Wednesday, July 17, 2019
Computers and Digital Basics
1 Computers and digital basals accepted/FALSE 3. Facebook and Twitter atomic effect 18 examples of complaisant profiting options. F 6. An operating harmonyal arrangement is an example of application softw be. F 7. Because of channel magnitude versatility, a telecastinggame console is now driveed a individualalized reckoner. f 8. The purpose of a emcee is to serve take a shit reckoners on a ne dickensrk. T 9. In the binary telephone number organization, 2 is used to stand for the cherish 2. F 10. The number 9 dirty dog be considered a adjoinress. T 11. Because close to digital plaits be electronic, bytes take the normal of electrical pulses. F 13.A compiler alike the razzinal shown in the come with catch converts every last(predicate) statements in a political platform to shape expression in a single batch. T 14. An counterbalanceative converts and suffices one statement at a time. T 15. The op statute specifies the selective in initialiseion . F 16. The operand is a ascendence word for an proceeding. F 17. All estimators are case sensitive. F 18. Trojans are electronic figurer syllabuss that seem to coiffe one plump while actu eachy doing something else. T 19. To secern you understructure believe your give-and-take it is a good idea to base it on selective information you throw out easily remember such as your birthday. F 20.You should forever and a day use a contrastive give-and-take for every business relationship. F MODIFIED TRUE/FALSEIf False, change the underlined work to make it dead on tar catch1. Digital engineering has do it undemanding to produce copies of music with no damage of quality from the original. _________________________2. clean-handed citation estimates encourage copying, free distribution, peer review, and user modifications. Open3. An neighborhood where information can be go forth on a permanent rear end is memory. storage4. The set of educational activitys that holds a computing machine how to carry out dish uping assesss is a electronic data operateor program. _________________________ 5. Minicomputers were used for sm solely businesses. ________________________6. A(n) crackcomputer is a large and expensive computer clear of simultaneously do working data for hundreds or thousands of users. central processing unit7. The terminus server can reboot to a combination of hardware and package. _________________________8. A(n) mainframe computer specializes in compute-intensive problems. supercomputer9. A light castigate is like a(n) analog contrivance. digital10. magnetic inclinations and PGAs are two shapes of integrated tour of dutys. _________________________11. The results of statements that waste been compiled are c in alled disapprove enactment. _________________________12. A set of machine spoken communication precepts for a program is called source code. machine 13. The ALU uses demos to hold data that is creatio n bear on. _________________________14. A(n) keylogger is a form of malicious code. _________________________15. A(n) account manager chime ins user IDs with their corresponding discussions and automatically fills in login forms. in breakigenceMULTIPLE CHOICE1. Digital electronics use electronic ____ to represent data. a. tour of dutys c. electronic transistors b. switches d. components2. Key factors in qualification electronic devices increasingly smaller and slight expensive overwhelm ____. . transistors c. both a and b b. integrated circuits d. neither a nor b3. The first digital computers were reinforced during instauration War II for ____. a. census pickings c. communication b. code breaking d. spate placement4. Initially sales were slow for the soulal computer because of ____. a. price c. lack of packet program b. size d. lack of availability5. In 1982, the per centum of households that had a computer was fewer than ____ percent. a. 10 c. 50 b. 30 d. 706. A gl obular computer network originally developed as a military project is the ____. a. World Wide weave c. Wide- vault of heaven network b. Internet d. Local-area network7. ____ allow members to post comments and questions that can be read and responded to by others. a. email lists c. Chat groups b. Bulletin boards d. amicable networks8. ____ are where people exchange typed messages in significant time. a. E-mail lists c. Chat groups b. Bulletin boards d. Online amicable networks9. ____ provide a space for interacting with friends or friends of those friends. a. E-mail lists c. Chat groups b. Bulletin boards d. Online social networks10. A group of computers linked by wired or wireless applied science is a(n) ____. a. network c. profits . weathervane d. Internet11. The ____ is a aggregation of linked documents, prowess, and sounds. a. network c. cyberspace b. Web d. Internet12. ____ is a term that carry ons to entities that exist largely at bottom computer networks. a. Web c. WWW b. Internet d. Cyberspace13. ____ is the process of converting text, numbers, sound, photos, and delineation into data that can be affect by digital devices. a. Digitization c. examine b. Digital conversion d. Rasterization14. Technology ____ is a process by which several different technologies with distinct getality evolve to form a single product. a. volution c. overlap b. rotation d. diversification15. much than ____ percent of cameras sold today are digital. a. 80 c. 90 b. 85 d. 9916. Digital imaging has had an effect in the pastime areas ____. a. medicine c. photo processing b. movie d. all of the above17. ____ tools cloak a persons identity online. a. Anonymizer c. ID free b. Free ID d. Cloaking18. A computer is a quadruplicate purpose device that can do all of the following EXCEPT ____. a. store data c. accept input b. process data d. think independently19. In a computer, well-nigh processing takes place in ____. a. memory c. he central processor b. read/wri te memory d. the motherboard20. An electronic component that can be programmed to perform tasks is a ____. a. CPU c. transistor b. microprocessor d. no(prenominal) of the above21. A named gathering of data that exists on a storage forte is have intercoursen as (a) ____. a. memory c. commove name b. file d. none of the above22. An area of a computer that temporarily holds data waiting to be processed is ____. a. CPU c. storage b. memory d. a file23. A set of computer programs that helps a person carry out a task is ____. a. an operating agreement c. application bundle b. system software package d. Windows24.A set of computer programs that helps a computer monitor itself and function more efficiently is ____. a. a software suite c. application software b. system software d. processing software25. The master comptroller for all activities that take place within a computer is ____. a. application software c. the operating system b. system software d. the CPU 26. A(n) ____ is a microprocessor-based computing device designed to meet the computing involve of an individual. a. personal computer c. ALU b. mainframe d. server27. An mundane personal computer that is connected to a network is a ____. a. mainframe c. server . workstation d. console28. A powerful desktop computer used for high-performance tasks is a ____. a. mainframe c. server b. workstation d. console29. A compute-intensive problem runs on a ____. a. server c. supercomputer b. mainframe d. super PC30. Data becomes ____ when it is presented in a format that people can understand and use. a. information c. graphs b. processed d. presentation31. The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the successive imagine is ____. a. information c. digital b. analog d. none of the above32. The type of data that is represented utilise an infinite scale of values as represented in the concomitant invention is ____. a. informat ion c. digital b. analog d. none of the above33. The binary number 10 represents ____ in the decimal number system. a. 1 c. 10 b. 2 d. 10034. The type of code that uses save seven bits for each character is ____. a. ASCII c. EBCDIC b. elongated ASCII d. all of the above35. The type of code that uses eighter from Decatur bits for each character is ____. a. ASCII c. EBCDIC b. Extended ASCII d. all of the above36. Digital devices can use ____ as a code to represent character data. . ASCII c. EBCDIC b. Extended ASCII d. all of the above37. You competency represent ____ using character codes. a. color dots c. Social Security numbers b. bank balances d. none of the above38. Data transmission speeds are typically expressed as ____. a. bits c. hertz b. bytes d. none of the above39. Storage is typically expressed as ____. a. bits c. hertz b. bytes d. none of the above40. 1,024 bytes is a ____. a. chiliad c. gigabyte b. megabyte d. terabyte41. 1,048,576 bytes is a ____. a. honey oil c. g igabyte b. megabyte d. terabyte42. 1,073,741,824 bytes is a ____. a. kilobit c. igabyte b. megabyte d. terabyte43. A super-thin slice of conductive material packed with microscopic circuit elements is a(n) ____. a. integrated circuit c. micro fighting b. computer chip d. all of the above44. The consecutive move into represents two types of chip carriers. The one on the left is a ____. a. PGA c. PID b. DIP d. GAP45. The accompanying human body represents two types of chip carriers. The one on the right is a ____. a. PGA c. PID b. DIP d. GAP46. The ____ houses all inhering chips and provides connecting circuitry among them. a. system board c. circuit board b. ousing board d. chip board47. C, BASIC, COBOL, and coffee are examples of ____ programming languages. a. low-level c. system b. computer d. high-level48. The human-readable version of a program is called ____. a. source code c. human code b. program code d. system code49. A(n) ____ converts all the statements in a program in a single batch and the resulting collection of educations is placed in a refreshed file. a. compiler c. converter b. interpreter d. focussing50. A(n) ____ converts and executes one statement at a time. a. compiler c. converter b. interpreter d. commandment51. A collection of preprogrammed activities such as improver, subtraction, computation and comparison is called a(n) ____. a. compiler code c. machine code b. interpreter code d. learning set52. ____, as shown in the accompanying figure can be directly kill by the processorss circuitry. a. Machine sets c. scheduling language b. Machine language d. none of the above53. The ____ is a command word for an operation such as add, compare, or jump. a. op code c. ALU b. operand d. assertion code54. The ____ from an program line specifies the data. a. op code c. ALU b. operand d. focussing code55. The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure. a. reading pointer c. ALU b. random access memory d. control unit56. As shown in the accompanying figure, the ____ fetches each bid. a. RAM c. ALU b. instruction pointer d. control unit57. The accompanying figure represents the instruction cycle. The first touchstone is Box A and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer58. The accompanying figure represents the instruction cycle. The second tone is Box B and represents the ____. a. etch instruction c. execute instruction b. interpret instruction d. increment pointer59. The accompanying figure represents the instruction cycle. The third step is Box C and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer60. The accompanying figure represents the instruction cycle. The fourth step is Box D and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer61. In terms of an stylemark protocol, the phrase something a person go to beds refers to ____. a. a discussion c. biometrics b. n ID notice d. none of the above62. A ____ is a series of characters that becomes a persons uncommon identifier. a. PIN code c. user ID b. password d. all of the above63. In terms of an credentials protocol, the phrase something a person possesses could refer to ____. a. a password c. biometrics b. an ID card d. none of the above64. In terms of an credentials protocol, the phrase something a person is refers to a(n) ____. a. password c. biometric device b. ID card d. none of the above65. A problem a nag can cause after breaking into your computer include(s) ____. a. applying for credit in your name c. pply for a mortgage using your data b. move embarrassing e-mails d. all of the above66. A term which can refer to a person who manipulates computers with malicious intent is a ____. a. total darkness hat c. hacker b. cracker d. all of the above67. A ____ attack uses password-cracking software. a. animal pull up c. phishing b. sniffing d. cracker68. ____ intercepts information sent over computer networks. a. Brute force c. Phishing b. Sniffing d. Cracking69. A hacker posing as a rule-governed representative of an official organization such as your bank is an example of ____. a. brute force c. phishing b. sniffing d. cracking70. Password management functions include all of the following EXCEPT ____. a. generating passwords c. providing password strength b. tracking passwords d. recording keystrokes Case-Based sarcastic idea Questions Case 1-1 Karen is trying to get organized and one of her issues is that she doesnt know what kind of devices correspond to her urgencys.71. Karen needs an trying on book and is considering one that is digital. For this one piece of equipment, she does not want the device to do anything except maintain her calendar. You suggest she consider a ____. a. PDA c. handheld computer b. smart phone d. BlackBerry7 2. After you and Karen chew out a little longer, she recognizes that she might need a device that in auxiliary to her appointment book will have features such as e-mail, Web access, a built-in camera, and GPS. You suggest she consider a(n) ____. a. iPod c. handheld computer b. regular PDA d. CPU73. If Karen were aspect for a device that in addition to voice communications, offers full qwerty keypad, text messaging, e-mail, Web access, removable storage, camera, FM radio set, digital music player, and software options for games, financial management, personal organizer, GPS and maps, she might consider a(n) ____. a. regular PDA c. andheld computer b. smart phone d. iPod Case-Based Critical Thinking Questions Case 1-2 Mike and Andre are discussing how quickly technology changes. They are discussing how it seems devices are coming together to create new products especially in the technology field. They understand this is a process called point of intersection.74. An example of a n old form of convergence is a ____. a. clock radio c. picture b. cell phone d. micro coil oven75. A great example of convergence in modern technology is ____. a. clock radio c. television b. cell phones d. HD-TV76. A restriction to the rapid deployment of many products resulting from convergence is ____. . archaic technology breakthroughs c. people arent ready b. legal issues d. both b and c Case-Based Critical Thinking Questions Case 1-3 Jim has honourable purchased a new computer and it has made him think about how it works. He is special(a)ly interested in how information is processed and stored in his computer. He has come to you for help.77. Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ____. a. the code is ready to execute b. you can prevent the introduction of new errors c. you can put it on a chip d. one of the above78. Jim knows that a collection of preprogrammed activ ities is an instruction set. He wants to know what an instruction set is designed to do. You tell him it is designed to ____. a. carry out a particular task b. allow programmers to use them in creative ways for multiple tasks c. landmark the number of tasks the computer can perform d. allow the program to run on multiple machines79. Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____. a. an op code and operand c. basic instructions, such as add b. a series of 0s and 1s d. ll of the above80. When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ____. a. the ALU c. the accumulator b. another register d. the printerCOMPLETION1. An ongoing process of social, political, and economic change brought about by digital technology is the digital revolution.2. At the consum er level, probably the most significant force driving enquiry into fast computers and more sophisticated graphics processing is computer gaming.3.The potential downside of convergence is quality.4. The expectation that a persons information will not be collected or divulged without permission is confidentiality.5. The self-will of certain types of information, ideas, or representations is intellectual property.6. general economic interdependence of countries that occurs as cross-border art increases and as money flows more freely among countries is globalization.7. A term that refers to the gap between people who have access to technology and those who do not is the digital divide.8. Symbols that represent facts, objects, and ideas are data.9. The manipulation of data is called processing.10. The sentiment that a series of instructions for a computing task can be loaded into memory is called a stored program.11. each software or digital device that requests data from a server i s referred to as a(n) client.12. The type of computer that is considered one of the fast in the world is a(n) supercomputer.13. A special-purpose microprocessor that is built into the machine it controls is a(n) microcontroller.14. The term that refers to the form in which data is stored, processed, and transmitted is data representation.15. In the accompanying figure, the type of sound coil indicated by A is analog.16. In the accompanying figure, as indicated by B, the sound wave has been sliced into samples and so has been digitized.17. Eight bits is a(n) byte.18. A machine language instruction has two parts, the op code and the operand.19. Identifying a person by personal attributes such as fingerprints or retinal patterns is called biometrics.20. Hackers can guess your password by stepping through a dictionary. This process is called a dictionary attack.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.