Monday, Dec9, 2013 (found on online classroom)
Happy Computer Science Education Week !
Go do your hour of code this week at ‘hourofcode.org’
Learning Target: I can correctly format a research paper using MLA format.
Agenda:
- Bellwork8 –Do a print screen for how to find a synonym for the word ‘prescribe’ in your first research paper.
- Submitfirst research paper using the project in MS Word Chapter 2 – “Can You See Me Now?” Post to online classroom
- Complete ‘In the Lab 1’ – “From One Controller to Another” – See back of Chapter in SAM or online classroom for instructions
- Study for FINAL – see below
- 100 Point Bonus for second 9 weeks: “MS Word Advanced Training Cert Prep”
- Eagle Tech Leader Projects – Winter Virtual Due before Christmas Break
- Extra Credit Option – Complete an hour(s) of code tutorial using ‘anhourofcode.org’
- Extra Credit Option - Design and create a birthday card for Grace Hopper
- Eagle Tech Leader Project Ideas – Please review the Eagle Tech Leader handbook from online classroom and sign up for a project that interests you. Idea for a project: See
- Early Finish:
- Complete any work for which you are behind. Put a note in the basket if you turn something in late and let me know where you submitted the late work.
- Work through LESSONS in GREEN box in middle and set to 35 WPM
- ACT Question of the Day:
- Free ACT Test Prep:
- Khan Academy – topic of choice
Testbank Questions
1. Introduction to Computers and the Internet
Question / ID / Correct Answer
1.MC:____ software is rights-protection software used to control the use of a work.
A . DRM
B . ISP
C . RSI
D . Copyright-Trademark / 341152 /
A . DRM
2.T/F:A copyright is a word, phrase, symbol, or design that identifies one product or service from another. / 341108 /
False
3.MC:A desktop computer may contain ____.
A .arsenic
B . lead
C . mercury
D . all of the above / 341158 /
D . all of the above
4.Mod. T/F:A(n)personalcomputer is a stationary computer designed to fit on or next to a desk. ______/ 341112 /
desktop
5.Mod. T/F:A(n)tabletcomputer is designed to be used with a digital pen or stylus. ______/ 341113 /
True
6.Mod. T/F:Accessing information in a shared company database is an example of a(n)communicationsfunction performed by today’s computers. ______/ 341109 /
True
7.T/F:An IP address uniquely identifies a specific Web page. / 341107 /
False
10.MC:Copyrights remain in effect until ____ after the creator’s death.
A .a year and a day
B . 10 years
C .a century
D . 70 years / 341151 /
D . 70 years
12.MC:Gmail is a(n) ____.
A .email program
B . Web mail service
C .knowledge base
D . search site / 341147 /
B . Web mail service
13.T/F:Information is processed into data. / 341100 /
False
14.MC:Intellectual property is ____.
A .any device or appliance containing a computer chip
B . original creative work
C . both a and b
D . neither a nor b / 341150 /
B . original creative work
15.T/F:Most of today’s modern computers are fifth-generation machines. / 341103 /
False
16.T/F:One of the most significant appeals of server virtualization today is increased efficiency. / 341104 /
True
17.Mod. T/F:Performance, cost, and security are threeadvantagesof cloud computing. ______/ 341111 /
disadvantages
18.MC:Presenting someone else’s work as your own is ____.
A .libel
B . trademark infringement
C . plagiarism
D . unethical but not illegal / 341153 /
C . plagiarism
19.T/F:Smartphones are a type of mobile device. / 341102 /
True
21.Mod. T/F:The current fastest computer in the world is technically a(n)supercomputing cluster. ______/ 341114 /
True
22.T/F:The Internet is the largest computer network in the world. / 341106 /
True
23.MC:The majority of discarded computer equipment ends up ____.
A .being reused in new computer components
B . being safely separated and recycled within the United States
C . in landfills or foreign nations with lax environmental standards
D . being ground into the underlayment used in highways / 341157 /
C . in landfills or foreign nations with lax environmental standards
24.T/F:The most powerful and most expensive type of computer available is the ultracomputer. / 341105 /
False
25.T/F:The physical parts of a computer are called hardware. / 341101 /
True
26.MC:The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices.
A . Gold Star
B . ENERGY STAR
C . LEED
D .GreenWare / 341156 /
B . ENERGY STAR
27.MC:To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____.
A . .exe
B . .jpg
C . .com
D . .vbs / 341149 /
B . .jpg
28.MC:Using a Web browser to view Web pages is called ____ the Web.
A .surfing
B . scanning
C . spinning
D . skating / 341148 /
A . surfing
Chapter 1: Introducing Hardware
Question / ID / Correct Answer
30.MC:_____ is the process of transferring data from memory to a storage medium.
A . Busing
B . Reading
C . Copying
D . Writing / 12764 /
D . Writing
35.SA:A 1 or 0 in the binary system is called a(n) ______. / 12822 /
bit
36.T/F:A binary number system is used by computers to express the positive state as the number 0. / 12771 /
False
37.T/F:A bus is an electric channel that transfers bits internally within the circuitry of a computer. / 12802 /
True
38.T/F:A CD-ROM drive uses a laser beam to read data. / 12811 /
True
39.MC:A central processing unit also is known as a _____.
A .computer case
B . microprocessor
C . personal computer
D . program / 12748 /
B . microprocessor
40.MC:A CMOS RAM chip contains _____.
A .volatile memory
B . a small amount of memory
C . a large amount of memory
D . a DIP switch / 12754 /
B . a small amount of memory
42.SA:A computer requires both ______to work. / 12820 /
hardware and software
harware & software
43.SA:A CPU uses ______to hold data and instructions temporarily while it is processing them / 12838 /
primary storage
memory
44.T/F:A CPU uses primary storage to retain data permanently. / 12787 /
False
45.T/F:A data bus transfers actual data. / 12803 /
True
46.T/F:A device is useless without software to control it. / 12772 /
True
47.T/F:A DIP switch consists of a pair of prongs that function as electrical contact points in the motherboard. / 12800 /
False
48.T/F:A DVD-ROM is the same size as a CD-ROM. / 12812 /
True
49.MC:A gigabyte is _____.
A .one million bytes
B . one thousand bytes
C . one billion bytes
D . none of the above / 12763 /
C . one billion bytes
50.T/F:A ground mat also is known as a static shielding bag. / 12814 /
False
51.T/F:A jumper acts as a switch that closes or opens electrical circuits. / 12799 /
True
52.SA:A key characteristic of a storage medium is its ______, or the number of bytes it can hold. / 12853 /
capacity
53.T/F:A microchip is an insulated circuit board. / 12783 /
False
54.SA:A monitor’s resolution is a function of the number of ______used for display on the screen. / 12831 /
pixels
dots
55.T/F:A monitor’s resolution is a function of the number of lines displayed on the screen. / 12781 /
False
56.T/F:A network card provides a port designed to fit a cable that connects a PC to a network. / 12809 /
True
57.MC:A pair of prongs that serves as electrical contact points in a motherboard is known as a _____.
A . CMOS setup chip
B .semiconductor
C . single inline memory module
D . jumper / 12755 /
D . jumper
58.T/F:A parallel port most often is used by a printer. / 12788 /
True
59.MC:A peripheral device is a device _____.
A .found on the motherboard
B . a port
C . not located on the motherboard
D . a device on the back of the computer case / 12749 /
C . not located on the motherboard
60.SA:A personal computer processes data that is ______. / 12821 /
digital
61.T/F:A port also is known as a peripheral device. / 12776 /
False
62.T/F:A serial port also is known as a USB port. / 12786 /
False
63.MC:A system clock is a(n) _____.
A .pulsating electrical signal
B . important trace on the system bus
C . dedicated line on the motherboard
D . all of the above / 12760 /
A . pulsating electrical signal
64.T/F:A UPS conditions the line for both brownouts and spikes. / 12819 /
True
65.MC:A(n) _____ provides a row of power outlets to protect equipment from overvoltages.
A . EMI device
B . ESD strip
C .surge suppressor
D . ground bracelet / 12769 /
C . surge suppressor
66.SA:A(n) ______can connect to many different input and output devices such as printers, scanners, keyboards, and mice. / 12840 /
USB port
universal serial bus port
67.SA:A(n) ______is a device that is not located directly on the motherboard but communicates with the CPU. / 12826 /
peripheral device
68.SA:A(n) ______is a group of microchips on the motherboard that control the flow of data and instructions to and from the CPU, providing careful timing of activities. / 12843 /
chip set
69.SA:A(n) ______is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card. / 12850 /
jumper
70.SA:A(n) ______is a physical connector that allows a cable from a peripheral device to be attached to the computer. / 12825 /
port
71.SA:A(n) ______is a pointing input device used to move a pointer on the screen and to make selections. / 12828 /
mouse
72.SA:A(n) ______is a small piece of silicon that contains millions of electronic components. / 12834 /
microchip
chip
integrated circuit
73.SA:A(n) ______is similar to a light switch, and is on or off depending on the direction in which the small switch is set. / 12851 /
DIP switch
dual inline package switch
74.SA:A(n) ______is used for high-speed multimedia devices such as digital camcorders. / 12841 /
FireWire port
75.SA:A(n) ______most often is used by a printer. / 12839 /
parallel port
76.SA:A(n) ______provides an interface for devices such as headphones and speakers. / 12842 /
sound port
77.T/F:All computer cases are the same. / 12775 /
False
78.SA:All letters and characters entered into a computer are converted to a(n) ______form before being stored in the computer. / 12823 /
binary
79.SA:An important line on the system bus is used by the ______, which helps the CPU control the timing of all computer operations. / 12852 /
system clock
80.T/F:An integrated circuit is a small piece of silicon. / 12782 /
True
81.T/F:Clock speed is measured in hertz (Hz). / 12806 /
True
82.T/F:EMI can lead to data loss. / 12816 /
True
83.T/F:Enhanced keyboards have 104 keys. / 12779 /
True
84.MC:ESD also is known as _____.
A .static electricity
B . electrical charge
C . a hazard for the motherboard
D . insulating surface / 12768 /
A . static electricity
85.T/F:Every device must have a method to communicate with the CPU. / 12774 /
True
86.SA:Expansion cards are installed in long narrow ______on the motherboard. / 12836 /
expansion slots
87.T/F:Expansion slots are a type of circuit board. / 12785 /
False
88.T/F:Expansion slots are used to hold expansion cards. / 12807 /
True
89.MC:Hardware consists of _____.
A .data processed by humans
B . continuous up-and-down wave patterns of light and sound
C . a computer’s physical components
D . a set of instructions / 12745 /
C . a computer’s physical components
90.T/F:Humans process data that is analog. / 12770 /
True
91.T/F:If a computer has just come from the cold, the potential for static electricity is very low. / 12815 /
False
92.SA:In a(n) ______, data is transferred serially. / 12837 /
serial port
93.T/F:Let-through voltage is the minimum voltage a surge suppressor allows to reach the equipment to which it is connected. / 12818 /
False
94.SA:Most motherboards today use boards called ______. / 12845 /
DIMMs
dual inline memory modules
95.T/F:Motherboards do not require jumpers if they have a DIP switch. / 12798 /
False
96.T/F:On new motherboards, the ROM BIOS and the CMOS RAM are kept separate. / 12796 /
False
97.T/F:Peripheral devices cannot be connected via a port. / 12778 /
False
98.T/F:Primary storage is provided by RAM chips. / 12791 /
True
99.T/F:Program instructions embedded into hardware are known as firmware. / 12795 /
True
100.SA:Program instructions embedded into hardware, such as a ROM chip, often are referred to as ______. / 12849 /
firmware
101.MC:RAM chips are _____.
A .considered to be volatile
B . capable of holding data permanently
C . manufactured by Rambus, Inc.
D . special circuit boards / 12751 /
A . considered to be volatile
102.T/F:RAM is used to speed up memory access. / 12793 /
False
103.MC:ROM chips that can be reprogrammed are known as _____.
A .firmware
B . flash ROM
C . BIOS
D . DIMMs / 12753 /
B . flash ROM
104.SA:ROM holds its data permanently and is considered to be ______. / 12846 /
nonvolatile
105.T/F:ROM is considered to be volatile. / 12792 /
False
106.T/F:Secondary storage media cannot hold data permanently. / 12810 /
False
107.T/F:Some computers have ports on the front. / 12777 /
True
108.T/F:Some surge processors provide telephone jacks. / 12817 /
True
109.SA:The ______are among the most visible devices when one looks inside a computer case. / 12833 /
circuit boards
110.SA:The ______contains the CPU, the component which performs most processing inside the PC. / 12835 /
motherboard
main board
system board
111.SA:The ______reads and writes data and instructions to and from storage devices and performs calculations. / 12824 /
CPU
central processing unit
microprocessor
processor
112.SA:The ______visually displays the output of the computer. / 12830 /
monitor
113.T/F:The AGP slot is used for an audio card. / 12808 /
False
114.SA:The BIOS typically is stored on a(n) ______on the motherboard. / 12847 /
ROM chip
ROM BIOS chip
115.SA:The BIOS used to manage simple devices is called ______. / 12848 /
system BIOS
116.T/F:The bottom of a mouse houses an optical sensor or rotating ball. / 12780 /
True
117.T/F:The chip set controls the flow of data and instructions to and from the CPU. / 12789 /
True
118.T/F:The CMOS BIOS is used to start the computer. / 12794 /
False
119.SA:The CPU uses ______to hold data and instructions temporarily while processing them. / 12844 /
primary storage
memory
temporary storage
120.MC:The function of a bus is to _____.
A .create a set of rules and standards for two entities communicating with each other
B . allow a computer’s devices to communicate with each other
C . act as a set of electrical contact points in a computer’s motherboard
D . retain setup or installation information / 12757 /
B . allow a computer’s devices to communicate with each other
121.MC:The function of the power supply in a computer’s electrical system is to _____.
A .power the CMOS RAM chip
B . generate electricity for the computer
C . convert power received from a standard power outlet
D . all of the above / 12767 /
C . convert power received from a standard power outlet
122.SA:The keyboards that are standard today are called a(n) ______and have 104 keys. / 12829 /
enhanced keyboard
123.MC:The main bus on the motherboard is called a _____.
A .system bus
B . memory bus
C . front side bus
D . all of the above / 12759 /
D . all of the above
124.MC:The most important circuit board in a computer is known as a(n) _____.
A .integrated circuit
B . insulated board
C . CPU
D . motherboard / 12750 /
D . motherboard
125.T/F:The most important circuit board in the computer is the motherboard. / 12784 /
True
126.T/F:The most important component inside a computer case is the microprocessor. / 12773 /
True
127.MC:The number of lines, or width, of a data bus is known as _____.
A .a trace
B . a DIP
C . the data path size
D . a system bus / 12758 /
C . the data path size
128.SA:The output produced on paper by a printer often is called ______. / 12832 /
hard copy
129.T/F:The system clock is the main bus on the motherboard. / 12805 /
False
130.T/F:The system clock keeps communications in sync. / 12790 /
True
131.T/F:The width of a data bus is called the data path size. / 12804 /
True
132.T/F:Traces are sets of rules and standards that any two entities use for communication. / 12801 /
False
133.T/F:Unlike EMI, ESD cannot cause the failure of an electronic component. / 12813 /
False
Chapter 1: Introduction to Internet Explorer
Question / ID / Correct Answer
134.MC:____ are connected with high-, medium-, and low-speed data lines that allow data to move from one computer to another.
A . Wireless systems
B . Firewalls
C . Portals
D . Networks / 354527 /
D . Networks
135.MC:____ randomly displays advertisements and other messages while you use your computer.
A . Spyware
B . Adware
C . Phishing data
D . A computer virus / 354531 /
B . Adware
136.MC:A ____, which runs Web server software, provides resources such as text, images, files, and links to other computers on the Internet.
A . Web server
B . Web browser
C . Web connector
D . Web administrator / 354529 /
A . Web server
137.MC:All of the resources and links found throughout the Internet create an interconnected network called ____.
A .the World Wide Web
B . the Web
C . WWW
D . all of the above / 354530 /
D . all of the above
138.MC:Each Web page has a unique address, called a(n) ____, which distinguishes it from all other pages on the Internet.
A . URL
B . FTP
C .browse tag
D . page title / 354534 /
A . URL
139.MC:Internet Explorer 9 includes a ____ Filter designed to identify malicious and fraudulent Web sites, and will inform you by displaying an appropriate warning.
A .SmartBrowser
B .SmartSecure
C .SmartWeb
D .SmartScreen / 354532 /
D .SmartScreen
140.MC:The ____ is a worldwide collection of networks, each of which is composed of a collection of smaller networks.
A . Government portal
B . Internet
C . NASA portal
D . Domain aggregator / 354526 /
B . Internet
141.MC:To combat security vulnerabilities that are present in programs installed on your computer, software manufactures may release updates, also known as ____.
A .patches
B . service packs
C . either a or b
D . neither a nor b / 354533 /
C . either a or b
142.MC:You access hypermedia by clicking a ____, which points to the location of the computer on which the hypermedia is stored and to the hypermedia itself.
A .navlink
B . hyper bar
C . hyperlink
D . navigation bar / 354528
Testbank Questions
Chapter 1: Introduction to Internet Explorer
Question / ID / Correct Answer
1.MC:____ are connected with high-, medium-, and low-speed data lines that allow data to move from one computer to another.
A . Wireless systems
B . Firewalls
C . Portals
D . Networks / 354527 /
D . Networks
2.MC:____ Browsing is a feature in Internet Explorer 9 that allows you to visit Web pages without the Web browser recording any information.
A .InPrivate
B . Secret
C . Discrete
D . Safe / 354559 /
A .InPrivate
3.MC:____ is a word-processing program that is supplied with Microsoft Windows.
A .TextPad
B . WordPad
C .ProcessPad
D .NoteTaker / 354565 /
B . WordPad
4.MC:____ randomly displays advertisements and other messages while you use your computer.
A . Spyware
B . Adware
C . Phishing data
D . A computer virus / 354531 /
B . Adware
5.SA:______displays the top-level domain in a black font, while the remainder of the Web address is displayed in a gray font. / 354603 /
Domain highlighting
6.SA:______is a program that tracks the actions you take on your computer, such as which Web sites you visit, what products you purchase online, and your credit card information, and sends them to a third party. / 354601 /
Spyware
7.SA:______is text that displays in place of the image if a user configures his or her Web browser not to display images. / 354609 /
Alternate text
8.SA:______is the combination of text, images, audio, video, and interactivity, delivered over the Internet. / 354598 /
Hypermedia
9.MC:A ____ is a set of rules.
A .behavior
B . protocol
C . command
D . menu / 354535 /
B . protocol
10.MC:A ____, which runs Web server software, provides resources such as text, images, files, and links to other computers on the Internet.
A . Web server
B . Web browser
C . Web connector
D . Web administrator / 354529 /
A . Web server
11.Mod. T/F:Aphishingscam works by falsifying one’s identity in an attempt to convince an unsuspecting victim into disclosing information such as credit card numbers, bank account information, and Social Security numbers.______/ 354617 /
True
12.SA:A change in the shape of the ______identifies an element as a link. / 354607 /
mouse pointer
13.SA:A collection of related Web pages make up a(n) ______. / 354600 /
Web site
14.T/F:A favoriteconsists of the title of the Web page and the Web address of that page. / 354592 /
True
15.T/F:A markup language contains text as well as information about the text. / 354577 /
True
16.MC:A method of saving information, called the ____ method, allows you to copy an entire Web page, or portions of a page, and insert the information into any Windows document.
A .copy and paste
B . copy
C . paste
D . duplicate / 354563 /
A . copy and paste