Name: Class: Date:

Chapter 01: Introduction to and the Internet

True / False 1. The processing operation occurs any time the data, a change to a program, or the output is saved for future use. a. True b. False

ANSWER: False

2. When data is processed into a meaningful form, it becomes information. a. True b. False

ANSWER: True

3. The physical parts of a are called software. a. True b. False

ANSWER: False

4. The instructions that are used to tell the computer what to do to accomplish tasks are known as hardware. a. True b. False

ANSWER: False

5. Self-driving cars contain a large number of mainframe computers which enable the car to safely operate without a driver. a. True b. False

ANSWER: False

6. Mobile devices are powered by a rechargeable battery and include wireless connectivity to enable the device to connect to the Internet. a. True b. False

ANSWER: True

7. To request a Web page located on the Internet, its Internet address—a unique numeric or text-based address—is used. a. True b. False

ANSWER: True

Copyright Cengage Learning. Powered by Cognero. Page 1 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

8. An email message can be sent from any device such as a , , or , to anyone without an Internet connection.​ a. True b. False

ANSWER: False

9. An email address consists of an IP address (a unique identifying name), followed by the @ symbol, followed by the domain name for the computer that will be handling that person's email. a. True b. False

ANSWER: False

10. An IP address is a text-based Internet address. a. True b. False

ANSWER: False

11. Trademarks are the standards of moral conduct that guide a business's policies, decisions, and actions. a. True b. False

ANSWER: False

12. Randy, an entrepreneur, has designed a trademark for his new business. He has claimed his trademark but has not registered it with the U.S. Patent and Trademark Office (USPTO), and so he should use the mark TM. a. True b. False

ANSWER: True

13. E-grass includes electronic trash, such as discarded computer components. a. True b. False

ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 2 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

Multiple Choice 14. The progression of input, processing, output, and storage is known as the _____. a. ​secure storage cycle b. ​information processing cycle . ​input transfer cycle d. ​output transmission cycle

ANSWER: b

15. Identify the difference between data and information from the following options. a. ​Data is the outcome derived after processing information, while information is only the input given to a system. b. ​Data is easily understood, while information is difficult to understand. c. ​Data is an unorganized set of facts, while information is processed data. d. ​Data is generated to answer a question, while information is a raw fact.

ANSWER: c

16. Which of the following is an example of hardware? a. ​A mouse b. ​A device driver c. ​A web desktop d. ​A content management system

ANSWER: a

17. _____ runs a computer and allows people to use the computer to perform specific tasks, such as creating letters, preparing budgets, managing inventory and customer . a. ​Hardware b. ​Network interface card c. ​Expansion card d. ​Software

ANSWER: d

18. Computer professionals who are responsible for designing computers to be used within their companies are the _____. a. ​systems analysts b. ​technical support engineers c. ​software testers d. ​business developers

ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 3 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

19. A security specialist is responsible for securing the company computers and networks against _____. a. ​hackers b. ​auditors c. ​staff members d. ​testers

ANSWER: a

20. Which of the following is true of an embedded computer? a. It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product.​ b. ​It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product. c. ​It is a embedded into a product designed to perform specific tasks or functions for that product. d. ​It is a embedded into a product designed to perform specific tasks or functions for that product.

ANSWER: a

21. The computers found in DVD players, thermostats, answering machines, and some appliances are known as _____. a. ​ b. ​fifth-generation computers c. ​embedded computers d. ​mainframe computers

ANSWER: c

22. Identify an accurate statement about embedded computers. a. ​They cannot be used as general-purpose computers. b. ​They are used for large-scale computing purposes. c. ​They cannot be used in a car's navigational or entertainment systems. d. ​They are used in various fields such as weather forecasting and quantum mechanics.

ANSWER: a

23. Identify a device that is used to make send text messages, view Web pages and documents, take digital photos, play games, and access other tools. a. ​A biometric device b. ​A translation device c. ​A mnemonic device d. ​A

ANSWER: d

Copyright Cengage Learning. Powered by Cognero. Page 4 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

24. The Apple is an example of a _____. a. ​mobile device b. ​mainframe computer c. ​wireframe device d. ​supercomputer

ANSWER: a

25. Many mobile devices can perform Internet searches and other tasks via _____. a. ​voice commands b. ​diagnostic signals c. ​thought transference d. ​command prompts

ANSWER: a

26. Kevin has designed a computer that can fit on or next to a piece of furniture so that it can be used by people at home or office. Conventional personal computers that are designed to fit on or next to a piece of furniture are often referred to as _____. a. ​desktop computers b. ​mainframe computers c. ​supercomputers d. ​ computers

ANSWER: a

27. Desktop computers can be housed in a _____, which is a system unit designed to sit vertically on the floor. a. ​tower case b. ​drive bay c. ​hub cove d. ​floppy disk

ANSWER: a

28. Integrated circuits incorporate many _____ on a single tiny silicon chip, making computers smaller and more reliable. a. ​transistors and electronic circuits b. ​batch files and algorithmic circuits c. ​arrays and bitmap circuits d. ​metafiles and mnemonic circuits

ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 5 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

29. Ray, a computer professional, works from home using a tablet. He separates the display from the keyboard for his convenience. Which of the following types of tablet computers is Ray using? a. ​Stand-alone notebook-tablet computers b. ​Notebook-tablet mainframe computers c. ​Notebook-tablet supercomputers d. ​Hybrid notebook-tablet computers

ANSWER: d

30. Susie purchased a . Which of the following devices should she use to work on her new computer? a. ​A digital pen b. ​A primary key c. ​A secondary key d. ​An analog pen

ANSWER: a

31. Which of the following statements is true of servers? a. ​They are known as and do not host programs and data for a network. b. ​They can serve only one person at a time to connect to a network. c. ​They are accessed by users connected through a network using a computer. d. ​They cannot be accessed by a home network.

ANSWER: c

32. Randy sets up a home server that will allow him to securely access his stored content remotely via the Internet. Here, Randy has created a _____. a. ​logical cloud b. ​personal cloud c. ​cloud gate d. ​cloud agent

ANSWER: b

33. One trend involving servers, as well as mainframe computers, is _____ that is the creation of practical versions of a computing resource. a. ​ b. ​fragmentation c. ​normalization d. ​optimization

ANSWER: c

Copyright Cengage Learning. Powered by Cognero. Page 6 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

34. Rita, a computer science student, studies about servers with her friend. They learn about a trend that stores each user's desktop environment on a server and delivers it to each individual via any authorized device. Which of the following trends is discussed in this scenario? a. ​Desktop virtualization b. ​Desktop authorization c. ​Desktop normalization d. ​Desktop generalization

ANSWER: a

35. Determine the device that helps a mainframe serve thousands of users connected to it. a. ​A thin b. ​A punch card c. ​A plotter d. ​A facsimile

ANSWER: a

36. Identify a true statement about mainframe computers. a. ​Mainframe computers are dedicated to serve only a single user connected via a personal computer. b. ​Mainframe computers are dedicated to serve only a single user connected via a dumb terminal. c. ​Mainframe computers are typically located in climate-controlled data centers. d. ​Mainframe computers are typically located within a tower case of a desktop computer.

ANSWER: c

37. Roger, an entrepreneur of a software industry, decides to use a system that will run the programs needed to meet the different needs of a wide variety of users during business hours. This system also performs large processing tasks, such as payroll and billing. Which of the following systems should Roger use? a. ​Mainframe computers b. ​Optical mark recognition systems c. ​Remote desktop systems d. ​Stand-alone computers

ANSWER: a

38. Identify a true statement about supercomputers. a. ​They tend to be very small and are slow at processing. b. ​They are used for applications that require extraordinary speed, accuracy, and processing capabilities. c. ​They can function as either a notebook or a tablet computer because they have display screen that folds shut to resemble a tablet. d. ​They include and small tablet devices.

ANSWER: b

Copyright Cengage Learning. Powered by Cognero. Page 7 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

39. Identify the computer that generally runs one program at a time as fast as possible. a. ​A supercomputer b. ​A quantum computer c. ​A photonic computer d. ​A mainframe computer

ANSWER: a

40. Which of the following statements is true of supercomputers? a. ​They have enormous processing power. b. ​They can process multiple applications simultaneously. c. ​They are setup in simulated environments on a single server. d. ​They do not facilitate faster research breakthroughs.

ANSWER: a

41. Which of the following statements is true of a home network? a. ​It allows home computers to a single printer and Internet connection. b. ​It permits home computers to work with a peak speed of 27,000 trillion calculations per second. c. ​It requires home computers to be located in climate-controlled data centers. d. ​It can be used to control missile guidance systems and satellites.

ANSWER: a

42. _____, the largest and most well-known in the world, is a network of networks because it consists of a vast collection of networks that can access each other. a. ​The Internet b. ​An extranet c. ​An intranet d. ​The World Wide Web

ANSWER: a

43. Which of the following best describes the World Wide Web? a. ​It refers to one resource available through the Internet. b. ​It refers to the physical structure of a network. c. ​It is a company that provides Internet access. d. ​It is a closed-source information center.

ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 8 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

44. Which of the following statements is true of Internet Protocol version 6 (IPv6)? a. ​It has four parts that are separated by periods. b. ​It was designed for use with third-generation computers. c. ​It allows 2128 unique addresses for all devices connecting to the Internet. d. ​It performs IP fragmentation.

ANSWER: c

45. Which of the following statements is considered a benefit of a computer-oriented society? a. ​As more and more data about our everyday activities is collected and stored on computers accessible via the Internet, our privacy is never at risk. b. ​There is no potential risk to personal privacy, which is one of the most important societal advantages. c. ​It increases the need of people and reduces unemployment in society. d. ​The capability to virtually design, build, and test new buildings before the actual construction begins helps professionals create safer products.

ANSWER: d

46. Bill is a trainer at a data entry company in Brampton, Canada. He is asked to train physically and visually challenged individuals to perform necessary job tasks and to communicate with others. Which of the following technologies should Bill use to assist them? a. ​Braille technology b. ​Quantum technology c. ​La crosse technology d. ​Nanotechnology

ANSWER: a

47. Which of the following is considered an intellectual property? a. ​An ethic b. ​A patent c. ​A plagiarized content d. ​An auction

ANSWER: b

48. Identify a true statement about an intellectual property. a. ​It provides copyrights only for published works. b. ​It includes original creative work such as movies and music. c. It withdraws the protection rights for a work after its creator's death.​ d. ​It uses the TM symbol for unregistered service marks.

ANSWER: b

Copyright Cengage Learning. Powered by Cognero. Page 9 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

49. Roger, a budding author, completes a manuscript and sends it to various publishers. He copyrights his work so that it will not be copied by others. For how long will the copyright cover Roger's work? a. ​85 years b. ​80 years c. ​75 years d. ​70 years

ANSWER: d

50. Which of the following was introduced by the U.S. Environmental Protection Agency (EPA) as a voluntary labeling program designed to identify and promote power-efficient products in an effort to reduce greenhouse gas emissions? a. ​VOLUNTEER PLANT b. ​ENERGY STAR c. ​Power Commando d. ​Gas Quantum Vessel

ANSWER: b

51. The term _____ refers to the use of computers in an environmentally friendly manner. a. ​ b. ​bio computing c. ​scene computing d. ​organic computing

ANSWER: a

52. Steve, a senior architect, has to design a work environment for the people who work in the office, including properly adjusting furniture and hardware. Which of the following should Steve make use of to set up a safe and effective workspace? a. ​Ergonomics b. ​Macronomics c. ​Hydrodynamics d. ​Geonomics

ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 10 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

53. ​Case 1-2 Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site. According to the specifications provided by the organization, which of the following Web page protocols should Bruce make use of to develop the Web site? a. ​Hypertext Transfer Protocol (http://) b. ​File Transfer Protocol (ftp://) c. ​Transmission Control Protocol (tcp://) d. ​Secure sockets layer (ssl://)

ANSWER: a

54. Case 1-2 Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site. Which of the following email addresses should Bruce use to update in the "Contact Us" tab of the Web page? a. ​[email protected] b. ​abruce.glenvalleycorporation@com c. ​abruce. glenvalleycorporation.com d. ​abruce@glenvalleycorporation@com

ANSWER: a

55. ​Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanyaasks Damon to provide a scenario that is an act of plagiarism. Which of the following scenarios can Damon provide? a. ​A teacher sharing a poem with a class, leading the class to believe the poem was his original work b. ​A newspaper reporter paraphrasing a few sentences or paragraphs written by another author without changing the meaning of the text, including the revised text in an article, and crediting the original author with a proper citation c. ​A student copying and pasting information from various online documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author d. ​A philosopher referring to the information available on the Internet and using certain quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author

ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 11 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

56. ​Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanya provides a scenario to Damon where a student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon replies saying that this is an act of _____. a. ​plagiarism b. ​inchoateness c. ​felony d. ​solicitation

ANSWER: a

57. Case 1-1 Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her. ​Burt asks Casey what type of computer she will need to operate and maintain the network in her school's computer lab. Casey replies that it would be a _____. a. third-generation computer b. ​ c. ​supercomputer d. ​

ANSWER: b

58. ​Case 1-1 Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her. Burt describes an incredibly expensive computer designed to focus all of its computing power on one specific task at a time that can handle applications requiring speed, accuracy, and processing capabilities. Casey identifies the type of computer to be a(n) _____. a. ​wireframe computer b. ​supercomputer c. ​mainframe computer d. ​enterprise-class computer

ANSWER: b

Completion 59. ______—technically an input or output operation, depending on which direction the information is going—is considered the fifth primary computer operation. A. Communication B. Processing C. Transmutation D. Computing ANSWER: Communication​

Copyright Cengage Learning. Powered by Cognero. Page 12 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

60. Raw, unorganized facts are termed as ______. A. information B. data C. program D. terminal ANSWER: data​

61. ______components can be internal (located inside a computer) or external (located outside a computer and connected to a computer via a wired or wireless connection). A. Hardware B. Software C. Data D. Instruction ANSWER: Hardware​

62. People who use computers to perform tasks or obtain information are known as ______. A. computer B. systems analysts c. end users D. operations personnel ANSWER: end users​

63. Sandy is a computer professional who writes instructions for computers to perform specific tasks. Sandy is a(n) ______. A. analyst B. C. operator D. designer ANSWER: programmer​

64. A(n) ______is a device that is designed to be used in conjunction with a company network instead of using local hard drives for storage. A. network hub B. C. coupled modem D. enterprise router ANSWER: thin client​

Copyright Cengage Learning. Powered by Cognero. Page 13 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

65. ______are used to back up the content located on all the computers in a home and to host music, photos, movies, and other media to be shared via a home network. A. Home routers B. Home modems C. Home servers D. Home modulators ANSWER: Home servers​

66. One recent focus for ______is ensuring that they can handle new and emerging needs, such as having the computational power to process data from smart meters and having the ability to run mobile and social networking applications. A. B. mainframe computers C. portable computers D. desktop computers ANSWER: mainframe computers​

67. Conventional and mobile telephone companies like AT&T, Verizon, and Sprint are known as ______. A. Web servers B. Web hosts C. Internet Service Providers D. Internet Messengers ANSWER: Internet Service Providers​

68. Susan, an archeological research student, browses sources online for her thesis. To conduct a search, she types one or more words into the search box on a search site, and a list of links to Web pages matching her search criteria is displayed. The words Susan uses are referred to as ______. A. keywords B. snippets C. codewords D. passwords ANSWER: keywords​

69. ______is a collection of eye and vision problems, including eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, and blurred vision. A. Repetitive stress injuries (RSIs) B. Carpal tunnel syndrome (CTS) C. Computer vision syndrome (CVS) D. De Quervain's tendonitis ANSWER: Computer vision syndrome (CVS)​

Copyright Cengage Learning. Powered by Cognero. Page 14 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

70. The problem of overusing, or being unable to stop using, the Internet is known as ______. A. Internet insomnia B. Internet triviality C. Internet addiction D. Internet indifference ANSWER: Internet addiction​

71. Used toner cartridges, obsolete or broken hardware, and discarded CDs, DVDs, and other storage media are referred to as ______. A. system dispose B. e-dump C. electronic compost D. computing refuse ANSWER: computing refuse​

Essay 72. Briefly explain the roles of a computer user and a software professional. ANSWER: Answers will vary. Computer users, often called end users, are the people who use computers to perform tasks or obtain information. This includes an accountant electronically preparing a client's taxes, an office worker using a word processing program to create a letter, a doctor updating a patient's electronic medical record, a parent emailing his or her child's teacher, a college student researching a topic online, a child playing a computer game, and a person shopping online.

Programmers, on the other hand, are computer professionals who write the programs that computers use. Other computer professionals include systems analysts, who design computer systems to be used within their companies; computer operations personnel, who are responsible for the day-to-day computer operations at a company, such as maintaining systems or troubleshooting user-related problems; and security specialists, who are responsible for securing the company computers and networks against hackers and other intruders. Please see the section "What Is a Computer?" for more information.

73. Briefly explain how an email is used as a means of communication. ANSWER: Answers will vary. An email message is a message sent between individuals over a network—usually the Internet. Email is one of the most widely used Internet applications—Americans alone send billions of email messages daily—and email sent via a mobile device is growing at an astounding rate. You can send an email message from any Internet-enabled device, such as a desktop computer, portable computer, or smartphone, to anyone who has an Internet email address.

To contact someone using the Internet, you most often use his or her email address. An email address consists of a username (a unique identifying name), followed by the @ symbol, followed by the domain name for the computer that will be handling that person's email (called a mail server). Please see the section "Computer Networks and the Internet" for more information.

Copyright Cengage Learning. Powered by Cognero. Page 15 Name: Class: Date:

Chapter 01: Introduction to Computers and the Internet

74. Explain the importance of green computing. ANSWER: Answers will vary. The increasing use of computers in our society has created a variety of environmental concerns. The term green computing refers to the use of computers in an environmentally friendly manner. Minimizing the use of natural resources, such as energy and paper, is one aspect of green computing. In 1992, the U.S. Environmental Protection Agency (EPA) introduced ENERGY STAR as a voluntary labeling program designed to identify and promote energy-efficient products in an effort to reduce greenhouse gas emissions. An ENERGY STAR-qualified computer will use between 30% and 75% less energy, depending on how it is used. Today, the ENERGY STAR label appears on computers, office equipment, residential heating and cooling equipment, major appliances, lighting, home electronics, and more. Eco-labels—environmental performance certifications—are used in other countries as well.

The high cost of electricity has made power consumption and heat generation by computers key concerns for businesses and individuals. Although computers have become more energy efficient, they can still draw quite a bit of power when they are not being used. For example, servers use 60% of their maximum power while idle. In addition, computers, home electronics, and home appliances often draw power even when they are turned off. Consolidating servers can help businesses reduce energy cost; turning off devices and unplugging mobile device chargers when they are not being used can help individuals save power.

In addition to more energy-efficient hardware, alternate power sources are being developed for greener computing. For instance, solar power is a growing alternative for powering electronic devices, including computers and mobile devices. With solar power, solar panels convert sunlight into electricity, which is then stored in an external battery or directly in the battery of a connected device. Solar charging capabilities are being built into a variety of mobile accessories, such as computer and tablet cases and backpacks. Please see the section "Computers and Society" for more information.

Copyright Cengage Learning. Powered by Cognero. Page 16