Vous êtes sur la page 1sur 6

Review Questions

1. a) Notebook computers have less memory, so if one were to


need a lot of storage, they would want a desktop computer.
b) -smaller, More accessible, Easy to carry around
c) Someone who needs access on the go wherever they are.
d) -IT manager
-Desktop support technician
e) Physicians can use them

2. a) keyboard, mouse, USB drive


b) Monitor, printer, projector
c) Mouse, keyboard
d) Display port, VGA, Serial

3. input slots, output slots, RAM slots, CPU socket, Storage device
connectors
4.
5. Programs will access the same data over and over
6. a) Application software cannot run by itself, it depends on the
OS software to run.
b) Linux, IBM, Apple inc
c) Where users run applications
d) Software
7. A program that manages input and output.
8. Generate different files.
9.A- Low level communicates directly to the computer using
machine language. High level uses English like instructions.
B-Fortran, C, Basic.
C- A compiler is a program that converts an entire program into
machine code before the program is executed. An interpreter
translates and executes an instruction.
D-Allows programmers to create modules that can be used over
and over again in a variety of programs.
10. Allows users to reliably share data, Can reduce costs by
sharing devices, offers security options ,simplifies file
management.
11.A- Architecture, topology, LAN, WAN
B- WAN.
12.A- A software that allows users and devices to communicate
over the network.
B-
13. Peer to peer, each computer has equal responsibilities.
Client/Server, A group of computers called clients, connected to a
server.
14.A- Arrangement of nodes on a network.
B- A node is a location on the network with a device capable of
processing information.
C- Star topology
D- Ring topology
E- Physical LAN uses a BUS
15. All Netiquette rules apply.
16. To represent numbers and letters.
17.A-
B-
18. Unicode uses a set of sixteen 1s and 0s to form a 16 bit binary
code.
19.A- 2,417,483,640 bytes of data.
B- 536,870,910,000 bytes of storage.
20.A- When the number of bits that are needed to represent the
integer is greater than the size of four bytes.
B- They are numbers that contain decimal points.
21.A- text files are human readable, binary files are only computer
readable files.
B- An application adds a unique extension to the file it creates.
C- Put more files in the same place.
22. internal, removable, magnetic
23. keep magnetic media away from magnets, Handle CDs by the
center hole or by the edges, Store CDs in a jewel case or sleeve,
Keep media away from moisture.
24.A- Intranet is a network that is used by a single organization.
Extranet extends by providing various levels of access to
authorized members for the public.
B- It is not controlled by any one person or organization.
25.A- Conventional modems have slow access time.
B- A DSL modem uses standard telephone lines with data
transmission up to 640 Kbps. A Cable modem transmits data
through a coaxial cable television network.
26.A- The World Wide Web (WWW)
B- Email can be sent and received around the world in a matter of
seconds.
C- litchy@telus.net , litchy is username, telus is host, net is top
level domain
D- An email address and an ISP
E- Yahoo, Hotmail, Google.
27.A- Because once its sent it cant be undone.
B- People could think that you are lazy and dont have proper
grammar.
28.A- Yahoo, Google, MSN
B- Google because it has always worked for me and it is the
easiest and most user friendly in my opinion.
C- If proper search criteria is used, the higher the chance the
information will be found.
29.A- Miami restaurants
B- Museums in Montreal
C- Clothing stores in Vancouver, BC
D- Alligators
E- James Patterson books
F-garbage in garbage out phrase
G- George Washington and John Adams
H- Transportation to Florida
30. Because that website for file could have a file that could
penetrate your computer and take private information.
31.A-
B- So people know that your not stealing information
C-
32.A- When a user visits a website data on that user may be
stored.
B- A cookie is a text file created by the server computer when a
user enters information into a website.
C- A web beacon are tiny transparent graphics located on web
pages.
D- Monitoring is done by an outside monitoring company.
33. Youtube, It states, what information we collect and why we
collect it, How we use that information, the choices we offer
including how to access and update information.
34. The Electronic Communications Privacy act of 1986 (ECPA)
35. Internet content, unproductive use, and copyright.
36. Contact a bank manager.
37.A- Authorization from that person
B- The financial company must notify that person.
38.A- The illegal use or reproduction of data.
B- The future development of that software is jeopardized.
C- A virus is a program that can replicate without the users
knowledge.
D- Phishing is the act of sending an email to a user falsely
claiming to be someone else to retrieve personal information.
39. Installing and updating software, keeping hardware working.
40.A- False, software is the internal
B- True
C- True
D- False, it is a low level language
E- True
F- True
G- True
H- False, a conventional modem is slower
I- True
J- True
K- True

Vous aimerez peut-être aussi