
a. | Computer engineering | c. | Information systems | b. | Computer science | d. | Information
technology |
|
|
|
Case-Based Critical Thinking Questions
Case 9-2 Jimmy recently
graduated and is looking for his first full-time job. He has turned to you for help.
Jimmy knows you recently graduated and got a new job. He thinks you can give him some advise to
help with his search.
|
|
|
194.
|
Jimmy was told the Internet had become an important tool for job hunters.
Jimmy is concerned about the amount of his job hunting time he should spend on online. You tell
him it is best to spend approximately ____ of his total time online.
|
|
|
195.
|
You advise Jimmy that one of the problems for job hunters using the Internet is
____.
a. | making sure to only apply for jobs that meet his requirements | c. | job titles are
non-standard | b. | posting his resume | d. | all of the above |
|
|
|
196.
|
You tell Jimmy that the elements of an effective resume include ____.
a. | it should be easy to read | c. | you should be sure and make the
resume flash to get attention | b. | it should contain as much multimedia as
possible | d. | all of the
above |
|
|
|
197.
|
You tell Jimmy there are automated programs that search one or more databases
and notifies you when it finds any leads. This program is called a ____.
a. | metasearch tool | c. | job search page | b. | job search engine | d. | job search
agent |
|
|
|
Case-Based Critical Thinking Questions
Case 9-3 Susan is
concerned about some of the laws affecting the IT industry. She is particularly interested in
issues related to copyright and copyright violations. She can’t afford to go to an
attorney but knows you have done some research on this topic and might be able to help.
|
|
|
198.
|
Susan wants to know which act extends copyright protection to all tangible
medium. You suggest she investigates the ____.
a. | United States Copyright Act | c. | Fair Use
Doctrine | b. | Digital Millennium Copyright Act | d. | CAN-SPAM Act |
|
|
|
199.
|
Susan asks which act she should investigate that makes it illegal to circumvent
copy-protection technologies.
a. | Unites States Copyright Act | c. | Fair Use
Doctrine | b. | Digital Millennium Copyright Act | d. | CAN-SPAM Act |
|
|
|
200.
|
Susan is a teacher and is concerned about her use of copyrighted
materials. You suggest she look at the ____.
a. | United States Copyright Act | c. | Fair Use
Doctrine | b. | Digital Millennium Copyright Act | d. | CAN-SPAM Act |
|