Name:     ID: 
 
Email: 

Introduction to Computers The Basics

True/False
Indicate whether the statement is true or false.
 

 1. 

A microphone can convert spoken words or sound information into a digital format.
 

 2. 

With a Web app, much of the program code for the software runs locally on a computer, instead of running on a remote computer connected to the Internet or other computer network.
 

 3. 

The coding scheme used by a computer depends on whether the data is numeric or character data.
 
 
nar001-1.jpg
 

 4. 

A digital image, like the one shown in the accompanying figure, is simply a list of the binary numbers for all the dots it contains.
 

 5. 

The higher the number of nanoseconds means the faster the RAM speed.
 

 6. 

A Trojan is designed to replicate itself and spread to other computers.
 

 7. 

A Remote Access Trojan allows hackers to transmit files to victims’ computers, search for data, run programs, and use a victim’s computer as a relay station for breaking into other computers.
 

 8. 

A security suite might include detecting intrusions into your wireless network.
 

 9. 

If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.
 

 10. 

A recovery disk contains a complete copy of your computer’s hard drive, including your data files and software you installed.
 
 
nar002-1.jpg
 

 11. 

In a network like the one in the accompanying figure, the network must have at least one client and one or more servers.
 

 12. 

Most routers are shipped with a predefined SSID set by the manufacturer.
 
 
nar003-1.jpg
 

 13. 

When typing a URL, you have to type http:// in the Address bar of the application shown in the accompanying figure.
 

 14. 

URLs cannot contain spaces.
 

 15. 

Although it is easy to copy text and graphics found on Web pages, you have to consider the rights of the originator of the content.
 

 16. 

Audio compression removes bits that are beyond the frequencies of normal hearing.
 

 17. 

A bitmap graphic has no fixed physical size.
 

 18. 

Linear editing uses a random-access device to hold both the original footage and finished video.
 
 
nar004-1.jpg
 

 19. 

The department shown in the accompanying figure determines an organization's information needs, as well as creates, maintains, and updates its information systems.
 

 20. 

A bachelor's degree in a computer-related area is a common requirement for most IT-related jobs.
 

Modified True/False
Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true.
 

 1. 

Digitization is the process of converting text, numbers, sound, photos, and video into data that can be processed by a computer. _________________________

 

 2. 

Memory is the area of a computer that holds data on a permanent basis when it is not immediately needed for processing. _________________________

 

 3. 

A touchpad is also called a(n) trackball. _________________________

 

 4. 

A(n) multiple-user license is priced per copy and allows a specific number of copies to be used at the same time. _________________________

 

 5. 

The Mac OS X operating system is distributed under the terms of a GPL. _________________________

 

 6. 

Adobe Photoshop is an example of drawing software. _________________________

 

 7. 

Each 0 or 1 is a(n) byte. _________________________

 

 8. 

An example of numeric data includes your telephone number. _________________________

 

 9. 

The word byte can be abbreviated as b. _________________________

 

 10. 

Software failure can be caused by a(n) worm, which is a flaw in the program code or design. _________________________

 

 11. 

A(n) differential backup makes a backup of the files that were added or changed since the last backup. _________________________

 

 12. 

Using a(n) router instead of a hub can increase a network’s performance and security. _________________________

 

 13. 

A(n) workgroup is a group of computers that communicate with each other to share resources on a network. _________________________

 

 14. 

A packet stuffer is a computer program that monitors data as it travels over networks. _________________________

 

 15. 

A computer's multimedia card has audio-processing circuitry that transforms the bits stored in an audio file into music, sound effects, and narration. _________________________

 

 16. 

A pixel appears white if its color values are (255, 255, 255). _________________________

 

 17. 

Data compression is based on a compression ratio. _________________________

 

 18. 

A(n) DVR is the software that compresses a video stream when the video is stored and decompresses the file when the video is played. _________________________

 

 19. 

Workers in many industries prefer to geolocate, which means that they use technology to work from home or another off-site location _________________________

 

 20. 

Offshoring is when companies hire workers from foreign countries. _________________________

 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The main processor in a computer is called the ____.
a.
GUI
c.
LAN
b.
CPU
d.
PC
 

 2. 

A mouse can either be connected to the computer using wires or cables, or can be ____.
a.
peripheral
c.
a stylus
b.
external
d.
wireless
 

 3. 

Two key components of a computer display system are a monitor and a(n) ____ card.
a.
sound
c.
printer
b.
graphics
d.
LCD
 

 4. 

Solid-state storage cards require a device called a card ____ to transfer data to or from a computer.
a.
drive
c.
folder
b.
reader
d.
slot
 

 5. 

Which step comes first in the boot process?
a.
Start bootstrap program.
c.
Identify peripheral devices.
b.
Power up.
d.
Load operating system.
 

 6. 

The term ____ was coined to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate.
a.
World Wide Web
c.
hypertext
b.
hyperlinks
d.
Web site
 

 7. 

Whether they are text or graphics, ____ provide the fundamental tools for navigating Web pages or causing some other action to happen.
a.
tags
c.
ActiveX controls
b.
cookies
d.
links
 

 8. 

____ sound is artificially created.
a.
Digital
c.
Analog
b.
Binary
d.
Synthesized
 

 9. 

A ____ monitors computer performance, installs software patches and upgrades, performs backups, and restores data.
a.
computer operator
c.
network specialist
b.
computer programmer
d.
database administrator
 

 10. 

A ____ troubleshoots hardware and software problems.
a.
computer operator
c.
database administrator
b.
technical support specialist
d.
manufacturing technician
 

Completion
Complete each statement.
 

 1. 

A(n) ____________________ is a common input device designed to move and select on-screen graphical objects and controls.
 

 

 2. 

When you turn on a computer, you start the ____________________ process.
 

 

 3. 

The three main operating systems today are Windows, Mac OS, and ____________________.
 

 

 4. 

One of the biggest security threats to your computer is the result of malicious code, called ____________________.
 

 

 5. 

An email with a dire warning about a new virus is usually a virus ____________________.
 

 

 6. 

Each connection point on a network is referred to as a(n) ____________________.
 

 

 7. 

Computers on the Internet communicate with each other by following certain rules, known as ____________________.
 

 

 8. 

The ____________________ is a collection of documents that are accessed over the Internet and are interconnected by links.
 

 

 9. 

A Web ____________________ is a computer that uses special software to transmit Web pages over the Internet.
 

 

 10. 

A computer ____________________ is any person who designs, configures, analyzes, develops, tests, or ensures the security of computer hardware or software.
 

 



 
         Start Over