Fill This Form To Receive Instant Help
Homework answers / question archive / Chapter 1: Introduction to Computers and the Internet TRUE/FALSE 1 ) The accompanying figure demonstrates the primary four operations of a computer
Chapter 1: Introduction to Computers and the Internet
TRUE/FALSE
1 ) The accompanying figure demonstrates the primary four operations of a computer.
2. Information is processed into data.
3. The physical parts of a computer are called hardware.
4. Smartphones are a type of mobile device.
5. Most of today’s modern computers are fifth-generation machines.
6. One of the most significant appeals of server virtualization today is increased efficiency.
7. The most powerful and most expensive type of computer available is the ultracomputer.
8. The Internet is the largest computer network in the world.
9. An IP address uniquely identifies a specific Web page.
10. A copyright is a word, phrase, symbol, or design that identifies one product or service from another.
MODIFIED TRUE/FALSE
1. Accessing information in a shared company database is an example of a(n) communications function performed by today’s computers. _________________________
2. Computer users, often called nodes, are the people who use computers to perform tasks or obtain information. _________________________
3. Performance, cost, and security are three advantages of cloud computing. _________________________
4. A(n) personal computer is a stationary computer designed to fit on or next to a desk. _________________________
5. A(n) tablet computer is designed to be used with a digital pen or stylus. _________________________
6. The current fastest computer in the world is technically a(n) supercomputing cluster. _________________________
7. Web pages are stored on Web browsers that are continually connected to the Internet. _________________________
8. The TLD originally provided for ISPs is .org. _________________________
9. A(n) copyright gives the holder the exclusive right to publish, reproduce, distribute, perform, or display his or her work. _________________________
10. According to the text, CTS (carpal tunnel syndrome) is a(n) RSI. _________________________
MULTIPLE CHOICE
1. All of the following are primary operations of a computer EXCEPT ____.
a. |
input |
c. |
processing |
b. |
sorting |
d. |
output |
2. The accompanying figure is a representation of the ____ cycle.
a. |
TCP/IP |
c. |
ISP |
b. |
IPOS |
d. |
product |
3. Operations are performed on data in step ____ in the accompanying figure.
a. |
D |
c. |
B |
b. |
C |
d. |
A |
4. Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
a. |
data |
c. |
logic |
b. |
information |
d. |
hardware |
5. ____ are computer professionals who write the programs that computers use.
a. |
Servers |
c. |
End users |
b. |
Suppliers |
d. |
Programmers |
6. ____ refers to data, applications, and even resources stored on computers accessed over the Internet.
a. |
Telecommuting |
c. |
The Ethernet |
b. |
Cloud computing |
d. |
Embedded computing |
7. The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____.
a. |
mobile devices |
c. |
embedded computers |
b. |
fifth-generation computers |
d. |
miniframes |
8. The third generation of computers was marked by the introduction of ____.
a. |
vacuum tubes |
c. |
punch cards and magnetic tape |
b. |
artificial intelligence |
d. |
integrated circuits |
9. A ____ is a very small notebook computer.
a. |
tablet PC |
c. |
netbook |
b. |
mobile device |
d. |
thin client |
10. A device that must be connected to a network to perform processing or storage tasks is referred to as a ____.
a. |
dumb terminal |
c. |
portable computer |
b. |
minicomputer |
d. |
server |
11. Devices designed primarily for accessing Web pages and/or exchanging email are called ____.
a. |
thin clients |
c. |
Web TVs |
b. |
Internet appliances |
d. |
Web apps |
12. Midrange servers are also known as ____.
a. |
supercomputers |
c. |
minicomputers |
b. |
mainframes |
d. |
enterprise-class servers |
13. ____ generally run one program at a time, as fast as possible.
a. |
Supercomputers |
c. |
Minicomputers |
b. |
Mainframes |
d. |
Thin clients |
14. A large organization that needs a computer to run the programs that staff use during the day, and then spend the night performing large processing tasks, most likely will buy a ____.
a. |
mainframe |
c. |
cloud computer |
b. |
supercomputer |
d. |
midrange server |
15. The Roadrunner computer cost approximately ____.
a. |
$1 billion |
c. |
$10 million |
b. |
$100 million |
d. |
$250 million |
16. ____ is the most well-known computer network in the world.
a. |
Skynet |
c. |
The Internet |
b. |
Telnet |
d. |
AOL |
17. The term ____ refers to one resource available through the ____.
a. |
Internet, WWW |
c. |
IP address, URL |
b. |
WWW, Internet |
d. |
Web client, Web servers |
18. IP addresses and domain names identify ____.
a. |
Web pages |
c. |
regions |
b. |
people |
d. |
computers |
19. A(n) ____ makes it easier for people to request Web pages than using a(n) ____.
a. |
domain name, IP address |
c. |
URL, IP address |
b. |
IP address, domain name |
d. |
ISP, modem |
20. Of the following, the only original TLD is ____.
a. |
.mil |
c. |
.uk |
b. |
.info |
d. |
.biz |
21. Of the following, the TLD mentioned in the chapter that is intended for individuals is ____.
a. |
.ind |
c. |
.name |
b. |
.net |
d. |
.me |
22. An email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server.
a. |
URL |
c. |
Password |
b. |
username |
d. |
TLD |
23. In the accompanying figure, the protocol identifier is shown in box ____.
a. |
A |
c. |
C |
b. |
B |
d. |
D |
24. In the accompanying figure, the Web server is shown in box ____.
a. |
A |
c. |
C |
b. |
B |
d. |
D |
25. In the accompanying figure, the document being retrieved and displayed is found in box ____.
a. |
A |
c. |
C |
b. |
B |
d. |
D |
26. All of the following are commonly used Web browsers EXCEPT ____.
a. |
Navigator |
c. |
Chrome |
b. |
Internet Explorer |
d. |
Firefox |
27. ____ browsing allows you to open multiple Web pages at one time.
a. |
Webbed |
c. |
Tabbed |
b. |
Threaded |
d. |
none of the above |
28. Worldwide email traffic is expected to exceed ____ messages per day by 2013.
a. |
1 billion |
c. |
500 billion |
b. |
300 million |
d. |
30 billion |
29. Gmail is a(n) ____.
a. |
email program |
c. |
knowledge base |
b. |
Web mail service |
d. |
search site |
30. Using a Web browser to view Web pages is called ____ the Web.
a. |
surfing |
c. |
spinning |
b. |
scanning |
d. |
skating |
31. To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____.
a. |
.exe |
c. |
.com |
b. |
.jpg |
d. |
.vbs |
32. Intellectual property is ____.
a. |
any device or appliance containing a computer chip |
b. |
original creative work |
c. |
both a and b |
d. |
neither a nor b |
33. Copyrights remain in effect until ____ after the creator’s death.
a. |
a year and a day |
c. |
a century |
b. |
10 years |
d. |
70 years |
34. ____ software is rights-protection software used to control the use of a work.
a. |
DRM |
c. |
RSI |
b. |
ISP |
d. |
Copyright-Trademark |
35. Presenting someone else’s work as your own is ____.
a. |
libel |
c. |
plagiarism |
b. |
trademark infringement |
d. |
unethical but not illegal |
36. Ethical beliefs may vary based on ____.
a. |
religion |
c. |
country |
b. |
culture |
d. |
all of the above |
37. An RSI related to repetitive finger movements on a keyboard is ____.
a. |
CTS |
c. |
CDS |
b. |
CVS |
d. |
CPS |
38. The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices.
a. |
Gold Star |
c. |
LEED |
b. |
ENERGY STAR |
d. |
GreenWare |
39. The majority of discarded computer equipment ends up ____.
a. |
being reused in new computer components |
b. |
being safely separated and recycled within the United States |
c. |
in landfills or foreign nations with lax environmental standards |
d. |
being ground into the underlayment used in highways |
40. A desktop computer may contain ____.
a. |
arsenic |
c. |
mercury |
b. |
lead |
d. |
all of the above |
Case-Based Critical Thinking Questions
Case 1-1
Shannon, a sophomore at the local college, spends an evening with her father and her grandfather talking about technology. Shannon is amazed at the changes that have happened over just a few generations.
41. Shannon’s grandfather told her that when his grandfather was a young man, he worked on the 1890 U.S. Census using Hollerith’s Punch Card Tabulating Machine and Sorter. What can Shannon determine from this?
a. |
He used a first-generation computer. |
b. |
He worked on a machine built by a company that would much later create the IBM PC. |
c. |
The machine was the first to use magnetic tape for storage. |
d. |
none of the above |
42. Shannon’s grandfather then told her that when he was a teenager, back in 1952, he helped out in the local Eisenhower for President campaign office. At that time, there was talk of a fancy new machine that was going to help count and analyze the votes that year. That machine was ____.
a. |
ENIAC |
c. |
the IBM 1401 |
b. |
UNIVAC |
d. |
the PC |
43. Shannon’s father chimes in, and reminds her somewhat proudly that he was born right about the same time that integrated circuits were invented. He was born in ____.
a. |
1955 |
c. |
1964 |
b. |
1958 |
d. |
1971 |
44. Shannon has enjoyed hearing about the advances in computers before her day. She asks her grandfather and father which was the longest-lasting generation of computers. They look at her and tell her ____.
a. |
the one in which her grandfather was born |
b. |
the one in which her father was born |
c. |
the one in which she was born |
d. |
the third generation, which is just what she is |
Case-Based Critical Thinking Questions
Case 1-2
Quincy is learning about the types of servers and more powerful computers available. She’s asked you to come over and quiz her.
45. You tell Quincy that she needs a computer to operate and maintain the network in her school’s computer lab. Quincy tells you that would be a ____.
a. |
mainframe |
c. |
supercomputer |
b. |
minicomputer |
d. |
netbook |
46. Next, you tell Quincy that what she needs is a computer that can handle intensive 3D applications, and will be designed to focus all of its computing power on one task at a time. Quincy tells you that you’re describing a(n) ____.
a. |
petaflop |
c. |
mini-cluster |
b. |
supercomputer |
d. |
enterprise-class server |
47. Lastly, you tell Quincy that she needs a computer for a large organization that can manage large amounts of data and run multiple programs simultaneously. She tells you that this would be a(n) ____.
a. |
enterprise-class server |
c. |
supercomputing cluster |
b. |
mainframe |
d. |
either a or b |
Case-Based Critical Thinking Questions
Case 1-3
Terrell is learning how to classify Web sites by their TLDs.
48. Terrell sees the .name TLD. He knows this is ____.
a. |
an original TLD |
c. |
based in the United Kingdom |
b. |
for noncommercial organizations |
d. |
none of the above |
49. Terrell would like his own TLD. The biggest roadblock to this will be ____.
a. |
legal: TLDs can only be created and assigned to governments or registered non-government bodies. |
b. |
technical: The ability to register TLDs is not possible yet due to conflicts with the TCP/IP protocols used on the Web. |
c. |
financial: It is estimated that registering a TLD could cost as much as $100,000. |
d. |
all of the above |
50. Lastly, Terrell sees the TLD “.cz” and wonders what it means. His best clue is that it ____.
a. |
is one of the original seven TLDs used in the United States |
b. |
is two letters long, and thus likely represents a country |
c. |
ends in “z” and is thus among the most recent new TLDs created |
d. |
none of the above; this is not a valid TLD |
COMPLETION
1. A(n) ____________________ is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed.
2. The term ____________________ refers to the programs or instructions used to tell the computer hardware what to do.
3. PDA stands for ____________________.
4. UNIVAC is an example of a(n) ____________________-generation computer.
5. Desktop computers usually conform to one of two standards or platforms: ____________________ or ____________________.
6. A(n) ____________________ client is a device that is designed to be used in conjunction with a company network.
7. Today’s ____________________ computers are sometimes referred to as high-end servers or enterprise-class servers.
8. The text described a total of ____________________ major categories of computer, though it emphasized that classification of any individual device is often not so straightforward.
9. ISP stands for ____________________.
10. A group of Web pages belonging to one individual or company is called a(n) ____________________.
11. 212.41.18.147 is an example of a(n) ____________________.
12. An email message first travels from the sender’s computer to his or her ISP’s ____________________.
13. The legal concept of ____________________ permits limited duplication and use of a portion of copyrighted material for specific purposes.
14. ____________________ are the standards of conduct that guide a business’s policies, decisions, and actions.
15. The average U.S. household spends approximately ____________________ per year powering devices that are turned off or in standby mode.
MATCHING
a. |
Internet appliance |
g. |
URL |
b. |
desktop computer |
h. |
portable computer |
c. |
Web server |
i. |
browser |
d. |
the IPOS cycle |
j. |
domain name |
e. |
trademark |
k. |
software |
f. |
midrange server |
l. |
ISP |
1. uniquely identifies a specific Web page
2. the programs or instructions used to tell the computer what to do
3. used for viewing Web pages
4. uses a tower case
5. a device designed primarily for accessing Web pages and using email
6. a company that provides Internet access
7. uniquely identifies a computer on the Internet
8. a word, symbol, etc. that identifies one product or service from another
9. where Web pages are stored
10. the progression of the four primary operations of a computer
11. often the computer of choice for students, home users, and even businesses
12. a medium-sized computer used to host programs and data for small networks
ESSAY
1. What is “cloud computing”? What are some of its advantages and disadvantages?
2. Name and briefly describe the four major kinds of portable computers mentioned in the textbook.
3. Name and describe two technologies currently being used to protect digital content.
please use this google drive link to download the answer file.
https://drive.google.com/file/d/1jzQn8hrj1PJ9U2G2Xdfh-azzHG6XHasb/view?usp=sharing
note: if you have any trouble in viewing/downloading the answer from the given link, please use this below guide to understand the whole process.
https://helpinhomework.org/blog/how-to-obtain-answer-through-googledrive-link