Computer Concepts for End Users: Unit 8
The AtanasoffBerry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.
false
The dotcom bubble occurred between the years 2008 and 2010
false
The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.
false
The terms outsourcing and offshoring are the same thing
false
Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.
false
Twoway radio technology went portable during World War I.
false
. ________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
first-generation
Which of the following descriptions best matches that of computer science degree?
focuses on computer architecture and how to program computers to make them work effectively and efficiently
Which of the following descriptions best matches that of computer engineering degree?
focuses on the design of computer hardware and peripheral devices, often at the chip level
Most computer historians agree that computers have evolved through _______ distinct generations.
four
A proprietary model called the __________ represents the position of a product during its life cycle of publicity
gartner hype cycle
In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
goods, services
The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.
gutta-percha
The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.
hollerith tabulating machine
_______________ are two of the world's largest exporters of ICT services.
india and ireland
1996 was the year that cable _______ service made its debut.
internet
Which of the following job descriptions best matches that of a systems analyst?
investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services
A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.
manual
An abacus is an example of a(n) _________ calculator.
manual
___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.
moore's law
Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.
morse code
Which of the following options offer selfstudy training to careerminded individuals who might not have the time or means to complete a traditional degree program?
nanodegree
A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
network
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
non-complete clause
____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
offshoring
Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers.
personal
Which of the following options is a useful format for your resume?
print, email and HTML
From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.
product life cycle
In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
productivity
A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
professional
A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.
programmer
With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
proprietary
The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
provide disruptive technologies
Which of the following would not be considered a common carrier?
radio
Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.
radio
The years between 1920 and 1960 are considered the Golden Age of ________.
radio
Highlevel programming languages were available for use on ________generation computers
second
With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers
security
. Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.
software
Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt
source
Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
tallinn manual
An information _________ degree programs focus on computer equipment and software used by businesses.
technology
A(n) _______________ uses available technology to work from home or an offsite location
telecommuter
__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.
telegraphy
A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals
telephone
The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.
television
Which of the following is not an example of an Information Technology Law?
the espionage act of 1917
. It was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
third
_______generation computers became possible by the development of integrated circuits
third
A key feature of the Apple Lisa was its use of _______________.
transistors
Secondgeneration computers used ________ instead of vacuum tubes.
transistors
. The Apple II computer included color graphics
true
. The 2002 SarbanesOxley Act is meant to offer protection to whistleblowers.
true
A computer that used an Intel 4004 microprocessor would be considered a fourthgeneration computer.
true
AtanasoffBerry Computer is often considered the first electronic digital computer
true
Colossus used binary arithmetic.
true
Historically, IT departments were part of an organization's finance department
true
ICT use in emerging nations lags behind its use in developed nations.
true
Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.
true
Moore's law accurately described the rate of chip innovation for the last 50 years.
true
Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States
true
Radio technology is the basis for cell phones and WiFi.
true
Samuel Morse developed and patented a telegraph system.
true
Technology workers encompass jobs such as telephone cable installers and radio broadcasters
true
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.
true
The first cellular phones to access the Internet and the Web were available in 1996
true
The first telephones were connected by pointtopoint networks, similar to those used by the telegraph system
true
The growth of the ICT industry has a generally upward trend.
true
Whistleblowing is risky under any circumstances.
true
Companies are classified into economic sectors according to the types of goods and services they provide
true
The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
vacuum tubes
Early computers that held both programs and data in memory became known as ________ architecture.
von Neumann
____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
whistleblowing
The first telephone was invented and patented by Alexander Graham Bell in ________.
1876
Telegraphy remained the major technology for intercontinental communication well into the ________.
1950s
Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.
1960s
Apple released the first Apple Macintosh computer in what year? ___________
1984
The Motorola DynaTAC 8000X was brought to market in what year? ___________
1984
Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.
4%
What generation of cell phone technology was the first to offer true mobile broadband?
4G
________ was designed to calculate trajectory tables for the U.S. Army.
ENIAC
_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.
GDP
Which of the following would be considered a thirdgeneration computer?
IBM 360
______ certification, offered by Certiport, covers basic computing knowledge and skills.
IC3
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
ICT industry
__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline
SCADA
Which of the following i would be considered a mechanical calculator?
Schikard's calculator, pascaline, de colmar's arithmometer
_____ was the first commercially successful computer.
UNIVAC
When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.
VisiCalc
A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.
algorithm
Babbage's __________ was an allpurpose computing device
analytical engine
Thomas de Colmar's _________ became the first massproduced mechanical calculator
arithmometer
. If you are hired as an entrylevel programmer, your job title would be a(n) ___________ programmer.
associate
A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
bubble
__________ goods are raw materials, tools, and machinery used by businesses to make consumer good
capital
A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.
cellular telephone
__________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.
certificates
. A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
code of ethics
________ was an electronic device designed to decode messages that were being sent between the german high command and their field commanders in WWII
colossus
A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
common carrier
Which of the following would not be considered a disruptive technology?
computers that run on OS X replacing computers that run on Windows 8
. ___________ is the obligation not to disclose willingly any information that should be kept private.
confidentiality
The information industry has three major facets: _________, computers, and telecommunications.
content
________ workers are not official employees of a company
contract
_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.
cyberwarfare
A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.
database
The Harvard Mark I was digital but used _________ rather than binary representation
decimal
Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?
digital millennium copyright act
________ technology displaces an existing business process, market, industry, or product.
disruptive
The term professional _______ refers to onthejob choices and actions that reflect a person's values.
ethics
Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.
exchange
A Web site developer manages an organization's online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.
false
A manual calculator implements algorithms autonomously
false
Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.
false
Certification alone is sufficient to qualify for a job in the IT industry.
false
ENIAC's memory held programs but not data
false
HTML is the best format for an effective resume
false