CIS ch. 1-7
Define the six categories into which computers are generally classified.
-Embedded computers: performs specific functions to tasks -Mobile devices: small personal devices that contain built-in computing or internet capabilities -Personal computers: Fully functioning portable or desktop computers that are designed to be used by a single individual at a time -Servers: Computers that host data and programs available to a small group of users -Mainframe computers: powerful computers used to host large amount of data and programs available to a wide group of users -Supercomputers:extremely powerful computers used for complex computations and processing
Hybrid notebook-tablet computers are also called convertible tablets or ____.
2-in-1 Computers
____________________ are being used with increased frequency in text messaging and e-mail exchanged via mobile phones to speed up the text entry process.
Abbreviations
What does an output device do?
An output device accepts processed data from the computer and presents the end results to the user. This can be presented through the monitor, or paper using a printer
ISP servers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the major high-speed networks within a country, called a(n) ____________________ network.
Backbone
Discuss the role of computers on the job.
Computers play an important role in improving communication. This is most noticeable in the work force. Using applications such as email, businesses and coworkers are able to stay in constant contact without the hassle of playing phone tag.
Because of ____________________, many devices today are single units with multiple computing or Internet capabilities.
Convergence
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.
Emoticons
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
False
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
False
The physical parts of a computer are collectively referred to as ____________________.
Hardware
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
IPOS
Individual users connect to the Internet by connecting their computers or mobile devices to servers belonging to a(n) ____________________.
ISP
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?
Java
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.
JavaScript
One of the most common online security risks today is your computer becoming infected with a(n) ____________________.
Malware program
____ refers to guidelines for online behavior.
Netiquette
____________________ are computer professionals who write the programs that computers use.
Programmers computer programmers computer programmer programmer
Discuss the development and characteristics of second-generation computers.
Second-generation computers came about during the late 1950 and and early 1960s. They used transistors, which acted asa switch to open or close electrical circuits. This replaced the vacuum tubes.This allowed computers to be smaller, more powerful, cheaper, more energy-efficient, and more reliable. Common programs that were used are punch cards and magnetic tape were used for input.
____ refers to typing your entire e-mail message or online post using capital letters.
Shouting
____________________ are traditional appliances with some type of built-in computer or communications technology.
Smart Appliances
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
Smart appliances
Define the four primary operations of a computer.
The four primary operations of a computer are: -Input: entering data into a computer -Processing: Performing operations on the data -Output: presenting the results -Storage: saving data, programs, or output for future use
There are application programs that help users write their own programs in a form the computer can understand using a programming language.
True
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
USB flash drive
Ultraportables conforming to Intel's standards can be marketed as ____.
Ultrabooks
____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.
Web-based e-mail
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?
XHTML
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.
address
By their very nature, online communications lend themselves to ____.
anonymity
____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the Windows Start menu on Windows computers.
apps
Fifth-generation computers are most commonly defined as those that are based on ____________________, allowing them to think, reason, and learn.
artificial intelligence
Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.
authentication systems
In addition to the four primary computer operations, today's computers almost always perform ____ functions.
communication
____________________—technically an input or output operation, depending on which direction the information is going—is often considered the fifth primary computer operation.
communications
A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.
computer network
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?
computer operations personnel
Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.
desktop computers
____________________ is an alternative to traditional classroom learning in which students participate, typically at their own pace, from their current location instead of physically going to class.
distance learning
To contact people using the Internet, you most often use their ____.
e-mail address
A computer does not always do whatever the instructions, or program, tell it to do.
false
A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed.
false
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today.
false
Communications hardware includes modems, network projectors, and routers.
false
Computer programmers are the people who use computers to perform tasks or obtain information.
false
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules.
false
Embedded computers are computers that host data and programs available to a small group of users.
false
Independent Web sites such as Snopes.com reports on the sources of current online rumors and stories.
false
Mobile tablets are extremely powerful computers used for complex computations and processing.
false
Once you have an Internet connection, you are ready to begin programming the Web—that is, to use a Web browser to view Web pages.
false
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network—usually the Internet.
false
Spam refers to harmful programs that can be installed on our computers without our knowledge.
false
The ISP is the largest and most well-known computer network in the world.
false
The external hardware components are located inside the main box or system unit of the computer.
false
The slide rule is considered by many to be the earliest recorded calculating device.
false
Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.
hackers
Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.
hotspots
When data is processed into a meaningful form, it becomes ____.
information
____ occurs when data is entered into the computer.
input
To request a Web page or other resource located on the Internet, use its ____.
internet address
Consumer ____________________ are small self-service computer-based stations that provide information or other services to the public, including those used for ATM transactions and bridal registries.
kiosks
HTML is a(n) ____________________ or scripting language.
markup hypertext markup language markup language
A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.
microcomputer
In the early 1980s, ____ were invented and computer use increased dramatically.
microcomputers
A(n) ____ is a computer used to host programs and data for a network.
midrange server
____________________ payment systems allow individuals to pay for purchases using a smartphone or other device
mobile
A ____ is loosely defined as a small device that has built-in computing or Internet capability.
mobile device
A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections
moderms
Common input devices include the keyboard, ____, and integrated video cameras.
mouse
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?
notebook computer
Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.
python
Fifty years ago, computers were used primarily by researchers and ____
scientists
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.
search sites
The ____________________ used with a computer determine the tasks that the computer is able to perform.
software
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
software
A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.
spam
Unlike mainframe computers, which typically run multiple applications simultaneously to serve a wide variety of users,____________________ generally run one program at a time, as fast as possible.
supercomputer
Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.
third-generation computers
A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.
true
A user inputs data into a computer, and then the computer processes it.
true
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server).
true
Computer literacy is knowing about and understanding computers and their uses.
true
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage.
true
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
true
IP addresses and their corresponding domain names are used to identify computers available through the Internet.
true
Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.
true
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
true
Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.
true
Small office networks enable workers to access company records stored on a network server.
true
Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.
true
Systems analysts design computer systems to be used within their companies.
true
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
true
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop
true
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings
true
Wireless networking allows the use of computers in virtually any location.
true
Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.
two and one-half years
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.
uniform resource locator(URL)
The first computers were powered by thousands of ____________________ that needed to be constantly replaced, required a great deal of electricity, and generated a lot of heat.
vacuum tubes
One trend involving servers is ____________________, which means creating virtual (rather than actual) versions of a computing resource.
virtualization
The World Wide Web refers to one resource—an enormous collection of documents called ____________________—available through the Internet.
web pages