You are on page 1of 5

Review Questions (pg.

26; #1-40)
1.a) While a notebook computer are very portable and efficient because of their size, they still,
however, don’t have the options to improve their features and functions while a desktop can.
Power and desktop.
b) Portability, battery power and flexibility.
c) Tablet handles long-lasting batteries and wireless technology. Smaller & Portable.
d) Engineering and System Administrator.
e) Monitor health problems such as, heart rate and respiration flow.

2.a) Keyboard, mouse, scanner are used to enter data and instructions into the computer.
b) Monitors and printers display data, DVD RW, Disc driver and memory keys store data and
speakers communicate audio output.
c) Printers, webcams, and microphones are added to make a computer more versatile.
d) Serial port, parallel port, firewire, USB and bluetooth port.

3. Expansion boards - circuit boards that connect to motherboard to add functionality to the
computer.
CPU - the processor that processes the data that controls the flow of data between the
computers of the units.
ALU - perform arithmetic and logic operations.
Bus - a set of circuits that connects to CPU to other components that transform data between
CPU, memory, and other hardware devices on the motherboard.
Memory - stores data electronically. ROM contains more basic instructions and the RAM is
called primary or main memory where data and instructions are stored temporarily.

4. The data bus transfers data between the CPU, memory, and other hardware devices on the
motherboard. The address bus carries memory addresses that indicate where the data is
located and were the data should go. A control bus carries control signals.

5. It stores data so that it can be quickly retrieved by an application.

6.a) Application software - written to perform a specific task.


Operating software - allows the user to communicate with the computer.
b) Windows, Unix, and Linux.
c) A computer’s hardware and software configuration.
d) Platform.

7. Utility programs manage input and output, read and write to memory, manage the processor,
maintain system security, and manage files and disks. (Ex: antivirus software)

8. To share data with a different type of computer.

9.a) Low-level programming: Classified as first generation programming language.


High-level programming: Classified as third generation programming language.
b) Fortan, C and Basic.
c) Compiler - converts an entire program into machine code before the program is executed.
Interpreter - translates and executes an instruction before moving on to the next instruction in
the program.
d) OOP: allows programmers to create modules that can be used over and over again in a
variety of programs.

10. Network - allows users to reliably share and exchange date, can reduce costs by sharing
devices such as printers, provides communication tools such as e-mail for network users, and
simplifies file management through centralized software updates and file backups.

11.a) LAN (Local-Area Network) and WAN (Wide-Area Network).


b) WAN.

12.a) Software that allows users and devices to communicate over the network.
b) The software and hardware that make a network.

13. Peer-to-peer network: each computer on the network is considered equal in terms of
responsibilities and resource sharing.
Client/server network: consists of a group of computers, called clients, connected to a server.

14.a) Physical topology refers to the arrangement of the nodes on a network.


b) Node is a location on the network with a device capable of processing information, such as a
computer or a printer.
c) Star topology.
d) Ring topology.
e) Physical topology is interconnected with wires and cables. Logical topology is when every
node is connected to a common bus that runs from node to node.

15. All of above.

16. The binary system was adopted because the electrical circuits on an IC have one of two
states, off or on.

17.a) 11
b) (42)10

18. Every letter of an alphabet and symbols of every culture have been given a representation in
a digital code called Unicode.

19.a) 2,147,483,648 Bytes


b) 465.6 GB
20.a) When the number of bits that are needed to represent the integer is greater than the size
of four bytes.
b) Numbers that contain decimal points.
c) When there are not enough bits to store the mantissa.

21.a) The bits in text files represent characters, while the bits in binary files represent custom
data.
b) File types are distinguished by the extension that comes after the file name. An application
adds a unique extension to the files it creates.
c) So it is easy to map where everything is.

22. Mass storage and auxiliary storage. Both can be categorized in internal, such as a hard
disk, or external, such as a memory key and magnetic, optical, or solid state technology.

23. Keep magnetic media away from magnets, Handle CD/DVDs by the center hole or by the
edges, Store CD/DVDs in a jewel case or sleeve to prevent scratches.

24.a) Intranet: a network that is used by a single organization, such as a corporation or school,
and is only accessible by authorized users.
Extranet: extends an intranet by providing various levels of accessibility to authorized members
of the public.
b) The internet is not controlled by any one organization because it is the largest and most
widely accessed network and allows users worldwide to communicate in a matter of seconds.

25.a) Using a conventional modems is a problem because they have slow access time.
b) DSL: uses standard telephone lines with data transmission up to 640 Kbps.
Cable modem: transmits data through a coaxial cable television network.

26.a) E-mail or electronic mail.


b) It can be received in a matter of seconds, even if the recipient is located halfway around the
world.
c) juliapradhan.jp@gmail.com
Username: juliapradhan.jp
Host/Domain name: gmail
Top-level domain: .com
d) An email address and an email software.
e) Google

27.a) Emails should be thought of the same as sending a postcard because you are needed to
use manners. Include “please” and “thank you” and also properly address people you do not
know as Mr., Ms., Mrs., Dr., and so on. You need be concise and also be professional, which
includes using the proper spelling and grammar. Always re-read the message before hitting
sent.
b) Send messages though your account only. Use appropriate subject matter and language. Be
considerate of other people's beliefs and opinions.

28.a) Yahoo! ; Google ; MSN


b) Google because it’s more efficient and fluent (it’s quick to display specific web pages, and
highlights words and phrases)
c) The more specific the search criteria, the better the chance the information will be found.

29.a) Top 10 Best Miami Restaurants - Tripadvisor


b) Montreal Museum of Fine Arts
c) The Best 10 Women's Clothing in Langley BC - Yelp
d) What's the difference between a crocodile and an alligator - Crocodilians
e) Home | The Official James Patterson Site
f) Garbage in, garbage out - Wikipedia
g) George Washington, and Thomas Jefferson but not John Adams (Poptropica)
h) Florida Vacation - Not Orlando Area - Florida Forum - TripAdvisor

30. Downloadable files are often associated with viruses.

31.a) Is the information from sources known to be reliable?


Does the information provided have no grammatical errors or spelling mistakes?
Does the content appear to contain any evidence to bias?
Who is responsible for the contents of the page?
b) To give credit to the publisher, author or other researchers.
c) Perez, Tara. “Clewiston Kitesurfing”. EMC School. August 2, 2012.
http://www.emcschool.net/kitesurf/color.txt

32.a) The collection of data about consumers visiting a website is a marketing technique known
as online profiling.
b) A text file created by the server computer when a user enters information into a website.
c) Tiny, transparent graphics located on web pages or in e-mail messages that are used in
combination with cookies to collect data about web page users or email senders.
d) Usually the monitoring is done by an outside advertising company.

33. Ownership & Content, Membership & Registration, Instructor Resource Center, Student
Resource Center, Changes in Service, Links to Other Websites, Term & Termination,
Modifications of this Agreement, Permitted Use, Digital Millennium Copyright Act Compliance.

34. The Safety and Freedom through Encryption Act of 1999 (SAFE): gives Americans the
freedom to use any type of encryption to protect their confidential information.

35. Use appropriate language. Do not reveal personal address or phone numbers. Do not
access another user’s account.
36. Find out what caused it (interrogate them).

37.a) A court order.


b) These records may be transferred to other Government authorities for legitimate law
enforcement inquiries, in which event you will be notified after the transfer.

38.a) The illegal use or reproduction of data.


b) The future development of all software will be then jeopardized.
c) A program or series of instructions that can replicate without the user’s knowledge.
d) The act of sending an email to a user falsely claiming to be a legitimate business in an
attempt to trick the user into revealing personal information that could be used for crimes such
as identity theft.

39. An IT professional has responsibilities that relate to system reliability. System reliability
involves installing and updating appropriate software, keeping hardware working and up-to-date,
and maintaining databases and other forms of data.

40.a) F
b) T
c) F
d) F
e) T
f) F
g) T
h) T
i) F
j) F
k) T

You might also like