
Name: Class: Date: Chapter 01: Introduction to Computers and the Internet True / False 1. The processing operation occurs any time the data, a change to a program, or the output is saved for future use. a. True b. False ANSWER: False 2. When data is processed into a meaningful form, it becomes information. a. True b. False ANSWER: True 3. The physical parts of a computer are called software. a. True b. False ANSWER: False 4. The instructions that are used to tell the computer what to do to accomplish tasks are known as hardware. a. True b. False ANSWER: False 5. Self-driving cars contain a large number of mainframe computers which enable the car to safely operate without a driver. a. True b. False ANSWER: False 6. Mobile devices are powered by a rechargeable battery and include wireless connectivity to enable the device to connect to the Internet. a. True b. False ANSWER: True 7. To request a Web page located on the Internet, its Internet address—a unique numeric or text-based address—is used. a. True b. False ANSWER: True Copyright Cengage Learning. Powered by Cognero. Page 1 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet 8. An email message can be sent from any device such as a desktop computer, portable computer, or smartphone, to anyone without an Internet connection. a. True b. False ANSWER: False 9. An email address consists of an IP address (a unique identifying name), followed by the @ symbol, followed by the domain name for the computer that will be handling that person's email. a. True b. False ANSWER: False 10. An IP address is a text-based Internet address. a. True b. False ANSWER: False 11. Trademarks are the standards of moral conduct that guide a business's policies, decisions, and actions. a. True b. False ANSWER: False 12. Randy, an entrepreneur, has designed a trademark for his new business. He has claimed his trademark but has not registered it with the U.S. Patent and Trademark Office (USPTO), and so he should use the mark TM. a. True b. False ANSWER: True 13. E-grass includes electronic trash, such as discarded computer components. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero. Page 2 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet Multiple Choice 14. The progression of input, processing, output, and storage is known as the _____. a. secure storage cycle b. information processing cycle c. input transfer cycle d. output transmission cycle ANSWER: b 15. Identify the difference between data and information from the following options. a. Data is the outcome derived after processing information, while information is only the input given to a system. b. Data is easily understood, while information is difficult to understand. c. Data is an unorganized set of facts, while information is processed data. d. Data is generated to answer a question, while information is a raw fact. ANSWER: c 16. Which of the following is an example of hardware? a. A mouse b. A device driver c. A web desktop d. A content management system ANSWER: a 17. _____ runs a computer and allows people to use the computer to perform specific tasks, such as creating letters, preparing budgets, managing inventory and customer databases. a. Hardware b. Network interface card c. Expansion card d. Software ANSWER: d 18. Computer professionals who are responsible for designing computers to be used within their companies are the _____. a. systems analysts b. technical support engineers c. software testers d. business developers ANSWER: a Copyright Cengage Learning. Powered by Cognero. Page 3 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet 19. A security specialist is responsible for securing the company computers and networks against _____. a. hackers b. auditors c. staff members d. testers ANSWER: a 20. Which of the following is true of an embedded computer? a. It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product. b. It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product. c. It is a supercomputer embedded into a product designed to perform specific tasks or functions for that product. d. It is a personal computer embedded into a product designed to perform specific tasks or functions for that product. ANSWER: a 21. The computers found in DVD players, thermostats, answering machines, and some appliances are known as _____. a. supercomputers b. fifth-generation computers c. embedded computers d. mainframe computers ANSWER: c 22. Identify an accurate statement about embedded computers. a. They cannot be used as general-purpose computers. b. They are used for large-scale computing purposes. c. They cannot be used in a car's navigational or entertainment systems. d. They are used in various fields such as weather forecasting and quantum mechanics. ANSWER: a 23. Identify a device that is used to make send text messages, view Web pages and documents, take digital photos, play games, and access other tools. a. A biometric device b. A translation device c. A mnemonic device d. A mobile device ANSWER: d Copyright Cengage Learning. Powered by Cognero. Page 4 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet 24. The Apple watch is an example of a _____. a. mobile device b. mainframe computer c. wireframe device d. supercomputer ANSWER: a 25. Many mobile devices can perform Internet searches and other tasks via _____. a. voice commands b. diagnostic signals c. thought transference d. command prompts ANSWER: a 26. Kevin has designed a computer that can fit on or next to a piece of furniture so that it can be used by people at home or office. Conventional personal computers that are designed to fit on or next to a piece of furniture are often referred to as _____. a. desktop computers b. mainframe computers c. supercomputers d. server computers ANSWER: a 27. Desktop computers can be housed in a _____, which is a system unit designed to sit vertically on the floor. a. tower case b. drive bay c. hub cove d. floppy disk ANSWER: a 28. Integrated circuits incorporate many _____ on a single tiny silicon chip, making computers smaller and more reliable. a. transistors and electronic circuits b. batch files and algorithmic circuits c. arrays and bitmap circuits d. metafiles and mnemonic circuits ANSWER: a Copyright Cengage Learning. Powered by Cognero. Page 5 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet 29. Ray, a computer professional, works from home using a tablet. He separates the display from the keyboard for his convenience. Which of the following types of tablet computers is Ray using? a. Stand-alone notebook-tablet computers b. Notebook-tablet mainframe computers c. Notebook-tablet supercomputers d. Hybrid notebook-tablet computers ANSWER: d 30. Susie purchased a tablet computer. Which of the following devices should she use to work on her new computer? a. A digital pen b. A primary key c. A secondary key d. An analog pen ANSWER: a 31. Which of the following statements is true of servers? a. They are known as microcomputers and do not host programs and data for a network. b. They can serve only one person at a time to connect to a network. c. They are accessed by users connected through a network using a computer. d. They cannot be accessed by a home network. ANSWER: c 32. Randy sets up a home server that will allow him to securely access his stored content remotely via the Internet. Here, Randy has created a _____. a. logical cloud b. personal cloud c. cloud gate d. cloud agent ANSWER: b 33. One trend involving servers, as well as mainframe computers, is _____ that is the creation of practical versions of a computing resource. a. virtualization b. fragmentation c. normalization d. optimization ANSWER: c Copyright Cengage Learning. Powered by Cognero. Page 6 Name: Class: Date: Chapter 01: Introduction to Computers and the Internet 34. Rita, a computer science student, studies about servers with her friend. They learn about a trend that stores each user's desktop environment on a server and delivers it to each individual via any authorized device. Which of the following trends is discussed in this scenario? a. Desktop virtualization b. Desktop authorization c. Desktop normalization d. Desktop generalization ANSWER: a 35. Determine the device that helps a mainframe serve thousands of users connected to it. a. A thin client b. A punch card c. A plotter d. A facsimile ANSWER: a 36. Identify a true statement about mainframe computers. a. Mainframe computers are dedicated to serve only a single user connected via a personal computer. b. Mainframe computers are dedicated to serve only a single user connected via a dumb terminal. c. Mainframe computers are typically located in climate-controlled data centers. d. Mainframe computers are typically located within a tower case of a desktop computer. ANSWER: c 37. Roger, an entrepreneur of a software industry, decides to use a system that will run the programs needed to meet the different needs of a wide variety of users during business hours. This system also performs large processing tasks, such as payroll and billing. Which of the following systems should Roger use? a. Mainframe computers b. Optical mark recognition systems c. Remote desktop systems d. Stand-alone computers ANSWER: a 38. Identify a true statement about supercomputers. a. They tend to be very small and are slow at processing. b. They are used for applications that require extraordinary speed, accuracy, and processing capabilities.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages16 Page
-
File Size-