Sie sind auf Seite 1von 6

Review Questions

1. a) A desktop computer is better for memory and storage. Probably runs


better than a notebook. If you work from home probably a better option.

b) Three advantages of purchasing a notebook computer instead of a desktop


is portability. More affordable and easy access to information.
c) Someone who travels a lot and a tablet is easily accessible. No need for
table or outlet.
d) Customer service, and door to door sales men.
e) Wearable computer in health care are used so that people can still live at
home or have more mobility.
2. A) Devices like keyboards, mouse, and the DVD drive all use to enter
instructions into the computer.

b) Devices like flash drives, printers and monitors all process data into
information.
c) A peripheral device is something that makes the computer more versatile,
can be connected wirelessly or through a port on the computer. Webcams,
printers and microphones are all examples of this.
d) Three types of ports are: USB, fire wire and Bluetooth
3. The motherboard consists of expansion boards which contain sound cards
and video adapters that make the computer more versatile. The central
processing unit controls the data flow between different units within the
computer. Another component is inside the CPU is the ALU which is a stands
for Arithmetic logic unit, and that preforms all logic and arithmetic
operations. The clock rate is the speed a command can be executed by the
CPU. A bus is a series of circuits that connect everything together, the bus
sends data between different components of the computer.
4. The flow of data entering from the input run through the bus to the memory
where it is stored, and is cycled through to the CPU and can leave through
the output when requested.
5. Cache memory or SRAM stores frequently used data so it is easily accessible.

6.

a) Operating system software is run automatically when you start up your


computer and controls different softwares and application software is written
by the user to perform a specific task.

7. A utility program manages input and output, manage the processer, the
system security, files and disk, and It reads and writes to memory.
8. Cross-platform connectivity is the ability to share data with another
computer. If the computers have different OS etc., this is needed to
communicate.
9. a) Machine and assembly language is classified under Low level programming
language or first generation programing language. This is used to
communicate directly with the computer but is difficult because this language
only consists of 0s and 1s. The third generation programming language or the
high level programming have English like instructions
b) Three high level programming language are Fortran, Basic and COBOL
c) The compiler translates everything and then runs the command and the
interpreter translate as it goes.
d) The advantage of using object oriented programming is to better develop
more complex programs.
10. Networks allow user to share data, Can offer security such as passwords, File
management through software updates and file backups and can lower cost
by sharing devices.
11.a) Two common size classification are LAN and A WAN .
b) A WAN is used for long distance.
12.a) A network operating system is a software that lets you communicate over
the network.
b) A network environment is
13.Two types of network architecture are peer to peer and client or peer to peer
network.

14.a) Physical topology is the place of nodes in a network.


b) A node is a location with the device to process information.
c) Star topology uses a hub
d) A ring topology connects each node to make a loop

e) Physical topology can process information and logical topology is the data
passed between nodes.
15.All rules apply.

16.The binary system was adopted because it only uses 1s and 0s and the
electrical circuits only have off and on
17.a)11
b) 42
18.Every symbol has been given a digital code.
19.a) 2 billion bytes
b) 500 billion
20.a) An Overflow error happens when the number of bits is over the amount of
four.
b) Real numbers are Number that have decimal points.
c) A round off error would occur when the unit storing the exponent is not
large enough.
21.a) A TXT file only contains numbers and letters and a binary file contains
photos or sound and need another application to read them.
b) Different programs have their initials at the end
c) Similar files can be put under one category to keep organized.
22.Internal such as disk or flash drive and removable.

23. Keep magnetic media away from magnets, Handle CDs by the center hole or
edges, store the CDs in a protective sleeve and keep it away from moisture
and extreme temperature.
24.a) An intranet is a network used by a single organization and an extranet is
open to the public.
b) It is not controlled by any one organization

25.a) The problem associated with a conventional modem is that its slow
b) A DSL modem uses a standard telephone line and a cable modem sends
data through a cable.
26. a) The world wide web is the most widely used internet service.
b) The benefit of e mail is you can receive and send it in seconds.
c) ellingsen.sydney( user name)@Gmail(host name).com(top level domain.
d) You need e-mail software and a username.
e) A browser based email site is google.
27. a) They should be thought the same as regular mail because they are not
private, any mail service can read it.
b) It could end in loss of job or you can get in serious trouble.
28. a)Google yahoo and MSN.
b) I prefer Google because of the layout is plain and simple.
c) When you use it you will get the closest search to whatever youre looking
for.
29. a) restaurants + Miami
b) Art museums + Montreal, Canada
c) Clothing store + city
d) Alligators - crocodiles
e) Author + James Patterson
f) " Garbage in garbage out"
g) George Washington + John Adams - Thomas Jefferson
h) Florida - Orlando
30. Because not all site give you legal downloads and you can accidently
download a virus.
31. a) Is it reliable information? Is it safe? Does it need special software? They
wont take
unnecessary information?
b) Give credit to the original source.

c) Kite surfing (Tara Perez 2012)


32. a) when a person accesses a website and data is collected.
b) A cookie is created when someone enters information into a website.
c) They work with cookies to collect data.
d) The monitoring is done by an outside advertising company.
33. The rules and guidelines, and treatment of information.
34. The Electronic Communications Privacy Act of 1986
35. Use appropriate language, do not revel personal information and dont
access another persons account.
36. The Fair Credit Reporting Act of 1970
37. a) They need government authority has a search warrant.
b) They must notify the individual.
38. a) They are copies of computer software that the user did not pay for.
b) Because it is such an expensive process
c) It is a program that holds instructions.
d) The a t OD send an email to someone claiming you are a legitimate
business.
39. They install and update software and keep hardware working and
maintain data.
40. a) F
b) T
c) T
d) F
e) T
f) F
g) T
h) F

I) T
j) T
k) T

Das könnte Ihnen auch gefallen