Name: 
 

Chapter 1 and 9 Study Guide



True/False
Indicate whether the statement is true or false.
 

 1. 

Digital technology has changed the way we view privacy.
 

 2. 

Because of increased versatility, a videogame console is now considered a personal computer.
 

 3. 

The number 9 can be considered a character.
 

 4. 

Because most digital devices are electronic, bytes take the form of electrical pulses.
 

 5. 

Semiconductor materials are substances with properties between substances like copper and wood.
 

 6. 

To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.
 

 7. 

You should always use a different password for every account.
 

 8. 

Trojans are computer programs that seem to perform one function while actually doing something else.
 

 9. 

The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
 

 10. 

The first digital computer was developed for conducting the census.
 

 11. 

MySpace and Facebook are examples of social networks.
 

 12. 

Prior to 1940, the word computer was defined as a person who performs calculations.
 

 13. 

An operating system is an example of application software.
 

 14. 

The purpose of a server is to serve computers on a network.
 

 15. 

In the binary number system, 2 is used to represent the value 2.
 

 16. 

A compiler converts all statements in a program to machine language in a single batch.
 

 17. 

An interpreter converts and executes one statement at a time.
 

 18. 

The op code specifies the data.
 

 19. 

The operand is a command word for an operation.
 

 20. 

All computers are case sensitive.
 

 21. 

First generation computers were characterized by custom application programs.
 

 22. 

Assembly language and machine language are the same.
 

 23. 

First-generation computers use vacuum tube technology.
 

 24. 

Second-generation computers were characterized by their use of operating systems.
 

 25. 

High-level languages were developed for first generation computers.
 

 26. 

One of the few remaining mini-computers is the IBM AS/400.
 

 27. 

Programming the first commercial micro-computers were accomplished by flipping switches.
 

 28. 

The first PCs required assembly by the user.
 

 29. 

Information technology is a large business.  It includes any business that makes use of information technology.
 

 30. 

All dot com companies are considered part of the IT industry.
 

 31. 

All major companies in the IT industry are headquartered in the Silicon Valley.
 

 32. 

The end of the dot com bubble meant a decline in IT job openings.
 

 33. 

It is less expensive to replace software with brand-new software than to purchase an upgrade.
 

 34. 

In the United States, the IT industry is regulated by the FCC.
 

 35. 

The number of telecommuting IT workers is increasing.
 

 36. 

A computer certification will totally prepare a person for a job in the IT industry.
 

 37. 

In IT,  job titles are standardized.
 

 38. 

Your web based resume should fully utilize multimedia to demonstrate you capabilities.  Companies are expecting IT resumes to contain all aspects of multimedia.
 

 39. 

Laws and ethics are really just different words for the same concept.
 

 40. 

To reduce cell phone radiation you should use your hands-free devices.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 41. 

Digital electronics use ____ to represent data.
a.
circuits
c.
transistors
b.
switches
d.
components
 

 42. 

Key factors in making electronic devices increasingly smaller and less expensive include ____.
a.
transistors
c.
a & b
b.
integrated circuits
d.
neither a nor b
 

 43. 

The first digital computers were built during World War II for ____.
a.
census taking
c.
communication
b.
code breaking
d.
troop placement
 

 44. 

Initially sales were slow for the personal computer because of ____.
a.
price
c.
lack of software
b.
size
d.
lack of availability
 

 45. 

In 1982, the percentages of households that had a computer was ____ percent.
a.
10
c.
50
b.
30
d.
70
 

 46. 

A global computer network originally developed as a military project is the ____.
a.
World Wide Web
c.
Wide-area network
b.
Internet
d.
Local-area network
 

 47. 

____ allow members to post comments and questions that can be read and responded to by others.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 48. 

____ are where people exchange typed messages in real-time.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 49. 

____ provides a space for interacting with friends.
a.
E-mail
c.
Chat groups
b.
Bulletin boards
d.
Social networks
 

 50. 

A group of computers linked by wired or wireless technology is a ____.
a.
network
c.
cyberspace
b.
web
d.
Internet
 

 51. 

The ____ is a collection of linked documents, graphics, and sounds.
a.
network
c.
cyberspace
b.
Web
d.
Internet
 

 52. 

____ is a term that refers to entities that exist largely within computer networks.
a.
Web
c.
WWW
b.
Internet
d.
Cyberspace
 

 53. 

____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
a.
Digitizing
c.
Scanning
b.
Digital conversion
d.
Rastorization
 

 54. 

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
a.
evolution
c.
convergence
b.
rotation
d.
diversification
 

 55. 

More than ____ percent of cameras sold today are digital.
a.
80
c.
90
b.
85
d.
99
 

 56. 

Digital imaging has had an effect in the following areas ____.
a.
medicine
c.
photo processing
b.
photography
d.
all of the above
 

 57. 

A computer is a multiple purpose device that ____.
a.
stores data
c.
accepts input
b.
processes data
d.
all of the above
 

 58. 

In a computer most processing takes place in ____.
a.
memory
c.
CPU
b.
RAM
d.
mother board
 

 59. 

An electronic component that can be programmed to perform tasks is a ____.
a.
CPU
c.
transistor
b.
microprocessor
d.
none of the above
 

 60. 

A set of computer programs that helps a person carry out a task is a/an ____.
a.
operating system
c.
application software
b.
system software
d.
Windows
 

 61. 

A set of computer programs that helps a computer monitor itself and function more efficiently is a/an ____.
a.
operating system
c.
application software
b.
system software
d.
Windows
 

 62. 

The master controller for all activities that take place within a computer is ____.
a.
application software
c.
operating system
b.
system software
d.
CPU
 

 63. 

A ____ is a microprocessor-based computing device.
a.
personal computer
c.
workstation
b.
mainframe
d.
server
 

 64. 

An area of a computer that temporarily holds data waiting to be processed is ____.
a.
CPU
c.
storage
b.
memory
d.
file
 

 65. 

An ordinary personal computer that is connected to a network is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 66. 

A powerful desktop computer used for high-performance tasks is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 67. 

Data becomes ____ when it is presented in a format that people can understand and use.
a.
information
c.
graphs
b.
processed
d.
presentation
 

 68. 

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits is ____.
a.
information
c.
digital
b.
analog
d.
none of the above
 

 69. 

The type of data that is represented using an infinite scale of values is ____.
a.
information
c.
digital
b.
analog
d.
none of the above
 

 70. 

The binary number 10 represents ____ in the decimal number system.
a.
4
c.
10
b.
2
d.
1
 

 71. 

Digital devices can use ____ as a code to represent character data.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 72. 

The type of code that uses only 7 bits for each character is ____.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 73. 

The type of code that uses 8 bits for each character is ____.
a.
ASCII
c.
EBCDIC
b.
Extended ASCII
d.
all of the above
 

 74. 

You might represent ____ as characters.
a.
color dot
c.
social security numbers
b.
bank balance
d.
none of the above
 

 75. 

Data transmission speeds are typically expressed as ____.
a.
bits
c.
hertz
b.
bytes
d.
none of the above
 

 76. 

Storage is typically expressed as ____.
a.
bits
c.
hertz
b.
bytes
d.
none of the above
 

 77. 

One thousand bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 78. 

One million bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 79. 

A billion bytes is a ____.
a.
kilobyte
c.
gigabyte
b.
megabyte
d.
terrabyte
 

 80. 

A super-thin slice of semiconducting material packed with microscopic circuit elements is a ____.
a.
integrated circuit
c.
microchip
b.
computer chip
d.
all of the above
 

 81. 

The ____ houses all essential chips and provides connecting circuitry between them.
a.
system board
c.
circuit board
b.
housing board
d.
chip board
 

 82. 

C, BASIC, COBOL, and Java are examples of ____ languages.
a.
low-level
c.
system programming
b.
computer
d.
high-level
 

 83. 

The human-readable version of a program is called ____.
a.
source code
c.
human code
b.
program code
d.
system code
 
 
nar001-1.jpg
 

 84. 

The above figure represents two types of chip carriers.  The one on the left is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 85. 

The figure above represents two types of chip carriers.  The one on the right is a ____.
a.
PGA
c.
PID
b.
DIP
d.
GAP
 

 86. 

A ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
a.
compiler
c.
converter
b.
interpreter
d.
instruction
 

 87. 

A(n) ____ converts and executes one statement at a time.
a.
compiler
c.
converter
b.
interpreter
d.
instructions
 

 88. 

A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.
a.
compiler code
c.
machine code
b.
interpretercode
d.
instruction set
 

 89. 

____ can be directly executed by the processors’s circuitry.
a.
machine code
c.
programming language
b.
machine language
d.
none of the above
 

 90. 

The ____ is a command word for an operation such as add, compare or jump.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 91. 

The ____ from an instruction specifies the data.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 92. 

The ____ is the part of the microprocessor that performs arithmetic operations.
a.
op code
c.
ALU
b.
operand
d.
control unit
 

 93. 

The ____ fetches each instruction.
a.
op code
c.
ALU
b.
operand
d.
control unit
 
 
nar002-1.jpg
 

 94. 

The above figure represents the instruction cycle.  The first step is Box A and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 95. 

The above figure represents the instruction cycle.  The second step is Box B and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 96. 

The above figure represents the instruction cycle.  The third step is Box C and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 97. 

The above figure represents the instruction cycle.  The fourth step is Box D and represents the ____.
a.
fetch instruction
c.
execute instruction
b.
interpret instruction
d.
increment pointer
 

 98. 

A ____ uses password-cracking software.
a.
brute force attack
c.
phishing
b.
sniffing
d.
cracker
 

 99. 

____ intercepts information sent over computer networks.
a.
Brute force
c.
Phishing
b.
Sniffing
d.
Cracking
 

 100. 

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
a.
brute force
c.
phishing
b.
sniffing
d.
cracking
 

 101. 

____ tools that disguise a person’s identity online.
a.
Anonymizer
c.
ID free
b.
Free ID
d.
Cloaking
 

 102. 

In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 103. 

In terms of an authentication protocol, the phrase ‘something a person possesses refers to ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 104. 

In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____.
a.
password
c.
biometrics
b.
ID card
d.
none of the above
 

 105. 

A term which refers to a skilled programmer or to a person who manipulates computers with malicious intent is a ____.
a.
black hat
c.
hacker
b.
cracker
d.
both b and c
 

 106. 

Password management functions include ____.
a.
generating passwords
c.
providing password strength
b.
tracking passwords
d.
all of the above
 

 107. 

A ____ is a series of characters that becomes a person’s unique identifier.
a.
PIN code
c.
user ID
b.
password
d.
all of the above
 

 108. 

A named collection of data that exists on a storage medium.
a.
memory
c.
file name
b.
file
d.
none of the above
 

 109. 

A compute-intensive problem runs on a ____.
a.
server
c.
super computer
b.
mainframe
d.
super PC
 

 110. 

A problem(s) a hacker can cause after breaking into your computer include(s) ____.
a.
applying for credit in your name
c.
apply for a mortgage using your data
b.
sending embarrassing e-mails
d.
all of the above
 
 
Case-Based Critical Thinking Questions

Case 1-1
Karen is trying to get organized and one of her issues is that she has too many electronic devices.  She wants to reduce the number of devices and still maintain the same degree of functionality.
 

 111. 

Karen needs an appointment book and is considering one that is digital.  You suggest she consider a ____.
a.
PDA
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 

 112. 

Karen thinks she might need a device that in addition to her appointment book she needs features such as email, Web access, a camera, and a GPS.  You suggest she consider a ____.
a.
iPod
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 

 113. 

If Karen were looking for voice communications, full-qwerty keypad, text messaging, email, removable storage, camera, radio and a digital music player, she might consider a ____.
a.
PDA
c.
hand-held computer
b.
smart phone
d.
BlackBerry
 
 
Case-Based Critical Thinking Questions

Case 1-2
Mike and Andre are discussing how quickly technology changes.  They are discussing how it seems devices are merging to create new products especially in the technology field.  They understand this is a process called convergence.
 

 114. 

An example of an old form of convergence is ____.
a.
clock radio
c.
television
b.
cell phone
d.
microwave oven
 

 115. 

A great example of convergence in modern technology is ____.
a.
clock radio
c.
television
b.
cell phones
d.
HD-TV
 

 116. 

A barrier to the rapid deployment of many products resulting from convergence is ____.
a.
technology breakthroughs
c.
people aren’t ready
b.
legal issues
d.
both b and c
 
 
Case-Based Critical Thinking Questions

Case 1-3
Jim has just purchased a new computer and it has made him think about how it works.  He is particularly  interested in how information is processed and stored in his computer.  He has come to you for help.
 

 117. 

Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code.  You tell him it is so that ____.
a.
the code is ready to execute
b.
you can prevent the introduction of new errors
c.
you can put it on a chip
d.
none of the above
 

 118. 

Jim knows that a collection of preprogrammed activities is an instruction set.  He wants to know what an instruction set is designed to do.  You tell him it is designed to ____.
a.
carry out a particular task
b.
allow programmers to use them in creative ways for multiple tasks
c.
limit the number of tasks the computer can perform
d.
allow the program to run on multiple machines
 

 119. 

Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.
a.
an op code and operand
c.
basic instructions such as add
b.
a series of 0s and 1s
d.
all of the above
 

 120. 

When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add.  He wants to know where the result of the add goes.  You tell him it goes to ____.
a.
the ALU
c.
the accumulator
b.
another register
d.
the printer
 

 121. 

A step by step process by which numbers are manipulated is a(n) ____.
a.
algorithm
c.
calculation
b.
computer
d.
abacus
 

 122. 

The type of manual calculator first used in ancient Rome, Greece, India, China and Japan is called a/n ____.
a.
slide rule
c.
abacus
b.
algorithm
d.
Napier’s Bones
 

 123. 

A device consisting of several rods divided into ten squares each labeled with two numbers with the rods positioned according to the numbers in the calculation is a ____.
a.
slide rule
c.
abacus
b.
algorithm
d.
Napier’s Bones
 

 124. 

A calculator that implements instructions to perform calculations is a ____.
a.
slide rule
c.
mechanical calculator
b.
abacus
d.
algorithm
 

 125. 

The first mass-produced calculator was the ____.
a.
Pascaline
c.
de Colmar’s Arithmometer
b.
Leibniz
d.
IBM calculator
 

 126. 

Punched cards were first used for ____.
a.
input to a computer
c.
census taking
b.
controlling colors and patterns of yarn
d.
early forms of electronic voting
 

 127. 

The U.S. Census Bureau held a competition to find a way to tabulate the 1890 census.  The Hollerith Tabulating Machine won.  The company is now known as ____.
a.
HP
c.
IBM
b.
HTM
d.
HAL
 

 128. 

An experimental device that typically must be further developed and perfected before going into production is called a ____.
a.
alpha
c.
prototype
b.
beta
d.
omega
 

 129. 

The first electronic computer to use vacuum tubes instead of switches was the ____.
a.
ABC
c.
Enigma
b.
Z3
d.
Mark 1
 

 130. 

IBM created a computer that integrated 73 IBM Automatic Accounting Machines into a single unified computing unit called the ____.
a.
ABC
c.
Enigma
b.
Z3
d.
Harvard Mark 1
 

 131. 

The electronic device used to decode messages encrypted by the Germans was the ____.
a.
COLOSSUS
c.
Enivac
b.
Enigma
d.
UNIVAC
 

 132. 

The general-purpose electronic computer designed to calculate trajectory tables for the U.S. Army was the ____.
a.
COLOSSUS
c.
ENIAC
b.
Enigma
d.
UNIVAC
 

 133. 

The first commercially successful computer was the ____.
a.
COLOSSUS
c.
Enivac
b.
Enigma
d.
UNIVAC
 

 134. 

Computers characterized by their use of vacuum tubes are considered ____ generation.
a.
first
c.
third
b.
second
d.
fourth
 

 135. 

A vacuum tube can have ____ states.
a.
one
c.
three
b.
two
d.
unlimited
 

 136. 

Computers characterized by their use of transistors are considered ____ generation.
a.
first
c.
third
b.
second
d.
fourth
 

 137. 

The birth of the software industry was a result of high-level languages developed for ____ generation computers.
a.
first
c.
third
b.
second
d.
fourth
 

 138. 

The first commercially successful minicomputer was the ____.
a.
RCA Spart 7
c.
DEC PDP-8
b.
IBM 360
d.
IBM AS400
 

 139. 

Computers characterized by their use of microprocessors are ____ generation.
a.
first
c.
third
b.
second
d.
fourth
 

 140. 

The first commercial micro computer was the ____.
a.
Mark 8
c.
Apple I
b.
MITS Altair
d.
IBM PC
 

 141. 

The first IBM PCs used ____ as an operating system.
a.
MS-DOS
c.
Windows
b.
PC-DOS
d.
IBM-DOS
 

 142. 

By the mid-1990s, IBM-compatible computer systems accounted for more than ____ percent of all personal computer sales.
a.
70
c.
90
b.
80
d.
100
 

 143. 

The popularity of PCs was in large part brought about by ____.
a.
graphical use interface
c.
Internet
b.
mouse
d.
Apple
 

 144. 

Narrowly defined, the term computer industry encompasses those companies that ____.
a.
manufacture computers and computer components
c.
develop, produce, sell, and support computers
b.
manufacture computers, components, peripherals
d.
all of the above
 

 145. 

Segments of the IT industry include ____.
a.
Software publishers
d.
a, b, and c
b.
Service companies
e.
a & c only
c.
Computer retailers
f.
b & c only
 

 146. 

World-wide consumers spend more than ____ dollars on information technology each year.
a.
1 billion
c.
1 trillion
b.
10 billion
d.
10 trillion
 

 147. 

Factors affecting the success of the IT industry include:
a.
population growth & business globalization
c.
population growth & interest rate declines
b.
gaining population & business globalization
d.
Internet declines & business globalization
 
 
nar006-1.jpg
 

 148. 

The file cycle of a new computer model is shown above.  In the figure above, Box A represents ____.
a.
Introduction
c.
Product Development
b.
Product Announcement
d.
Product Design
 

 149. 

The file cycle of a new computer model is shown above.  In the figure above, Box B represents ____.
a.
Introduction
c.
Product Development
b.
Product Announcement
d.
Product Design
 

 150. 

The file cycle of a new computer model is shown above.  In the figure above, Box C represents ____.
a.
Product Development
c.
Introduction
b.
Product Announcement
d.
Product Design
 

 151. 

The file cycle of a new computer model is shown above.  In the figure above, Box D represents ____.
a.
Introduction
c.
Maintenance
b.
Product Design
d.
Product Announcement
 

 152. 

The first phase of testing generally carried out by software publishers in-house test team is called ____.
a.
white box testing
c.
alpha testing
b.
black box testing
d.
beta testing
 

 153. 

A set of testing conducted by a team of off-site testers is called ____.
a.
white box testing
c.
alpha testing
b.
black box testing
d.
beta testing
 

 154. 

Microsoft’s share of the total personal computer operating system market is about ____.
a.
80 %
c.
90 %
b.
85 %
d.
95 %
 

 155. 

The ____ tier of the computer industry consists of large companies.
a.
first
c.
third
b.
second
d.
fourth
 

 156. 

The ____ tier of the computer industry consists of companies falling below the cutoff for identifiable market share.
a.
first
c.
third
b.
second
d.
fourth
 

 157. 

The ____ tier of companies sell primarily through mail order.
a.
first
c.
third
b.
second
d.
fourth
 
 
nar007-1.jpg
 

 158. 

The figure shown above represents computer and software marketing channels.  In that figure, Box A represents ____.
a.
Distribution centers
c.
Mail-order suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 159. 

The figure shown above represents computer and software marketing channels.  In that figure, Box B represents ____.
a.
Distribution centers
c.
Mail-order suppliers
b.
Value-added Resellers
d.
Retail stores
 

 160. 

The figure shown above represents computer and software marketing channels.  In that figure, Box C represents ____.
a.
Distribution centers
c.
Mail-order Suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 161. 

The figure shown above represents computer and software marketing channels.  In that figure, Box D represents ____.
a.
Distribution centers
c.
Mail-order Suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 162. 

____ tends to be small local shops or national chains that specialize in the sale of microcomputer software and hardware.
a.
Computer retail store
c.
Large box stores
b.
Computer specialty store
d.
None of the above
 

 163. 

____ is a special type of retailing in which a vendor takes orders by phone or an Internet site.
a.
Manufacturer direct
c.
VAR
b.
Mail-order
d.
All of the above
 

 164. 

____ refers to hardware manufacturers that sell their products directly to consumers.
a.
Manufacturer direct
c.
VAR
b.
Mail-order
d.
All of the above
 

 165. 

A ____ combines commercially available products with speciality hardware or software.
a.
manufacturer direct
c.
VAR
b.
mail-order
d.
All of the above
 

 166. 

Most IS/T departments are headed by a ____.
a.
Chief Information Officer
c.
Chief Technology Officer
b.
Chief Operating Officer
d.
Chief Systems Officer
 

 167. 

A ____ investigate the requirements of a business or organization, its employees, and its customers in order to plan and implement new or improved customer service.
a.
system designer
c.
systems analyst
b.
information analyst
d.
programmer
 

 168. 

A person who designs, codes, and tests computer programs is a ____.
a.
computer specialist
c.
computer analyst
b.
computer programmer
d.
computer technician
 

 169. 

A person who creates documentation for large programming projects is a ____.
a.
program documentation
c.
computer specialist
b.
program analyst
d.
technical writer
 

 170. 

It is anticipated that the highest future demand for computer professionals will be in the area  of ____.
a.
technical support
d.
technical writers
b.
security specialist
e.
a & b
c.
computer engineers
f.
c & d
 

 171. 

Advantages of telecommuting include all the following except ____.
a.
no commute time
c.
data security
b.
increased productivity
d.
all are advantages
 

 172. 

All of the following are essential for secure business data transmitted over the Internet except ____.
a.
virtual private network
c.
secure connections
b.
encryption
d.
high speed connection
 

 173. 

Careers in computer ____ focuses on the design of computer hardware.
a.
engineering
c.
design
b.
science
d.
construction
 

 174. 

Careers in computer ____ focuses on computer architecture and programming computers to make them work effectively and efficiently.
a.
engineering
c.
design
b.
science
d.
construction
 

 175. 

____ degrees focus on applying computers to business problems.
a.
Information system
c.
Information management
b.
Information technology
d.
Information analysis
 

 176. 

____ degrees focus on the computer equipment and software used by businesses.
a.
Information systems
c.
Information management
b.
Information technology
d.
Information analysis
 

 177. 

Resumes should be in a ____ format.
a.
pdf
c.
doc
b.
xml
d.
all of the above
 

 178. 

The ____ Act enhances the authority of Law enforcement agents to prevent various terrorist acts such as monitoring electronic communication without a warrant.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 

 179. 

To get maximum exposure for your resume in an online job database you should focus on ____ type of words.
a.
verbs
c.
adjectives
b.
nouns
d.
all the above
 

 180. 

A hypertext version of your resume is called a ____.
a.
web page
c.
web portfolio
b.
web-based resume
d.
web resume
 

 181. 

The ____ Act makes it a criminal offense to knowingly access a computer without authorization.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 

 182. 

The ____ Act extends telephone wiretap laws by restricting government agents and unauthorized third parties from tapping into data transmissions without a search warrant.
a.
Homeland Security
c.
USA Patriot Act
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 

 183. 

The ____ Act establishes an agency to monitor threats to the communication infrastructure.
a.
Homeland Security
c.
USA Patriot
b.
Electronic Communications Privacy
d.
Computer Fraud and Abuse
 
 
nar008-1.jpg
 

 184. 

The figure above represents a CRT; in this drawing Box A points to the ____.
a.
panel glass
c.
magnet shield
b.
phosphor screen
d.
frame
 

 185. 

The figure above represents a CRT; in this drawing Box B points to the ____.
a.
panel glass
c.
magnetic shield
b.
phosphor screen
d.
frame
 

 186. 

The figure above represents a CRT; in this drawing Box C points to the ____.
a.
panel glass
c.
frame
b.
phosphor screen
d.
electron beam
 

 187. 

The figure above represents a CRT; in this drawing Box D points to the ____.
a.
electron beam
c.
inner magnetic shield
b.
electronic gun
d.
none of the above
 
 
nar009-1.jpg
 

 188. 

Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use.  The figure above represents a hand.  Box A indicates the ____.
a.
median nerve
c.
carpal bones
b.
transverse carpal ligament
d.
tendons and sheaths
 

 189. 

Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use.  The figure above represents a hand.  Box B indicates the ____.
a.
median nerve
c.
carpal bones
b.
transverse carpal ligament
d.
tendons and sheaths
 

 190. 

Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use.  The figure above represents a hand.  Box C indicates the ____.
a.
median nerve
c.
carpal bones
b.
transverse carpal ligament
d.
tendons and sheaths
 
 
Case-Based Critical Thinking Questions

Case 9-1
John is considering getting a college degree in the IT field.  He is confused about which degree he needs.  Connie said she would help him decide.
 

 191. 

John is interested in advancement opportunities when he graduates.  Connie should advise him that it would be best to get at least a ____ degree.
a.
Associates
c.
Bachelors
b.
Graduate
d.
Certificates (he really doesn’t need a degree)
 

 192. 

John thinks he would like  to focus his studies on programming computers.  He is not interested in the hardware aspects.  Connie should tell him he needs to major in ____.
a.
Computer engineering
c.
Information systems
b.
Computer science
d.
Information technology
 

 193. 

John is also interested in the application of computers to business processes.  If he wants to focus on computer equipment and software used by businesses and organizations, Connie should advise him to major in ____.
a.
Computer engineering
c.
Information systems
b.
Computer science
d.
Information technology
 
 
Case-Based Critical Thinking Questions

Case 9-2
Jimmy recently graduated and is looking for his first full-time job.  He has turned to you for help.  Jimmy knows you recently graduated and got a new job.  He thinks you can give him some advise to help with his search.
 

 194. 

Jimmy was told the Internet had become an important tool for job hunters.  Jimmy is concerned about the amount of his job hunting time he should spend on online.  You tell him it is best to spend approximately ____ of his total time online.
a.
25%
c.
75%
b.
50%
d.
95%
 

 195. 

You advise Jimmy that one of the problems for job hunters using the Internet is ____.
a.
making sure to only apply for jobs that meet his requirements
c.
job titles are non-standard
b.
posting his resume
d.
all of the above
 

 196. 

You tell Jimmy that the elements of an effective resume include ____.
a.
it should be easy to read
c.
you should be sure and make the resume flash to get attention
b.
it should contain as much multimedia as possible
d.
all of the above
 

 197. 

You tell Jimmy there are automated programs that search one or more databases and notifies you when it finds any leads.  This program is called a ____.
a.
metasearch tool
c.
job search page
b.
job search engine
d.
job search agent
 
 
Case-Based Critical Thinking Questions

Case 9-3
Susan is concerned about some of the laws affecting the IT industry.  She is particularly interested in issues related to copyright and copyright violations.  She can’t afford to go to an attorney but knows you have done some research on this topic and might be able to help.
 

 198. 

Susan wants to know which act extends copyright protection to all tangible medium.  You suggest she investigates the ____.
a.
United States Copyright Act
c.
Fair Use Doctrine
b.
Digital Millennium Copyright Act
d.
CAN-SPAM Act
 

 199. 

Susan asks which act she should investigate that makes it illegal to circumvent copy-protection technologies.
a.
Unites States Copyright Act
c.
Fair Use Doctrine
b.
Digital Millennium Copyright Act
d.
CAN-SPAM Act
 

 200. 

Susan is a teacher and is concerned about her use of copyrighted materials.  You suggest she look at the ____.
a.
United States Copyright Act
c.
Fair Use Doctrine
b.
Digital Millennium Copyright Act
d.
CAN-SPAM Act
 



 
Check Your Work     Start Over