A ____ is the smallest unit of data that a binary computer can recognize.
pixel
bit
byte
datum
To convert analog sound to digital sound, several thousand
samples—digital representations of the sound at a particular moment—are
taken every second.
True
False
Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white).
True
False
Instructions and data flow in and out of the CPU via the ____.
bus interface unit
decode unit
prefetch unit
control unit
Score:
2/2
Case-Based Critical Thinking Questions
Case 2-2Jack
has a computer at home that he uses to access the Internet, store and
edit personal photos, and create and edit documents. Recently, he has
come to realize that in order to keep the computer performing at its
best, he needs to carry out regular system maintenance on the computer.
Since
Jack has a Windows system, he can right-click a hard drive icon in
Windows Explorer, select Properties, and then select the ____ option on
the Tools tab to check that hard drive for errors.
Check Now
Disk Defragmenter
Defragment Now
Windows Disk Cleanup
One nanometer (nm) is ____ of a meter.
one-tenth
one-millionth
one-billionth
one-thousandth
____ means that data can be retrieved directly from any location on the storage medium, in any order.
Sequential access
Online access
Random access
Indirect access
One reason advanced users may partition a primary hard drive is to be
able to use two different operating systems on the same hard drive.
True
False
A ____ partition contains the data necessary to restore a hard drive
back to its state at the time the computer was purchased and is designed
to be used only if the computer malfunctions.
recovery
troubleshooting
malfunction
dual-boot
CD-ROM discs and DVD-ROM discs are ____ optical discs and come prerecorded with commercial products.
read-only
write-only
rewritable
recordable
Score:
2/2
Users do not have to be concerned with how files are physically stored on a storage medium.
True
False
SSDs are an especially attractive option for portable computers and mobile devices.
False
True
Flash memory media can be inserted into a reader in several ways.
True
False
Most computer tapes today are in the form of ____ tapes, as shown in the accompanying figure.
floppy
cartridge
flash
optical
Score:
0/2
A graphics tablet is typically connected to a computer via a USB port.
False
True
A display device is the most common form of output device.
False
True
Automating the data entry process is referred to as source data automation.
False
True
In addition to a keyboard, most PCs today have some type of online storage system.
False
True
The accompanying figure shows a(n) ____ printer.
ink-jet
dot-matrix
thermal
laser
____ monitors can be added to a computer without requiring a video card that supports multiple monitors.
GPU
Monochrome
VGA
USB
Digital video cameras include digital camcorders and small digital video
cameras used in conjunction with computers and other devices.
False
True
File extensions should not be changed by the user because the operating
system uses them to identify the program that should be used to open the
file.
True
False
Most operating systems today use a text-based user interface.
False
True
Dean
has been using computers for some time now, but he is unfamiliar with a
number of utility programs. In order to better maintain his computer, he
decides to ask his coworker Andrea for advice on basic utility
programs.
Another thing that Andrea tells Dean is that it is very
important for him to ____ all of his important data on a regular basis
to protect against data loss in the case of a problem with the computer.
He can use a(n) ____ utility to do this.
defragment
backup
compress
cleanup
____ refers to the ability of an operating system to work with more than one program at one time.
Polyprogramming
Multidimensional
Multiprogramming
Multitasking
As you work on your computer, the operating system is in charge of
managing system resources and making them available to devices and
programs when they are needed.
True
False
Stand-alone utility programs are often available in a suite of related programs.
True
False
Case 5-2Dean
has been using computers for some time now, but he is unfamiliar with a
number of utility programs. In order to better maintain his computer, he
decides to ask his coworker Andrea for advice on basic utility
programs.
Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.
delete
uninstall
cleanup
remove
Case 5-1Janet
is studying operating systems as part of her Understanding Computers
101 class. After learning about the different types of operating
systems, she realizes that she uses a number of them in her daily life.
All the computers in Janet’s school computer lab have the newest version of Windows installed, which is ____.
Windows Solaris
Windows XP
Windows
7
Windows Vista
Linux is increasingly being used with both mainframes and supercomputers.
False
True
100%
Although labels and constant values will be copied exactly to the new
location, the way formulas behave when they are copied depends on
whether they use relative cell referencing or ____.
full cell referencing
total cell referencing
absolute cell referencing
integral cell referencing
When entering a formula or function into a cell, most spreadsheet
programs require that you begin with some type of symbol, usually the
asterisk character (*).
False
True
The accompanying figure represents the toolbar command button for the ____ command.
New document
Save
Open
Undo
____ refers to organizing the content to be transferred to DVD, such as
importing video clips, creating the desired menu structure, and so
forth.
Video ripping
DVD authoring
DVD ripping
Video editing
The accompanying figure is an example of a wide variety of software available today for mobile phones and other mobile devices.
False
True
____ satellites travel at a speed and direction that keeps pace with the
earth’s rotation, so they appear (from earth) to remain stationary over
a given spot.
Isochronous
Geosynchronous
Full-duplex transmission
Microwave
____ was originally developed to carry a large number of high-speed
video transmissions at one time, such as to deliver cable TV service.
Fiber-optic cable
Twisted-pair cable
Single-wire cable
Coaxial cable
In ____ transmission, data is sent at the same time as other related
data to support certain types of real-time applications that require the
different types of data to be delivered at the proper speed for that
application.
asynchronous
isochronous
synchronous
endrosynchronous
Client-server networks include both clients and servers.
True
False
____ is the use of networking technology to provide medical information and services.
Remote medicine
Telecommuting
Remote health
Telemedicine
____ is a consortium of researchers, educators, and technology leaders
from industry, government, and the international community that is
dedicated to the development of revolutionary Internet technologies.
ISP
ICANN2
Internet2
P2P
Web conferences typically take place via a personal computer or mobile phone and are used by businesses and individuals.
True
False
Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet.
Anthony
regularly visits several popular political ____, which are Web pages
designed to facilitate written discussions between people on specific
subjects.
podcasts
message boards
e-mail programs
Webinars
Businesses and ISPs typically archive e-mail messages that travel through their servers.
False
True
Technically, the Internet is a physical network, and the Web is the collection of Web pages accessible over the Internet.
True
False
Repeated threats or other harassment carried out online between adults is referred to as ____.
phishing
cyberterrorism
cyberstalking
computer sabotage
Possessed knowledge access systems use physical objects for
identification purposes and are frequently used to access facilities and
computer systems.
True
False
]
Advocates of ____ state that, unless individuals or businesses protect
their access points, they are welcoming others to use them.
war driving
spoofing
phishing
spamming
One emerging type of Trojan horse is called a ____-Access Trojan.
Demote
Control
Remote
Hacker
Melissa
is the network administrator for a small publishing company. As network
administrator, she is in charge of maintaining the security of all the
computers that are part of the company’s network.
Melissa also
decided to use a(n) ____, which continuously monitors and analyzes the
traffic allowed to and from the network to detect possible attacks as
they are occurring and block them.
No comments:
Post a Comment