Indicate Whether the Statement Is True Or False s4

Mid Term Review

True/False

Indicate whether the statement is true or false.

____ 1. A computer is used to input, process, and store data and provide useful output.

____ 2. Telecommunications components include a transmitter that sends a signal over a medium, such as fiber-optic cables or through the air, to a receiver.

____ 3. Data mining is a branch of AI that empowers computers to control mechanical devices to perform tasks that require a high degree of precision or are otherwise tedious, monotonous, or hazardous for humans.

____ 4. Databases are a key component to managing information, and information systems are the primary defense against information overload.

____ 5. Individuals use information systems to manage their contacts, e-mail, and online documents.

____ 6. Wired networks are especially vulnerable to hackers as no physical connection is required to access the network.

____ 7. At the heart of all digital electronics devices is a microprocessor.

____ 8. The data stored on a PDA is not typically synchronized with the data stored on a desktop or notebook PC.

____ 9. The true measure of processor performance is the amount of time it takes to execute an instruction.

____ 10. Data stored on magnetic media could last over 100 years.

____ 11. Compared to other types of secondary storage, flash memory can be accessed more quickly, consumes less power, and is smaller in size.

____ 13. Many special-purpose input devices are designed to support scientific and medical research.

____ 14. It is very unusual to find six or more USB ports on a new computer.

____ 15. FireWire comes standard on Apple computers.

____ 16. The latest technique in chip design is referred to as cellcore technology and refers to housing more than one processor on a chip.

____ 18. A new technique called parallel computing allows processors from different computers to work together over a network on complex problems.

____ 19. RAM exists as a set of chips grouped together on a circuit board called a single in-line memory module, or SIMM.

____ 22. Fifth-generation languages are sometimes called natural languages because they use even more English-like syntax than 4GLs.

____ 23. Operating systems can control one computer or multiple computers, or they can allow multiple users to interact with one computer.

____ 24. The OS serves as a buffer or interface between the application program and the hardware.

____ 25. All operating systems can be considered either proprietary or portable.

____ 26. Off-the-shelf software enables an organization to have more flexibility in making modifications or changes.

____ 27. The format feature of many operating systems allows the computer to effectively execute program instructions and speed processing.

____ 28. Today’s Internet joins together networks of over 300 million computers, or Internet hosts, to create the world’s second largest internetwork.

____ 30. The Internet is a combination of hardware, protocols, and software.

____ 31. Software allows users to interact with the Internet to access information and services.

____ 32. Many companies, organizations, and institutions, work directly with the network service providers to connect their own organizations’ networks directly to a PoP.

____ 33. Most dial-up service providers advertise an “accelerated” feature that boosts speeds up to five times that of a standard dial-up connection (to 280 Kbps).

____ 34. Cable modem network lines are shared by neighbors, so if many neighbors access the Internet simultaneously, they might experience slower throughput.

____ 35. The protocols for the Internet are the Transmission Control Protocol (TCP) and Internet Protocol (IP).

____ 36. The Internet is a packet-switching network.

____ 37. Registering a domain name does not provide you with your own Web site, only with ownership of the name that you can associate with a Web site you have created and stored on a Web server with an assigned IP address.

____ 38. It is anticipated that DHTML will gradually replace HTML as the primary markup language of the Web.

____ 39. While creating static Web pages, those that simply present unchanging information, has become easy, today’s professional-quality Web sites have evolved well beyond these basics.

____ 40. JavaScript is similar to Java in that it provides functionality in Web pages through programming code that is embedded in an HTML document.

____ 41. Pervasive communications are the result of advances in wireless communications and Internet communications.

____ 42. Most personal computers come equipped with on-board synthesizers on the computer’s sound card that include all the standard synthesizer keyboard sounds.

____ 45. Media player software has been designed for desktop and notebook PCs, and handheld PCs, but not cell phones.

____ 46. Representing an image using bytes is simply a matter of storing the color of each pixel used in the image.

____ 50. Digital video can be transferred to a computer directly from a camcorder or read from a DVD or VCR tape.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

____ 101. ____ refers to the tangible components of a computer system or digital device.

a. / Software / c. / Artificial intelligence
b. / Information / d. / Hardware

____ 102. ____ comprises the electronic instructions that govern the computer system’s functioning.

a. / Software / c. / Artificial intelligence
b. / Information / d. / Hardware

____ 103. A ____ is a telecommunications network that connects two or more computers for the purpose of sharing data, hardware, and software resources.

a. / computer network / c. / protocol
b. / database / d. / kiosk

____ 104. A ____ is a collection of data stored on a computer, organized to meet users’ needs.

a. / supercomputer / c. / byte
b. / database / d. / protocol

____ 105. ____ is the activity of creating new or modifying existing systems.

a. / Transaction processing / c. / Digitization
b. / Wireless networking / d. / Systems development

____ 106. When transactions are carried out online, over the Internet or using other telecommunications and network systems it is called ____.

a. / artificial intelligence / c. / wireless networking
b. / management information systems / d. / e-commerce

____ 109. A(n) ____ is an information system that can make suggestions and reach conclusions in one particular area of expertise much the same way that a human expert can.

a. / expert system / c. / DSS
b. / neural network / d. / MIS

____ 110. A ____ is an agreed-upon way of doing something within an industry.

a. / standard / c. / byte
b. / megapixel / d. / stylus

____ 111. ____ is the act of manipulating data in a manner defined by programmed instructions.

a. / Input / c. / Storage
b. / Output / d. / Processing

____ 112. The group of integrated circuits that work together to perform the processing in a computer system is called the ____.

a. / central processing unit / c. / motherboard
b. / microprocessor / d. / transistor

____ 119. RAM exists as a set of chips grouped together on a circuit board called a(n) ____.

a. / SIMM / c. / stylus
b. / MIPS / d. / integrated circuit

____ 120. ____ is intended to store data permanently, but can be updated with new revisions when they become available.

a. / Flash memory / c. / Cache memory
b. / RAM / d. / ROM

____ 121. ____ can be used by security systems to allow only authorized personnel into restricted areas.

a. / SRAM / c. / A flash drive
b. / Voice recognition / d. / Graphic tablets

____ 122. A(n) ____ is a short, penlike device without ink.

a. / kiosk / c. / stylus
b. / trackball / d. / trackpoint

____ 125. Languages beyond the fourth generation include ____.

a. / structured query languages / c. / COBOL
b. / BASIC / d. / artificial intelligence languages

____ 126. A(n) ____ is a set of programs that runs or controls the computer hardware and acts as an interface with application programs and users.

a. / operating system / c. / software suite
b. / integrated software package / d. / public domain software

____ 131. Windows NT and Windows 2000 are often referred to as ____ because they include security management features for networks and the servers that handle them.

a. / utility programs / c. / public domain software
b. / network operating systems / d. / open-source software

____ 132. ____ programs can reduce the amount of disk space required to store a file or reduce the time it takes to transfer a file over the Internet.

a. / File compression / c. / Graphic
b. / Virus detection / d. / Word processing

____ 134. Which of the following types of software is programmed to have human-like intelligence?

a. / groupware / c. / decision support
b. / artificial intelligence / d. / expert systems

____ 136. A(n) ____ is a collection of computing devices connected together to share resources such as files, software, processors, storage, and printers.

a. / URL / c. / server
b. / computer network / d. / port

____ 137. ____ involves the transmission of messages over a computer network to support asynchronous text-based communication.

a. / E-mail / c. / Hyperlinking
b. / IP addressing / d. / Web authoring

____ 138. Internet ____ involves synchronous text messaging between two or more participants.

a. / routing / c. / searching
b. / conferencing / d. / chat

____ 139. ____ is a research and development consortium led by over 200 U.S. universities and supported by partnerships with industry and government to develop and deploy advanced network applications and technologies for tomorrow’s Internet.

a. / HTTP / c. / Internet2
b. / P2P / d. / TCP/IP

____ 140. Participants running ____ software make a portion of their file system available to other participants to access directly.

a. / P2P / c. / e-mail
b. / networking / d. / routing

____ 144. The ____ protocol was implemented in 1983 to provide a standard language for digital music devices to use in communicating with each other.

a. / MIDI / c. / CAD
b. / LAN / d. / analog signal

____ 145. A ____ is an MP3 audio file that contains a recorded broadcast distributed over the Internet.

a. / podcast / c. / RFID
b. / synthesizer / d. / MIDI

Completion

Complete each statement.

152. A group of eight bits is called a(n) ______.

153. ______involves using a cell phone to send short text messages to other cell phone users.

154. ______are communications that take place electronically over a distance.

156. A(n) ______is an object in a Web document that can be clicked to access related information.

162. Software that is prepackaged and sold to the public is called ______.

167. A(n) ______is an individual who subverts computer security without authorization.

169. ______such as the IBM Thinkpad or Apple iBook are also considered personal computers and provide near-desktop power in a portable case.

170. A(n) ______handles sending and receiving e-mail messages.

173. The primary circuit board of a computing device is known as the ______.

180. A(n) ______sits stationary and allows you to control the mouse pointer by rolling a mounted ball.

181. Microsoft’s ______is designed in such a way as to reduce the stress on your wrists common with traditional keyboards.

182. ______provide a lower-priced video camera for use as a computer input device.

183. ______are used for projecting presentations from your computer onto a larger screen.

189. A(n) ______is an optical media that stores up to 700 MB of data.

190. Handheld computers and tablet PCs use a(n) ______that allows you to select items on the screen by touching them with your finger or a stylus.

196. A(n) ______uses pictures or icons on the screen and menus to send commands to the computer system.

199. A(n) ______contains rows that are numbered and columns that are lettered.

203. ______software allows you to prepare federal and state returns.

204. ______is software that can be used to create and synthesize sound and music.

205. ______is a commonly used music and sound compression standard that is used on many portable music players.

212. Companies that provide users with access to the Internet through PoPs are called ______.

219. The protocol of the Web is called ______.

220. A(n) ______stores and delivers Web pages and other Web services such as interactive Web content.

223. A(n) ______allows you to run keyword searches on several search engines at once.

226. ______(such as smiley faces) combine keyboard characters to create a sideways facial expression.

228. A(n) ______is typically a binary file, such as an image file, Word document, music file, or spreadsheet, that travels along with an e-mail message but is not part of the e-mail ASCII text message itself.

229. ______is synchronous one-to-one text-based communication over the Internet.

230. Conducting classes over the Web with no physical class meetings is called ______.

235. The most recognized compressed digital audio file format is ______.

236. ______software such as iTunes, Windows Media Player, and RealPlayer, allows users to organize and play digital music, audio, and video files on PCs and media devices.

237. The process of transferring music from CD to MP3 or other digital audio format is called ______a CD.

239. Digital images are made up of a grid of small points called ______.

245. ______assists designers, engineers, and architects in designing three dimensional objects, from the gear mechanism in a watch to suspension bridges.

247. ______animation includes all of the complexity of 3D graphic rendering, multiplied by the necessity to render 24 3D images per second to create the illusion of movement.