CIS ch. 1-7

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Define the six categories into which computers are generally classified.

-Embedded computers: performs specific functions to tasks -Mobile devices: small personal devices that contain built-in computing or internet capabilities -Personal computers: Fully functioning portable or desktop computers that are designed to be used by a single individual at a time -Servers: Computers that host data and programs available to a small group of users -Mainframe computers: powerful computers used to host large amount of data and programs available to a wide group of users -Supercomputers:extremely powerful computers used for complex computations and processing

Hybrid notebook-tablet computers are also called convertible tablets or ____.

2-in-1 Computers

____________________ are being used with increased frequency in text messaging and e-mail exchanged via mobile phones to speed up the text entry process.

Abbreviations

What does an output device do?

An output device accepts processed data from the computer and presents the end results to the user. This can be presented through the monitor, or paper using a printer

ISP servers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the major high-speed networks within a country, called a(n) ____________________ network.

Backbone

Discuss the role of computers on the job.

Computers play an important role in improving communication. This is most noticeable in the work force. Using applications such as email, businesses and coworkers are able to stay in constant contact without the hassle of playing phone tag.

Because of ____________________, many devices today are single units with multiple computing or Internet capabilities.

Convergence

____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

Emoticons

In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.

False

To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.

False

The physical parts of a computer are collectively referred to as ____________________.

Hardware

The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.

IPOS

Individual users connect to the Internet by connecting their computers or mobile devices to servers belonging to a(n) ____________________.

ISP

Case-Based Critical Thinking Questions ​ Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

Java

Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.

JavaScript

One of the most common online security risks today is your computer becoming infected with a(n) ____________________.

Malware program

____ refers to guidelines for online behavior.

Netiquette

____________________ are computer professionals who write the programs that computers use.

Programmers computer programmers computer programmer programmer

Discuss the development and characteristics of second-generation computers.

Second-generation computers came about during the late 1950 and and early 1960s. They used transistors, which acted asa switch to open or close electrical circuits. This replaced the vacuum tubes.This allowed computers to be smaller, more powerful, cheaper, more energy-efficient, and more reliable. Common programs that were used are punch cards and magnetic tape were used for input.

____ refers to typing your entire e-mail message or online post using capital letters.

Shouting

____________________ are traditional appliances with some type of built-in computer or communications technology.

Smart Appliances

Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

Smart appliances

Define the four primary operations of a computer.

The four primary operations of a computer are: -Input: entering data into a computer -Processing: Performing operations on the data -Output: presenting the results -Storage: saving data, programs, or output for future use

There are application programs that help users write their own programs in a form the computer can understand using a programming language.

True

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

USB flash drive

Ultraportables conforming to Intel's standards can be marketed as ____.

Ultrabooks

____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.

Web-based e-mail

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?

XHTML

To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.

address

By their very nature, online communications lend themselves to ____.

anonymity

____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the Windows Start menu on Windows computers.

apps

Fifth-generation computers are most commonly defined as those that are based on ____________________, allowing them to think, reason, and learn.

artificial intelligence

Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.

authentication systems

In addition to the four primary computer operations, today's computers almost always perform ____ functions.

communication

____________________—technically an input or output operation, depending on which direction the information is going—is often considered the fifth primary computer operation.

communications

A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.

computer network

Case-Based Critical Thinking Questions ​ Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?

computer operations personnel

Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.

desktop computers

____________________ is an alternative to traditional classroom learning in which students participate, typically at their own pace, from their current location instead of physically going to class.

distance learning

To contact people using the Internet, you most often use their ____.

e-mail address

A computer does not always do whatever the instructions, or program, tell it to do.

false

A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed.

false

Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today.

false

Communications hardware includes modems, network projectors, and routers.

false

Computer programmers are the people who use computers to perform tasks or obtain information.

false

Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules.

false

Embedded computers are computers that host data and programs available to a small group of users.

false

Independent Web sites such as Snopes.com reports on the sources of current online rumors and stories.

false

Mobile tablets are extremely powerful computers used for complex computations and processing.

false

Once you have an Internet connection, you are ready to begin programming the Web—that is, to use a Web browser to view Web pages.

false

Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network—usually the Internet.

false

Spam refers to harmful programs that can be installed on our computers without our knowledge.

false

The ISP is the largest and most well-known computer network in the world.

false

The external hardware components are located inside the main box or system unit of the computer.

false

The slide rule is considered by many to be the earliest recorded calculating device.

false

Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.

hackers

Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.

hotspots

When data is processed into a meaningful form, it becomes ____.

information

____ occurs when data is entered into the computer.

input

To request a Web page or other resource located on the Internet, use its ____.

internet address

Consumer ____________________ are small self-service computer-based stations that provide information or other services to the public, including those used for ATM transactions and bridal registries.

kiosks

HTML is a(n) ____________________ or scripting language.

markup hypertext markup language markup language

A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.

microcomputer

In the early 1980s, ____ were invented and computer use increased dramatically.

microcomputers

A(n) ____ is a computer used to host programs and data for a network.

midrange server

____________________ payment systems allow individuals to pay for purchases using a smartphone or other device

mobile

A ____ is loosely defined as a small device that has built-in computing or Internet capability.

mobile device

A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections

moderms

Common input devices include the keyboard, ____, and integrated video cameras.

mouse

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

notebook computer

Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.

python

Fifty years ago, computers were used primarily by researchers and ____

scientists

There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

search sites

The ____________________ used with a computer determine the tasks that the computer is able to perform.

software

The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

software

A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.

spam

Unlike mainframe computers, which typically run multiple applications simultaneously to serve a wide variety of users,____________________ generally run one program at a time, as fast as possible.

supercomputer

Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.

third-generation computers

A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.

true

A user inputs data into a computer, and then the computer processes it.

true

An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server).

true

Computer literacy is knowing about and understanding computers and their uses.

true

Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage.

true

Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.

true

IP addresses and their corresponding domain names are used to identify computers available through the Internet.

true

Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.

true

Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.

true

Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.

true

Small office networks enable workers to access company records stored on a network server.

true

Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.

true

Systems analysts design computer systems to be used within their companies.

true

Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.

true

The background work area displayed on the screen for computers running Microsoft Windows is called the desktop

true

Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings

true

Wireless networking allows the use of computers in virtually any location.

true

Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.

two and one-half years

Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.

uniform resource locator(URL)

The first computers were powered by thousands of ____________________ that needed to be constantly replaced, required a great deal of electricity, and generated a lot of heat.

vacuum tubes

One trend involving servers is ____________________, which means creating virtual (rather than actual) versions of a computing resource.

virtualization

The World Wide Web refers to one resource—an enormous collection of documents called ____________________—available through the Internet.

web pages


Kaugnay na mga set ng pag-aaral

Chapter 69: Management of Patients With Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set

Chapter 15 - Managing Communication

View Set

Colorado Property - Certificate Exam

View Set

Nurs 107 Prep U Chapter 33 Assessment and Management of Patients with Allergic Disorders

View Set

Chapter 6 - Arrays, Chapter 7, Chapter 8

View Set