Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
CIS201_Chapter1_Review True/False Indicate whether the statement is true or false. ____ 1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works. ____ 2. Computer literacy is the knowing about and understanding computers and their uses. ____ 3. A computer does not always do whatever the instructions, or program, tell it to do. ____ 4. Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information. ____ 5. The slide rule is considered by many to be the earliest recorded calculating device. ____ 6. Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet. ____ 7. The external hardware components are located inside the main box or system unit of the computer. ____ 8. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards. ____ 9. To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action. ____ 10. There are application programs that help users write their own programs using a programming language. ____ 11. In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes. ____ 12. Systems analysts design computer systems to be used within their companies. ____ 13. The accompanying figure shows a notebook computer. ____ 14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard. ____ 15. Tablet PCs can use either a slate or a convertible tablet PC design. ____ 16. A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data. ____ 17. Many networks use a network server to manage the data flowing through the network devices and the resources on a network. ____ 18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a Web browser to view Web pages. ____ 19. Most browsers maintain a History list, which is a record of all Web pages visited in the last few weeks. ____ 20. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network—usually the Internet. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 21. Wireless networking has added to the convenience of home computing, allowing the use of computers in places other than traditional locations, such as a home office. _________________________ ____ 22. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________ ____ 23. A user inputs data into a computer, and then the computer processes it. _________________________ ____ 24. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules. _________________________ ____ 25. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and magnetic disks and optical discs for storage. _________________________ ____ 26. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to launch programs. _________________________ ____ 27. Computer programmers, or end users, are the people who use a computer to obtain information. _________________________ ____ 28. Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________ ____ 29. Multiple computing typically refers to accessing Web-based applications and data using a personal computer, mobile phone, or any other Internet-enabled device. _________________________ ____ 30. The Web is the largest and most well-known computer network in the world. _________________________ ____ 31. IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________ ____ 32. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person’s e-mail (called a mail server). _________________________ ____ 33. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________ ____ 34. A(n) acronym is an online world that users can explore. _________________________ ____ 35. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of communications today. _________________________ Completion Complete each statement. 36. Computers and traditional devices we use everyday have begun to ____________________ into single units with multiple capabilities. 37. ____________________ are regular appliances with some type of built-in computer technology. 38. ____________________ is a common alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to the educational institution. 39. An emerging payment option is the use of ____________________ systems—systems that allow individuals to pay for products and services via a mobile phone or other portable device. 40. Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems. 41. The ____________________ being used with a computer determine the tasks the computer is able to perform. 42. The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle. 43. ____________________—technically an input or output operation, depending on which direction the information is going—is increasingly considered the fifth primary computer operation. 44. The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great deal of electricity, and generated a lot of heat. 45. One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think, reason, and learn. 46. The physical parts of a computer are collectively referred to as ____________________. 47. HTML is called a(n) ____________________ or scripting language. 48. ____________________ are computer professionals whose primary job responsibility is to write the programs that computers use. 49. Some midrange servers consist of a collection of individual ____________________ called blades. 50. Typically, individual users connect to the Internet by connecting to computers belonging to a(n) ____________________. 51. ISP computers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the major high-speed networks within a country, called a(n) ____________________. 52. The World Wide Web refers to one resource—a collection of documents called ____________________— available through the Internet. 53. One of the most common online security risks today is your PC becoming infected with (a) ____________________. 54. By their very nature, online communications lend themselves to ____________________. Since recipients usually do not hear senders’ voices or see their handwriting, it is difficult to know for sure who the sender is. 55. A(n)____________________ would be used for applications that require extraordinary speed, accuracy, and processing capabilities—for example, sending astronauts into space, controlling missile guidance systems and satellites, forecasting the weather, exploring for oil, and assisting with some kinds of scientific research.