You are on page 1of 9

1.

a) Describe a situation where a desktop computer might be preferred over a notebook


computer.

Office Job!

b) List three advantages of purchasing a notebook computer instead of desktop computer.

Portable, more accessible and cheaper.

c) Describe a situation or user that would prefer tablet PC over a notebook computer.

If you work an on-the--go job.

d) Describe two occupations where it would be useful to have a hand-held computer.

Mechanics and doctor

e) Describe how wearable computers are used in the healthcare industry.

To monitor health problems

2. a) List and compare three input devices.

Microphone, keyboard, mouse.

b) List and compare three output devices.

Headphones, speakers, monitor

c) List and describe two peripheral devices.

Printer and webcam

d) List three types of ports.

USB, HDMI, VGA

3. List and describe five components found on the motherboard.

Expansion boards, CPU, RAM, bus and ICs

4. Describe the flow of data between the components of a computer, starting with input.

Input Memory Output



CPU

5. What is cache memory used for?


Store frequently used data so it can be retrieved quickly

6. a) Describe one difference between operating system software and applications software.

Operating system software allows applications to work

b) List three different operating systems.

Mac OS, Windows OS and Linux OS.

c) What does environment refer to?

The workplace

d) What is another word for environment?

Workplace

7. What is a utility program? Give an example.

Manage input and output. Device Driver

8. Why is cross-platform connectivity important to many computer users?

It allows them to link and show data with different computers.

9. a) What is the difference between low and high level programming languages?

High level programming is easier to read then low level

b) List three high-level programming languages.

C, C++ and BASIC

c) What is the difference between a compiler and an interpreter?

A compiler searches all the errors of a program and lists them while a interpreter checks
the errors of a program statement by statement.

d) List an advantage of using an object-oriented programming language.

You can reuse/recycle the code

10. List four benefits of using a network.

Allows users to reliably share and exchange data, can reduce costs by sharing devices,
provides communication tools and simplifies file management

11 a) What are the two common size classifications for networks?


LAN and WAN

b) What size classification is used to connect devices over large geographical distances?

WAN

12. a) What is a network operating system?

Referred to as NOS it can be shared

b) What does a network environment refer to?

Allows users to share

13. Describe two common network architecture models.

Peer-to-peer and client/server

14. a) What does physical topology refer to?

An arrangement of nodes on a network.

b) What is a node?

A location on a network with a device capable of processing information.

c) Which topology uses a hub?

LAN using star topology.

d) Which topology connects each node to form a closed loop?

LAN using a ring topology

e) What is the difference between physical and logical topology?

Physical topology uses physical devices and logical is the act of transferring data
between nodes.
.
15. Which netiquette rules apply in your classroom?

Antipodal

16. Explain why the binary number system was adopted for use in computers.

Electrical circuits on an IC have one of two states on or off or 0/1


17. a) What is the decimal equivalent of 10112?

4170

b) What is the decimal equivalent of 2A ?16

43

18. What is Unicode?

Unicode is an encoding standard for use with different languages and scripts

19. a) How many bytes of data can 2GB of RAM store?

2,147,483,648B

b) How many bytes of data can a 500GB hard drive store?

5e+11

20. a) When would an overflow error occur?

Occurs when the computer attempts to handle a number that is too large for it.

b) What are real numbers?

Real number is a value that represents a quantity along a line.

c) When would a round off error occur?

21. a) What is the difference between a text file and a binary file?

Text is just a message while binary is coding which can then be used to program

b) Explain how an extension distinguishes file types.

Changes the files

c) Describe how organizing your files into folders would help keep you organized.

Because you can then be more effective in choosing where to go

22. List two ways storage devices can be classified and give an example of a storage device in
each category.
Internal and removable. Hard disk and CDs

23. List four rules that should be followed to avoid damaging files stored on disks or CD/DVDs.

Keep magnetic media away from magnets, hand CD/DVDs by the center, store
CD/DVDs in a jewel case or sleeve, and keep media away from moisture.

24. a) What is the difference between an intranet and an extranet?

Extranet allows to talk with customers whilst intranet allows to talk with colleagues

b) Who controls the Internet?

The internet provider

25 a) What problem is associated with using a conventional modem?

Slow access times

b) Describe the differences between a DSL modem and a cable modem.

DSL uses phone lines and cable modem used television lines

26. a) What is the most widely used Internet


service?

The World Wide Web

b) List one benefit of email over standard mail.

They can be sent or received in a matter of seconds.

c) Write your email address and label the parts of the address.

pingumeep7@gmail.com

Username Host top-level domain

d) That are the two requirements for sending and receiving email messages?

Having a email address and internet.

e) List one example of a browser-based email site.

Gmail.

27. a) Explain why sending an email message should be thought of the same as sending a
postcard.
Because it is to send a message and has the same purpose as a postcard

b) Discuss with a partner and then summarize issues that could occur if email etiquette is not
followed in the workplace.

It could come across as rude to the receiving end

28. a) List three commonly used search engines.

Yahoo Google and MSN

b) Which search engine do you prefer to use, and why?

Google because it is the best!

c) Describe the importance of using effective search criteria.

Better chance at finding the information

29. Write search criteria to locate web pages that contain the following information:

a) Restaurants in Miami

b) Art museums in Montreal, Canada


c) Clothing stores in your city


d) Alligators, but not crocodiles


e) The author James Patterson


f) The phrase garbage in garbage out


g) George Washington and John Adams, but not Thomas Jefferson


h) Travel to Florida, but not Orlando


30. Why should files only be downloaded from authentic sites?

You could get viruses from third party sites.


31. a) List four questions to answer when evaluating a website source.

Is it cited? Is it a good source? How credible is it? What is the privacy policy?

b) Why is it necessary to cite sources?

So you know where you got the information

c) On August 2, 2012 you accessed a posting on the Clewiston Kite Surfing discussion list at
http://www.emcschool.net/kitesurf/color.txt. The posting was made by Tara Perez on the topic of
kite colors. Write a citation for a research paper that quotes Taras posting.

Perez Tara Kite Surfing Kite colors emcschool.net August 2


2012 http://www.emcschool.net/kitesurf/color.txt

32. a) What is online profiling?

Allows users to record online behavior

b) What is a cookie?

A small ad sometimes downloading things and sending cache back and forth.

c) What is a web beacon?

Sometimes a small photo that sends cookies to your computer as a combination

d) Who usually monitors the information collected by web beacons?

Maybe someone who wants personal info and or a web industry wanting revenue

33. Locate a websites privacy policy and document its contents.

http://imgur.com/privacy

34. Name and briefly describe one law that helps protect the privacy of an individual.

ECPA makes it a crime to access electronic data without authorization

35. List three reasons why many schools have developed an Acceptable use Policy.

So people are still restricted, so kids cant try to use a school computer for illegal
purposes and so they have access to things they might not have at home

36. What can you do if you are turned down for credit at a bank and believe that the data used
to deny credit is inaccurate?
Ask to see the files.

37 a) What is necessary for a federal government authority to access an individual's financial


records?

The IRS can access your financial records on what is called an administrative summons
issued to your bank or financial institution. It doesn't have to go through the courts.

b) What must a financial institution do after releasing an individuals records?

Notify the individual who has had access to them.

38. a) What is copyright infringement?

Copyright infringement is the use of works protected by copyright law without


permission.

b) Why is computer piracy such a concern to software developers?

It causes them to lose money.

c) What is a computer Virus?

A virus is a program or series of instructions that can replicate without use knowledge.

d) Describe phishing.

The act of sending an email to a user falsely claiming to be a legitimate business.

39. What ethical responsibilities does an IT professional have?

To keep computer software updated as well as help colleagues who may be having a
issue with a hardware/software issue

40. Determine if each of the following are true or false. If false, explain why.

a) Software refers to the physical components of the computer.

False

b) Linux is an operating system.

True

c) a utility program has one clearly defined task.

False
d) Assembly language is a high-level programming language.

True

e) A WAN connects devices over large geographical distances.

True

f) A peer-to-peer network has a server.

False

g) The binary number system uses only 1s and 0s.

True

h) A conventional modem transmits data faster than a cable modem.

False

i) An e-mail address is required to send e-mail messages.

True

k) Ergonomics is the science that studies safe work environments.

True

You might also like