Computer Concepts for End Users: Unit 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The AtanasoffBerry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.

false

The dotcom bubble occurred between the years 2008 and 2010

false

The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.

false

The terms outsourcing and offshoring are the same thing

false

​Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.

false

​Twoway radio technology went portable during World War I.

false

. ​________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.

first-generation

​Which of the following descriptions best matches that of computer science degree?

focuses on computer architecture and how to program computers to make them work effectively and efficiently

Which of the following descriptions best matches that of computer engineering degree?

focuses on the design of computer hardware and peripheral devices, often at the chip level

​Most computer historians agree that computers have evolved through _______ distinct generations.

four

A proprietary model called the __________ represents the position of a product during its life cycle of publicity

gartner hype cycle

In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.

goods, services

The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.

gutta-percha

​The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.

hollerith tabulating machine

​_______________ are two of the world's largest exporters of ICT services.

india and ireland

​1996 was the year that cable _______ service made its debut.

internet

Which of the following job descriptions best matches that of a systems analyst?

investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services

A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.

manual

An abacus is an example of a(n) _________ calculator.

manual

___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.

moore's law

Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.

morse code

​Which of the following options offer selfstudy training to careerminded individuals who might not have the time or means to complete a traditional degree program?

nanodegree

A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.

network

​Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.

non-complete clause

​____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.

offshoring

Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers.​

personal

Which of the following options is a useful format for your resume?

print, email and HTML

From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.

product life cycle

In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.

productivity

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

professional

A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.

programmer

With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.

proprietary

The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?

provide disruptive technologies

Which of the following would not be considered a common carrier?

radio

​Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.

radio

​The years between 1920 and 1960 are considered the Golden Age of ________.

radio

Highlevel programming languages were available for use on ________generation computers

second

With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers

security

. ​Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.

software

​Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt

source

Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.

tallinn manual

An information _________ degree programs focus on computer equipment and software used by businesses.

technology

A(n) _______________ uses available technology to work from home or an offsite location

telecommuter

__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.

telegraphy

A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals

telephone

​The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.

television

​Which of the following is not an example of an Information Technology Law?

the espionage act of 1917

. ​It was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.

third

_______generation computers became possible by the development of integrated circuits

third

A key feature of the Apple Lisa was its use of _______________.​

transistors

Secondgeneration computers used ________ instead of vacuum tubes.​

transistors

. The Apple II computer included color graphics

true

. ​The 2002 SarbanesOxley Act is meant to offer protection to whistleblowers.

true

A computer that used an Intel 4004 microprocessor would be considered a fourthgeneration computer.

true

AtanasoffBerry Computer is often considered the first electronic digital computer

true

Colossus used binary arithmetic.

true

Historically, IT departments were part of an organization's finance department

true

ICT use in emerging nations lags behind its use in developed nations.

true

Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.

true

Moore's law accurately described the rate of chip innovation for the last 50 years.

true

Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States

true

Radio technology is the basis for cell phones and WiFi.

true

Samuel Morse developed and patented a telegraph system.

true

Technology workers encompass jobs such as telephone cable installers and radio broadcasters

true

The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.

true

The first cellular phones to access the Internet and the Web were available in 1996

true

The first telephones were connected by pointtopoint networks, similar to those used by the telegraph system

true

The growth of the ICT industry has a generally upward trend.

true

Whistleblowing is risky under any circumstances.​

true

​Companies are classified into economic sectors according to the types of goods and services they provide

true

The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.

vacuum tubes

​Early computers that held both programs and data in memory became known as ________ architecture.

von Neumann

____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.

whistleblowing

The first telephone was invented and patented by Alexander Graham Bell in ________.

1876

​Telegraphy remained the major technology for intercontinental communication well into the ________.

1950s

​Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.

1960s

Apple released the first Apple Macintosh computer in what year? ___________

1984

The Motorola DynaTAC 8000X was brought to market in what year? ___________

1984

Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.

4%

What generation of cell phone technology was the first to offer true mobile broadband?

4G

​________ was designed to calculate trajectory tables for the U.S. Army.

ENIAC

_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.

GDP

Which of the following would be considered a thirdgeneration computer?

IBM 360

______ certification, offered by Certiport, covers basic computing knowledge and skills.

IC3

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​

ICT industry

​__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline

SCADA

Which of the following i would be considered a mechanical calculator?

Schikard's calculator, pascaline, de colmar's arithmometer

​_____ was the first commercially successful computer.

UNIVAC

When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.​

VisiCalc

​A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.

algorithm

Babbage's __________ was an allpurpose computing device

analytical engine

Thomas de Colmar's _________ became the first massproduced mechanical calculator

arithmometer

. ​If you are hired as an entrylevel programmer, your job title would be a(n) ___________ programmer.

associate

​A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

bubble

​__________ goods are raw materials, tools, and machinery used by businesses to make consumer good

capital

A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.

cellular telephone

__________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.

certificates

. ​A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

code of ethics

​________ was an electronic device designed to decode messages that were being sent between the german high command and their field commanders in WWII

colossus

A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.

common carrier

Which of the following would not be considered a disruptive technology?

computers that run on OS X replacing computers that run on Windows 8

. ​___________ is the obligation not to disclose willingly any information that should be kept private.

confidentiality

The information industry has three major facets: _________, computers, and telecommunications.​

content

________ workers are not official employees of a company

contract

​_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.

cyberwarfare

A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.

database

The Harvard Mark I was digital but used _________ rather than binary representation

decimal

Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?

digital millennium copyright act

________ technology displaces an existing business process, market, industry, or product.

disruptive

The term professional _______ refers to onthejob choices and actions that reflect a person's values.

ethics

​Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.

exchange

A Web site developer manages an organization's online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.

false

A manual calculator implements algorithms autonomously

false

Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.

false

Certification alone is sufficient to qualify for a job in the IT industry.

false

ENIAC's memory held programs but not data

false

HTML is the best format for an effective resume

false


Ensembles d'études connexes

Chapter 108: Dietary Supplements

View Set

ITEC 451 Mining Frequent Patterns, Association, and Correlations

View Set

Funeral Directing - Roman Catholic - Exam III

View Set

Chapter 7 Control of gene expression

View Set

MS 2 Module 2 Quiz 4 - Client Needs - Health Promotion & Maintenence

View Set

Business Associations - multiple choice questions

View Set

Fraud Examination - AC313 (Unit 2)

View Set

Developmental Exam 4 Chapter 13 Lecture/Review

View Set

"Chapter 18: Nutrition for Patients with Disorders of the Lower GI Tract & Accessory Organs"

View Set