Using Information Technology 9th edition

advertisement
Chapter 1
1. The World Wide Web refers to the part of the internet that presents information in multimedia
form.
2. The two main types of microcomputers are the Desktop PCs ,which sits on the desktop, and
the Tower PCs, which usually is placed on floor.
3. “ Information technology “merges computing with high speed communications.
4. A(n) Computer is an electronic machine that accepts data and processes it into information.
5. The Internet is a worldwide network that connects hundreds of thousands of smaller network.
6. Multimedia refers to information presented in nontextual forms such as video, sound , and graphics.
7. Supercomputers are high-capacity machines with thousands of processors.
8. Embedded computers , or microcontrollers , are installed in “smart” appliances and automobiles.
9. The kind if software that enables users to perform specific tasks is calledApplication software.
10. RAM is an example of primary storage, and a hard drive is an example of secondary storage .
11. A(n) network is a communications system connecting two or more computers.
12. The four basic operations of all computers are Input , Processing , Storage, and Output.
13. The first programmable computers in the USA, which appeared in 1946, was called
the ENIAC(Electronic Numerical Integrator and Calculator).
14. The Monitor is the display device that takes the electrical signals from the video card and forms an
image using points of colored light on the screen.
15. The base material for computer processing devices is silicon ,a natural element found in sand.
16. The general term for all the machinery and equipment in a computer system is hardware.
17. Keyboard and Mouse are the two most common input devices.
18. The processor chip, commonly called the processor or a CPU ,is a tiny pieces of silicon that contains
millions of miniature electronic circuits.
19. One gigabyte is approximately 1 billion characters.
Multiple choice questions
1. Which of the following devices converts computer output into displayed images?
1. Printer
2. b. Monitor
3. Floppy-Disk drive
4. Processor
5. Hard-Disk drive
2. Which of the following computer types is the smallest?
1. Mainframe
2. Microcomputer
3. c. Microcontroller
4. Supercomputer
5. Workstation
3. Which of the following is the secondary-storage devices?
1. Processor
2. Memory chip
3. c. Floppy-Disk drive
4. Printer
5. Monitor
4. Since the days when computers were first made available , computers have developed in three
directions. What are they?
1. Increased expense
2. b. Miniaturization
3. Increased size
4. d. Affordability
5. e. Increase speed
5. Which of the following operations constitute the four basic operations followed by all
computers?
1. Input
2. Storage
3. Programming
4. Output
5. e. Processing
6. Supercomputers are used for
1. Breaking codes
2. Simulations for explosions f nuclear bombs
3. Forecasting weather
4. Keeping planets in orbit
5. All of these
6. f. Only a , b , and c
7. What is the leading use of computers?
1. Web surfing
2. b. Email
3. e-shopping
4. word processing
8. Which is the main circuit board in the computer?
1. RAM chip(random access memory)
2. CPU processor chip(central processing unit)
3. c. Motherboard(system board)
4. Hard drive
9. A terabyte is approximately
1. One million characters
2. One billion characters
3. c. One trillion characters
4. One quadrillion characters
10. Speakers are an example of
1. An input device
2. b. An output device
3. A processor
4. A storage device
True / False Questions
1. Mainframe computers process faster than microcomputers.(T)
2. Main memory is a software component.(F)
3. The operating system is part of the system software.
4. Processing is the manipulation by which a computer transforms data into information.(T)
5. Primary storage is the area in the computer where data or information is held permanently.(F)
6. The keyboard and the mouse are examples of input devices.(T)
7. Movies are a form of multimedia.(T)
8. Computers are becoming larger , slower , and more expensive.(F)
9. Modems store information.(F)
10.
11.
12.
13.
A microcomputers is used to view very small objects.(F)
A hard disc is an example of software.(F)
Computers continue to get smaller and smaller.(T)
Supercomputers are particularly inexpensive.(F)
Stage 2 :
Short answer Questions
1. What does online mean?
online means using a computer or some other information device, connected through a network, to
access information and services from another computer or information devices.
1. What is the difference between the system software and application software?
System software is software that helps the computer to perform essential operational task,
application software is a software developed to solve a particular problem , perform useful work on
general-purpose tasks, or provide entertainment.
1. Briefly define cyberspace.
Cyberspace is a term used to refer to not only the online world and internet in particular but also the
whole wired and wireless world of communications in general.
1. What is the difference between software and hardware?
Hardware is all machinery and equipment in a computer system. Software is a program that instruct
hardware to perform a task.
1. What is local area network?
A local area network(LAN) connects, usually by special cable, a group of desktop PCs and other devices
, such as printers, in a office or a building.
1. What is multimedia?
Technology that presents information more than one medium, such as text , still images , moving
images , and sound.
1. What is the difference between microcomputers and supercomputers?
The size , processing speed , price of supercomputers are totally different with microcomputer.
Supercomputers usually used in research purpose , microcomputer is a personal computer with
various purpose.
1. What is the function of RAM?
RAM – temporary storage that hold data before processing and information after processing.
1. What does downloading mean?
Downloading means transferring data from a remote computer to one’s own computer.
10. What is meant by connectivity?
Ability to connect to computers to one another by communications lines to provide online
information access and sharing the peripheral devices.
11. Describe some ways that information technology can be used to help people find jobs and help jobs
find people.
Post resume online , online job search.
12. Compare the use of email to the use of the telephone and of conventional letters sent via the postal
system. Which kind of communications are best suited for which medium?
13. What is the basic meaning if cloud computing?
Concepts of storing your software or data not on your own PC but on the servers on internet.
Stage 3 :
Applying , Analyzing , Synthesizing , Evaluating
Knowledge in action
1. Computer prices are constantly falling .Whatever you pay for a computer today , you can be
certain that you will be able to buy a more powerful computer for less money a year from now.
So how can you decide when it’s good time to upgrade to a better computer ?Paradoxically , it
seems that no matter how you time it, you’ll always lose , because prices will go down again
soon, and yet you will also always gain , because , since you were going to upgrade sooner or
later anyway, you will reap the benefits of having the more powerful equipment that much
longer.
Discuss the benefits and costs , both material and psychological , of “waiting until prices drop.”Gather
more information on this topic by asking friends and colleagues what choices they have made about
upgrading equipment over the years and whether they feel satisfaction or regret about the timing when
they finally did upgrade.
I think the material benefit for waiting until the prices drop is you can save your money, because the
computer prices will surely falling ,but you will has the psychological cost , that is your computer is
not up to date. But no one can guarantee that the new technology developed will always better than
the old one, so if you wait until the prices drop , you will know more about the advantages and
disadvantages of that technology.
9. It has been said that the computer is a “meta medium” because it can simulate (behave as) any
other medium. Thus a computer can present text that can be read from virtual “pages” as if it were a
book; it can let you compose and print text as if it were a typewriter; it can play music as if it were a
boombox; it can make telephone calls as if it were a telephone; it can let you “draw” and “paint”; it can
be programmed to serve as an answering machine; and so forth.
Imagine a future in which computer have replaced all the things they can emulate: instead of books and
magazines and newspapers, we would have text only on computers. Telephones , PDAs , television sets,
VCR’s ,DVD players, stereo sets, and other electronic devices would all be gone or , rather, subsumed by
computers. What benefits to your life can you see in such a future? What things might be worse ? What
dangers can you see? Do you think this kind of radical convergence is likely ?if so, how long do you think
it will take.
The benefits is our life become easier , and convenient. But the worse things is we will depend to
much on computers. If there aren’t any computers, we can’t do anything. But to reach this kind of
state , it will still have a long way to go. First , we need a large amount if computer units.
Web exercises
6. “Moore’s Law” predicts the rate at which computers will continue to get smaller ( and hence faster ).
The “law” has proved to be astonishingly accurate over many years. Do a web search for Moore’s law
and see if you can find answers to the following questions :
1. Who is Moore , and when did he make the prediction we know as Moore’s law?
Moore is Intel co-founder ,he make the prediction at 1965
1. What is the simplest statement of the law’s prediction?
number of components in integrated circuits will doubled at least every 2 years
1. How has the law changed overtime?
now, it need least than two years for the components in integrated ciccuits to be doubled.
1. How much longer is the law expected to hold true?
it is supposed to be true until 2015 or later.
1. How does the law affects the business projection?
Moore’s law drived the business in the development of computers, where it becomes the targets
for research and development.
Chapter 2
Self test questions
1. Today’s data transmission speed’s are measured in Bps , Kbps , Mbps, and Gbps.
2. A(n) cable modem ,connects a personal computer to a cable-TV system that offers an internet
connection.
3. A space station that transmits data as microwaves is a communications satellite.
4. A company that connects you through your communications line to it’s server , which connects
you to the internet, is a(n)ISP.
5. A rectangular area on the computer screen that contains a document or displays an activity is
called a(n) Window.
6. Flaming is writing an online message that uses derogatory , obscene , or inappropriate language.
7. A(n)Web browser is a software that enables users to view web pages and to jump from one
page to another.
8. A computer with a domain name is called a(n)server.
9. HTTP comprises the communications rules that allow browsers to connect with web servers.
10. A(n) plug in is aprogram that adds a specific feature to a browser, allowing it to play or view
certain files.
11. Unsolicited email in the form of advertising or chain letters known as Spam.
12. The expression of how much data-text, voice,video,and so on – can be sent through
communications channel in a given amount of time is known as bandwidth.
13. A(n) URL is a string of characters that points to a specific piece of information somewhere in the
web.
14. Some websites may leave files on your hard disk that contain information such as your name,
password, and preferences; they are called cookies.
15. Using trusted institutional names to elicit confidential information is called Phising.
16. The kind of spyware that can record each characters you type and transmit that information to
someone else on the internet , making it possible to strangers to learn your passwords and
other information, is called Key logger.
Multiple –Choice Questions
1. Kbps means how many bits per second?
a.
b.
c.
d.
e.
1 billion
1 thousand
1 million
1 hundred
1 trillion
1. A location on the internet is called a
a.
b.
c.
d.
e.
Network
User ID
Domain
Browser
Web
1. In the email address Kim_Lee@earthlink.net.us, Kim_Lee is the
a.
b.
c.
d.
e.
Domain
URL
Site
User ID
Location
1. Which of the following is not one of the four components of a URL?
a.
b.
c.
d.
e.
Web protocol
Name of the web server
Name of the browser
Name of the directory on the web server
Name of the file within the directory
1. Which of the following is the fastest method of data transmission?
a.
b.
c.
d.
e.
ISDN
DSL
Modem
TI line
Cable modem
1. Which of the following is not netiquette rule?
a.
b.
c.
d.
e.
Consults FAQ
Flame only when necessary
Don’t shout
Avoid huge file attachment
Avoid sloppiness and errors
1. Which protocol is used to retrieve email messages from the server to your computer?
a.
b.
c.
d.
HTTP
SMTP
POP3
POP
1. Who owns internet?
a.
b.
c.
d.
Microsoft
IBM
Apple
U.S.government
e. No one owns the internet; the components that make up the internet are owned and
thousands of public and private entities.
shared by
1. Each time you connect to your ISP, it will assign your computer a new address called a(n)
a.
b.
c.
d.
e.
Domain
IP address
Plug – in
POP
URL
1. ISPs that don’t run their own backbones connects to an internet backbones through a
a. NAP
b. Web portal
c. Web browser
d. URL
e. TCP/IP
1. Which of the following is not protocol?
a. TCP/IP
b. IE
c. HTTP
d. SMTP
1. The sending of phony email that pretends to be from a credit card company or bank, luring you
to website that attempts to obtain confidential information from you is called
a.
b.
c.
d.
e.
Spoofing
Phishing
Spamming
Keylogging
Cookies
True / false Questions
1. POP3 is used for sending email, and SMTP is used for retrieving email. (T)
2. A dial up modem is an ISP.(F)
3. Replying to spam email messages with statement “remove” will always get spammers to stop
sending you unsolicited email.(F)
4. All computer communications use the same bandwidth(F)
5. A TI line is the slowest but cheapest form of internet connection.(F)
6. A dynamic IP address gives you faster internet access than a static IP address does(F)
7. A bookmark lets you return to a favorite website quickly(T)
8. Radio buttons are used for listening to radio stations on the internet(F)
9. Spoofing means using fake email sender names(T)
10. Hypertext refers to text presented with very large letters.(F)
Short answer Questions
1. Name three metods of data transmission that are faster than a regular modem connection
T1 line , cable modem , satellite wireless connection
1. What does log on mean?
To make a connection to a remote computer
1. What is netiquette, and why is it important?
“Network etiquette” or appropriate online behavior. because internet is used world wide , you will
need a good behavior to use internet
1. Briefly define bandwidth.
An expression of how much data-text, voice , video ,or so on-can be sent through a communications
channel in a given amount of time.
1. Many web documents are “linked”.What does that mean?
Connected to the other documents or webages that contain related information.
1. Compare and contrast a cable modem service to DSL service

DSL receive data at the rate 1.5-10 Mbps and can send data at only 128kbps-1.5mbps, you can
download 6 minute music video in only 11 minutes. The advantage of DSL is that it is always
on and its transmission rate is relatively consistent.

Cable modem send data at rate 1.4Mbps-30Mbps, you can download 6 minute music video in
only 2 minutes. The disadvantage of cabel modem is that you and your cable TV viewing
neighbours are sharing the system and consequently, during the peek load times , your service
may be slowed to the speed of a regular dial-up modem. Also using an internet connection
that is always on-and that , in the case of cable, you share with other people-invites outside
interference with your computer.
1. Explain the basics of how the internet works
Dial up with your client computer’s modem connecting via a local phone call to your ISP.
1. What expanded functions does IMAP have?
If your access provider and email software support IMAP , you can search through your email
messages while they are still on the access provider’s server before you download them
1. Briefly explain what TCP/IP does.
IP is used to send the packets across the internet to their final destination, and TCP is used to
reassemble the packets in the correct order.
1. Why was ICANN established?
To regulate human friendly internet domain names-those addresses ending with .com , .org , .net and
so on, that overlie IP addresses and identify the website type.
1. What’s the difference between a dynamic IP address and a static IP address?
Dynamic ip address is an IP address that will change everytime you connect to internet ,Static IP
address is an IP address that will remain the same everytime you connect to the internet.
1. Explain what a blog is.
Short for web blog, an internet journal. Blogs are usually updated daily ;they reflect the personality
and views of the blogger.
1. State your answer to a person who asks you the question “Who owns the internet?”
Nobody owns internet , we the user of the internet owns it ourself.
1. What is B2B commerce?
Electronic sale or exchange of goods and services directly between , cutting out traditional
intermediaries
1. List and briefly describe three kind of spyware

Adware
Is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted
and unsolicited pop-up or other ads.

Browser hijackers
Change setting in your browser without your knowledge , often changing your browser’s home page
and replacing it with another web page

Search hijackers
Intercept your legitimate search requests made to real search engines and return results from phony
search services designed to send you to sites they run.
Stage 3
Knowledge in action
7.
Email and IM are ways of sending text messages back and forth to other people on the internet.
They seem very similar : in both , you compose a message , and when it’s ready , you send it; and when
someone else sends something to you, you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths
and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone,
whereas email is more like corresponding by letter.
As you use email and IM during the course of the term, watch for differences between them. Which
medium is more appropriate for which kinds of relationships and communications? Which medium is
more stressful to use? Which takes more time? Which is more convenient for you? Which one is more
useful for getting real work done? Which medium would you use if you knew that whatever you wrote
was eventually going to be published in a book. If you were restricted to using only one of these
communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think email is better for formal
conditions and relationships such as from employers to employee.
I think email is stressful to use , because we need to write it in formal language, and it take more time
to send an email rather than IM.
About which one is more convenient for me is depend on the conditions and to whom my message
will be sent. If my message is for my friends , I may use IM ,but if it is for my boss, or my lecturer , I
would rather use Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a book , and if I was restricted
to using only one of these communications methods ,I would rather use email, because it s written in
a formal language.
10. As we have discussed in this chapter, the internet is both goldmine and minefield. There are vast
riches of information , entertainment, education, and communication to be found, but there are also
snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should
you do to avoid these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that everything in this world is not
“FREE”. And to avoid spyware , adware , browser hijacker , and key logger is simple, be careful with
“FREE download” , be sure to prepare your computer with antivirus , or antispyware before
downloading.
Chapter 3
Self – Test Questions
1. System software enables the computer to perform essential operating tasks.
2. Application software is a term for programs designed to perform specific tasks for the user.
3. Multitasking is the activity in which a computer works on more than one process at a time.
4. Fragmentation is the scattering of portions of files about the disk in nonadjacent areas, thus
greatly slowing access to the file.
5. Windows and Mac OS are generally used on personalcomputers.
6. Booting is the process of loading an operating system into a computer’s main memory.
7. A(n) defragger is a utility that will find all the scattered files on your hard disk and reorganize
them as contiguous file.
8. The Operating system is the component of system software that comprises the master system
of programs that manage the basic operations of the computer.
9. The user interface is the user controllable display screen that allows you to communicate, or
interact, with your computer.
10. Disk scanner and disk cleanup utilities detect and correct certain types of common problems on
hard disks, such as removing unnecessary files called temp files that are created by windows
only for short tasks and system restore after system problem.
11. OSs allows users to control access to their computers via use of a username and a password.
12. Software or hardware that is copyrighted means that it is privately owned and controlled by a
company.
13. Linux is open – source software-meaning any programmer can download it from the internet for
free and modify it with suggested improvements.
14. When you power up a computer by turning on the power “on” switch, this is called a cold boot.if
your computer is already on and you restart it, this is called warm boot.
15 Word processing software allows you to create and edit documents.
16 Scrolling is the activity of moving upward or downward through the next or other screen
display.
17 Name four editing features offered by word processing programs : insert & delete , find and
replace , cut/copy & paste, Spelling checker.
18 In a spreadsheet, the place where a row and a column intersect is called a cell .
19 The cursor is the moveable symbol on the display screen that shows you where you may next
enter data or commands.
20 When you buy a software, you pay for a
software license , a contract by which you
agree not to make copies of the software to give away or sell.
21 Records In database are sorted according to a key .
22 Desktop publishing involves mixing text and graphics to produce high quality output for
commercial printing.
23 A spreadsheets allows users to create tables and do “what-if” financial analyses by entering
data and formulas into rows and columns arranged as a grid on a display screen.
24 Word warp automatically continues text to the next line when you reach the right margin.
25 Settings that are automatically used by a program unless the user specifies otherwise are
called Default-Settings .
26 Public-Domain software is not protected by copyright and may be copied to anyone.
27 Device drivers are specialized software programs that allow input and output devices to
communicate with the rest of the computer system.
28 The Portable document format allows documents to be sent to almost any platform and be
opened without losing any of their characteristics (text, colors, graphics, formatting)
Short-Answer Questions
9
What is open-source software?
Open source software meaning any programmer can download it from the internet for free and
modify it with suggested improvements.
10 What does defragmenting do?
Find all scattered files on hard disk and reorganize them as contiguous files.
11 What is an embedded system?
Any electronic system that uses CPU chip but that is not general workstation , desktop , or laptop
computer . for example : automobiles , planes , trains , barcode scanners , fuel pumps.
12 What are the following types of application software used for?
1. Project management software
A program used to plan an schedule people , costs , and resources required to complete a
project on time.
1. Desktop-publishing software
A program used to design and produce high quality output which include mixing text and
graphics for commercial printing.
1. Database software
A program that sets up and controls the structure of a database and access to the data.
1. Spreadsheet software
A program that allow users to create tables and financial schedules by entering data and
formulas into rows and columns arranged as a grid on a display screen.
1. Word processing software
A program that allow you to use computers to create , edit . format , print , and score text
material.
13 Which program is more sophisticated, analytical graphics or presentation graphics ?Why ?
Presentation graphics , because presentation graphics uses graphics , animation , sound , and
data or information to make visual presentation while analytical graphics only convert
numeric data into graph to make it easier to analyzed.
14 How are the following different from another? Pop up menu; pull-down menu; cascading
menu.
A pop up menu is a list of command options that can “pop up” anywhere on the screen when
you click the right mouse button.
Pull-down menu also called drop down menu is a list of options that pulls down from the
menu bar at the top of the screen .
Cascading menu is a menu that seem to fly back to the right or explode out to the right,
wherever there is a space.
The difference between them is pop up menu didn’t connected to the menu bar , while pull
down menu and cascading menu is connected to the menu bar .choosing one of the options in
pulls down menu may produce cascading menu.
15 What is importing? Exporting ?
Importing is defined as getting data from another source and then converting it into a format
compatible with the program in which you are currently working.
Exporting is defined as transforming data into a format that can be used in another program
and then transmitting it.
16 Briefly compare drawing programs and painting programs.
Drawing program illustrate objects and products by creating vector images (images created
from geometrical formulas) while painting image simulate painting on the screen. Painting
images produce bit-mapped image , or raster image , made up of little dots.
17 Explain what computer-aided design(CAD)programs do.
CAD is a programs used for design products , structures , civil engineering drawings , and
maps.
18 Discuss the various software licenses : site licenses, concurrent-use licenses, multiple-user
licenses, single-user license.
Site license is a license that allow software to be used on all computers at a specific location.
Concurrent-use licenses allow a certain number of copies of the software to be used at the
same time.
Multiple user license specifies the number of people who may use the software.
Single user license limits software use to one user at a time.
Multiple-Choice questions
1. Which of the following are functions of the operating system?
a.
b.
c.
d.
e.
File management
CPU management
Task management
Booting
All of these
1. Which of the following was the first major microcomputer OS?
a.
b.
c.
d.
e.
Mac OS
Windows
DOS
Linux
Unix
1. Which of the following is a prominent network operating system?
a.
b.
c.
d.
e.
Linux
Ubuntu
Windows NT
DOS
Mac OS
1. Which of the following is the newest Microsoft Windows operating system?
a.
b.
c.
d.
e.
Windows Vista
Windows XP
Windows 7
Windows NT
Windows CE
1. Which of the following refers to the execution of two or more programs by one user almost at
the same time on the same computer with one central processor?
a.
b.
c.
d.
e.
Multitasking
Multiprocessing
Time-sharing
Multiprogramming
Coprocessing
1. Which of the following are specialized software programs that allow input and output devices to
communicate with the rest of the computer system?
a. Multitasking
b. Boot-disks
c. Utility programs
d. Device drivers
e. Service packs
7 Which of the following is not an advantage of using database software ?
a. Integrated data
b. Improved data integrity
c. Lack of structure
d. Elimination of data redundancy
8
a.
b.
c.
d.
e.
Which of the following is not a feature of word processing software?
Spelling checker
Cell address
Formatting
Cut and paste
Find and replace
9
a.
b.
c.
d.
e.
What is the common consumer computer interface used today?
Command-drived interface
Graphical user interface
Menu-driven interface
Electronic user interface
Biometric user interface
10 Which type of software can you download and duplicate without any restrictions whatsoever and
without a fear of legal prosecution?
a. Commercial software
b. Shareware
c. Public-domain software
d. Pirated software
e. Rentalware
True/False Questions
1. The supervisor manages CPU(T)
2. The first graphical user interface was provided by Microsoft windows.(F)
3. All operating systems are mutually compatible.(F)
4. Font refers to a preformatted document that provides basic tools for shaping the final
document.(F)
5. Unix crashes often and thus is not normally used for running important large systems.(F)
6. Windows NT is the most recent Microsoft OS.(F)
7. Spreadsheet software enables you to perform what-if calculations.(T)
8
Public-domain software is protected by copyright and so is offered for sale by license only.(F)
9
The records within the various tables in a database are linked by a key field.(T)
10 QuarkXPress and Adobe InDesign are professional desktop-publishing programs.(T)
11 The best known graphical user interface is the command driven one.(F)
12 Microsoft power point is an example of financial software.(F)
13 Drawing programs create vector images, and painting programs produce bit-mapped
images.(T)
14 General computer users can design their own web pages using Adobe Dreamweaver, Adobe
Flash, and Microsoft Front page.(T)
Stage 2
Short-Answer Questions
1. Briefly define booting.
Booting is the process of loading an operating system into a computer’s main memory.
1. What is the difference between a command-driven interface and a graphical user
interface(GUI)?
Command driven interface = typing the command / instruction , GUI : Use a mouse or keystrokes to
click the command / instruction.
1. Why can’t you run your computer without system software?
Because system software is a software that control the computer hardware you are using, without
system software , the hardware is nothing but a junk.
1. Why is multitasking useful?
Because multitasking allows the computer to switch rapidly back and forth among different tasks. The
user is generally unaware of the switching process and thus can work in more than one application at
a time.
1. What is a device driver?
Device drivers are specialized software programs that allow input and output devices to communicate
with the rest of the computer system.
1. What is utility program?
Utility programs also known as services programs, perform tasks that related to the control and
allocation of computer resources.
1. What is a platform?
Platform is the particular processor model and operating system on which a computer system is
based.
1. What are the three components of system software? What is the basic function of each?

Operating system
An operating system is the principal component of system software in any computing system

Device drivers
Device drivers help the computer control peripheral devices

Utility programs
Utility programs are generally used to support enhance, or expand existing programs in a computer
system.
Stage 3
3. What do you think is the future of Linux? Experts currently disagree about whether Linux will become
a serious competitors to windows. Research Linux on the web. Which companies are creating
application software to run on Linux? Which businesses are adopting Linux as an OS? What are the
predictions about Linux use?
I think Linux will dominate the market, because it’s an open source software.
4. How do you think you will obtain software for your computer in the future? Explain your answer.
I will buy it online , or I will create it myself, because I’m studying computer science major. Or maybe
if I am working with some software development company , I can get it free.
Chapter 4
Self test questions
1.
A(n) kilobyte is about 1000 bytes; a(n) megabyte is about 1 million bytes; a(n) gigabyte is about
1 billion bytes.
2.
The CPU is the part of the microprocessor that tells the rest of the computer how to carry out a
program’s instructions.
3.
The process of retrieving data from a storage device is referred to as read ; the process of copying
data to a storage device is called write.
4.
To avoid losing data, users should always backup their files.
5.
Formatted disks have track and sector that the system software uses to reference data locations.
6.
The CPU is often referred to as the “brain” of a computer.
7.
The electrical data roadways though which bits are transmitted are called bus .
8.
A cable connected to a serial port sends bits one at a time, one after the other; a cable connected
to a paralel port port sends 8 bits simultaneously.
9.
Part of the disk-drive mechanism, the transfers data between the computer and the stick.
10. RAM Chips , also called main memory, are critical to computer performance.
11. arithmetical Operations are the fundamental math operations ; addition , subtraction ,
multiplication , and division.logical Operations are comparisons such as “equal to” , “greater than” , or
“less than”.
12. A group of 8 bits is a byte.
13. The extra bit attached to the end of a byte for error checking is a parity bit.
14. A tiny electronic device acts as an on/off switch , switching between “on” and “off” millions of
times per second, is called a transistor.
15. Flash memory sticks is a form of flash memory media that plugs into a special port in a digital
camera, camcorder, notebook , PC , or photo printer and holds up to 1 gigabyte of data.
Multiple-Choice Questions
1.
Which of the following is another term for primary storage?
a.
ROM
b. ALU
c.
CPU
d. RAM
e. CD-R
2.
Which of the following is not included on a computer’s motherboard?
a.
RAM chips
b. ROM chips
c. Keyboard
d. Microprocessor
e. Expansion slots
3.
Which of the following is used to hold data and instructions that will be used shortly by the CPU?
a.
ROM chips
b. Peripheral devices
c. RAM chips
d. CD-R
e. Hard disk
4.
Which of the following coding schemes is widely used on microcomputers?
a.
EBCDIC
b. Unicode
c. ASCII
d. Microcode
e. UNIX
5.
Which of the following is used to measure processing speed in microcomputers?
a.
MIPS
b. Flops
c.
Piscoseconds
d. Megahertz
e. Milihertz
6.
Which expansion bus specializes in graphics processing?
a.
PCI
b. ROM
c.
CMOS
d. AGP
e. AMR
7.
Which element is commonly used in the making of solid-state integrated circuits?
a.
Pentium
b. Lithium
c.
Copper
d. Iron
e. Silicon
8.
DVD-Rs allow
a.
Repeated rewriting
b. One-time recording by the user; they cannot be written on more than once
c.
No writing; they are read-only
True False Question
1.
A bus connects a computer’s control unit and ALU(F)
2.
The machine cycle comprises the instruction cycle and the execution cycle.(F)
3.
Magnetic tape is the most common secondary storage medium used with microcomputers.(F)
4.
Main memory is nonvolatile.(F)
5.
Pipelining is a method of speeding up processing.(T)
6.
Today’s laptop computers can perform more calculations per second than ENIAC , an enormous
machine occupying more than 1800 square feet and weighing more than 30 tons.(T)
7.
USB can theoretically connect up to 127 peripheral devices.(T)
8.
A petabyte is approximately 1 quadrillion bytes.(T)
9.
Online secondary storage services test your computer’s RAM capacity.(F)
10. Keychain memory is a pipelining device.(F)
Download