Download CIS201_Chapter1_Review True/False Indicate whether the

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Supercomputer wikipedia , lookup

Computer cluster wikipedia , lookup

Transcript
CIS201_Chapter1_Review
True/False
Indicate whether the statement is true or false.
____
1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer
without understanding the technical details of how a computer works.
____
2. Computer literacy is the knowing about and understanding computers and their uses.
____
3. A computer does not always do whatever the instructions, or program, tell it to do.
____
4. Information processing is a vital activity today because the success of many businesses depends heavily on
the wise use of information.
____
5. The slide rule is considered by many to be the earliest recorded calculating device.
____
6. Fourth-generation computers witnessed the development of computer networks, wireless technologies, and
the Internet.
____
7. The external hardware components are located inside the main box or system unit of the computer.
____
8. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD
discs, or flash memory cards.
____
9. To begin to use a computer, the user first turns on the power by pressing the power button, and then the
computer displays a prompt for the user to decide the next course of action.
____ 10. There are application programs that help users write their own programs using a programming language.
____ 11. In addition to hardware, software, data, and procedures, the fifth major component of a computer system are
codes.
____ 12. Systems analysts design computer systems to be used within their companies.
____ 13. The accompanying figure shows a notebook computer.
____ 14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and
keyboard.
____ 15. Tablet PCs can use either a slate or a convertible tablet PC design.
____ 16. A mainframe computer is the standard choice for large organizations that need to manage large amounts of
centralized data.
____ 17. Many networks use a network server to manage the data flowing through the network devices and the
resources on a network.
____ 18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a Web
browser to view Web pages.
____ 19. Most browsers maintain a History list, which is a record of all Web pages visited in the last few weeks.
____ 20. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages
between computers over a network—usually the Internet.
Modified True/False
Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true.
____ 21. Wireless networking has added to the convenience of home computing, allowing the use of computers in
places other than traditional locations, such as a home office. _________________________
____ 22. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs
operations on that data, presents the results, and can store the data or results as needed.
_________________________
____ 23. A user inputs data into a computer, and then the computer processes it. _________________________
____ 24. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical machine
that could read slide rules. _________________________
____ 25. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output,
and magnetic disks and optical discs for storage. _________________________
____ 26. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to launch
programs. _________________________
____ 27. Computer programmers, or end users, are the people who use a computer to obtain information.
_________________________
____ 28. Communications hardware includes modems, which are used to connect a computer to the Internet and
network projectors, which are used to connect a computer to a computer network.
_________________________
____ 29. Multiple computing typically refers to accessing Web-based applications and data using a personal computer,
mobile phone, or any other Internet-enabled device. _________________________
____ 30. The Web is the largest and most well-known computer network in the world. _________________________
____ 31. IP addresses and their corresponding domain names are used to identify computers available through the
Internet. _________________________
____ 32. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for
the computer that will be handling that person’s e-mail (called a mail server). _________________________
____ 33. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain
social security numbers or other information needed for identity theft. _________________________
____ 34. A(n) acronym is an online world that users can explore. _________________________
____ 35. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all
types of communications today. _________________________
Completion
Complete each statement.
36. Computers and traditional devices we use everyday have begun to ____________________ into single units
with multiple capabilities.
37. ____________________ are regular appliances with some type of built-in computer technology.
38. ____________________ is a common alternative to traditional classroom learning that allows students to
participate from their current location, instead of physically going to the educational institution.
39. An emerging payment option is the use of ____________________ systems—systems that allow individuals
to pay for products and services via a mobile phone or other portable device.
40. Consumer ____________________ are small self-service computer-based stations, such as ATM machines,
bridal registries, and ticketing systems.
41. The ____________________ being used with a computer determine the tasks the computer is able to perform.
42. The progression of input, processing, output, and storage is sometimes referred to as the
____________________ cycle or the information processing cycle.
43. ____________________—technically an input or output operation, depending on which direction the
information is going—is increasingly considered the fifth primary computer operation.
44. The first computers were powered by thousands of ____________________ that needed replacing constantly,
required a great deal of electricity, and generated a lot of heat.
45. One common opinion is that fifth-generation computers will be based on ____________________, allowing
them to think, reason, and learn.
46. The physical parts of a computer are collectively referred to as ____________________.
47. HTML is called a(n) ____________________ or scripting language.
48. ____________________ are computer professionals whose primary job responsibility is to write the
programs that computers use.
49. Some midrange servers consist of a collection of individual ____________________ called blades.
50. Typically, individual users connect to the Internet by connecting to computers belonging to a(n)
____________________.
51. ISP computers are continually connected to a larger network, called a regional network, which, in turn, is
connected to one of the major high-speed networks within a country, called a(n) ____________________.
52. The World Wide Web refers to one resource—a collection of documents called ____________________—
available through the Internet.
53. One of the most common online security risks today is your PC becoming infected with (a)
____________________.
54. By their very nature, online communications lend themselves to ____________________. Since recipients
usually do not hear senders’ voices or see their handwriting, it is difficult to know for sure who the sender is.
55. A(n)____________________ would be used for applications that require extraordinary speed, accuracy, and
processing capabilities—for example, sending astronauts into space, controlling missile guidance systems and
satellites, forecasting the weather, exploring for oil, and assisting with some kinds of scientific research.