Académique Documents
Professionnel Documents
Culture Documents
Block C
9a) What is the difference low and high level programming languages?
Low level programming uses either 1s and 0s to communicate to program
whereas high level programming have English like instructions that are
easier to use and understand.
b) List three high-level programming languages.
Three high level programming languages are C, Basic and COBOL.
c) What is the difference between a complier and an interpreter?
A complier converts an entire program into machine code before it is
executed and an interpreter translates and executes a single instruction
before moving on to the next one.
d) List an advantage of using an object-oriented programming language.
Eli Klassen
Block C
One perk of using object oriented programming is that it allows for more
organized, systematic and complex approaches because of the ability to
create reusable modules.
11a) What are the two common size classifications for networks?
The two common size classifications for networks are LAN (local-area
network) and WAN (wide-area network).
b) What size classification is used to connect devices over large
geographical distances?
WAN is used to connect devices over large geographical distances.
16) Explain why the binary number system was adopted for use in
computers.
The binary number system was adopted for usage because electrical circuits
on an IC have two states, on or off.
21a) What is the difference between a text file and a binary file?
A text file is human readable and a computer readable file is a binary file.
b) Explain how an extension distinguishes file types.
An application adds a unique extension that comes after the file name to
distinguish the file type.
c) Describe how organizing your files into folders would help keep you
organized.
Keeping your files in separate folders based on their contents would help you
be more organized because your files will not be spread out all over your
computer. Instead they would be in a centralized location and easy to access.
22) List two ways storage devices can be classified ad give an example of a
storage device in each category.
Two ways storage devices can be categorized is as internal and external. An
internal storage device would be a hard drive and an external storage device
would be something like a flash drive.
23) List four rules that should be followed to avoid damaging files store on
disks or DVDs.
i) Keep the magnetic media away from magnets.
Eli Klassen
Block C
27a) Explain why sending an e-mail message should be thought of the same
as sending a postcard.
Sending e-mails should be thought as sending postcards because you still
need to use manners such as please and thank you on e-mails and
postcards. Also, an address is required for both except postcards have a
house or mail address and emails have an electronic address. Additionally,
anyone can read postcards as well as an email that you send.
b) Discuss with a partner and then summarize issues that could occur if e-
mail etiquette is not followed in the work place.
If e-mail etiquette is not followed in the workplace, it could lead to severe
consequences such as being fired from your job in the worst case scenario or
getting in serious trouble with your superiors. This is because employers
have the right to read your emails that are sent.
Perez, Tara. Kite Colors Clewiston Kite Surfing. n.p. n.d. August 2nd 2012.
http://www.emcschool.net/kitesurf/color.txt.
34) Name and briefly describe one law that helps protect the privacy of an
individual.
One law that protects the privacy of a person is called the: Electronic
Communications Act of 1986 or ECPA. It protects your privacy by making
accessing and sending electronic data without authorization a crime.
Eli Klassen
Block C
35) List three reasons why many schools have developed an Acceptable Use
Policy.
i) Inappropriate language is disallowed.
ii) Only the administrator is allowed to install/uninstall software that may be
used on the computes.
iii) Disallowing the access of other users accounts without authorization.
iv) The distribution of inappropriate materials is banned.
36) What can you do if you are turned down for credit at a bank and believe
the data use to deny credit is inaccurate?
If you believe the information is inaccurate, you can ask the bank to view the
information/files used to assess the denial and check for yourself in the
information is inaccurate.
d) Describe phishing.
Phishing is the act of sending an e-mail to a user that falsely claims to be a
legitimate business in an attempt to trick the user into revealing personal
information.
40) Determine if each of the following is true or false. If false, explain why.
a) Software refers to the physical components of the computer
False. Hardware refers to the physical components of the computer.
b) Linux is an operating system
True.
c) A utility program has one clearly defined task.
True.
d) Assembly language is a high-level programming language.
False, assembly language is a low-level programming language.
e) WAN connects devices over large geographical distances
True.
f) A peer-to-peer network has a server.
False, a peer-to-peer network has no server as both devices have equal
responsibilities. A client-to-server network does have a server.
g) The binary number system uses only 1s and 0s.
True.
Eli Klassen
Block C