Vous êtes sur la page 1sur 6

Chapter1

Critical thinking
1) a) Desktops have an entire CPU(Central Processing Unit) that is
contained in a single computer chip.
b) 1. Long lasting batteries
2. Wireless technology
3. Includes wearable computers
c) When traveling to other countries
d) When working as a construction worker or a grocery store member.
e) Help monitor heart rates and respiration flow.
2) a) Keyboard inputs letters and numbers, mouse inputs where you want
to click, and microphones inputting sound.
b) Printers outputs the work youve just done, monitors outputs what
youve done, and flash-drives outputs memory.
c) Peripheral devices are webcams and microphones that make the
computer more versatile.
d) 1) Bluetooth
2) fire-wire
3) USB
3) 1. Center Processing Unit(CPU) processes data and controls the flow
between the computers other units.
2. Expansion boards are circuit boards that connect to the
motherboard to add functionality to the computer
3. A bus is a set of circuits that connect the CPU to other components.
4. Arithmetic Logic Unit(ALU) can perform arithmetic and logic
operations.
5. Integrated Circuits(IC) stores data electronically.
4) The flow of data starts with the input- memory- CPU- memory- output, all
data flows through the CPU.
5) Cache memory is high speed memory used to store frequently used data
so that it can be quickly retrieved by an application.
6) A) Application software is program written to perform a specific task
Operating system is a software that allows the user to communicate with
the computer. Types include multiuser, multiprocessing, multitasking,
multithreading, or real time.
B) 1. Windows
2. Mac OS X

3. Unix
C) A computers hardware and software configuration. Also referred to as
platform.
D) Environment types include desktop, multiuser, network, handheld,
distrusted, multiprocessing, and multitasking.
7) A program run by the operating system to manage input and output, read
and write to memory. An example is a device driver for printing, viewing
graphics, using a CD/DVD drive.
8) Because it has the ability of one type of PC to link to and share data with a
different type of PC.
9) A) Low-level programming languages include machine language and
assemble language. High-level programming languages have English-like
instructions and are easier to use then machine language.
B) Fortran, C, Basic, COBOL, and Pascal.
C) Compiler is a program that converts an entire program into machine
code before the program is executed. A interpreter is a program that
translates and executes an instruction before moving on to the next
instruction in the program.
D) Allows programmers to create modules that can be used over and over
again in a variety of programs.
10) 1. Allows users to reliably share and exchange data.
2. Offers security options including password protection to restrict
access to certain files
3. Provides communication tools such as e-mail for network users.
4. Simplifies file management through centralized software updates and
file backups.
11) A) MAN(Metropolitan Are Network) and HAN(Home Area Network).
B) WAN(Wide-Area Network)
12) A) A software that allows users and devices to communicate over a
network.
B)
13) A peer-to-peer is a type of network that doesnt have a server. And a
client is a computer that is sent information from a server computer.
14) A) A Physical topology refers to the arrangement to the nodes on a
network.

B) A node is a location on a network capable of processing information,


such as a computer or a printer.
C) A star topology uses a hub.

D) A ring topology connects each node to form a closed loop.


E) Physical topology refers to the arrangement of the nodes on a network
and logical topology refers to the way data is past between the nodes on the
network.
15) -Do not attempt to access the account of another user without
authorization.
-Do not share your password, and change it periodically.
-use appropriate subject matter and language, and be considerate of
other peoples beliefs and opinions.
16) The electrical circuits on an integrated circuit have one of two states, off
or on. Therefore, the binary number system (base2), which uses only two
digits (0and1), was adopted for use in computers. Numbers and letters are
represented with a code that consists of eight binary code is called a bit
(Binary digit) and an 8-bit unit is called byte.
17) A) The decimal equivalent of 1011 is 11.
B) The decimal equivalent of 2A is 42.
18) Unicode is a digital code that can be used to represent every letter of an
alphabet and symbols of every culture (=, @, and so on). Unicode uses a set
of sixteen 1s and 0s to form a 16-bit binary code for each symbol.
19) a. 2 GB of RAM can store 2,147483,640bytes of data.
b. A500 GB hard drive can store 536,870,190,000bytes of data
20) A. An overflow error occurs when the number of bits that are needed to
represent the integer is greater then the size of four bytes.
b. Real numbers are numbers that contain decimal points.
c. A roundoff error occurs when there are not enough bits to store the
mantissa.
21) a. Human-readable files are called text files, and computers-readable
files are called binary files.
b. An application adds a unique file name extension to the files it creates
making it possible to distinguish between file types. For example, a DOCX file
is created in Microsoft word.

c. Organizing files into folders is considered a good practice because it


keeps related files together.
22) Storage devices can be classified as internal and external. A hard disk is
typically an internal device but can also be external. A keychain or memory
stick is an example of an external storage device.
23) Four rules that should be followed to avoid damaging files stored on disk
or CD/DVDs are:
- keep media away from food.
- keep magnetic media away from magnets.
- Handle CD/DVDs by the center hole or by the edges.
- Keep media away from moisture and extreme temperatures.
24) a. An intranet is a network that is used by a single organization, such as
a corporation or school, and only accessible by authorization users. An
extranet is an extended intranet that provides various levels of access to
authorized members of the public.
b. No one person or organization controls the internet.
25) a. A problem associated with conventional modems is slow access time.
b. A DSL modem uses standard telephone lines and a cable modem uses
a coaxial cable instead of analog phone lines.
26) a. The most widely used internet service is the World Wide Web (WWW).
b. One benefit of e-mail over standard mail is that e-mail can be
received in a matter of seconds, even if the recipient is located half way
around the world.
c. For the e-mail address student@Ipdatafiles.com, student is the user
name, Ipdatafiles is the host or domain name com is the top-level
domain.
d. An e-mail address and e-mail software are required for sending and
receiving e-mail messages.
e. Hotmail! is an example of a browser-based e-mail site.
27) a. E-mail messages are not private and are easily accessible for others to
read, similar to how a postcard.
b. Issues that could occur if e-mail etiquette is not followed in the
workplace:
- E-mail messages could be misinterpreted.
- E-mail messages could offend recipients.

28) a. Yahoo!, Google, and Excite are three commonly used search engines.
b. I prefer to use Yahoo! Because I like the option of using directories or
subject trees that Yahoo! offers.
29) a. Restaurants +Miami
b. Art +museum +Montreal +Canada
c. clothing stores +Vancouver
d. Alligators crocodiles
e. James +Patterson
f. garbage in garbage out
g. George +Washington +John +Adams-Thomas-Jefferson
h. Travel +Florida-Orlando
30) Files should only be downloaded from known, authentic websites since
downloadable files are often associated with viruses.
31) a. Four questions to answer when evaluating a website source are:
- On what date was the web page last updated?
- Is the information incorrect or incomplete in order to give a particular
or slanted view of a topic?
- Is the information truthful and trustworthy?
- Does the author present his or her credentials?
b. Is it necessary to cite sources to give credit to the original author and
allow the reader to locate the cited information.
c. Perez, Tara. Kite Colors. Clewiston Kite Surfing discussion list. 2
Aug.2012.http://www.Ipdatafiles.com/kitesurf/color.txt.
32) a. Online profiling is a marketing technique of collecting data about
consumers visiting a website.
b. A cookie is a text file created by the server computer when a user
enters information into a website.
c. Web beacons are tiny, transparent graphics located on webpages or in
e-mail messages that are used in combination with cookie to collect data
about webpage user or e-mail senders.
d. The information collected by the web beacons is usually monitored by
an outside advertising company.
33)

34) The Electronic communications Privacy Act of 1986 (ECPA) makes it a


crime to access electronic data without authorization and also prohibits
unauthorized release of such data.
35) Three reasons why many schools have developed an acceptable use
policy are: internet content, unproductive use, and copyright.
36) Under the fair credit reporting act, if you are denied credit you are
allowed to see the files used to make the credit determination.
37) a. A subpoena is necessary for a federal government authority to access
an individuals records.
b. A financial institution must notify the individuals of who has access to
the individuals records.

Vous aimerez peut-être aussi