True/False Indicate whether the
statement is true or false.
|
|
1.
|
A microphone can convert spoken words or sound information into a digital
format.
|
|
2.
|
With a Web app, much of the program code for the software runs locally on a
computer, instead of running on a remote computer connected to the Internet or other computer
network.
|
|
3.
|
The coding scheme used by a computer depends on whether the data is numeric or
character data.
|
|
|
|
|
4.
|
A digital image, like the one shown in the accompanying figure, is simply a list
of the binary numbers for all the dots it contains.
|
|
5.
|
The higher the number of nanoseconds means the faster the RAM speed.
|
|
6.
|
A Trojan is designed to replicate itself and spread to other computers.
|
|
7.
|
A Remote Access Trojan allows hackers to transmit files to victims’
computers, search for data, run programs, and use a victim’s computer as a relay station for
breaking into other computers.
|
|
8.
|
A security suite might include detecting intrusions into your wireless
network.
|
|
9.
|
If a pop-up ad for a security suite opens on your computer, you should click on
it to install the software.
|
|
10.
|
A recovery disk contains a complete copy of your computer’s hard drive,
including your data files and software you installed.
|
|
|
|
|
11.
|
In a network like the one in the accompanying figure, the network must have at
least one client and one or more servers.
|
|
12.
|
Most routers are shipped with a predefined SSID set by the manufacturer.
|
|
|
|
|
13.
|
When typing a URL, you have to type http:// in the Address bar of the
application shown in the accompanying figure.
|
|
14.
|
URLs cannot contain spaces.
|
|
15.
|
Although it is easy to copy text and graphics found on Web pages, you have to
consider the rights of the originator of the content.
|
|
16.
|
Audio compression removes bits that are beyond the frequencies of normal
hearing.
|
|
17.
|
A bitmap graphic has no fixed physical size.
|
|
18.
|
Linear editing uses a random-access device to hold both the original footage and
finished video.
|
|
|
|
|
19.
|
The department shown in the accompanying figure determines an
organization's information needs, as well as creates, maintains, and updates its information
systems.
|
|
20.
|
A bachelor's degree in a computer-related area is a common requirement for
most IT-related jobs.
|
Modified True/False Indicate
whether the statement is true or false. If false, change the identified word or phrase to make the
statement true.
|
|
1.
|
Digitization is the process of converting text, numbers, sound, photos,
and video into data that can be processed by a computer. _________________________
|
|
2.
|
Memory is the area of a computer that holds data on a permanent
basis when it is not immediately needed for processing. _________________________
|
|
3.
|
A touchpad is also called a(n) trackball.
_________________________
|
|
4.
|
A(n) multiple-user license is priced per copy and allows a specific
number of copies to be used at the same time. _________________________
|
|
5.
|
The Mac OS X operating system is distributed under the terms of a GPL.
_________________________
|
|
6.
|
Adobe Photoshop is an example of drawing software.
_________________________
|
|
7.
|
Each 0 or 1 is a(n) byte. _________________________
|
|
8.
|
An example of numeric data includes your telephone number.
_________________________
|
|
9.
|
The word byte can be abbreviated as b. _________________________
|
|
10.
|
Software failure can be caused by a(n) worm, which is a flaw in the
program code or design. _________________________
|
|
11.
|
A(n) differential backup makes a backup of the files that were added or
changed since the last backup. _________________________
|
|
12.
|
Using a(n) router instead of a hub can increase a network’s
performance and security. _________________________
|
|
13.
|
A(n) workgroup is a group of computers that communicate with each other
to share resources on a network. _________________________
|
|
14.
|
A packet stuffer is a computer program that monitors data as it travels
over networks. _________________________
|
|
15.
|
A computer's multimedia card has audio-processing circuitry that
transforms the bits stored in an audio file into music, sound effects, and narration.
_________________________
|
|
16.
|
A pixel appears white if its color values are (255, 255, 255).
_________________________
|
|
17.
|
Data compression is based on a compression ratio.
_________________________
|
|
18.
|
A(n) DVR is the software that compresses a video stream when the video is
stored and decompresses the file when the video is played. _________________________
|
|
19.
|
Workers in many industries prefer to geolocate, which means that they use
technology to work from home or another off-site location _________________________
|
|
20.
|
Offshoring is when companies hire workers from foreign countries.
_________________________
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
The main processor in a computer is called the ____.
|
|
2.
|
A mouse can either be connected to the computer using wires or cables, or can be
____.
a. | peripheral | c. | a stylus | b. | external | d. | wireless |
|
|
3.
|
Two key components of a computer display system are a monitor and a(n) ____
card.
a. | sound | c. | printer | b. | graphics | d. | LCD |
|
|
4.
|
Solid-state storage cards require a device called a card ____ to transfer data
to or from a computer.
a. | drive | c. | folder | b. | reader | d. | slot |
|
|
5.
|
Which step comes first in the boot process?
a. | Start bootstrap program. | c. | Identify peripheral
devices. | b. | Power up. | d. | Load operating system. |
|
|
6.
|
The term ____ was coined to describe a computer system that could store literary
documents, link them according to logical relationships, and allow readers to comment and
annotate.
a. | World Wide Web | c. | hypertext | b. | hyperlinks | d. | Web site |
|
|
7.
|
Whether they are text or graphics, ____ provide the fundamental tools for
navigating Web pages or causing some other action to happen.
a. | tags | c. | ActiveX controls | b. | cookies | d. | links |
|
|
8.
|
____ sound is artificially created.
a. | Digital | c. | Analog | b. | Binary | d. | Synthesized |
|
|
9.
|
A ____ monitors computer performance, installs software patches and upgrades,
performs backups, and restores data.
a. | computer operator | c. | network specialist | b. | computer programmer | d. | database
administrator |
|
|
10.
|
A ____ troubleshoots hardware and software problems.
a. | computer operator | c. | database administrator | b. | technical support
specialist | d. | manufacturing
technician |
|
Completion Complete each
statement.
|
|
1.
|
A(n) ____________________ is a common input device designed to move and select
on-screen graphical objects and controls.
|
|
2.
|
When you turn on a computer, you start the ____________________ process.
|
|
3.
|
The three main operating systems today are Windows, Mac OS, and
____________________.
|
|
4.
|
One of the biggest security threats to your computer is the result of malicious
code, called ____________________.
|
|
5.
|
An email with a dire warning about a new virus is usually a virus
____________________.
|
|
6.
|
Each connection point on a network is referred to as a(n)
____________________.
|
|
7.
|
Computers on the Internet communicate with each other by following certain
rules, known as ____________________.
|
|
8.
|
The ____________________ is a collection of documents that are accessed over the
Internet and are interconnected by links.
|
|
9.
|
A Web ____________________ is a computer that uses special software to transmit
Web pages over the Internet.
|
|
10.
|
A computer ____________________ is any person who designs, configures, analyzes,
develops, tests, or ensures the security of computer hardware or software.
|