lOMoARcPSD|10133946 Final Exam Test Bank CP102 15e Information Processing with Microcomputer Systems (Wilfrid Laurier University) StuDocu is not sponsored or endorsed by any college or university Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 Technology in Action, Complete, 15e (Evans et al.) Chapter 1 The Impact of Technology in a Changing World 1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. A) Social networking B) Crowdsourcing C) Crisis-mapping D) Affective computing Answer: C Diff: 2 Objective: 1.01 Describe various technological tools being used to impact national and global issues. 2) ________ tools enable people to connect and exchange ideas. A) Affective computing B) Social media C) Debugging D) Computer forensics Answer: B Diff: 2 Objective: 1.01 Describe various technological tools being used to impact national and global issues. 3) The gap in ease of access to the Internet and technology is known as the ________ divide. A) web B) Internet C) digital D) technology Answer: C Diff: 1 Objective: 1.02 Describe various global social issues that are being affected by technology. 4) The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lecturers in the world together using TED and Google Project 10^100 to make technological changes in that continent. A) African B) Asian C) South American D) Australian Answer: A Diff: 3 Objective: 1.02 Describe various global social issues that are being affected by technology. 1 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) ________ results when leisure time and available tools allow us to engage in creative acts. A) Crowdsourcing B) Social networking C) Cognitive surplus D) Affective computing Answer: C Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 6) ________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. A) Cognitive surplus B) QR codes C) Web 2.0 D) Instant Messaging Answer: C Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 7) Using the Internet to get small donations from many people to start a business is called ________. A) kickstarting B) crowdfunding C) crowdsourcing D) collaborating Answer: B Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 8) QR or ________ codes let any piece of print host a link to online information. A) quick retention B) quick response C) quality response D) quality retention Answer: B Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 2 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) ________ solicits online input such as product ratings from consumers. A) A quick response code B) Computer forensics C) Crowdsourcing D) Crowdfunding Answer: C Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 10) ________ is joining together as a group to use a specific product more efficiently. A) Collaborative consumption B) Crowdfunding C) Crowdsourcing D) Social networking Answer: A Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 11) Skype is a ________. A) crowdfunding app B) Voice over IP service C) Social network D) Wi-fi hotspot Answer: B Diff: 2 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 12) The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations. A) master B) webmaster C) literate D) hacker Answer: C Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 3 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 13) ________ provides the instructions that tell a computer what to do. A) Software B) Hardware C) Spam D) Data mining Answer: A Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 14) Unwanted or junk e-mail is called ________. A) spam B) spyware C) adware D) malware Answer: A Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 15) All of the following are examples of being computer literate, EXCEPT ________. A) knowing how to avoid hackers and viruses B) knowing how to maintain and troubleshoot your computer C) knowing how to use the web efficiently D) knowing how to build and program computers Answer: D Diff: 3 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 16) Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________. A) perception B) planning C) unsupervised learning D) supervised learning Answer: D Diff: 3 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 17) All of the following are main areas of research in artificial intelligence, EXCEPT ________. A) data mining B) natural language processing C) perception D) problem solving Answer: A Diff: 2 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 4 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 18) Processes information using a bottom-up approach, learning by examples rather than rote rules, similar to humans. A) Artificial neural networks B) Cloud computing C) Expert systems D) Rules-based systems Answer: A Diff: 3 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 19) ________ analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the AI system accordingly. A) Machine learning B) Big data C) Deep learning D) Cloud Computing Answer: A Diff: 2 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 20) Which of the following is an example of a recommendation engine? A) An Excel spreadsheet listing all employees and their annual salaries in a random order B) Amazon providing you a list of products similar to others you've viewed C) Raw data from marketing questionnaires D) A printout of all sales taken from the register at the end of the day Answer: B Diff: 3 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 21) The Turing test consists of a person asking written questions of a person and a computer. If the questioner can't tell which one of the respondents is a computer, then the computer has attained ________. A) mastery B) intelligence C) independence D) Turing Answer: B Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 5 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 22) A robot which moves and acts much like a human is a(n) ________. A) empathetic agent B) intelligent personal assistant C) turing machine D) embodied agent Answer: D Diff: 1 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 23) Course management software often includes intelligent personal assistants to manage ________. A) paperwork B) student interactions C) learning plans D) AI Answer: A Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 24) ________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwanted visual effects. A) Augmentative B) Alternate C) Assisted D) Altruistic Answer: A Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 25) In medicine, 3D printing allows more stylish and less expensive designs for ________. A) medicines B) patient simulators C) prosthetic limbs D) clothing Answer: C Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 6 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 26) ________ replaces perceived reality with a different world. A) Variable reality B) Augmentative reality C) Virtual reality D) Alternate reality Answer: C Diff: 3 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 27) Analyzing computer systems to gather potential legal evidence is computer ________. A) detective work B) forensics C) analysis D) enforcement Answer: B Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 28) ________ behavior is NOT conforming to a set of approved standards of behavior. A) Unethical B) Amoral C) Illegal D) Dogmatic Answer: A Diff: 2 Objective: 1.08 Define ethics and examine various ethical systems. 29) Which of these is NOT a system of ethics? A) Humanism B) Relativism C) Divine Command Theory D) Utilitarianism Answer: A Diff: 2 Objective: 1.08 Define ethics and examine various ethical systems. 30) A set of formal or informal ethical principles an individual uses to make decisions is ________. A) personal ethics B) ethical system C) relativism D) societal ethics Answer: A Diff: 2 Objective: 1.09 Describe influences on the development of your personal ethics. 7 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 31) ________ property is work that is the result of someone's creativity and knowledge. A) Intellectual B) Personal C) Collective D) Public Answer: A Diff: 2 Objective: 1.10 Present examples of how technology creates ethical challenges. 32) The gap in access to the Internet and technical tools among people around the world is known as the ________. Answer: digital divide Diff: 1 Objective: 1.02 Describe various global social issues that are being affected by technology. 33) The Witness Project hopes to stop ________ abuses throughout the world. Answer: Human Rights Diff: 2 Objective: 1.02 Describe various global social issues that are being affected by technology. 34) ________ asks for small donations from a large number of people to fund a business or project. Answer: Crowdfunding; Crowd-funding Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 35) Using a smartphone app to rent a bike at a kiosk or schedule a ride are examples of ________. Answer: collaborative consumption Diff: 3 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 36) ________ is obtaining the opinions of many people on the quality of products or services. Answer: Crowdsourcing; Crowd-sourcing Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 37) ________ means that people have the combination of leisure time and the tools to be creative. Answer: Cognitive surplus Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 8 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 38) Scanning a product's ________ code with a smartphone can take you to online information and video content. Answer: quick response, QR Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 39) Skype, Google Hangouts and Facetime are ________ services to make free phone or video conference calls over the Internet. Answer: Voice over IP; VoIP; voice over internet protocol Diff: 1 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 40) The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them. Answer: computer Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 41) ________ programs are the instructions that tell the computer what to do. Answer: Software Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 42) Electronic junk mail is known as ________. Answer: spam Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 43) Using data collected at register terminals to determine consumer buying patterns is an example of ________. Answer: data mining Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 44) ________ focuses on creating computer systems which perform tasks that are usually associated with human intelligence. Answer: AI, Artificial Intelligence Diff: 2 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 9 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 45) ________ is a type of AI system that understands written and spoken words and can interact with humans using language. Answer: NLP, Natural Language Processing, Natural Language Processor, Natural Language Processors Diff: 2 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 46) ________ analyzes computer systems using techniques to gather legal evidence. Answer: Computer forensics Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 47) ________ computing relates to recognizing and simulating human emotions. Answer: Affective Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 48) ________ enables production of more inexpensive and better fitting prosthetics than traditional manufacturing methods. Answer: 3-D printing; 3D printing Diff: 3 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 49) Understanding your ________ will make it easier to handle situations which require ethical action. Answer: personal ethics Diff: 3 Objective: 1.09 Describe influences on the development of your personal ethics. 50) ________ is the result of someone's creativity and knowledge and usually is protected by copyrights. Answer: Intellectual property, IP Diff: 3 Objective: 1.10 Present examples of how technology creates ethical challenges. 51) A hackathon is a group of people who get together to develop a computer virus. Answer: FALSE Diff: 2 Objective: 1.01 Describe various technological tools being used to impact national and global issues. 10 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 52) Civic hacking groups like Random Hacks of Kindness use technology to improve humanity. Answer: TRUE Diff: 2 Objective: 1.01 Describe various technological tools being used to impact national and global issues. 53) Crisis-mapping tools collect and analyze data from social media and create instantly available information to respond to a crisis. Answer: TRUE Diff: 2 Objective: 1.01 Describe various technological tools being used to impact national and global issues. 54) The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis. Answer: FALSE Diff: 1 Objective: 1.02 Describe various global social issues that are being affected by technology. 55) Crowdfunding is asking for large donations from a few people. Answer: FALSE Diff: 2 Objective: 1.03 Describe how technology is changing how and why we connect and collaborate with others. 56) Car sharing services like Zipcar are examples of individual ownership. Answer: FALSE Diff: 1 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 57) The AT&T Mark the Spot mobile app enables customers to report locations where there are gaps in service is an example of crowdsourcing. Answer: TRUE Diff: 2 Objective: 1.04 Summarize how technology has impacted the way we choose and consume products and services. 58) A computer virus is electronic junk mail. Answer: FALSE Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 11 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 59) You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming. Answer: FALSE Diff: 1 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 60) Hardware refers to the programs that give instructions to the computer. Answer: FALSE Diff: 2 Objective: 1.05 Characterize computer literacy and explain why it is important to be computer literate. 61) Computer vision is that ability for a computer to interpret visual data as humans do. Answer: TRUE Diff: 2 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 62) Rules-based AI systems are expert systems which use preprogrammed algorithms to make human-like decisions. Answer: TRUE Diff: 1 Objective: 1.06 Describe artificial intelligence systems and explain their main goals. 63) Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information. Answer: FALSE Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 64) Computer forensics analyzes computer systems to gather potential legal evidence. Answer: TRUE Diff: 1 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 65) Information technology is the study of managing, processing, and retrieving information. Answer: TRUE Diff: 1 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 12 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 66) Examples of information technology careers are telecommunications and software development. Answer: TRUE Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 67) Big Data is generated by how we use technology, today. Answer: TRUE Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 68) The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes. Answer: TRUE Diff: 1 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 69) Data warehousing is the process of searching large datasets to find patterns. Answer: FALSE Diff: 2 Objective: 1.07 Describe how artificial intelligence and other information technologies are providing career opportunities. 70) Deontology focuses on adherence to moral duties and morals should apply to everyone, equally. Answer: TRUE Diff: 2 Objective: 1.08 Define ethics and examine various ethical systems. 71) Your personal ethics are NOT influenced by your culture and religion. Answer: FALSE Diff: 2 Objective: 1.09 Describe influences on the development of your personal ethics. 72) Copyrights govern ownership of real property. Answer: FALSE Diff: 2 Objective: 1.10 Present examples of how technology creates ethical challenges. 13 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its meaning: I. II. III. IV. V. augmentative reality data mining information technology spam cognitive surplus A. electronic junk mail B. combination of leisure time and the tools to be creative C. combination of our normal sense of the world and digital information D. field of study focusing on the management, processing, and retrieval of information E. searching for patterns within large amounts of data Answer: C, E, D, A, B Diff: 2 Objective: Multiple Objectives in the Chapter 74) Match each of the following terms to its meaning: I. II. III. IV. V. computer forensics computer literacy QR code affective computing collaborative consumption A. computing that simulates emotion B. using computer systems to gather legal evidence C. understanding the capabilities and limitations of computers D. hosts a link to online information and video content in printed form E. sharing a service or product rather than owning it outright Answer: B, C, D, A, E Diff: 1 Objective: Multiple Objectives in the Chapter 14 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 75) Match each of the following terms to its meaning: I. II. III. IV. V. crowdsourcing crowdfunding digital divide social media crisis-mapping tools A. facilitates exchange of ideas B. gap between those with access to technology and those without C. collect electronic information and instantly make the information publicly available D. solicits small donations from a large number of people E. used by marketers to solicit online consumer input Answer: E, D, B, A, C Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 2 Looking at Computers: Understanding the Parts 1) What is the difference between data and information? A) Data represents a fact. Information is data that has been organized. B) They are essentially the same thing. C) Data is numbers. Information is words. D) Data represents a process. Information is the stored data. Answer: A Diff: 1 Objective: 2.01 Describe the four main functions of a computer system and how they interact with data and information. 2) Computers use a ________ language consisting of 0s and 1s. A) symbol B) binary C) byte D) system Answer: B Diff: 1 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 3) In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________. A) bytes B) kilobytes C) characters D) bits Answer: D Diff: 2 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 15 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 4) Which of the following is the smallest unit of measure? A) Megabyte B) Gigabyte C) Petabyte D) Terabyte Answer: A Diff: 2 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 16 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Apple's macOS and Microsoft Windows are examples of ________ software. A) utility B) application C) operating system D) communication Answer: C Diff: 2 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 6) An Apple iPad and an Amazon Fire are examples of ________ computers. A) tablet B) netbook C) desktop D) laptop Answer: A Diff: 1 Objective: 2.03 List common types of computers, and discuss their main features. 7) Which of the following computers is large, expensive, and is designed to execute a few programs as fast as possible? A) Desktop computer B) Supercomputer C) Mainframe computer D) Embedded computer Answer: B Diff: 2 Objective: 2.03 List common types of computers, and discuss their main features. 8) ________ computers are specially designed computer chips that reside inside other devices, such as a car. A) Tablet B) Desktop C) Embedded D) Netbook Answer: C Diff: 2 Objective: 2.03 List common types of computers, and discuss their main features. 9) A keyboard and touch screen are the most common of ________ devices. A) output B) processing C) input D) storage Answer: C Diff: 1 Objective: 2.04 Identify the main types of keyboards and touch screens. 17 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) A(n) ________ is an input device that looks like a pen. A) joystick B) e-rod C) pointer D) stylus Answer: D Diff: 1 Objective: 2.04 Identify the main types of keyboards and touch screens. 11) Each of these is a basic type of a touch screen, EXCEPT ________. A) resistive B) reflective C) capacitive D) surface acoustic wave Answer: B Diff: 3 Objective: 2.04 Identify the main types of keyboards and touch screens. 12) The number of pixels displayed on the screen is known as ________. A) contrast ratio B) aspect ratio C) brightness resolution D) screen resolution Answer: D Diff: 2 Objective: 2.07 Describe options for outputting images and audio from computing devices. 13) The most common type of monitor for laptops and desktop computers is a(n) ________. A) liquid crystal display (LCD) B) light-emitting diode (LED) C) organic light-emitting diode (OLED) D) cathode ray tube (CRT) Answer: A Diff: 2 Objective: 2.07 Describe options for outputting images and audio from computing devices. 14) The two main categories of home and office printers are ________ and laser printers. A) inkjet B) large format C) cloud-based D) thermal Answer: A Diff: 2 Objective: 2.08 Describe various types of printers, and explain when you would use them. 18 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) ________ printers use static electricity, toner, and heat to set an image on a page very quickly. A) Inkjet B) Thermal C) Nonimpact D) Laser Answer: D Diff: 1 Objective: 2.08 Describe various types of printers, and explain when you would use them. 16) The ________ contains the central electronic components of the computer. A) motherboard B) arithmetic/logic unit C) peripheral unit D) input unit Answer: A Diff: 1 Objective: 2.09 Describe the functions of the motherboard and RAM. 17) A ________ enables your computer to connect to other computers or to the Internet. A) video card B) network interface card (NIC) C) sound card D) controller card Answer: B Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 18) The computer stores currently used programs and data in ________. A) ROM B) CPU C) RAM D) USB Answer: C Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 19) RAM is a ________ storage location. A) permanent B) peripheral C) volatile D) nonvolatile Answer: C Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 19 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) The area that holds all the startup instructions the computer needs to start is ________. A) RAM B) ROM C) USB D) CPU Answer: B Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 21) A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. A) all-in-one B) bimodal C) dual-core D) dual-mode Answer: C Diff: 3 Objective: 2.10 Explain the main functions of the CPU. 22) Which of the following is NOT an example of nonvolatile storage? A) Hard drive B) DVD C) RAM D) Flash drive Answer: C Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 23) Dropbox is an example of ________. A) SSD technology B) cloud storage C) optical storage D) Bluetooth technology Answer: B Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 24) Flash drives plug into a(n) ________. A) USB port B) serial port C) expansion slot D) drive bay Answer: A Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 20 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 25) Which of the following optical storage media has the greatest storage capacity? A) DVD DL B) DVD C) CD D) Blu-ray Answer: D Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 26) Which port is the most common port used to connect input and output devices to a computer? A) Universal serial bus (USB) B) Parallel C) FireWire D) Ethernet Answer: A Diff: 2 Objective: 2.12 Describe common types of ports used today. 27) To connect a peripheral device to a computer to exchange data, find the appropriate ________ for the device. A) port B) drive C) slot D) expansion bus Answer: A Diff: 2 Objective: 2.12 Describe common types of ports used today. 28) Which computer port transmits audio and video without the need for compression? A) VGA B) USB C) HDMI D) RGA Answer: C Diff: 2 Objective: 2.12 Describe common types of ports used today. 21 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 29) Which of the following is NOT a goal of green IT? A) Cleaning waterways with repurposed computers B) Reduce use of electricity C) Use technology to reduce travel D) Use technology as long as possible Answer: A Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 30) All of the following are ways to avoid injuries when working on computers EXCEPT ________. A) placing a monitor at least 12" from the eyes B) purchasing an adjustable chair C) ensuring proper lighting D) taking breaks Answer: A Diff: 3 Objective: 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices. 31) The ________ is the biggest power consumer on a computing device. A) display B) hard drive C) memory module D) CPU Answer: A Diff: 1 Objective: 2.13 Describe how to manage power consumption on computing devices. 32) ________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. A) Ergonomics B) Positioning C) Occupational safety D) Repetitive strain prevention Answer: A Diff: 2 Objective: 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices. 33) ________ is a representation of a fact, a figure, or an idea and can be a number, a word, a picture, or even a recording of sound. Answer: Data Diff: 1 Objective: 2.01 Describe the four main functions of a computer system and how they interact with data and information. 22 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 34) ________ is the set of computer programs that allows the hardware to perform different tasks. Answer: Software Diff: 1 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 35) A(n) ________ is a computer that is designed to execute a few programs extremely rapidly. Answer: supercomputer Diff: 2 Objective: 2.03 List common types of computers, and discuss their main features. 36) A(n) ________ device is a component, such as a keyboard, that connects to the computer. Answer: peripheral Diff: 2 Objective: 2.03 List common types of computers, and discuss their main features. 37) A ________ is approximately 1000 bytes. Answer: kilobyte; KB Diff: 3 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 38) Microphones and scanners are examples of ________ devices. Answer: input; peripheral Diff: 1 Objective: 2.06 Explain how images, sounds, and sensor data are input into computing devices. 39) ________ is a wireless transmission standard that lets you connect mobile computing devices to peripheral devices over short distances. Answer: Bluetooth; Bluetooth technology; WiFi; wireless; wi-fi; wi fi Diff: 2 Objective: 2.04 Identify the main types of keyboards and touch screens. 40) Display screens that respond to commands initiated with your finger or a stylus are called ________ screens. Answer: touch Diff: 1 Objective: 2.04 Identify the main types of keyboards and touch screens. 41) A desktop computer's ________ is the case that houses the main components of the computer and where peripheral devices connect. Answer: system unit; tower Diff: 2 Objective: 2.03 List common types of computers, and discuss their main features. 23 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 42) The ________ keyboard layout gets its name from the first six letters in the top-left row of alphabetic keys on the keyboard and is the most common English-language keyboard layout. Answer: QWERTY Diff: 2 Objective: 2.04 Identify the main types of keyboards and touch screens. 43) Joysticks and steering wheels are examples of ________ controllers. Answer: game Diff: 1 Objective: 2.05 Describe the main types of mice and pointing devices. 44) A(n) ________ is a small video camera that sits on top of a monitor or is built into a computing device and can be used to transmit live video. Answer: webcam Diff: 2 Objective: 2.06 Explain how images, sounds, and sensor data are input into computing devices. 45) A(n) ________ microphone picks up sounds coming from all directions at once and is well suited for conference calls. Answer: omnidirectional Diff: 3 Objective: 2.06 Explain how images, sounds, and sensor data are input into computing devices. 46) The width-to-height proportion of a monitor is known as the ________. Answer: aspect ratio Diff: 2 Objective: 2.07 Describe options for outputting images and audio from computing devices. 47) Monitors display images by using a grid made up of millions of tiny dots, called ________. Answer: pixels Diff: 2 Objective: 2.07 Describe options for outputting images and audio from computing devices. 48) The length of time it takes for a processor to request, locate, open and deliver information stored in RAM is measured in ________. Answer: nanoseconds; billionths of a second Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 49) Each pixel on the newest 4K resolution TVs and monitors is actually made up of four yellow, red, blue, and green ________. Answer: subpixels; sub pixels; sub-pixels Diff: 3 Objective: 2.07 Describe options for outputting images and audio from computing devices. 24 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 50) A(n) ________ is a device that combines the functions of a printer, scanner, copier, and fax machine into one unit. Answer: all-in-one printer; all in one printer Diff: 2 Objective: 2.08 Describe various types of printers, and explain when you would use them. 51) The "brains" of the computer is the ________. Answer: CPU; central processing unit; processor; microprocessor Diff: 2 Objective: 2.10 Explain the main functions of the CPU. 52) An SD card is an example of a(n) ________ card. Answer: flash memory; memory; secure digital Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 53) CDs, DVDs, and ________ discs are examples of optical storage. Answer: Blu-ray; BD; bluray Diff: 2 Objective: 2.11 Describe the various means of storing data and information with computing devices. 54) ________ is a technology most frequently used for credit and debit card processing Answer: Near field communication; NFC Diff: 2 Objective: 2.07 Describe options for outputting images and audio from computing devices. 55) ________ mode puts the computer in low power usage, but keeps programs in RAM. Answer: Sleep Diff: 2 Objective: 2.13 Describe how to manage power consumption on computing devices. 56) ________ is a power-saving mode that stores data to a computer's hard drive instead of to its memory. Answer: Hibernate Diff: 2 Objective: 2.13 Describe how to manage power consumption on computing devices. 57) Information is data that has been organized or presented in a meaningful fashion. Answer: TRUE Diff: 2 Objective: 2.01 Describe the four main functions of a computer system and how they interact with data and information. 25 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 58) A smartphone is a type of computer. Answer: TRUE Diff: 1 Objective: 2.03 List common types of computers, and discuss their main features. 59) The operating system controls how your computer functions. Answer: TRUE Diff: 1 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 60) The terms data and information can be used interchangeably. Answer: FALSE Diff: 1 Objective: 2.01 Describe the four main functions of a computer system and how they interact with data and information. 61) Processing is manipulating, calculating, or organizing data into information. Answer: TRUE Diff: 2 Objective: 2.01 Describe the four main functions of a computer system and how they interact with data and information. 62) On a keyboard, Num Lock and Caps Lock are both toggle keys. Answer: TRUE Diff: 1 Objective: 2.04 Identify the main types of keyboards and touch screens. 63) Laser printers are usually faster at printing in black and white than inkjet printers. Answer: TRUE Diff: 3 Objective: 2.08 Describe various types of printers, and explain when you would use them. 64) All printers can print from smartphones and tablets. Answer: FALSE Diff: 3 Objective: 2.08 Describe various types of printers, and explain when you would use them. 65) Game controllers are output devices. Answer: FALSE Diff: 1 Objective: 2.05 Describe the main types of mice and pointing devices. 66) Keyboards that display on-screen when text input is required are known as virtual keyboards. Answer: TRUE Diff: 2 Objective: 2.04 Identify the main types of keyboards and touch screens. 26 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 67) Starting a computer when it is powered off is called a warm boot. Answer: FALSE Diff: 2 Objective: 2.13 Describe how to manage power consumption on computing devices. 68) The area that holds all of the instructions the computer needs to start up is called RAM. Answer: FALSE Diff: 2 Objective: 2.09 Describe the functions of the motherboard and RAM. 69) Today's CPUs run at speeds measured in kilohertz. Answer: FALSE Diff: 2 Objective: 2.10 Explain the main functions of the CPU. 70) Match each of the following terms to its meaning: I. II. III. IV. V. CPU OLED QWERTY ROM RAM A. holds start up instructions needed when the computer is powered on B. standard keyboard layout C. processes commands issued by software instructions D. more energy efficient than LCD monitors E. stores programs and data the computer is currently using Answer: C, D, B, A, E Diff: 2 Objective: Multiple Objectives in the Chapter 27 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 71) Match each of the following terms to its meaning: I. II. III. IV. V. data processing information software hardware A. represents a fact, figure, or idea B. data organized in a meaningful way C. physical components of a computer D. turning data into information E. computer programs Answer: A, D, B, E, C Diff: 2 Objective: Multiple Objectives in the Chapter 72) Rank the following from smallest capacity to largest capacity: I. II. III. IV. V. terabyte gigabyte kilobyte megabyte petabyte A. largest B. second largest C. third largest D. fourth largest E. fifth largest Answer: B, C, E, D, A Diff: 2 Objective: 2.02 Define bits and bytes, and describe how they are measured, used, and processed. 28 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its meaning: I. II. III. IV. V. input device peripheral device output device motherboard system unit A. case that houses the electronic components, power source, and storage devices of a desktop computer B. main circuit board containing the central electronic components of a computer C. used to enter data D. external device that exchanges data with the computer through ports E. displays processed data Answer: C, D, E, B, A Diff: 2 Objective: Multiple Objectives in the Chapter 74) Match each of the following terms to its meaning: I. II. III. IV. V. pixel hertz bit ppm dpi A. measurement of printing speed B. unit of measure for processor speed C. tiny dot that creates an image on the computer monitor D. measurement of printer resolution E. 0 or 1 Answer: C, B, E, A, D Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources 1) The Internet is ________. A) an internal communication system for businesses B) a communication system for the U.S. navy C) the same as the web D) a large network of networks Answer: D Diff: 1 Objective: 3.01 Describe how the Internet got its start. 2) The concept of the Internet was developed by the U.S. Department of Defense as a network 29 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 that ________ in event of an attack. A) provides point to point connections B) allows commerce to continue C) would not be disrupted easily D) would not be easily hacked Answer: C Diff: 1 Objective: 3.01 Describe how the Internet got its start. 3) The World Wide Web was based on a protocol developed by ________. A) CERN B) Ray Tomlinson C) Tim Berners-Lee D) Vinton Cerf Answer: C Diff: 3 Objective: 3.01 Describe how the Internet got its start. 4) The "fathers of the Internet" are Vinton Cerf and ________. A) Robert Cailliau B) Tim Berners-Lee C) Bill Gates D) Robert Kahn Answer: D Diff: 3 Objective: 3.01 Describe how the Internet got its start. 30 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Software that enables you to display and interact with text and other media on the web is a web ________. A) client B) server C) agent D) browser Answer: D Diff: 1 Objective: 3.01 Describe how the Internet got its start. 6) The web is based on the ________ Protocol. A) Hypertext Transfer B) Hypertext Trade C) Hypertext Transmit D) Hypertext Translate Answer: A Diff: 2 Objective: 3.01 Describe how the Internet got its start. 7) A computer connected to the Internet that asks for data is a(n) ________. A) server B) client C) surrogate D) aggregator Answer: B Diff: 2 Objective: 3.02 Explain how data travels on the Internet. 8) The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT a(n) ________. A) dotted quad B) path C) dotted decimal D) IP address Answer: B Diff: 3 Objective: 3.02 Explain how data travels on the Internet. 9) ________ is a professional, business-oriented social networking site. A) Flickr B) Pinterest C) Twitter D) LinkedIn Answer: D Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 31 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) Which of the following is NOT a social networking site? A) Facebook B) YouTube C) LinkedIn D) iTunes Answer: D Diff: 1 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 11) A ________ allows users to add, remove, or edit its content. A) wiki B) podcast C) blog D) chat Answer: A Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 12) Which of the following are personal video journal entries posted on the web? A) Podcasts B) Newsgroups C) Vlogs D) Blogs Answer: C Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 13) A(n) ________ is usually a live broadcast of audio or video content. A) podcast B) wiki C) instant message D) webcast Answer: D Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 14) A ________ is a personal journal posted on the web. A) blog B) podcast C) wiki D) webcast Answer: A Diff: 1 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 32 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Podcasts enable you to ________. A) deliver audio/video files via RSS B) post journal entries on the web C) communicate with friends in real time D) edit video files over the web Answer: A Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 16) All of the following are tips for professional e-mail etiquette EXCEPT ________. A) be concise and to the point B) use spell-checker and proofread before sending C) use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter D) include a meaningful subject line Answer: C Diff: 1 Objective: 3.04 Summarize the technologies used to communicate over the web. 17) Which of the following is a universal instant messaging service? A) Skype B) WhatsApp C) Google Hangouts D) Yahoo! Messenger Answer: B Diff: 3 Objective: 3.04 Summarize the technologies used to communicate over the web. 18) ________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer. A) Web-based e-mail program B) E-mail client software C) E-mail host package D) E-mail server Answer: B Diff: 1 Objective: 3.04 Summarize the technologies used to communicate over the web. 19) All of the following are types of e-commerce business EXCEPT ________. A) B2C B) B2B C) C2C D) C2B Answer: D Diff: 2 Objective: 3.05 Describe how business is conducted using the Internet. 33 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) Microsoft ________ is a cloud storage and file sharing service. A) iCloud B) Dropbox C) OneDrive D) Drive Answer: C Diff: 2 Objective: 3.05 Describe how business is conducted using the Internet. 21) A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce. A) crowd B) source C) friend D) social Answer: D Diff: 1 Objective: 3.05 Describe how business is conducted using the Internet. 22) Which of the following is NOT a precaution to take when shopping online? A) Pay with a debit card, not a credit card. B) Shop at well-known, reputable sites. C) Avoid making online transactions on a public computer. D) When placing an order, make sure you receive a confirmation number. Answer: A Diff: 2 Objective: 3.06 Summarize precautions you should take when doing business online. 23) The "s" in "https" stands for ________ socket layer. A) semantic B) secure C) server D) social Answer: B Diff: 2 Objective: 3.06 Summarize precautions you should take when doing business online. 24) Which of the following is NOT a feature of the most popular web browsers? A) Pinned tabs B) Session restore C) Tacked browsing D) Thumbnail preview Answer: C Diff: 2 Objective: 3.07 Explain what web browsers are, and describe their common features. 34 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 25) The browser feature which enables tabs to work independently from one another so if one crashes, the others may continue to work is known as ________. A) pinned tabs B) tab isolation C) free tabs D) privacy browsing Answer: B Diff: 2 Objective: 3.07 Explain what web browsers are, and describe their common features. 26) The unique address for a particular website is the ________. A) protocol B) domain section C) client D) URL Answer: D Diff: 1 Objective: 3.08 Explain what a URL is, and discuss its main parts. 27) In the URL: http://www.microsoft.com/surface, the portion labeled ".com" is the ________. A) subdirectory B) host C) top-level domain D) protocol Answer: C Diff: 2 Objective: 3.08 Explain what a URL is, and discuss its main parts. 28) In the URL: http://www.microsoft.com/surface, the portion labeled "surface" is the ________. A) protocol B) domain name C) subdirectory D) top-level domain Answer: C Diff: 2 Objective: 3.08 Explain what a URL is, and discuss its main parts. 29) In the URL: http://www.microsoft.com/surface, the portion labeled "http" is the ________. A) protocol B) domain name C) path D) top-level domain Answer: A Diff: 2 Objective: 3.08 Explain what a URL is, and discuss its main parts. 35 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 30) Which of the following top-level domains identifies a degree-granting institution? A) .gov B) .net C) .edu D) .info Answer: C Diff: 1 Objective: 3.08 Explain what a URL is, and discuss its main parts. 31) A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website. A) index B) navigation bar C) breadcrumb trail D) cookie trail Answer: C Diff: 3 Objective: 3.09 Describe tools used to navigate the web. 32) AND, OR, and NOT are examples of ________ operators. A) Boolean B) Jacobean C) relational D) keyword Answer: A Diff: 3 Objective: 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. 33) Which of the following is a supporting argument for geolocation devices posing a threat to privacy? A) Businesses are responsible to educate consumers about how they use geolocation data. B) The social norm has shifted and people have become comfortable with sharing more information, including their location. C) Many businesses incorporate geolocation as a primary marketing strategy; the loss of privacy is outweighed by the benefit to consumers. D) Society may need to reevaluate its expectations as to the amount of privacy in people's digital lives. Answer: A Diff: 3 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 36 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 34) Catfishing is ________. A) creating fake profiles on a dating site and developing a fabricated online and phone relationship B) posting inflammatory remarks to solicit angry and negative responses C) bombarding someone with harassing messages D) posting embarrassing pictures, rumors, or videos via social media Answer: A Diff: 3 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 35) An Internet connected computer that receives a request and returns data is a(n) ________. Answer: server Diff: 2 Objective: 3.02 Explain how data travels on the Internet. 36) Facebook and Twitter are popular examples of ________ networks. Answer: social Diff: 1 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 37) E-mail is ________ communication, which means users do not have to communicate at the same time. Answer: asynchronous Diff: 2 Objective: 3.04 Summarize the technologies used to communicate over the web. 38) ________ e-mail is managed by a browser and enables access to e-mail from anywhere that has Internet access. Answer: Web-based, web based, webbased Diff: 1 Objective: 3.04 Summarize the technologies used to communicate over the web. 39) E-mail ________ are software programs such as Microsoft Outlook that run on your computer and download messages to your computer. Answer: clients Diff: 2 Objective: 3.04 Summarize the technologies used to communicate over the web. 40) Feedspot and iTunes are examples of RSS ________ which locate and download RSS series to which you have subscribed. Answer: aggregators Diff: 3 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 37 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 41) A(n) ________ consists of a series of audio or video content that are distributed over the Internet. Answer: podcast; webcast Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 42) A(n) ________ is usually a live broadcast of audio and video content over the Internet. Answer: webcast Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 43) ________ describes the use of hashtags and posts to raise awareness and foster discussion about specific issues and causes via social media. Answer: Digital activism Diff: 2 Objective: 3.12 Demonstrate an understanding of the ethical issues regarding digital activism. 44) A web browser's ________ feature makes it easy to return to a specific web page. Answer: Favorites; Bookmarks Diff: 2 Objective: 3.09 Describe tools used to navigate the web. 45) The top-level domain suffix used by not-for-profit groups such as the American Diabetes Association is ________. Answer: .org Diff: 3 Objective: 3.08 Explain what a URL is, and discuss its main parts. 46) ________ refers to storing data, files, and applications on the web and being able to access and manipulate these files and applications from any Internet-connected device. Answer: Cloud computing Diff: 1 Objective: 3.05 Describe how business is conducted using the Internet. 47) In B2B commerce, businesses buy and sell goods and services with ________. Answer: businesses Diff: 2 Objective: 3.05 Describe how business is conducted using the Internet. 48) URL stands for ________. Answer: Uniform Resource Locator Diff: 1 Objective: 3.08 Explain what a URL is, and discuss its main parts. 38 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 49) .jp, .ca, .de, and .uk are examples of ________. Answer: top-level domains; country codes; country specific domains; country-specific domains; top level domains Diff: 2 Objective: 3.08 Explain what a URL is, and discuss its main parts. 50) The ________ list shows all of the websites and pages you have visited over a certain period of time. Answer: history Diff: 2 Objective: 3.09 Describe tools used to navigate the web. 51) Another term for social bookmarking is ________. Answer: tagging Diff: 2 Objective: 3.09 Describe tools used to navigate the web. 52) When performing searches, the asterisk (*) is used as a(n) ________. Answer: wild card; wildcard Diff: 3 Objective: 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. 53) The Internet was developed to ensure faster delivery of communications such as e-mail. Answer: FALSE Diff: 1 Objective: 3.01 Describe how the Internet got its start. 54) All popular social networking sites have privacy policies, but you still need to follow certain precautions when using their sites. Answer: TRUE Diff: 1 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. 55) E-mails are completely private. Answer: FALSE Diff: 1 Objective: 3.04 Summarize the technologies used to communicate over the web. 56) With a client-based e-mail account, you are able to view your e-mail only from the computer on which the client program is installed. Answer: TRUE Diff: 2 Objective: 3.04 Summarize the technologies used to communicate over the web. 39 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 57) A universal chat client enables you to chat with users who use a different IM service than you use. Answer: TRUE Diff: 2 Objective: 3.04 Summarize the technologies used to communicate over the web. 58) When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card. Answer: FALSE Diff: 2 Objective: 3.06 Summarize precautions you should take when doing business online. 59) A browser's bookmark feature makes it easy to return to a specific web page. Answer: TRUE Diff: 1 Objective: 3.09 Describe tools used to navigate the web. 60) Using the browser feature called tab isolation, you can drag an open tab away from its current window and open it in a new window. Answer: FALSE Diff: 2 Objective: 3.07 Explain what web browsers are, and describe their common features. 61) The semantic web uses metadata with text data to make it more easily processed by computers. Answer: TRUE Diff: 1 Objective: 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. 62) Wikipedia is a good reference for a research paper. Answer: FALSE Diff: 2 Objective: 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. 63) When evaluating the relevance of a website, it is important to evaluate the date of publication. Answer: TRUE Diff: 2 Objective: 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. 64) A criticism of hashtag activism is that it fosters a false sense of involvement. Answer: TRUE Diff: 2 Objective: 3.12 Demonstrate an understanding of the ethical issues regarding digital activism. 40 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 65) Geolocation is a GPS enabled feature on a smartphone that provides your location to apps like Uber. Answer: TRUE Diff: 2 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 66) One method of cyberbullying involves spreading rumors about another person. Answer: TRUE Diff: 2 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 67) A metasearch engine searches other search engines instead of individual websites. Answer: TRUE Diff: 2 Objective: 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. 68) Cyberbullying is essentially the same thing as cyberstalking, but the parties involved in cyber bullying are children or adolescents. Answer: TRUE Diff: 2 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 69) There are federal laws against cyberstalking. Answer: TRUE Diff: 2 Objective: 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. 70) Websites selling a product are often the most accurate and appropriate for research. Answer: FALSE Diff: 2 Objective: 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. 71) Current search engines function by recognizing keywords. Answer: TRUE Diff: 2 Objective: 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. 41 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 72) Match each of the following terms to its meaning: I. II. III. IV. V. browser Internet search engine host e-mail A. large network of networks B. tool used to locate information on the web C. location that maintains the computers that store the website files D. application program used to view the web E. asynchronous electronic communication Answer: D, A, B, C, E Diff: 3 Objective: Multiple Objectives in the Chapter 73) Match each of the following domains to the site that would use it: I. II. III. IV. V. .com .gov .edu .ca .org A. White House B. Red Cross C. Stanford University D. Apple E. Ontario Government Answer: D, A, C, E, B Diff: 3 Objective: 3.08 Explain what a URL is, and discuss its main parts. 42 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 74) Match each of the following browsers to a defining feature of it: I. II. III. IV. V. Firefox Safari Mosaic Microsoft Edge Chrome A. Apple's web browser B. the first browser to display graphics as well as text C. available only for Windows 10 D. runs on any platform E. open source Answer: E, A, B, C, D Diff: 3 Objective: Multiple Objectives in the Chapter 75) Match each of the following terms to a definition of it: I. II. III. IV. V. HTTP C2C FTP B2C URL A. protocol that allows files to be transferred from a web server B. transactions between two individuals C. transactions between a company and its customers D. website address E. protocol that allows files to be transferred over the Internet Answer: E, B, A, C, D Diff: 3 Objective: Multiple Objectives in the Chapter 43 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 76) Match each of the following terms to its meaning: I. II. III. IV. V. IM podcast blog webcast wiki A. personal journal posted on the web B. program that enables you to communicate in real time with others online C. uses RSS to deliver an audio or video file D. live streamed broadcast E. website that allows site visitors to change its content Answer: B, C, A, D, E Diff: 2 Objective: Multiple Objectives in the Chapter 77) Match each of the following social networking sites to its specialty: I. II. III. IV. V. Facebook Pinterest LinkedIn Uber PayPal A. Social Commerce B. Social Travel C. Social Communication D. Business Networking E. Media Sharing Answer: C, E, D, B, A Diff: 2 Objective: 3.03 Evaluate the tools and technologies used to collaborate on the web. Technology in Action, Complete, 15e (Evans et al.) Chapter 4 Application Software: Programs That Let You Work and Play 1) ________ software helps run the computer and coordinates instructions between other software and the hardware devices. A) Application B) Recovery C) Productivity D) System Answer: D Diff: 1 Objective: 4.01 Compare application software and system software. 2) ________ applications are software in which the vendor hosts the software online over the 44 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 Internet and you do not to install the software on your computer. A) Open Source as a Service B) Platform as a Service C) Software as a Service D) Infrastructure as a Service Answer: C Diff: 2 Objective: 4.02 Explain the differences between commercial software and open source software, and describe models for software distribution. 3) Using applications on smartphones and tablets to buy and sell products is known as ________ commerce. A) smart B) remote C) mobile D) web Answer: C Diff: 1 Objective: 4.03 Explain the different options for purchasing software. 4) Which of these is NOT a factor to consider when upgrading software? A) What patches are applied to your current version? B) Do you use the software frequently enough? C) Is the new upgrade stable? D) Is the upgrade sufficiently different? Answer: A Diff: 2 Objective: 4.05 Explain the considerations around the decision to upgrade your software. 45 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) LibreOffice is an example of a(n) ________ productivity software package. A) open source B) system C) online D) proprietary Answer: A Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 6) Which of the following is NOT a type of a productivity software application? A) Image editing B) Word processing C) Personal information management D) Spreadsheet Answer: A Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 7) Which is TRUE about web-based application software? A) It is always free. B) It is installed by the computer manufacturer. C) It is stored completely on a web server instead of your hard drive. D) It does not need an Internet connection. Answer: C Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 8) The appropriate software to use for writing and editing research papers is ________ software. A) spreadsheet B) presentation C) word processing D) database Answer: C Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 46 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) ________ software lets you perform calculations and numerical analyses. A) Presentation B) Personal information manager C) Word processing D) Spreadsheet Answer: D Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 10) When using a spreadsheet, the expression =D8-D17 is called a ________. A) function B) range C) formula D) cell Answer: C Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 11) When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________. A) function B) operator C) formula D) operand Answer: A Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 12) The box formed by the intersection of a row and column in a spreadsheet program is known as a ________. A) label B) formula C) function D) cell Answer: D Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 47 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 13) All of the following are tips for a great presentation EXCEPT ________. A) limit bullet points per slide to 4-6 B) use images to convey a thought or illustrate a point C) use a variety of animations on most slides to keep your audience's attention D) keep the font size large enough to be read from the back of the room Answer: C Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 14) In databases, a data category is called a ________. A) table B) record C) worksheet D) field Answer: D Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 15) All of the following are examples of database software EXCEPT ________. A) Oracle B) OneNote C) MySQL D) Microsoft Access Answer: B Diff: 3 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 16) ________ software helps you manage e-mail, contacts, calendars, and tasks in the same application. A) Note-taking B) Personal information manager C) Spreadsheet D) Presentation Answer: B Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 48 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 17) Adobe InDesign is an example of ________ software. A) image-editing B) presentation C) desktop publishing D) video-editing Answer: C Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 18) QuickBooks is an example of ________ software. A) educational B) accounting C) course management D) gaming Answer: B Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 19) Dreamweaver is an example of ________ software. A) desktop publishing B) accounting C) course management D) web authoring Answer: D Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 20) Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software. A) accounting B) enterprise resource planning C) project management D) customer relationship management Answer: B Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 21) All of the following are types of multimedia and educational software EXCEPT ________. A) digital audio editing software B) digital video editing software C) drawing software D) productivity software Answer: D Diff: 3 Objective: 4.09 Describe the uses and features of digital multimedia software. 49 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 22) Computer-aided design software is used by ________. A) architects and engineers to create virtual models B) web designers to create websites C) project managers to track tasks D) game makers to create games Answer: A Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 23) Software designed specifically for managing real estate is an example of ________ software. A) e-commerce B) general business C) project management D) vertical market Answer: D Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 24) Multimedia software includes all of the following EXCEPT ________. A) image-editing software B) animation software C) utility software D) audio-editing software Answer: C Diff: 3 Objective: 4.09 Describe the uses and features of digital multimedia software. 25) To remove red eye from a digital image, you would use software such as ________. A) Adobe Photoshop B) Adobe Acrobat C) Microsoft PowerPoint D) Apple Keynote Answer: A Diff: 3 Objective: 4.09 Describe the uses and features of digital multimedia software. 26) Which of the following is the most common audio compression format? A) WAV B) AU C) MP3 D) WMA Answer: C Diff: 1 Objective: 4.10 Describe the uses and features of digital audio software. 50 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 27) Blackboard is an example of ________ software. A) utility B) drawing C) course management D) gaming Answer: C Diff: 2 Objective: 4.12 Categorize educational and reference software and explain their features. 28) A(n) ________ software installation copies all the most commonly used files to your computer's hard drive. A) full B) upgrade C) custom D) beta Answer: A Diff: 2 Objective: 4.04 Describe how to install and uninstall software. 29) A(n) ________ software installation enables you to decide which features you want to install on the hard drive. A) full B) partial C) custom D) upgrade Answer: C Diff: 2 Objective: 4.04 Describe how to install and uninstall software. 30) Unwanted or unneeded software included by manufacturers on new computers is called ________. A) adware B) bloatware C) malware D) shareware Answer: B Diff: 2 Objective: 4.04 Describe how to install and uninstall software. 31) Microsoft Office Online is an example of a(n) ________ productivity packages. Answer: web-based; web based; online; on-line Diff: 3 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 51 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 32) The two main types of software are system software and ________ software. Answer: application Diff: 1 Objective: 4.01 Compare application software and system software. 33) Another name for commercial software is ________ software. Answer: proprietary Diff: 2 Objective: 4.02 Explain the differences between commercial software and open source software, and describe models for software distribution. 34) Apple iWork Pages is an example of ________ software which is used to create documents such as résumés, letters and research papers. Answer: word processing; word-processing Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 35) Writer is the ________ program in LibreOffice package. Answer: word processing; word-processing Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 36) iWork is the ________ package made especially for Apple computers. Answer: productivity; proprietary Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 37) Automatic ________ lets you immediately see the effects of changing values in your spreadsheet. Answer: recalculation Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 38) Microsoft Excel is a(n) ________ software program. Answer: spreadsheet Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 39) Spreadsheet equations that use functions are called ________. Answer: formulas Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 52 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 40) To organize and query large, complicated groups of data, you should use ________ software. Answer: database Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 41) In traditional databases, data is organized into fields, records, and ________. Answer: tables Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 42) In a database, a group of related fields is a(n) ________. Answer: record Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 43) In a database, a group of related records is a(n) ________. Answer: table Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 44) You would use ________ software to create a slide show. Answer: presentation Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 45) In most productivity software packages, a(n) ________ guides you through the steps necessary to finish a complicated task. Answer: wizard Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 46) In most productivity software packages, ________ are predefined forms that include specific designs, special formatting, and styles relevant to a particular document. Answer: templates Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 53 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 47) You could use a(n) ________ to combine a series of commands so that they will run as a single command in most productivity software packages. Answer: macro Diff: 3 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 48) Software that helps manage a checkbook or prepare taxes is called ________ software. Answer: financial planning; personal finance; personal financial planning; tax preparation Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 49) ________ software includes image-editing, video-editing, and audio-editing software. Answer: Multimedia Diff: 2 Objective: 4.09 Describe the uses and features of digital multimedia software. 50) ________ programs allow you to experience a real situation through a virtual environment. Answer: Simulation; Training; Simulated training Diff: 2 Objective: 4.12 Categorize educational and reference software and explain their features. 51) Drawing software is also known as ________ software. Answer: illustration Diff: 2 Objective: 4.09 Describe the uses and features of digital multimedia software. 52) A(n) ________ version is a software application that is still under development. Answer: beta Diff: 2 Objective: 4.03 Explain the different options for purchasing software. 53) If you make more copies of software than your license permits, you are committing software ________. Answer: piracy Diff: 1 Objective: 4.06 Explain how software licenses function. 54) Before installing any software, it's always important to back up your system and to create a(n) ________, which enables you to go back to your computer's previous settings if anything goes wrong during a new software installation. Answer: restore point Diff: 2 Objective: 4.04 Describe how to install and uninstall software. 54 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 55) EULA stands for ________. Answer: End User License Agreement Diff: 3 Objective: 4.06 Explain how software licenses function. 56) To create an app for a mobile device yourself, you would use ________ software like Swift, Corona or Scratch. Answer: app creation Diff: 2 Objective: 4.11 Describe the features of app creation software. 57) Application software helps run the computer and coordinates instructions with the hardware. Answer: FALSE Diff: 1 Objective: 4.01 Compare application software and system software. 58) Software as a Service (SaaS) hosts online applications. Answer: TRUE Diff: 2 Objective: 4.02 Explain the differences between commercial software and open source software, and describe models for software distribution. 59) All online word processing applications are as fully featured as installed versions. Answer: FALSE Diff: 2 Objective: 4.02 Explain the differences between commercial software and open source software, and describe models for software distribution. 60) LibreOffice is an example of open source software. Answer: TRUE Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 61) All files created by newer versions of software are readable by older versions. Answer: FALSE Diff: 1 Objective: 4.05 Explain the considerations around the decision to upgrade your software. 62) Most word processing programs come with a find-and-replace tool that enables you to locate and replace specific text. Answer: TRUE Diff: 1 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 55 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 63) In a database, a table can be defined as a data category. Answer: FALSE Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 64) You can use PowerPoint to trim video clips without having to use a separate video-editing program. Answer: TRUE Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 65) A CD stores the same number of songs in uncompressed format as in MP3 format. Answer: FALSE Diff: 2 Objective: 4.10 Describe the uses and features of digital audio software. 66) An installation wizard walks you through completing a complicated tasks during software installation. Answer: TRUE Diff: 2 Objective: 4.07 Categorize the types of application software used to enhance productivity, and describe their uses and features. 67) Blackboard is an example of gaming software. Answer: FALSE Diff: 2 Objective: 4.12 Categorize educational and reference software and explain their features. 68) Programmers create all apps using high end Software Development Kits like Corona SDK. Answer: FALSE Diff: 2 Objective: 4.11 Describe the features of app creation software. 69) Adobe Photoshop is a drawing software application used by graphic artists. Answer: FALSE Diff: 2 Objective: 4.09 Describe the uses and features of digital multimedia software. 70) Desktop publishing software enables you to create newsletters and annual reports. Answer: TRUE Diff: 2 Objective: 4.08 Summarize the types of software that large and small businesses use. 56 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 71) A full software installation enables you to choose which program features you want installed on your hard drive. Answer: FALSE Diff: 2 Objective: 4.04 Describe how to install and uninstall software. 72) Match each of the following software categories to its purpose: I. II. III. IV. V. computer-aided design course management desktop publishing tax preparation image-editing A. to design buildings B. modifying pictures C. to create newsletters D. used in personal finance E. used by instructors and students Answer: A, E, C, D, B Diff: 2 Objective: Multiple Objectives in the Chapter 73) Match each of the following software categories to its purpose: I. II. III. IV. V. vertical market software application software commercial software software suite system software A. bundled group of software programs B. runs the computer C. another term for proprietary software D. designed for a specific industry E. used to perform tasks Answer: D, E, C, A, B Diff: 2 Objective: Multiple Objectives in the Chapter 57 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 74) Match each of the following software categories to its primary use: I. II. III. IV. V. entertainment enterprise resource planning database video-editing word processing A. manage back end business functions B. write and edit documents C. play games D. edit movies E. keep track of clients Answer: C, A, E, D, B Diff: 2 Objective: Multiple Objectives in the Chapter 75) Match each of the following terms to its definition: I. II. III. IV. V. web-based open source project management personal information manager proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available Answer: B, E, C, A, D Diff: 2 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 5 System Software: The Operating System, Utility Programs, and File Management 1) The two major types of system software programs are utility programs and the ________. A) supervisor programs B) application software C) user interface D) operating system Answer: D Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 2) The ________ of the operating system enables users to communicate with the computer 58 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 system. A) window B) modem C) network adapter card D) user interface Answer: D Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 3) MacOS is the operating system developed by ________. A) Apple B) Microsoft C) Google D) Linux Answer: A Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 4) Which of the following two operating systems are used most frequently on tablets? A) Windows and iOS B) Windows and Android C) Android and iOS D) BlackBerry and Windows Answer: C Diff: 3 Objective: 5.02 Explain the most common operating systems for personal use. 5) Most smartphones use operating systems developed by ________. A) Google and Apple B) Apple and Microsoft C) Microsoft and Google D) Symbian and Apple Answer: A Diff: 2 Objective: 5.02 Explain the most common operating systems for personal use. 6) Which of the following is a proprietary OS for desktop and laptop computers? A) Windows B) iOS C) Android D) Linux Answer: A Diff: 1 Objective: 5.02 Explain the most common operating systems for personal use. 7) All of the following are examples of network operating systems EXCEPT ________. A) Windows 10 B) Linux 59 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 C) macOS D) MS-DOS Answer: D Diff: 2 Objective: 5.03 Explain the different kinds of operating systems for machines, networks, and business. 8) Which of the following is NOT a capability of UNIX? A) It is multiuser. B) It is multitasking. C) It is a network OS. D) It is only for supercomputers. Answer: D Diff: 3 Objective: 5.03 Explain the different kinds of operating systems for machines, networks, and business. 9) Most supercomputers use the ________ operating system. A) UNIX B) Linux C) Windows D) iOS Answer: B Diff: 3 Objective: 5.03 Explain the different kinds of operating systems for machines, networks, and business. 10) Which of the following is the online storage system affiliated with a Microsoft account? A) iCloud B) Chrome C) OneDrive D) iOS Answer: C Diff: 2 Objective: 5.02 Explain the most common operating systems for personal use. 60 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 11) Which of the following is NOT a type of user interface? A) Command-driven B) Application programming interface (API) C) Menu-driven D) Graphical user interface (GUI) Answer: B Diff: 3 Objective: 5.04 Explain how the operating system provides a means for users to interact with the computer. 12) Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________. A) spool B) interrupt sequencer C) compressor D) virtual memory Answer: D Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 13) An application programming interface (API) is ________. A) the code the application software needs in order to interact with the CPU B) the code to interface between an application and a peripheral like a printer C) the currently active part of an application D) the code to interface between an application and RAM Answer: A Diff: 2 Objective: 5.06 Explain how the operating system interacts with application software. 14) Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other. A) device driver B) translator C) interpreter D) device configurator Answer: A Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 61 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Which of the following is the first step in the boot process? A) The BIOS is activated. B) The BIOS checks that all devices are operational. C) The OS is loaded into RAM. D) Configuration and customization settings are checked. Answer: A Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 16) The basic input/output system (BIOS) is stored on a ________ chip. A) ROM B) CPU C) RAM D) CMOS Answer: A Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 17) All of the following are terms related to part of the boot process EXCEPT ________. A) ROM B) CMOS C) RAM D) USB Answer: D Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 18) C: denotes a(n) ________ directory that is at the top of the filing structure of a computer. A) sub B) cluster C) root D) domain Answer: C Diff: 1 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 19) When using Windows File Explorer, which view provides the most information at a glance? A) List B) Content C) Tiles D) Details Answer: D Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and 62 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 manages files and folders. 20) The location of a file is specified by its ________. A) domain B) file path C) file type D) file extension Answer: B Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 21) C:\Windows\System32\drivers\etc\protocol is an example of a file ________. A) extension B) type C) path D) list Answer: C Diff: 1 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 22) Which of the following is the name of a Microsoft Excel file? A) inventory.xlsx B) inventory.wpd C) inventory.accdb D) inventory.pdf Answer: A Diff: 1 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 23) Deleted files on a Mac computer are moved to the ________. A) Garbage Can B) Recycle Bin C) Trash D) Wastepaper Basket Answer: C Diff: 1 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 63 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 24) Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access? A) Disk Cleanup B) Defragment and Optimize Drives C) Error-checking D) Task Manager Answer: B Diff: 1 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 25) Which of the following is NOT a Windows utility program? A) Disk Cleanup B) Desktop Cleanup C) Defragment and Optimize Drives D) System Restore Answer: B Diff: 3 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 26) Which utility temporarily removes redundancies in a file to reduce the file size? A) Disk Cleanup B) File Compression C) Error-checking D) Defragment and Optimize Drives Answer: B Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 27) Use the Windows ________ to check on a nonresponsive program. A) System Restore B) Backup utility C) Error-checking D) Task Manager Answer: D Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 64 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 28) The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage location. A) System Restore B) Time Capsules C) File History D) Carbonite Answer: C Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 29) The ________ is a group of programs that controls how your computer functions. Answer: operating system; OS Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 30) iOS was developed by ________ as the operating system for its tablets and smartphones. Answer: Apple Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 31) The fuel-injection system in a car engine uses a(n) ________. Answer: real-time operating system; real time operating system; RTOS; Embedded system Diff: 2 Objective: 5.03 Explain the different kinds of operating systems for machines, networks, and business. 32) Most supercomputers use the ________ operating system. Answer: Linux Diff: 3 Objective: 5.03 Explain the different kinds of operating systems for machines, networks, and business. 33) The vast majority of smartphones use the ________ or ________ operating systems. Answer: Android, iOS; iOS, Android Diff: 3 Objective: 5.02 Explain the most common operating systems for personal use. 34) Linux download packages are called distributions or ________. Answer: distros Diff: 3 Objective: 5.02 Explain the most common operating systems for personal use. 35) MS-DOS used a(n) ________ interface. Answer: command-driven; command driven Diff: 1 Objective: 5.04 Explain how the operating system provides a means for users to interact with the computer. 65 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 36) A unique signal by a device to let the operating system know that it needs attention is called a(n) ________. Answer: interrupt Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 37) If your computer is thrashing, increase ________ to solve the problem. Answer: RAM; Random-Access Memory; Random Access Memory Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 38) ________is the feature that enables you to use a new device without first installing a device driver. Answer: Plug and Play; PnP Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 39) The Windows feature that removes a newly installed, improperly working driver and replaces it with the last one that worked is called ________. Answer: Roll Back Driver Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 40) During the boot process, the ________ is responsible for loading the operating system from the hard drive into RAM. Answer: BIOS; basic input/output system; basic input output system Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 41) Natural language processing is a field of ________that uses software to analyze, understand, and generate human languages naturally. Answer: artificial intelligence; AI Diff: 2 Objective: 5.06 Explain how the operating system interacts with application software. 42) When a computer is booted, the process called ________ checks the computer's components. Answer: power-on self-test (POST); power-on self-test; POST Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 66 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 43) The Windows ________ displays open and favorite applications for easy access at the bottom of the display by default. Answer: taskbar Diff: 2 Objective: 5.08 Describe the main features of the Windows interface. 44) File ________ manages files stored in a hierarchical structure of directories in Windows. Answer: Explorer Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 45) The ________ is a Windows tool that enables you to capture all or a portion of a screen display. Answer: Snipping Tool Diff: 3 Objective: 5.08 Describe the main features of the Windows interface. 46) In the Windows operating system, the C:\ drive is commonly referred to as the ________ directory. Answer: root Diff: 1 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 47) When using a Windows PC, ________ is the main tool for finding, viewing, and managing files. Answer: File Explorer Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 48) The Windows path separator is the ________ character. Answer: backslash; \ Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 49) In the file name, Resume.docx, docx is the ________, indicating the file type. Answer: extension; file extension Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 50) Disk ________ realigns separated data so that related file pieces are unified. Answer: defragmentation; defrag; defragmenter Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide 67 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 accessibility. 51) The Windows utility program that removes unnecessary files from the hard drive is called ________. Answer: Disk Cleanup Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 52) Tracks on hard disk drives are broken down into pie shaped wedges called ________. Answer: sectors Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 53) Scattered pieces of files on the hard drive can be regrouped into sequential order using the ________ utility. Answer: Disk defragmenter; disk defragmenting; disk defragmentation; defrag; disk defrag Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 54) Windows includes ________ settings, which provide a centralized location for assistive technology and tools. Answer: accessibility Diff: 2 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 55) Every computer has an operating system. Answer: TRUE Diff: 1 Objective: 5.01 Discuss the functions of the operating system. 56) Gaming consoles, such as Xbox One and PlayStation 4, do not need an operating system. Answer: FALSE Diff: 2 Objective: 5.01 Discuss the functions of the operating system. 57) A system restore point is a snapshot of your entire computer system's settings. Answer: TRUE Diff: 1 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 58) A personal computer can only have one operating system installed on it. Answer: FALSE Diff: 2 68 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 Objective: 5.02 Explain the most common operating systems for personal use. 59) Most desktop and laptop computers run some version of Windows, Linux or macOS. Answer: TRUE Diff: 1 Objective: 5.02 Explain the most common operating systems for personal use. 60) Windows 10 is the planned final operating system release by Microsoft. Answer: TRUE Diff: 2 Objective: 5.02 Explain the most common operating systems for personal use. 61) Android is an open source operating system for network servers. Answer: FALSE Diff: 2 Objective: 5.02 Explain the most common operating systems for personal use. 62) When your computer runs out of RAM, the operating system borrows space from the CPU. Answer: FALSE Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 63) Installing a device driver can sometimes cause system instability. Answer: TRUE Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 64) CMOS is a special kind of memory that uses a great deal of power. Answer: FALSE Diff: 2 Objective: 5.07 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. 65) Preemptive multitasking is the term used when the operating system processes higherpriority tasks before lower-priority tasks. Answer: TRUE Diff: 2 Objective: 5.05 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. 66) File Explorer is Windows's main program to find, manage and view files. Answer: TRUE Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 69 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 67) You can use System Restore to return your system's settings back to a specific date when everything was working properly. Answer: TRUE Diff: 1 Objective: 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. 68) Match each of the following terms to its file type (extension): I. II. III. IV. V. .zip .jpg .pdf .accdb .html A. Microsoft Access B. compressed files C. portable document format D. image E. web page Answer: B, D, C, A, E Diff: 2 Objective: 5.09 Summarize how the operating system helps keep your computer organized and manages files and folders. 69) Match each of the following terms to its definition: I. II. III. IV. V. folder track sector platter taskbar A. displays open and favorite applications B. storage location for a collection of files C. pie-shaped wedge on the hard drive D. round, thin plate of metal that makes up a hard drive E. concentric circle on the hard drive Answer: B, E, C, D, A Diff: 2 Objective: Multiple Objectives in the Chapter 70 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 70) Match each of the following terms to its definition: I. GUI II. thrashing III. Desktop IV. pin V. POST A. checks hardware at startup B. primary work area C. place an application tile on the Start screen or icon on the taskbar D. type of user interface in macOS and Microsoft Windows 10 E. the condition of excessive paging Answer: D, E, B, C, A Diff: 2 Objective: Multiple Objectives in the Chapter 71) Match each of the following terms to its definition: I. II. III. IV. V. Defragment and Optimize Drives Task Manager System Restore File History, File Recovery Disk Cleanup A. brings system back to a previously stable state B. regroups related pieces of files on the hard disk C. lists all the programs being used and indicates their status D. backs up important files, makes a complete mirror image of your current computer setup E. removes unnecessary files from the hard drive Answer: B, C, A, D, E Diff: 2 Objective: Multiple Objectives in the Chapter 71 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 72) Match each of the following terms to its definition: I. II. III. IV. V. virtual memory paging kernel swap file spooler A. process of optimizing RAM storage by using hard drive space B. operating system supervisor program C. coordinates print jobs D. temporary storage area on the hard drive E. swapping data between RAM and a hard drive Answer: A, E, B, D, C Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 6 Understanding and Assessing Hardware: Evaluating Your System 1) The rule of thumb that predicts that the number of transistors on a CPU will double every two years is called ________ Law. A) Charles' B) Moore's C) Intel's D) Boyle's Answer: B Diff: 1 Objective: 6.01 Describe the changes in CPU performance over the past several decades. 2) Which of the following is the lightest computer? A) Laptop B) Ultrabook C) Smartphones D) Desktop Answer: C Diff: 2 Objective: 6.02 Compare and contrast a variety of computing devices. 3) The processor market for desktop and laptop computers is dominated by ________. A) IBM B) Microsoft C) Intel D) Apple Answer: C Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 72 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 4) Which of the following does NOT determine a CPU's processing power? A) Clock speed B) Number of cores C) Amount of cache memory D) Speed of the motherboard Answer: D Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 73 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Which of the following activities is carried out by the ALU? A) Moves read/write heads B) Performs arithmetic calculations C) Creates virtual memory D) Renders video images Answer: B Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 6) All of the following are part of the machine cycle EXCEPT ________. A) fetch B) encode C) execute D) store Answer: B Diff: 3 Objective: 6.03 Describe how a CPU is designed and how it operates. 7) The CPU consists of which two parts? A) The arithmetic logic unit and the front side bus B) The control unit and the arithmetic logic unit C) The control unit and the front side bus D) Cache memory and SSD storage Answer: B Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 8) The control unit is one component of the ________. A) CPU B) cache C) front side bus D) clock Answer: A Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 9) Running the CPU at a faster speed than the manufacturer recommends is called ________. A) fetching B) latency C) overclocking D) hyperthreading Answer: C Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 74 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) Cache memory levels are based on proximity to ________. A) the hard drive B) RAM C) the processor D) the video card Answer: C Diff: 3 Objective: 6.03 Describe how a CPU is designed and how it operates. 11) ________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished. A) Multitasking B) Cache memory C) Hyperthreading D) Overclocking Answer: C Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 12) Some of the cache memory of a CPU is ________. A) inside the CPU, itself B) on the hard disk drive C) on a nearby SSD D) in cloud storage Answer: A Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 13) RAM is an example of ________ storage. A) volatile B) nonvolatile C) permanent D) mobile Answer: A Diff: 1 Objective: 6.05 Discuss how RAM is used in a computer system. 14) The amount of RAM storage is measured in ________. A) gigabytes B) gigahertz C) gigabits D) machine cycles Answer: A Diff: 2 Objective: 6.05 Discuss how RAM is used in a computer system. 75 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently an d then preloads them into your system memory. A) SuperGet B) SuperFetch C) SuperTake D) SuperRetrieve Answer: B Diff: 2 Objective: 6.05 Discuss how RAM is used in a computer system. 16) Select the best way to determine your RAM allocation. A) List all programs you would run simultaneously and the amount of RAM each needs and add together. B) Count the number of available slots on the motherboard. C) Divide the number of used memory slots by the number of total memory slots. D) Monitor RAM usage in performance monitor and calculate an average of RAM used over 10 random periods. Answer: A Diff: 3 Objective: 6.06 Evaluate whether adding RAM to a system is desirable. 17) When referring to hard drives, access time is measured in ________. A) megahertz B) bits per second C) milliseconds D) kilobytes Answer: C Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 18) A ________ uses electronic memory and has no motors or moving parts. A) mechanical hard drive B) solid-state drive C) Bluray disc D) digital video disc Answer: B Diff: 1 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 19) How do optical discs store data? A) A laser burns tiny pits onto a disc. B) A magnet aligns iron particles on a platter. C) Electronic memory records data on chips. D) A digital spectrometer leaves grooves in a platter. Answer: A Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 76 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) Which of the following is NOT a permanent storage option? A) Optical drive B) Random access memory C) Internal hard drive D) SSD Answer: B Diff: 3 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 21) Which of the following storage devices has the largest potential capacity? A) Compact disc B) Thumb drive C) Bluray disc D) Mechanical hard drive Answer: D Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 22) Which of the following ports is NOT considered to be exclusively a video port? A) HDMI B) DVI C) USB D) DisplayPort Answer: C Diff: 3 Objective: 6.09 Describe the features of video cards. 23) To speed up the display of graphics, a(n) ________ is integrated into most video cards. A) GPU B) CPU C) ALU D) SSD Answer: A Diff: 2 Objective: 6.09 Describe the features of video cards. 24) A(n) ________ enables the computer to drive the speaker system. A) GPU port B) display port C) sound card D) PCI bus Answer: C Diff: 1 Objective: 6.10 Describe the features of sound cards. 77 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 25) How many channels are in a Dolby 7.1 surround sound system? A) 7 B) 8 C) 6 D) 12 Answer: B Diff: 2 Objective: 6.10 Describe the features of sound cards. 26) Running the Disk Defragmenter utility will ________. A) detect and remove spyware B) mark bad memory cells C) make the hard drive work more efficiently D) clean out your Startup folder Answer: C Diff: 2 Objective: 6.11 Describe steps you can take to optimize your system's reliability. 27) Running the Disk Cleanup utility is a quick way to ________. A) defrag your hard drive B) remove spyware programs C) clear out unnecessary files D) uninstall unwanted apps Answer: C Diff: 2 Objective: 6.11 Describe steps you can take to optimize your system's reliability. 28) The Windows ________ utility returns your computer to the state it was in when it came from the factory. A) Backup B) Erase C) Restore D) Refresh Answer: D Diff: 2 Objective: 6.11 Describe steps you can take to optimize your system's reliability. 29) Which statement pertaining to system reliability is FALSE? A) Having the latest version of software products can make your system more reliable. B) An accumulation of temporary Internet files has no effect on your computer's overall performance. C) Removing unnecessary programs from your Startup folder can improve system reliability. D) When you defrag your hard drive, it works more efficiently. Answer: B Diff: 2 Objective: 6.11 Describe steps you can take to optimize your system's reliability. 78 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 30) To securely erase data, the U.S. Department of Defense suggests that data be ________. A) overwritten seven times B) deleted C) encoded D) refactored Answer: A Diff: 3 Objective: 6.12 Discuss how to recycle, donate, or dispose of an older computer. 31) ________ Law predicts that the number of transistors in a CPU will double about every two years. Answer: Moore's Diff: 1 Objective: 6.01 Describe the changes in CPU performance over the past several decades. 32) The CPU is located on the ________. Answer: motherboard; system motherboard; mother board; system board Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 33) A CPU's processing power is determined by the combination of the clock speed, the number of cores, and the amount of ________ memory. Answer: cache Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 34) The ________ of a CPU dictates how many instructions the CPU can process each second. Answer: clock speed Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 35) The CPU is composed of two units, the control unit and the ________. Answer: arithmetic logic unit; ALU Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 36) The process the CPU performs for each program instruction is called the ________. Answer: machine cycle Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 37) ________ is a feature of a CPU that allows it to begin to fetch the next instruction before it has finished executing the current one. Answer: Hyperthreading Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 79 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 38) Running the CPU at a faster speed than the manufacturer recommends is called ________. Answer: overclocking Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 39) ________ is the type of RAM memory used most often in today's lower-end computers. Answer: DDR3; Double data rate 3; DDR3 memory modules; Double data rate 3 memory modules Diff: 3 Objective: 6.05 Discuss how RAM is used in a computer system. 40) The CPU's ________ memory is a form of RAM that gets data to the CPU for processing much faster than bringing the data in from the computer's RAM. Answer: cache Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 41) RAM is an example of ________ storage because when the power is turned off, RAM is cleared out. Answer: volatile; temporary Diff: 1 Objective: 6.05 Discuss how RAM is used in a computer system. 42) The time it takes a storage device to locate stored data and make it available for processing is called ________ time. Answer: access Diff: 3 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 43) The ________ has the largest potential capacity of any storage device. Answer: mechanical hard drive; hard drive; hard disk drive Diff: 1 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 44) ________ drives are 100 times faster than mechanical hard drives. Answer: Solid-state; Solid state; SSD Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 45) ________ drives run with no noise and very little heat, and require very little power. Answer: Solid-state; Solid state; SSD Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 46) Optical drives use a(n) ________ to read and write data. Answer: laser; high speed laser; high-speed laser Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 80 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 47) A(n) ________ moves over the spinning platters to retrieve data from a mechanical hard disk. Answer: read/write head Diff: 3 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 48) A stoppage of a mechanical hard drive that often results in data loss is called a(n) ________. Answer: head crash Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 49) ________ improves disk writing performance because data is written across two drives. Answer: RAID 0 Diff: 2 Objective: 6.08 Evaluate the amount and type of storage needed for a system. 50) ________ automatically duplicates your data and saves it on two identical drives. Answer: RAID 1 Diff: 2 Objective: 6.08 Evaluate the amount and type of storage needed for a system. 51) A video card can deliver output to multiple ________. Answer: monitors; displays Diff: 2 Objective: 6.09 Describe the features of video cards. 52) In a video card, GPU stands for ________. Answer: graphics processing unit Diff: 3 Objective: 6.09 Describe the features of video cards. 53) ________ sound is a type of audio system where the listener hears the sound as if it were coming from multiple speakers. Answer: Surround Diff: 1 Objective: 6.10 Describe the features of sound cards. 54) The audio subsystem consists of the speakers, microphone, and a(n) ________. Answer: sound card Diff: 1 Objective: 6.10 Describe the features of sound cards. 55) macOS X uses ________ software to automatically backup and restore data. Answer: Time Machine Diff: 3 Objective: 6.11 Describe steps you can take to optimize your system's reliability. 81 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 56) Many computer manufacturers offer ________ programs to reduce the number of computers disposed in landfills. Answer: recycling Diff: 2 Objective: 6.12 Discuss how to recycle, donate, or dispose of an older computer. 57) Windows has tools to monitor CPU utilization in Task Manager. Answer: TRUE Diff: 2 Objective: 6.04 Describe tools used to measure and evaluate CPU performance. 58) Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive. Answer: TRUE Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 59) Desktop computer systems are less reliable than laptop computers. Answer: FALSE Diff: 2 Objective: 6.02 Compare and contrast a variety of computing devices. 60) Level 3 cache memory is faster than Level 1 and Level 2 cache. Answer: FALSE Diff: 3 Objective: 6.03 Describe how a CPU is designed and how it operates. 61) The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time. Answer: TRUE Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 62) Cache memory is a form of ROM. Answer: FALSE Diff: 2 Objective: 6.03 Describe how a CPU is designed and how it operates. 63) Level 1 cache usually contains the least amount of storage of the cache memory levels. Answer: TRUE Diff: 1 Objective: 6.03 Describe how a CPU is designed and how it operates. 64) Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. Answer: FALSE Diff: 2 Objective: 6.05 Discuss how RAM is used in a computer system. 82 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 65) The heads of a mechanical hard disk drive touch the surface of the platter to read or write the data. Answer: FALSE Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 66) RAM prices tend to be very stable. Answer: FALSE Diff: 2 Objective: 6.06 Evaluate whether adding RAM to a system is desirable. 67) Optical discs store data using tiny pits and grooves burned by a laser. Answer: TRUE Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 68) Video cards are designed with their own RAM storage. Answer: TRUE Diff: 1 Objective: 6.09 Describe the features of video cards. 69) When using multiple monitors, you must have multiple video cards. Answer: FALSE Diff: 2 Objective: 6.09 Describe the features of video cards. 70) 3D sound is different from surround-sound. Answer: TRUE Diff: 2 Objective: 6.10 Describe the features of sound cards. 71) Dolby Digital 7.1 requires a total of eight speakers. Answer: TRUE Diff: 3 Objective: 6.10 Describe the features of sound cards. 72) RAID 0 automatically duplicates your data and saves it on two identical drives. Answer: FALSE Diff: 2 Objective: 6.08 Evaluate the amount and type of storage needed for a system. 73) If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate. Answer: FALSE Diff: 2 Objective: 6.12 Discuss how to recycle, donate, or dispose of an older computer. 83 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 74) Match each of the following terms to its meaning: I. II. III. IV. V. latency sectors tracks seek time platters A. time required for the read/write head to move to the correct track B. round, thin plates of metal within a mechanical hard drive C. time needed for correct sector to spin to the read/write head D. concentric circles on a hard drive E. pie-shaped wedges on the surface of a hard drive Answer: C, E, D, A, B Diff: 2 Objective: 6.07 Classify and describe the major types of nonvolatile storage drives. 75) Match each of the following terms to its meaning: I. II. III. IV. V. RAM hyperthreading clock speed quad-core processor ROM A. a CPU with 4 cores B. volatile storage C. measure of CPU speed D. permanent storage E. simultaneous execution of more than one instruction Answer: B, E, C, A, D Diff: 2 Objective: Multiple Objectives in the Chapter 84 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 76) Match each of the following terms to its purpose: I. II. III. IV. V. virtual memory physical memory random access memory cache memory video memory A. volatile storage space B. found on a video card C. space on the hard drive for data that doesn't fit in RAM D. can be accessed more quickly than regular RAM E. the amount of RAM contained on memory modules Answer: C, E, A, D, B Diff: 2 Objective: Multiple Objectives in the Chapter 77) Match each of the following terms to its function: I. II. III. IV. V. CPU ALU cache RAID SSD A. closest memory to the CPU B. processor C. uses electronic memory and has no moving parts D. strategy for using more than one storage drive in a system E. performs arithmetic calculations Answer: B, E, A, D, C Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 7 Networking: Connecting Computing Devices 1) A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. A) network B) switch C) broadband D) node Answer: A Diff: 1 Objective: 7.01 Describe computer networks and their pros and cons. 2) A ________ is any device connected to a network such as a computer, printer, or game 85 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 console. A) packet B) node C) NOS D) NIC Answer: B Diff: 1 Objective: 7.01 Describe computer networks and their pros and cons. 3) ________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate. A) Benchmark B) Broadband C) Bandwidth D) Throughput Answer: D Diff: 2 Objective: 7.01 Describe computer networks and their pros and cons. 4) Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance. A) security engineer B) IT managers C) computer technicians D) network administrators Answer: D Diff: 2 Objective: 7.01 Describe computer networks and their pros and cons. 86 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Which of the following is NOT a common network architecture type? A) Local area network (LAN) B) Home area network (HAN) C) Intraoffice area network (IAN) D) Personal area network (PAN) Answer: C Diff: 3 Objective: 7.02 Explain the different ways networks are defined. 6) You can find out which network adapters are installed in your system by using the Windows ________ Manager utility. A) Network B) Device C) Setup D) Hardware Answer: B Diff: 2 Objective: 7.08 Explain what should be considered before creating a home network. 7) When setting up a home network, make sure each node has ________. A) a NOS installed B) the proper software installed on each node C) a network adapter D) the proper security protocols in place Answer: C Diff: 2 Objective: 7.10 Summarize how to configure home network software. 8) The network architecture that spans the largest physical distance is called a ________. A) MAN B) LAN C) PAN D) WAN Answer: D Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 9) A large network designed to provide access to a specific geographic area, such as a large city, is a ________. A) MAN B) PAN C) LAN D) WAN Answer: A Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 87 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) Which transmission medium transmits data the fastest? A) Twisted-pair cable B) Coaxial cable C) Wireless D) Fiber-optic cable Answer: D Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 11) What transmission media is used for normal telephone service? A) Fiber-optic cable B) Twisted-pair cable C) Coaxial cable D) Ethernet cable Answer: B Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 12) A client/server network is an example of ________ administration. A) local B) wide area C) central D) remote Answer: C Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 13) A peer-to-peer (P2P) network is an example of ________ administration. A) local B) wide area C) central D) corporate Answer: A Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 14) Which of the following is NOT a standard for wireless Ethernet networks? A) 802.11n B) 802.11g C) 802.11ab D) 802.11ac Answer: C Diff: 3 Objective: 7.02 Explain the different ways networks are defined. 88 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Which of the following is NOT a type of cable used in wired networks? A) Unshielded twisted-pair B) Coaxial C) Fiber-optic D) Unshielded coaxial Answer: D Diff: 3 Objective: 7.03 Describe the types of transmission media used in networks. 16) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network? A) Cat 5E B) Cat 6 C) Cat 6A D) Cat 7B Answer: D Diff: 3 Objective: 7.03 Describe the types of transmission media used in networks. 17) If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard? A) 802.11bc B) 802.11n C) 802.11ac D) 802.3ac Answer: C Diff: 2 Objective: 7.08 Explain what should be considered before creating a home network. 18) Wireless network devices use ________ to communicate with each other. A) fiber optics B) satellites C) radio waves D) DSL Answer: C Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 19) For the nodes on a network to communicate with each other and access the network, each node needs a ________. A) DSL modem B) network adapter C) hub D) router Answer: B Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 89 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) On a network, a(n) ________ helps prevent data packets from colliding with each other. A) access point B) hub C) adapter D) switch Answer: D Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 21) Which hardware device connects your network to the Internet? A) Modem B) Router C) Firewall D) Switch Answer: A Diff: 3 Objective: 7.04 Describe the basic hardware devices necessary for networks. 22) To transfer data packets between two or more networks, a ________ is used. A) router B) hub C) modem D) switch Answer: A Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 23) Data are sent through a network in bundles called ________. A) packages B) pouches C) packets D) nodes Answer: C Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 24) Which of the following is NOT a home operating system that supports P2P networking? A) Windows B) macOS C) Unix D) Linux Answer: C Diff: 2 Objective: 7.05 Describe the type of software necessary for networks. 90 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 25) Client/server networks are controlled by a central server that runs specialized software called a(n) ________. A) multipersonnel operating system (MPOS) B) network operating system (NOS) C) central operating system (COS) D) central server operating system (CCOS) Answer: B Diff: 2 Objective: 7.05 Describe the type of software necessary for networks. 26) Which of the following is NOT a wired broadband Internet connection option? A) Cable B) Dial-up C) DSL D) Fiber-optic Answer: B Diff: 3 Objective: 7.06 Summarize the broadband options available to access the Internet. 27) A(n) ________ device facilitates file sharing and data backup. A) NAS B) WAN C) UTP D) NOS Answer: A Diff: 2 Objective: 7.09 Describe how to set up a home network. 28) Using a wireless network without the network owner's permission is known as ________. A) hijacking B) spamming C) piggybacking D) phishing Answer: C Diff: 2 Objective: 7.12 Describe how to secure wireless home networks. 29) All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. A) change your network name (SSID) B) enable SSID broadcast C) turn on security protocols D) create a passphrase Answer: B Diff: 3 Objective: 7.12 Describe how to secure wireless home networks. 91 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 30) The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A) MAC B) IP C) SSID D) network Answer: A Diff: 2 Objective: 7.12 Describe how to secure wireless home networks. 31) The term network ________ is the same as the network design. Answer: architecture Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 32) A(n) ________ network is one in which each computer can communicate directly with the others. Answer: peer-to-peer; P2P Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 33) A computer lab is an example of a(n) ________ type of network. Answer: LAN; local area network Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 34) A network used to communicate among devices close to one person is called a(n) ________. Answer: PAN; personal area network Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 35) Many cities in the United States now provide a(n) ________ type of network to allow Internet access to residents and tourists. Answer: metropolitan area network; MAN Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 36) ________ cable is composed of four pairs of wires that are wrapped around each other with no external casing. Answer: Unshielded twisted-pair; UTP Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 37) ________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. Answer: Coaxial Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 92 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 38) The capability of current devices to use earlier standards, in addition to the current standard, is known as ________. Answer: backward compatibility Diff: 2 Objective: 7.02 Explain the different ways networks are defined. 39) ________ are devices that transfer packets of data between two or more networks. Answer: Routers Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 40) A(n) ________ is a device that receives data packets and sends them to their intended nodes on the same network while preventing data collisions. Answer: switch Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 41) The server on a client/server network has specialized ________ software installed. Answer: network operating system; NOS Diff: 2 Objective: 7.05 Describe the type of software necessary for networks. 42) ________ is often referred to as "high-speed Internet." Answer: Broadband Diff: 2 Objective: 7.06 Summarize the broadband options available to access the Internet. 43) DSL broadband service uses ________ cable. Answer: twisted-pair; twisted pair Diff: 3 Objective: 7.06 Summarize the broadband options available to access the Internet. 44) A(n) ________ network uses radio waves as its transmission medium. Answer: wireless Diff: 1 Objective: 7.03 Describe the types of transmission media used in networks. 45) A(n)________ acts like a traffic signal on a network. Answer: switch Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 46) In terms of networking, NOS stands for ________. Answer: network operating system Diff: 2 Objective: 7.05 Describe the type of software necessary for networks. 93 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 47) ________ has faster cellular data transfer rates than 3G. Answer: 4G Diff: 2 Objective: 7.07 Summarize how to access the Internet wirelessly. 48) Public places where you can wirelessly connect to the Internet are known as ________. Answer: hotspots; WiFi hotspots; Wi-Fi hotspots; wireless hotspots Diff: 2 Objective: 7.07 Summarize how to access the Internet wirelessly. 49) A(n) ________ is someone who attempts to access your network without your knowledge. Answer: hacker; piggybacker Diff: 1 Objective: 7.12 Describe how to secure wireless home networks. 50) When using a wireless connection, the process of ________ translates data into code so that it is protected. Answer: encryption Diff: 2 Objective: 7.12 Describe how to secure wireless home networks. 51) SSID stands for ________. Answer: service set identifier; service set ID Diff: 3 Objective: 7.12 Describe how to secure wireless home networks. 52) All wireless networks have their own name, referred to as the ________, which is used to identify the network. Answer: service set identifier; SSID; service set ID Diff: 3 Objective: 7.12 Describe how to secure wireless home networks. 53) A wireless ________ extender is a wireless network device that repeats your wireless signal. Answer: range Diff: 3 Objective: 7.11 Describe the potential problems with wireless networks and means to avoid them. 54) ________ is a much stronger protocol than WEP for wireless security. Answer: Wi-Fi Protected Access; WPA; WPA2; Wi-Fi Protected Access Version 2 Diff: 3 Objective: 7.12 Describe how to secure wireless home networks. 55) A printer connected to a wireless network is considered to be a node on that network. Answer: TRUE Diff: 1 Objective: 7.01 Describe computer networks and their pros and cons. 94 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 56) Sharing files is a benefit of a network. Answer: TRUE Diff: 1 Objective: 7.01 Describe computer networks and their pros and cons. 57) When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router. Answer: FALSE Diff: 1 Objective: 7.10 Summarize how to configure home network software. 58) P2P networks are most commonly used in home networks. Answer: TRUE Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 59) The Internet is a WAN. Answer: TRUE Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 60) Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard. Answer: FALSE Diff: 3 Objective: 7.02 Explain the different ways networks are defined. 61) Wireless network connections are slower than wired broadband connections. Answer: TRUE Diff: 2 Objective: 7.03 Describe the types of transmission media used in networks. 62) An access point connects to the main router wirelessly. Answer: FALSE Diff: 2 Objective: 7.11 Describe the potential problems with wireless networks and means to avoid them. 63) Most computers today come with network adapters already installed. Answer: TRUE Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 64) A switch acts like a traffic signal on a network. Answer: TRUE Diff: 2 Objective: 7.04 Describe the basic hardware devices necessary for networks. 95 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 65) A P2P network needs specialized network operating system software installed on every node. Answer: FALSE Diff: 2 Objective: 7.05 Describe the type of software necessary for networks. 66) Wireless networks are more vulnerable to attack than wired networks. Answer: TRUE Diff: 2 Objective: 7.12 Describe how to secure wireless home networks. 67) WEP is a stronger form of security than WPA. Answer: FALSE Diff: 2 Objective: 7.12 Describe how to secure wireless home networks. 68) Limiting your signal range does not help increase wireless network security. Answer: FALSE Diff: 1 Objective: 7.12 Describe how to secure wireless home networks. 69) Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance Answer: B, D, A, C, E Diff: 1 Objective: 7.02 Explain the different ways networks are defined. 96 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 70) Match each of the following terms to its definition: I. fiber-optic II. twisted-pair III. coaxial cable IV. peer-to-peer V. client/server A. single copper wire surrounded by layers of plastic B. made up of plastic or glass and transmits data at extremely fast speeds C. each node can communicate directly with every other node on the network D. made up of copper wires E. central computer provides information and resources to other computers Answer: B, D, A, C, E Diff: 2 Objective: Multiple Objectives in the Chapter 71) Match each of the following terms to its definition: I. server II. client III. network IV. piggyback V. node A. two or more computers connected together via software and hardware so they can communicate B. a computer, peripheral, or communication device on a network C. computer on which users accomplish specific tasks and make specific requests D. provides information and resources to other computers on a network E. unauthorized connection to a wireless network Answer: D, C, A, E, B Diff: 3 Objective: Multiple Objectives in the Chapter 97 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 72) Match each of the following terms to its definition: I. throughput II. packet III. firmware IV. firewall V. bandwidth A. maximum speed at which data can be transmitted B. the actual speed of data transfer that is achieved on a network C. the format in which data is sent over transmission media D. hardware or software for protecting computers from hackers E. instructions in read-only memory Answer: B, C, E, D, A Diff: 2 Objective: Multiple Objectives in the Chapter 73) Match each of the following terms to its definition: I. NOS II. broadband III. router IV. switch V. NIC A. directs data traffic between networks B. handles data traffic between nodes on the same network C. software used to set up and manage a network D. connects a node to a network E. high-speed Internet connection Answer: C, E, A, B, D Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 8 Managing a Digital Lifestyle: Media and Ethics 1) What does the Digital Living Network Alliance standardize? A) The compilation of available e-texts. B) The codecs used in video compression. C) The sampling rate used to create MP3 files. D) The convergence of devices. Answer: D Diff: 3 Objective: 8.01 Describe how digital convergence has evolved. 2) The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. 98 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 A) multimedia message service B) telephony C) mobile switching center D) digital convergence Answer: D Diff: 1 Objective: 8.01 Describe how digital convergence has evolved. 3) What kind of e-book reader does Barnes and Noble sell? A) NOOK B) Kindle C) VitalSource D) Fire Answer: A Diff: 2 Objective: 8.04 Explain how to purchase, borrow, and publish e-texts. 4) What happens after 180 days to e-books rented through VitalSource? A) They are encrypted until you purchase them. B) They show up in your library, but cannot be read. C) They disappear from your device. D) Only the first chapter can be read. Answer: C Diff: 2 Objective: 8.04 Explain how to purchase, borrow, and publish e-texts. 99 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) What is a system of access control that allows only limited use of material that has been legally purchased? A) DDM B) DRM C) DRR D) MDR Answer: B Diff: 3 Objective: 8.06 Summarize how to listen to and publish digital music. 6) Google ________ is an online store that can be used for self-publishing books. A) Fun B) Games C) Play D) Sport Answer: C Diff: 2 Objective: 8.04 Explain how to purchase, borrow, and publish e-texts. 7) A(n) ________ chip converts sound waves from a voice into a digital signal. A) analog-to-digital converter B) digital convergence C) digital signal processor D) telephony Answer: A Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 8) What is NOT an example of a method to stream music? A) Pandora B) Google Tunes C) Spotify D) Apple CarPlay Answer: B Diff: 2 Objective: 8.06 Summarize how to listen to and publish digital music. 9) ________ property is a product of a person's mind and is usually considered an expression of human creativity? A) Abstract B) Intellectual C) Tangible D) Personal Answer: B Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 100 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) The Apple logo would be considered a(n) ________. A) copyright B) service mark C) patent D) trademark Answer: D Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 11) To protect a movie, what category of intellectual property would be used? A) Copyright B) Trademark C) Service mark D) Patent Answer: A Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 12) When does copyright protection begin? A) When the application for the copyright has been approved B) When the application for the copyright has been submitted C) When a work is begun D) When a work is created and fixed into a digital or physical form Answer: D Diff: 3 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 13) Creative Commons licenses are ________. A) temporary B) irrevocable C) used mostly for software D) used mostly for movies Answer: B Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 14) A violation of the holder's rights is known as copyright ________. A) violation B) infringement C) defrauding D) abuse Answer: B Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 101 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Which is NOT a reason someone might risk violating a copyright? A) The risk of being caught is very low. B) It is hard to prove the copyright in court. C) Everyone else is doing it. D) I am just one person. Answer: B Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 16) What is the act of copying text or ideas from someone else and claiming them as your own? A) Copyright abuse B) Trademark infringement C) Plagiarism D) Copyleft Answer: C Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 17) Instead of writing a term paper, some people cheat and purchase one from a(n) ________. A) paper mill B) term paper resource C) academic wholesale house D) academic paper resource Answer: A Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 18) What is a popular copyleft license used for software? A) Creative Commons (CC) B) General Public License (GNU) C) Software Copy License (SCL) D) NonCommercial (NC) Answer: B Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 19) What is a website that allows an instructor to upload a paper to check for plagiarism? A) checkit.com B) plagiarism.com C) turnitin.com D) checkthatpaper.com Answer: C Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 102 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) What is a good rule to follow to avoid plagiarism? A) Cite every fact you use. B) Never cite from another source. C) When in doubt, cite your source. D) Cite every comment. Answer: C Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 21) Works without copyright protection are considered to be in the ________. A) public domain B) free use domain C) trademark zone D) copyleft domain Answer: A Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 22) Which of the following is NOT true about e-books? A) You can borrow them from the library. B) They are always PDF file format. C) You can annotate them with your own notes. D) Amazon sells more e-books now than printed books. Answer: B Diff: 3 Objective: 8.03 Describe the different types of e-readers. 23) ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices. A) Short message service B) SMTP C) E-text D) Digital rights management Answer: C Diff: 3 Objective: 8.03 Describe the different types of e-readers. 24) How long do current U.S. laws grant copyright protection? A) The life of the author (creator) plus 70 years B) The life of the author (creator) plus 50 years C) 99 years D) 101 years Answer: A Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 103 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 25) Which of the following is NOT an example of a digital music file format? A) WMA B) MP3 C) AAC D) ACCDB Answer: D Diff: 1 Objective: 8.05 Describe how digital music is created and stored. 26) ________ allows only limited use of media that has been legally purchased. A) Digital rights management B) Copyright C) Copyleft D) Synchronizing Answer: A Diff: 2 Objective: 8.06 Summarize how to listen to and publish digital music. 27) Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? A) Converting rate B) Conversion rate C) Simplifying rate D) Sampling rate Answer: D Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 28) Which of the following digital formats compress an image file? A) AAC B) RAW C) JPEG D) MPEG Answer: C Diff: 2 Objective: 8.07 Explain how best to create, print, and share digital photos. 29) Which of the following is NOT a video file extension? A) .jpg B) .mpg C) .avi D) .mov Answer: A Diff: 2 Objective: 8.08 Describe how to create, edit, and distribute digital video. 104 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 30) A(n) ________ cable carries all audio and video information from one devices to another connected device. A) HDMI B) S component C) Ethernet D) RJ11 Answer: A Diff: 1 Objective: 8.08 Describe how to create, edit, and distribute digital video. 31) A(n) ________ is anything designed to deceive another person either as a practical joke or for financial gain. Answer: hoax Diff: 1 Objective: 8.13 Describe hoaxes and digital manipulation. 32) When a hoax becomes so well known that it is incorporated into society as a true event, it is known as a(n) ________. Answer: urban legend Diff: 2 Objective: 8.13 Describe hoaxes and digital manipulation. 33) Digital ________ involves altering media so that the images captured are changed from the way they were originally seen by the human eye. Answer: manipulation Diff: 2 Objective: 8.13 Describe hoaxes and digital manipulation. 34) Google ________ is a subscription service that lets you listen to tracks in their catalog. Answer: Play; Play Music Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 35) The tendency of information to remains on the Internet indefinitely is known as ________ of information. Answer: persistence Diff: 2 Objective: 8.14 Describe what comprises your online reputation and how to protect it. 36) Your online ________ consists of the information available about you in cyberspace that can influence people's opinions of you in the real world. Answer: reputation Diff: 1 Objective: 8.14 Describe what comprises your online reputation and how to protect it. 105 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 37) Employment ________ means that unless you're covered by an employment contract or a collective bargaining agreement, employers can fire you at any time for any reason, unless the reason violates a legal statute. Answer: at-will; at will Diff: 3 Objective: 8.14 Describe what comprises your online reputation and how to protect it. 38) You have a constitutional right to ________ speech. Answer: free Diff: 2 Objective: 8.14 Describe what comprises your online reputation and how to protect it. 39) The ________ Machine is a utility that shows you what a website looked like at a previous point in time. Answer: Wayback Diff: 3 Objective: 8.14 Describe what comprises your online reputation and how to protect it. 40) MLA stands for ________ Language Association. Answer: Modern Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 41) Failing to identify a direct quotation with quotation marks is an example of ________. Answer: plagiarism Diff: 2 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 42) Reproduction by a teacher or student of a small part of a work to illustrate a lesson is commonly known as educational ________ use. Answer: fair Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 43) Many websites that contain copyrighted material also contain lengthy legal documents that delineate the ________ of use for the material that you download. Answer: terms Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 44) Illegally using copyrighted software is known as software ________. Answer: piracy Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 106 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 45) Works in the public ________ are considered public property and therefore, anyone can modify, distribute, copy, or sell them for profit. Answer: domain Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 46) The FedEx logo is a ________ mark. Answer: service Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 47) The main grayscale technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is ________. Answer: E Ink; electronic ink Diff: 2 Objective: 8.03 Describe the different types of e-readers. 48) The ________ is the number of times that an analog wave is measured each second in an analog-to-digital conversion. Answer: sampling rate Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 49) The size of an MP3 file depends on the digital ________ of the song. Answer: sampling Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 50) Digital camera resolution is measured in ________. Answer: megapixels; MP Diff: 1 Objective: 8.07 Explain how best to create, print, and share digital photos. 51) The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________. Answer: Joint Photographic Experts Group (JPEG); jpg; JPEG Diff: 2 Objective: 8.07 Explain how best to create, print, and share digital photos. 52) The ________ of a digital camera refers to the number of data points recorded for a captured image. Answer: resolution Diff: 2 Objective: 8.07 Explain how best to create, print, and share digital photos. 107 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 53) A(n) ________ is a rule that squeezes the same audio and video information into less space. Answer: codec; compression/decompression Diff: 3 Objective: 8.08 Describe how to create, edit, and distribute digital video. 54) ________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights. Answer: Copyleft; Copy left Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 55) A copyright holder cannot loan, rent, or give away the work. Answer: FALSE Diff: 2 Objective: 8.10 Explain how copyright is obtained and the rights granted to the owners. 56) Facts cannot be copyrighted. Answer: TRUE Diff: 1 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 57) Plagiarism is usually considered an academic offense of dishonesty and isn't punishable under U.S. civil law. Answer: TRUE Diff: 1 Objective: 8.12 Explain plagiarism and strategies for avoiding it. 58) Pictures you find on Google image search are considered to be in the public domain. Answer: FALSE Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 59) YouTube is the entity legally responsible for its content, rather than the person who uploaded the content. Answer: FALSE Diff: 2 Objective: 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. 60) Patents last for a period of 30 years from the date the patent is filed. Answer: FALSE Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 108 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 61) A trade dress applies to the visual appearance of a product or its packaging. Answer: TRUE Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 62) A physical music CD is an example of intellectual property. Answer: FALSE Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 63) DRM-free music can legally be moved from system to system. Answer: TRUE Diff: 2 Objective: 8.06 Summarize how to listen to and publish digital music. 64) The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value. Answer: FALSE Diff: 2 Objective: 8.02 Explain the differences between digital and analog signals. 65) When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be recreated. Answer: TRUE Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 66) RAW files are larger in size than JPEG files. Answer: TRUE Diff: 2 Objective: 8.07 Explain how best to create, print, and share digital photos. 67) Real property is considered immoveable, such as land or a home. Answer: TRUE Diff: 1 Objective: 8.09 Describe the various types of intellectual property. 68) Intangible personal property has no value. Answer: FALSE Diff: 2 Objective: 8.09 Describe the various types of intellectual property. 69) In terms of video resolution, HD stands for highly digitized. Answer: FALSE Diff: 1 Objective: 8.08 Describe how to create, edit, and distribute digital video. 109 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 70) Many cameras support wireless connections so you can transfer images without connecting cables. Answer: TRUE Diff: 1 Objective: 8.07 Explain how best to create, print, and share digital photos. 71) Match each of the following terms to its definition: I. II. III. IV. V. MP3 AAC ADC WMV SD A. storage card for media B. digital video file format which includes both audio and video C. digital music file format used broadly D. default digital music file format with iTunes E. converts audio signals into digital signals Answer: C, D, E, B, A Diff: 2 Objective: 8.05 Describe how digital music is created and stored. 72) Match each of the following terms to its definition: I. II. III. IV. V. resolution digital analog CCD codec A. a rule that squeezes audio and video information into less space B. number of data points used to capture an image C. data encoded as zeros and ones D. electronic sensor used in digital cameras E. continuous sound or light waves Answer: B, C, E, D, A Diff: 3 Objective: Multiple Objectives in the Chapter 110 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its definition: I. II. III. IV. V. NOOK Kindle e-text e-reader E ink A. textual information captured digitally B. sharp grayscale representation of text C. sold by Amazon D. device that displays e-text E. sold by Barnes and Noble Answer: E, C, A, D, B Diff: 2 Objective: 8.03 Describe the different types of e-readers. 74) Match each of the following terms to its definition: I. II. III. IV. V. digital-to-analog converter MPEG-4 ripping analog-to-digital converter codec A. changes zeros and ones to a continuous analog wave B. converting a song on a CD to a digital computer file C. changes your voice's sound waves into digital signals D. usually has a .mp4 extension E. rule using hardware or software that compresses audio and video information Answer: A, D, B, C, E Diff: 2 Objective: Multiple Objectives in the Chapter 111 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 75) Match each of the following terms to its definition: I. II. III. IV. V. copyleft sampling rate trademark fair use digital rights management A. granting of certain rights to a work while retaining other rights B. allows only limited use of legally purchased materials C. allows McDonalds to protect its logo D. allows people to use portions of a copyrighted work for specific purposes E. number of times an analog wave is measured Answer: A, E, C, D, B Diff: 2 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 9 Securing Your System: Protecting Your Digital Data and Devices 1) All of the following are top cybercrimes reported to the IC3 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) malware fraud Answer: D Diff: 3 Objective: 9.01 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 2) Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking Answer: B Diff: 1 Objective: 9.01 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 3) The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and the IRS B) FBI and the CIA C) FBI and National White Collar Crime Center D) NRA and the U.S. Department of Defense Answer: C Diff: 3 112 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 Objective: 9.01 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 4) Government impersonation scams involve ________. A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods Answer: A Diff: 2 Objective: 9.01 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 113 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) ________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Grey-hat C) White-hat D) Green-hat Answer: C Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 6) A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. A) use your debit card information to purchase items illegally B) assume your identity C) steal your logons and passwords for various accounts D) launch a denial of service (DoS) attack on your computer Answer: D Diff: 3 Objective: 9.02 Describe the different types of hackers and the tools they use. 7) A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit Answer: D Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 8) You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software Answer: B Diff: 1 Objective: 9.07 Explain what a firewall is and how a firewall protects your computer from hackers. 114 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) ________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A) A Trojan horse B) A polymorphic virus C) A DDoS attack D) Pretexting Answer: C Diff: 3 Objective: 9.02 Describe the different types of hackers and the tools they use. 10) Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies Answer: B Diff: 2 Objective: 9.03 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. 11) Which of the following is NOT a virus category? A) Worm B) Logic bomb C) Macro D) Pharming Answer: D Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 12) All of the following activities may infect your computer with a virus EXCEPT ________. A) sharing flash drives B) downloading video files from peer-to-peer sites C) downloading or running an e-mail attachment file D) printing a document Answer: D Diff: 3 Objective: 9.03 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. 13) Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus Answer: B Diff: 3 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 115 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 14) A ________ is a virus that is triggered on a certain date. A) worm B) macro C) logic bomb D) time bomb Answer: D Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 15) A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own. A) worm B) script virus C) encryption virus D) macro virus Answer: A Diff: 3 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 16) A ________ is a virus that is attached to documents. A) script virus B) macro virus C) polymorphic virus D) Trojan horse Answer: B Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 17) Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm Answer: C Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 18) Viruses, adware, and spyware are referred to collectively as ________. A) bloatware B) grayware C) alertware D) firmware Answer: B Diff: 2 Objective: 9.05 Explain what malware, spam, and cookies are and how they impact your security. 116 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 19) ________ is a program that gathers information about your surfing habits without your knowledge. A) Adware B) Ghostware C) Shareware D) Spyware Answer: D Diff: 2 Objective: 9.05 Explain what malware, spam, and cookies are and how they impact your security. 20) Which of the following statements about cookies is NOT true? A) Cookies obtain your personal information by searching your hard drive. B) Cookies are text files. C) Cookies help companies determine the traffic flow through their website. D) Some companies sell the personal information found in cookies to other companies. Answer: A Diff: 3 Objective: 9.05 Explain what malware, spam, and cookies are and how they impact your security. 21) Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A) engineering B) theft C) pretexting D) pharming Answer: A Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 22) When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. A) phishing B) pharming C) pretexting D) polymorphing Answer: B Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 117 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 23) Using your computer for non-work activities while you are being paid to work is known as ________. A) cyberloafing B) cybersleeping C) cyberlazing D) cyberbreaking Answer: A Diff: 1 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 24) In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. A) firehouse B) firebreak C) firewall D) fire extinguisher Answer: C Diff: 1 Objective: 9.07 Explain what a firewall is and how a firewall protects your computer from hackers. 25) Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking Answer: D Diff: 2 Objective: 9.07 Explain what a firewall is and how a firewall protects your computer from hackers. 26) Regarding computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file Answer: B Diff: 1 Objective: 9.08 Explain how to protect your computer from virus infection. 118 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 27) A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern Answer: A Diff: 2 Objective: 9.08 Explain how to protect your computer from virus infection. 28) Rules for creating passwords include all of the following EXCEPT ________. A) keep your password a secret B) change your password frequently C) keep a master password that is the same for all of your accounts D) use letters, numbers, and symbols in your passwords Answer: C Diff: 2 Objective: 9.09 Describe how passwords and biometric characteristics can be used for user authentication. 29) One type of CAPTCHA is ________. A) antivirus software B) a password method C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website D) a rootkit virus Answer: C Diff: 3 Objective: 9.09 Describe how passwords and biometric characteristics can be used for user authentication. 30) Which is NOT one of the four key pieces of personal information you should protect from identity thieves? A) Social Security number B) Anniversary C) Date of birth D) Street address Answer: B Diff: 2 Objective: 9.11 Describe the types of information you should never share online. 119 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 31) A(n) ________ backup makes a copy of all changes since the last backup. A) incremental B) full C) image D) data Answer: A Diff: 2 Objective: 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. 32) A whole-house surge protector is installed ________. A) at the breaker panel B) at the power line from the street C) on each device and appliance D) on computers Answer: A Diff: 3 Objective: 9.13 Explain the negative effects environment and power surges can have on computing devices. 33) Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts. Answer: identity theft Diff: 1 Objective: 9.01 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 34) A botnet is a group of applications running on ________ computers in a DDoS attack. Answer: zombie Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 35) For security reasons, you should be extremely wary of opening e-mail ________ such as Word files. Answer: attachments Diff: 1 Objective: 9.03 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. 36) A(n) ________ virus is a series of commands that is executed without your knowledge. Answer: script Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 120 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 37) A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable. Answer: encryption; ransomware Diff: 3 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 38) A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software. Answer: multipartite Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 39) A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer. Answer: stealth Diff: 1 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 40) A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator. Answer: grey; gray Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 41) Another name for a sniffer is a(n) ________ analyzer. Answer: packet Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 42) A(n) ________ can help block unwanted, unsolicited e-mail. Answer: spam filter Diff: 1 Objective: 9.05 Explain what malware, spam, and cookies are and how they impact your security. 43) Unwanted, unsolicited e-mail is referred to as ________. Answer: spam Diff: 1 Objective: 9.05 Explain what malware, spam, and cookies are and how they impact your security. 44) The most common kind of pretexting in cyberspace is ________. Answer: phishing Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 121 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 45) ________ is malware that tries to convince you that your computer is infected with a virus. Answer: Scareware Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 46) Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. Answer: engineering Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 47) ________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud. Answer: Phishing Diff: 2 Objective: 9.06 Describe social engineering techniques, and explain strategies to avoid falling prey to them. 48) During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. Answer: inoculation Diff: 2 Objective: 9.08 Explain how to protect your computer from virus infection. 49) The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm. Answer: antivirus, anti-virus Diff: 1 Objective: 9.08 Explain how to protect your computer from virus infection. 50) ________ occur when a website downloads harmful software onto your computer. Answer: Drive-by downloads, drive by downloads Diff: 3 Objective: 9.08 Explain how to protect your computer from virus infection. 51) Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices. Answer: biometric Diff: 2 Objective: 9.09 Describe how passwords and biometric characteristics can be used for user authentication. 122 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 52) One way to protect your personal information on Facebook is to change your ________ settings. Answer: privacy Diff: 2 Objective: 9.11 Describe the types of information you should never share online. 53) A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed. Answer: incremental; partial Diff: 2 Objective: 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. 54) A(n) ________ protects a computer against power surges. Answer: surge protector Diff: 1 Objective: 9.13 Explain the negative effects environment and power surges can have on computing devices. 55) ________ alarm software is an inexpensive theft deterrent for mobile devices. Answer: Motion Diff: 2 Objective: 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems. 56) Ethical hackers are also known as white-hat hackers. Answer: TRUE Diff: 1 Objective: 9.02 Describe the different types of hackers and the tools they use. 57) A denial-of-service attack can be used to deny hackers access to a computer system. Answer: FALSE Diff: 2 Objective: 9.02 Describe the different types of hackers and the tools they use. 58) Creating and spreading online viruses is a cybercrime. Answer: TRUE Diff: 2 Objective: 9.03 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. 59) All viruses cause serious destruction of computer data. Answer: FALSE Diff: 2 Objective: 9.03 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. 123 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 60) A worm does NOT require human interaction to spread to other computers. Answer: TRUE Diff: 3 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 61) A stealth virus is designed to infect multiple file types to fool the antivirus software. Answer: FALSE Diff: 1 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 62) A time bomb virus can be triggered on a certain date. Answer: TRUE Diff: 1 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 63) The terms virus and worm mean the same thing. Answer: FALSE Diff: 1 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 64) An encryption virus replicates itself onto a hard drive's master boot record. Answer: FALSE Diff: 1 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 65) A macro virus is a virus that is attached to a file. Answer: TRUE Diff: 2 Objective: 9.04 List the different categories of computer viruses, and describe their behaviors. 66) A virus signature is a portion of virus code that is unique to a particular computer virus. Answer: TRUE Diff: 2 Objective: 9.08 Explain how to protect your computer from virus infection. 67) Currently, there are no antivirus programs for mobile devices. Answer: FALSE Diff: 2 Objective: 9.08 Explain how to protect your computer from virus infection. 68) To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols. Answer: TRUE Diff: 1 Objective: 9.09 Describe how passwords and biometric characteristics can be used for user authentication. 124 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 69) You should use the same password for each system or website you need to access. Answer: FALSE Diff: 1 Objective: 9.09 Describe how passwords and biometric characteristics can be used for user authentication. 70) Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure. Answer: FALSE Diff: 3 Objective: 9.10 Describe ways to surf the web anonymously. 71) Since you can always redownload program files, you do not need to include them in backups. Answer: FALSE Diff: 2 Objective: 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. 72) Match each of the following terms to its meaning: I. II. III. IV. V. Trojan horse pretexting cookie botnet time bomb A. text file for storing personal preferences pertaining to websites B. program that appears to be something useful or desirable C. virus that is triggered by the passage of time or on a certain date D. creating a scenario that sounds legitimate enough that someone will trust you E. programs that run on a large number of zombie computers Answer: B, D, A, E, C Diff: 2 Objective: Multiple Objectives in the Chapter 125 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its meaning: I. II. III. IV. V. grey-hat hacker black-hat hacker cyberloafing social engineering white-hat hacker A. techniques used to manipulate people into performing actions or divulging confidential information B. an unethical hacker C. flaunts expertise to the administrator of a system D. an ethical hacker E. using an employer's computer for non-work activities Answer: C, B, E, A, D Diff: 3 Objective: Multiple Objectives in the Chapter 74) Match each of the following terms to its meaning: I. II. III. IV. V. packet filtering IP address firewall CAPTCHA biometric authentication device A. program that generates distorted text and requires that it be typed into a box B. reads a unique personal characteristic and converts its pattern to a digital code C. hardware or software for protecting computers from hackers D. a computer's identity on the Internet E. method for selectively allowing certain requests to access ports Answer: E, D, C, A, B Diff: 2 Objective: Multiple Objectives in the Chapter 126 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 75) Match each of the following terms to its meaning: I. II. III. IV. V. worm computer virus encryption virus polymorphic virus logic bomb A. virus that is triggered when a file is opened or program is started a certain number of times B. attempts to travel between systems through network connections to spread an infection C. virus that changes its own code to avoid detection D. program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files E. a program that renders your computer files unusable by compressing them Answer: B, D, E, C, A Diff: 3 Objective: Multiple Objectives in the Chapter 76) Match each of the following terms to its meaning: I. spear phishing II. rootkit III. scareware IV. zombie V. spyware A. program that allows hackers to gain access to your computer without your knowledge B. malware on your computer used to convince you that your computer has a virus C. a computer controlled by a hacker D. sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data E. transmits information about you, such as your Internet-surfing habits Answer: D, A, B, C, E Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 10 Behind the Scenes: Software Programming 1) What is the first step of the system development life cycle (SDLC)? A) Design B) Analysis C) Problem and Opportunity Identification D) Development Answer: C Diff: 1 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 127 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 2) ________ is the process of translating a task into a series of commands that a computer will use to perform the task. A) Debugging B) Programming C) Analyzing D) Diagramming Answer: B Diff: 1 Objective: 10.03 Define programming and list the steps in the program development life cycle (PDLC). 3) Which of the following is the final stage of the program development life cycle (PDLC)? A) Making a Plan B) Coding C) Testing and Documentation D) Debugging Answer: C Diff: 1 Objective: 10.03 Define programming and list the steps in the program development life cycle (PDLC). 4) The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________. A) Beta code B) structure chart C) algorithm D) working plan Answer: C Diff: 2 Objective: 10.03 Define programming and list the steps in the program development life cycle (PDLC). 128 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Translating an algorithm into a programming language is called ________. A) interpreting B) coding C) compiling D) executing Answer: B Diff: 1 Objective: 10.03 Define programming and list the steps in the program development life cycle (PDLC). 6) A clearly stated objective of how a program should work and how it responds to errors is called the ________. A) SDLC B) problem statement C) compilation D) execution Answer: B Diff: 2 Objective: 10.04 Describe how programmers construct a problem statement from a description of a task. 7) Which of the following provides a visual representation of the patterns of an algorithm? A) Flowchart B) Pseudocode C) Gantt chart D) Flow analysis Answer: A Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 8) The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. A) pseudocode B) control structures C) flowcharts D) operators Answer: B Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 129 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n) ________. A) class B) operator C) test condition D) documentation plan Answer: C Diff: 3 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 10) ________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. A) Object-oriented analysis B) Top-down design C) Bottom-up design D) Inheritance Answer: B Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 11) Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them. A) blocks B) classes C) units D) fields Answer: B Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 12) In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class. A) reusability B) regression C) scalability D) inheritance Answer: D Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 130 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 13) An example of a first-generation language is ________. A) BASIC B) machine language C) COBOL D) assembly language Answer: B Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 14) The capability of moving a completed programming solution easily from one type of computer to another is known as ________. A) portability B) scalability C) transferability D) inheritance Answer: A Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 15) SQL is an example of a ________ category programming language. A) 2GL B) 3GL C) 4GL D) 5GL Answer: C Diff: 1 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 16) Which statement does NOT describe fifth-generation languages? A) They are the most "natural" of languages. B) They use a set of short, English-based commands (such as ADD) that speak directly to the CPU. C) Problems are presented as a series of facts or constraints rather than as a specific algorithm. D) The system of facts can be queried. Answer: B Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 131 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 17) The process that converts program code into machine language is called ________. A) documentation B) variable declaration C) compilation D) execution Answer: C Diff: 1 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 18) ________ is the set of instructions that programmers have written in a higher-level language. A) Executable code B) Base code C) Compiled code D) Source code Answer: D Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 19) An integrated development environment (IDE) is a ________. A) program that helps interpret code B) tool that converts one programming language into a different programming language C) collection of tools that helps programmers write and test their programs D) program that translates code into binary 1s and 0s and ignores comments Answer: C Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 20) Division by zero is a ________ error that is caught when the program executes. A) compiler B) runtime C) syntax D) logical Answer: B Diff: 2 Objective: 10.07 Identify the role of debugging in program development. 21) Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost. A) gamma B) release to manufacturers (RTM) C) beta D) general availability (GA) Answer: C Diff: 3 Objective: 10.08 Explain the importance of testing and documentation in program development. 132 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 22) Which refers to a text-based approach to documenting an algorithm? A) Syntax B) Pseudocode C) Keywords D) Data types Answer: B Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 23) Which is NOT a key factor a programmer uses in selecting the language for a project? A) Space available B) Number of inputs required C) Speed required D) Type of target application Answer: B Diff: 2 Objective: 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting. 24) ________ is a programming language that can be used to create a wide range of Windows applications. A) Visual Basic B) PHP C) BASIC D) HTML Answer: A Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 25) Which language is the most popular language for writing Apple macOS applications? A) C++ B) HTML C) Objective C D) Java Answer: C Diff: 3 Objective: 10.11 Compare and contrast modern programming languages. 26) A small Java-based program is called a ________. A) Java class B) JSP C) JavaScript D) Java applet Answer: D Diff: 1 Objective: 10.11 Compare and contrast modern programming languages. 133 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 27) Special symbols called tags are used in which of the following languages? A) C# B) Java C) HTML/XHTML D) C++ Answer: C Diff: 1 Objective: 10.11 Compare and contrast modern programming languages. 28) Which of the following would NOT be used to build websites with interactive capabilities? A) Active Server Pages (ASP) B) PHP (PHP: Hypertext Preprocessor) C) FORTRAN D) Java Server Pages (ISP) Answer: C Diff: 3 Objective: 10.11 Compare and contrast modern programming languages. 29) ________ enables users to define their own data-based tags and facilitates the exchange of information between websites. A) HTML B) XHTML C) XML D) PHP Answer: C Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 30) Corona and App Inventor can be used to develop ________. A) complex web applications B) apps for mobile devices C) Mac software D) Web pages Answer: B Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 31) You can automate features by using custom-built miniprograms called ________. Answer: macros Diff: 2 Objective: 10.01 Describe the importance of programming to both software developers and users. 32) The programming term SDLC stands for ________. Answer: system development life cycle Diff: 1 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 134 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 33) In a(n) ________ system, each step is dependent on the previous step being completed. Answer: waterfall; "waterfall" Diff: 2 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 34) A(n) ________ is a visual diagram of a process that includes any decisions that are made along the way. Answer: flowchart; data-flow diagram Diff: 2 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 35) In the ________ phase of the SDLC, exploration of the depth of a problem and development of program specifications take place. Answer: analysis Diff: 2 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 36) In the "Making a Plan" step of the PDLC, a(n) ________ is written in natural, ordinary language describing exactly what the computer program is to do. Answer: algorithm Diff: 2 Objective: 10.03 Define programming and list the steps in the program development life cycle (PDLC). 37) ________ is the part of the problem statement that describes what a program should do if the input data is invalid. Answer: Error handling Diff: 2 Objective: 10.04 Describe how programmers construct a problem statement from a description of a task. 38) The flowchart shape for a binary decision is a(n) ________. Answer: diamond Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 39) A(n) ________ is a control structure that continues to be performed while a test condition is true. Answer: loop; repeating loop Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 135 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 40) Scratch and App Inventor are considered ________ programming languages. Answer: visual; top down Diff: 1 Objective: 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting. 41) In object-oriented terms, an original class is called the ________ class. Answer: base Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 42) In object-oriented terms, a new, modified class is called the ________ class. Answer: derived Diff: 3 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 43) SQL stands for ________. Answer: Structured Query Language Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 44) ________-generation languages use symbols and commands to help programmers tell the computer what to do. Answer: Third; 3rd Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 45) A(n) ________ translates source code into an intermediate form of code, line by line. Answer: interpreter Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 46) A(n) ________ program is the binary sequence that has been translated from source code by a compiler for use by the CPU. Answer: executable Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 136 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 47) A(n) ________ error is caused by not following the strict, precise set of rules for a specific programming language. Answer: syntax Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 48) The programming term IDE stands for ________. Answer: integrated development environment Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 49) The process of running a program over and over to find and repair errors and make sure the program behaves in the way it should is known as ________. Answer: debugging Diff: 1 Objective: 10.07 Identify the role of debugging in program development. 50) ________ and runtime errors are caught only when a program executes. Answer: Logical; Logical errors Diff: 2 Objective: 10.07 Identify the role of debugging in program development. 51) Most browsers can execute Java ________, which are small Java-based programs. Answer: applets Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 52) When a large project begins, a programmer can build a(n) ________, which is a small model of what the final program will look like when it is finished. Answer: prototype Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 53) HTML uses special symbols called ________ to control how information is displayed on the web. Answer: tags Diff: 1 Objective: 10.11 Compare and contrast modern programming languages. 54) The MUMPS language is often used to build ________ databases. Answer: clinical; medical Diff: 2 Objective: 10.12 State key principles in the development of future programming languages. 137 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 55) Programming is necessary when the software needed to accomplish a task is not available. Answer: TRUE Diff: 2 Objective: 10.01 Describe the importance of programming to both software developers and users. 56) The program specification is a clear statement of the goals and objectives of the project. Answer: TRUE Diff: 1 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 57) Data is the raw input that users have at the start of the job. Answer: TRUE Diff: 1 Objective: 10.04 Describe how programmers construct a problem statement from a description of a task. 58) The standard set of vocabulary for pseudocode is specific and detailed. Answer: FALSE Diff: 1 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 59) A data-flow diagram provides a visual representation of an algorithm. Answer: FALSE Diff: 3 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 60) Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks. Answer: FALSE Diff: 1 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 61) When programmers need to create several different examples of a class, each is known as an object. Answer: TRUE Diff: 2 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 138 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 62) Inheritance means that the data and methods of an existing class can be extended and customized to fit a new class. Answer: TRUE Diff: 1 Objective: 10.05 Explain how programmers use flow control and design methodologies when developing algorithms. 63) Prolog is an example of a fourth-generation programming language. Answer: FALSE Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 64) Second-generation languages are also known as assembly languages. Answer: TRUE Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 65) A compiler translates the source code into an intermediate form of code, line by line. Answer: FALSE Diff: 1 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 66) One IDE can often be configured to support many different languages. Answer: TRUE Diff: 2 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 67) During the program debugging stage, the people who will use the program test the software. Answer: FALSE Diff: 2 Objective: 10.07 Identify the role of debugging in program development. 68) Syntax errors are caught only when a program executes. Answer: FALSE Diff: 1 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 69) A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++. Answer: TRUE Diff: 2 Objective: 10.11 Compare and contrast modern programming languages. 139 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 70) Eventually all programming languages will merge into one universal language. Answer: FALSE Diff: 2 Objective: 10.12 State key principles in the development of future programming languages. 71) Match each of the following generations to its language: I. II. III. IV. V. 1GL 2GL 3GL 4GL 5GL A. assembly language B. SQL C. machine language D. Prolog E. COBOL Answer: C, A, E, B, D Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 72) Match each of the following terms to its definition: I. II. III. IV. V. portability reusability inheritance method data A. a new class can automatically pick up data and methods of an existing class B. the capability to move a completed programming solution easily from one type of computer to another C. the ability to apply classes from other projects to a new project D. an object-oriented action or behavior E. raw input Answer: B, C, A, D, E Diff: 3 Objective: Multiple Objectives in the Chapter 140 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its definition: I. II. III. IV. V. source code syntax compiler interpreter operator A. program that translates code into binary 0s and 1s and ignores comments B. agreed-on set of rules defining how the language must be structured C. translates source code line by line into an intermediate form of code D. coding symbol that represents a fundamental action of a language E. programmers' instructions written in a higher-level language Answer: E, B, A, C, D Diff: 3 Objective: 10.06 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment (IDE) in coding. 74) Match each of the following steps of SDLC development to its position in the development process. I. II. III. IV. V. development design analysis testing and installation problem/opportunity identification A. first step B. second step C. third step D. fourth step E. fifth step Answer: D, C, B, E, A Diff: 3 Objective: 10.02 Summarize the stages of the system development life cycle (SDLC). 141 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 75) Match each of the following terms to its definition: I. II. III. IV. V. pseudocode error handling source code binary decision variable A. program instructions written in a higher-level language B. text-based approach to documenting an algorithm C. items allocated storage space in RAM D. managing what a program should do if input data is invalid E. can be answered in only two ways (for example, yes/no) Answer: B, D, A, E, C Diff: 2 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 11 Behind the Scenes: Databases and Information Systems 1) A ________ is a collection of related data that can be stored, sorted, organized, and queried. A) database B) document C) memo D) macro Answer: A Diff: 1 Objective: 11.01 Explain what a database is and why databases are useful. 2) If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________. A) integrity B) redundancy C) completeness D) normalization Answer: B Diff: 2 Objective: 11.01 Explain what a database is and why databases are useful. 3) Data ________ means that the data contained in a database is accurate and reliable. A) efficiency B) integrity C) redundancy D) consistency Answer: B Diff: 2 Objective: 11.02 Discuss the benefits of using a database. 142 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 4) Data ________ helps to ensure data integrity by maintaining information in only one place. A) flexibility B) redundancy C) mapping D) centralization Answer: D Diff: 2 Objective: 11.02 Discuss the benefits of using a database. 143 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) ________ is used to ensure that data is organized most efficiently in a database. A) Consistency checking B) Validation C) Normalization D) Range checking Answer: C Diff: 2 Objective: 11.02 Discuss the benefits of using a database. 6) ________ databases are the most commonly used electronic databases. A) Relational B) Flat-file C) Multidimensional D) Object-oriented Answer: A Diff: 3 Objective: 11.03 Describe features of relational databases. 7) A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A) many-to-one B) one-to-many C) one-to-one D) many-to-many Answer: C Diff: 1 Objective: 11.03 Describe features of relational databases. 8) Nontraditional data in object-oriented databases such as audio clips, video clips, pictures, and very large documents are called ________ data. A) enterprise B) structured C) unstructured D) multidimensional Answer: C Diff: 3 Objective: 11.04 Describe features of object-oriented databases. 9) Data in a multidimensional database is organized in a ________ format. A) linear B) modular C) cube D) cellular Answer: C Diff: 2 Objective: 11.05 Describe features of multidimensional databases. 144 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) In a database, the term ________ is synonymous with a category of data. A) field B) record C) row D) table Answer: A Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 11) In a database, a group of related records is referred to as a(n) ________. A) memo B) field C) object D) table Answer: D Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 12) In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field. A) text B) long text C) short text D) object Answer: B Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 13) You can set a ________, which is automatically displayed in a field unless the user enters something different. A) default value B) relation C) field type D) numeric check Answer: A Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 14) Which of the following is a likely primary key in a student information record? A) Last name B) Date of birth C) Student ID number D) First name Answer: C Diff: 1 Objective: 11.06 Describe how relational databases organize and define data. 145 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) ________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A) Referential integrity B) Normalization C) Database consistency D) Record integrity Answer: A Diff: 3 Objective: 11.06 Describe how relational databases organize and define data. 16) A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250. A) completeness B) range C) consistency D) numeric Answer: B Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 17) A(n) ________ check determines whether a required field such as LastName was filled in. A) completeness B) range C) consistency D) alphabetic Answer: A Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 18) A ________ check compares the values of data in two or more fields to see whether those values are reasonable. A) correctness B) range C) consistency D) numeric Answer: C Diff: 1 Objective: 11.07 Describe how data is inputted and managed in a database. 19) You would use a ________ in a database to temporarily display records of residents for the city of Boston. A) sieve B) filter C) validation rule D) field constraint Answer: B Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 146 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 20) A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data. A) validation rule B) field constraint C) enquiry D) query Answer: D Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 21) A ________ displays a subset of data from a table (or tables) based on the specified criteria. A) table query B) join query C) select query D) criteria query Answer: C Diff: 3 Objective: 11.07 Describe how data is inputted and managed in a database. 22) SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations. A) Boolean algebra B) relational algebra C) primary keys D) foreign keys Answer: B Diff: 3 Objective: 11.07 Describe how data is inputted and managed in a database. 23) ________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize. A) Exporting B) Importing C) Enhancing D) Extracting Answer: A Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 147 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 24) A data ________ is a large-scale collection of data that contains and organizes all of an organization's data in one place. A) mart B) chain C) warehouse D) storehouse Answer: C Diff: 2 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 25) Data staging consists of all of the following steps, EXCEPT ________. A) transforming the data B) mining the data C) storing the data in a warehouse D) extracting the data Answer: B Diff: 3 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 26) Big data analytics is usually associated with ________ services. A) office support B) data warehouse C) management information D) decision support Answer: B Diff: 1 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 27) In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing. A) direct B) batch C) real-time D) immediate Answer: C Diff: 2 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 148 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 28) Management information systems (MIS) provide ________ reports, which show conditions that are unusual or need attention from users of the system. A) detail B) summary C) exception D) expert Answer: C Diff: 2 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 29) Siri, the personal assistant application on Apple's iPhone is an example of a ________. A) natural language processing (NLP) system B) decision support system (DSS) C) management information system (MIS) D) database management system (DBMS) Answer: A Diff: 3 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 30) ________ is the branch of computer science that attempts to create computers that think like humans. A) Natural language processing B) Expert systems C) Artificial intelligence D) Enterprise resource planning Answer: C Diff: 1 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 31) A database that allows data to be maintained in a single location provides data ________. Answer: centralization Diff: 2 Objective: 11.02 Discuss the benefits of using a database. 32) In a relational database, a(n) ________ relationship indicates that a record that appears only one time in a table, may appear multiple times in a related table. Answer: one-to-many; one to many Diff: 1 Objective: 11.03 Describe features of relational databases. 33) ________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pictures. Answer: Object-oriented; Object oriented Diff: 2 Objective: 11.04 Describe features of object-oriented databases. 149 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 34) A(n) ________ database stores data in more than two dimensions, as opposed to relational databases, which store data in two-dimensional tables. Answer: multidimensional; multi-dimensional Diff: 2 Objective: 11.05 Describe features of multidimensional databases. 35) A data dictionary is also referred to as a(n) ________. Answer: database schema Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 36) A group of related records is called a(n) ________. Answer: table; file Diff: 1 Objective: 11.06 Describe how relational databases organize and define data. 37) Data that describes other data is called ________. Answer: metadata Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 38) In a database, another term for a table is a(n) ________. Answer: file Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 39) In a Microsoft Access database, an active web page, e-mail address, or existing file is stored as a(n) ________ field. Answer: hyperlink Diff: 3 Objective: 11.06 Describe how relational databases organize and define data. 40) When working with a relational database, each record must have a(n) ________ key field, which has a value unique to that record. Answer: primary Diff: 1 Objective: 11.06 Describe how relational databases organize and define data. 41) Referential integrity means that for each value in the ________ field of a table, there is a corresponding value in the primary key of the related table. Answer: foreign key Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 150 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 42) A(n) ________ provides a view of data fields to be filled in with appropriate labels to assist a user in entering data into the database. Answer: input form; form; user form Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 43) ________ is the process of ensuring that the data entered into a field meets specified guidelines. Answer: Validation; Data validation Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 44) A field ________ is a property that must be met before an entry can be accepted into the field. Answer: constraint Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 45) To temporarily display records from a single table that match certain criteria, you would use a(n) ________. Answer: filter Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 46) When using SQL, a(n) ________ query is used to extract data from two or more tables. Answer: join Diff: 2 Objective: 11.07 Describe how data is inputted and managed in a database. 47) The data in a data warehouse is ________, meaning it does not all pertain to one period in time. Answer: time-variant; time variant Diff: 2 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 48) ________ data is information about how users of a company's website move through the web pages. Answer: Clickstream Diff: 2 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 49) When creating a data warehouse, ________ is the process that extracts data from source databases, reformats the data, and stores them in the warehouse. Answer: data staging Diff: 2 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 151 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 50) A(n) ________ is created from a large data business warehouse to analyze a single component of the business. Answer: data mart Diff: 3 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 51) ________ is used to analyze large amounts of data and identify unseen patterns or trends. Answer: Data mining Diff: 2 Objective: 11.09 Describe data mining and how it works. 52) A business that updates its records all at once at the end of the business day uses ________ processing. Answer: batch Diff: 2 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 53) A(n) ________ report provides a consolidated picture of detailed data and usually includes some calculation or visual displays of information and is generated by a MIS. Answer: summary Diff: 3 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 54) A(n) ________ tries to replicate the decision-making processes of human experts to solve specific problems. Answer: expert system Diff: 1 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 55) Data redundancy ensures that the data contained in the database is accurate and reliable. Answer: FALSE Diff: 2 Objective: 11.01 Explain what a database is and why databases are useful. 56) Normalization means that there are no data entry errors in a database. Answer: FALSE Diff: 1 Objective: 11.02 Discuss the benefits of using a database. 57) In a relational database, when two tables have a common field, the link between the tables is known as a hyperlink. Answer: FALSE Diff: 1 Objective: 11.03 Describe features of relational databases. 152 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 58) A street address field is an example of a field that should have a default value. Answer: FALSE Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 59) A group of related records is called a table. Answer: TRUE Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 60) In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record. Answer: TRUE Diff: 1 Objective: 11.06 Describe how relational databases organize and define data. 61) When using Access, the text of the Declaration of Independence would be stored in a short text field. Answer: FALSE Diff: 3 Objective: 11.06 Describe how relational databases organize and define data. 62) Employees' last name would usually make an appropriate primary key field. Answer: FALSE Diff: 1 Objective: 11.06 Describe how relational databases organize and define data. 63) A database schema defines the name, data type, and length of each field in the database. Answer: TRUE Diff: 2 Objective: 11.06 Describe how relational databases organize and define data. 64) Most databases can import electronic data from other software applications. Answer: TRUE Diff: 1 Objective: 11.07 Describe how data is inputted and managed in a database. 65) A filter is limited to extracting data from a single table. Answer: TRUE Diff: 1 Objective: 11.07 Describe how data is inputted and managed in a database. 66) Small slices of a data mart are called data warehouses. Answer: FALSE Diff: 1 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 153 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 67) The information in a data mart spans an entire enterprise. Answer: FALSE Diff: 2 Objective: 11.08 Explain what data warehouses and data marts are and how they are used. 68) Data mining analyzes and investigates large amounts of data with the intention of discovering significant patterns or trends. Answer: TRUE Diff: 2 Objective: 11.09 Describe data mining and how it works. 69) Real-time processing means that transactions are updated when they occur. Answer: TRUE Diff: 1 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 70) A summary report generated by an MIS provides a list of the transactions that occurred during a specified time period. Answer: FALSE Diff: 1 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 71) Match each of the following terms to its definition: I. II. III. IV. V. field database record table primary key A. a group of related fields B. a category of information in a database C. a collection of related data that can be stored, sorted, organized, and queried D. a field that has a value unique to each record E. a group of related records Answer: B, C, A, E, D Diff: 3 Objective: Multiple Objectives in the Chapter 154 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 72) Match each of the following terms to its definition: I. II. III. IV. V. data mining expert system data mart artificial intelligence data staging A. small slice of a data warehouse B. includes transforming data to fit into a data warehouse C. process by which great amounts of data are analyzed and investigated D. software that tries to replicate the decision making of human specialists E. attempts to create computers that think like humans Answer: C, D, A, E, B Diff: 3 Objective: Multiple Objectives in the Chapter 73) Match each of the following terms to its definition: I. II. III. IV. V. office support system (OSS) natural language processing (NLP) management information system (MIS) decision support system (DSS) enterprise resource planning (ERP) system A. provides managers with timely and accurate information B. software system that integrates multiple system data sources and ties together the various processes of an organization C. helps managers develop solutions for specific problems D. assists employees in day-to-day tasks and communication E. communicates with computer systems using a natural spoken or written language Answer: D, E, A, C, B Diff: 3 Objective: 11.10 Describe the main types of business information systems and how they are used by business managers. 155 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 74) Match each of the following terms to its definition: I. II. III. IV. V. data warehouse batch processing relational database real-time processing data dictionary A. when a database is queried and updated as a transaction is taking place B. organizes data into various tables based on logical groupings C. defines the name, data type, and length of each field in a database D. large-scale collection of data E. transaction data that are processed all at once Answer: D, E, B, A, C Diff: 3 Objective: Multiple Objectives in the Chapter 75) Match the following data checks to their definition: I. II. III. IV. V. alphabetic numeric completeness consistency range A. ensures data entered into the database fall within a certain set of values B. ensures that all required fields have data entered into them C. confirms that only numbers are entered into a field D. confirms that only textual characters are entered into a field E. compares values in two or more fields to see whether the values are reasonable Answer: D, C, B, E, A Diff: 3 Objective: 11.07 Describe how data is inputted and managed in a database. Technology in Action, Complete, 15e (Evans et al.) Chapter 12 Behind the Scenes: Networking and Security in the Business World 1) A ________ is a group of two or more computers, or nodes, configured to share information and resources. A) router B) bus C) bridge D) network Answer: D Diff: 1 Objective: 12.01 List the advantages for businesses of installing a network. 2) A ________ network can contain servers as well as individual computers. 156 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 A) client/server B) peer-to-peer C) switch D) bridge Answer: A Diff: 1 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 3) In a ________ network, each node connected to the network communicates directly with every other node. A) client/server B) peer-to-peer C) router D) bridge Answer: B Diff: 1 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 4) The computers in a lab on a floor of a building would be connected using a ________. A) WAN B) LAN C) MAN D) PAN Answer: B Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 157 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) Cars often have ________ connectivity. A) Wi-Fi and Bluetooth B) ROVER-5 and ethernet C) IPv7 and IPv6 D) Exhaust and fuel injection Answer: A Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 6) A ________ uses the Internet communications infrastructure to build a secure and private network. A) PAN B) WAN C) VPN D) HAN Answer: C Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 7) A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) application B) authentication C) dedicated D) file Answer: B Diff: 2 Objective: 12.04 List the common types of servers found on client/server networks. 8) A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database Answer: A Diff: 1 Objective: 12.04 List the common types of servers found on client/server networks. 158 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) spooler C) logger D) heap Answer: B Diff: 3 Objective: 12.04 List the common types of servers found on client/server networks. 10) Which of the following is NOT a common network topology? A) Star B) Cluster C) Linear bus D) Ring Answer: B Diff: 3 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 11) A network ________ is a set of rules for how information and communications are exchanged. A) protocol B) token C) frame D) packet Answer: A Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 12) Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check Answer: C Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 159 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 13) The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. A) endcap B) terminator C) stopper D) block Answer: B Diff: 1 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 14) In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) star B) bus C) hierarchical D) cluster Answer: B Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 15) Which of the following is the most commonly used client/server network topology? A) Star B) Cluster C) Ring D) Hierarchical Answer: A Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 16) In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. A) hit B) crash C) stop D) jam Answer: D Diff: 3 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 160 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 17) A ________ topology uses more than one type of topology when building a network. A) hybrid B) multiple-use C) fusion D) crossover Answer: A Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 18) ________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A) Data capacity B) Scalability C) Bandwidth D) Infusion Answer: C Diff: 3 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 19) Which of the following is NOT a major factor to consider when selecting network cabling? A) Cable diameter B) Interference C) Maximum run length D) Bandwidth Answer: A Diff: 3 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 20) ________ cable is NOT subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Fiber-optic C) Polycarbonate D) Coaxial Answer: B Diff: 2 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 21) For business networks, which of the following is NOT one of the main cable types? A) Twisted-pair B) Polyvinyl C) Coaxial D) Fiber-optic Answer: B Diff: 3 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 161 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 22) Most wired home networks use ________ cable, which is most susceptible to interference. A) fiber-optic B) unshielded twisted-pair C) Wi-Fi D) coaxial Answer: B Diff: 2 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 23) ________ is the standard communications protocol used on most client/server networks. A) Ethernet B) NOS C) Mac D) VPN Answer: A Diff: 3 Objective: 12.07 Describe how network adapters help data move around a network. 24) The physical address assigned to each network adapter is called its ________ address. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC) Answer: D Diff: 2 Objective: 12.08 Define MAC addresses, and explain how they are used to move data around a network. 25) A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) MAC C) WAP D) IP Answer: D Diff: 2 Objective: 12.08 Define MAC addresses, and explain how they are used to move data around a network. 26) A ________ sends data from one collision domain to another. A) switch B) bridge C) link D) router Answer: B Diff: 2 Objective: 12.09 List the various network navigation devices, and explain how they help route data through networks. 162 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 27) A ________ sends information between two networks. A) repeater B) switch C) bridge D) router Answer: D Diff: 2 Objective: 12.09 List the various network navigation devices, and explain how they help route data through networks. 28) A ________ keeps your computer safe by determining who is trying to access it. A) gateway B) firewall C) hub D) switch Answer: B Diff: 1 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 29) Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A) viewing B) examination C) scanning D) screening Answer: D Diff: 3 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 30) A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. A) transitional B) iron-clad C) bastion host D) proxy Answer: C Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 163 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 31) Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. A) brute force attack B) spammer C) worm D) Trojan horse Answer: A Diff: 3 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 32) A(n) ________ network is often the type of network that is set up in a home or very small business. Answer: peer-to-peer (P2P); peer-to-peer; P2P Diff: 2 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 33) ________ means that additional users can easily be added to a network without affecting the performance of the other network nodes. Answer: Scalability Diff: 2 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 34) A(n) ________ is made up of two or more LANs that are miles apart. Answer: wide area network (WAN); Wide Area Network; WAN Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 35) A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters. Answer: intranet Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 36) ________ technology for a VPN places data packets inside other data packets. Answer: Tunneling Diff: 3 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 164 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 37) A(n) ________ is an area of an intranet to which only certain external users have access. Answer: extranet Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 38) A(n) ________ server is maintained by a hosting company and is connected to an internal network using the Internet. Answer: cloud Diff: 2 Objective: 12.04 List the common types of servers found on client/server networks. 39) A(n) ________ server is a server used to fulfill one specific purpose. Answer: dedicated Diff: 1 Objective: 12.04 List the common types of servers found on client/server networks. 40) A library book reservation service is a good example of a use for a(n) ________ server. Answer: database Diff: 2 Objective: 12.04 List the common types of servers found on client/server networks. 41) A(n) ________ server is used to host an Internet site. Answer: web Diff: 1 Objective: 12.04 List the common types of servers found on client/server networks. 42) A ring topology is also known as a(n) ________ topology. Answer: loop; token-ring; token ring Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 43) Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair. Answer: star Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 44) Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions. Answer: electromagnetic interference (EMI); electromagnetic interference; EMI Diff: 3 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 165 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 45) ________ is a type of network interference for cable transmission media that can be caused by nearby television or radio signals. Answer: Radio frequency interference (RFI); Radio frequency interference; RFI Diff: 1 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 46) A(n) ________ network cable contains a glass or plastic core. Answer: fiber-optic; fiber optic Diff: 1 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 47) ________ network cable is the most costly to install. Answer: Fiber-optic; Fiber optic Diff: 2 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 48) A(n) ________ provides wireless devices with a sending and receiving connection point to the network. Answer: wireless access point (WAP); wireless access point; WAP Diff: 1 Objective: 12.07 Describe how network adapters help data move around a network. 49) In networking terminology, NIC stands for ________. Answer: network interface card Diff: 2 Objective: 12.07 Describe how network adapters help data move around a network. 50) A(n) ________ is a container that can hold multiple data packets that are sent together. Answer: frame Diff: 3 Objective: 12.08 Define MAC addresses, and explain how they are used to move data around a network. 51) A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card. Answer: access card reader; card reader Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 52) ________ is the process that requires users to prove that they have permission to access a computer network. Answer: Authentication Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 166 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 53) A(n) ________ can often be equipped to act as a hardware firewall. Answer: router Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 54) A(n) ________ server acts as a liaison between an internal network and an external network. Answer: proxy Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 55) Retinal scanning is an example of ________ authentication. Answer: biometric Diff: 1 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 56) Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility. Answer: possessed Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 57) P2P networks become difficult to administer when they have large numbers of users. Answer: TRUE Diff: 2 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 58) In a client/server network, each network node communicates directly with every other node on the network. Answer: FALSE Diff: 2 Objective: 12.02 Explain the differences between a client/server network and a peer-to-peer network. 59) An international company like Microsoft would use a MAN to connect all of its computers. Answer: FALSE Diff: 2 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 167 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 60) Data flows in both directions around the ring in a ring network. Answer: FALSE Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 61) In an active topology, each node helps to move data through a network. Answer: TRUE Diff: 2 Objective: 12.05 Describe the common types of network topologies and the advantages and disadvantages of each one. 62) Transmission media comprise the system that data takes to flow between devices on the network. Answer: TRUE Diff: 1 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 63) Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions. Answer: TRUE Diff: 2 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 64) Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it. Answer: TRUE Diff: 1 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 65) Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms. Answer: TRUE Diff: 1 Objective: 12.06 Describe the types of wired and wireless transmission media used in networks. 66) MAC addresses are restricted to Macintosh computers. Answer: FALSE Diff: 1 Objective: 12.08 Define MAC addresses, and explain how they are used to move data around a network. 67) MAC addresses and IP addresses are the same thing. Answer: FALSE Diff: 2 Objective: 12.08 Define MAC addresses, and explain how they are used to move data around a network. 168 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 68) A bridge sends information between two networks. Answer: FALSE Diff: 2 Objective: 12.09 List the various network navigation devices, and explain how they help route data through networks. 69) A phishing attack is an attempt to access an account by repeatedly trying different passwords. Answer: FALSE Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 70) Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network. Answer: FALSE Diff: 2 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 71) A facial-recognition scanner is an example of a biometric authentication device. Answer: TRUE Diff: 1 Objective: 12.11 List major security threats to networks, and explain how network administrators mitigate these threats. 72) Match each of the following dedicated servers to its function: I. II. III. IV. V. authentication web cloud database application A. acts as a repository for application software B. keeps track of user logins to the network and which services are available to each user C. a server not physically located at a company's site but accessed through the Internet D. allows client computers to access a database E. hosts websites that can be accessed via the Internet Answer: B, E, C, D, A Diff: 1 Objective: 12.04 List the common types of servers found on client/server networks. 169 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 73) Match each of the following terms to its definition: I. II. III. IV. V. protocol token terminator honey pot frame A. special type of data packet B. computer system designed to attract unauthorized users C. device that absorbs a signal so that it is not reflected back D. set of common rules that control communications among network devices E. holds multiple data packets Answer: D, A, C, B, E Diff: 3 Objective: Multiple Objectives in the Chapter 74) Match each of the following terms to its definition: I. II. III. IV. V. NOS NIC CSMA/CD P2P MAC address A. adapter card that connects a computer to a network B. used for internal identification of nodes on a network C. an operating system for network servers D. method used on Ethernet networks to avoid data collisions E. network in which each node connected to the network communicates directly with every other node Answer: C, A, D, E, B Diff: 3 Objective: Multiple Objectives in the Chapter 170 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 75) Match each of the following networks to its definition: I. II. III. IV. V. WAN LAN MAN PAN HAN A. links users in a specific geographic area (usually a city) B. network of two or more LANs C. a network in a small geographic area D. can be used for a small home-based business E. used by a single individual connecting devices using wireless media Answer: B, C, A, E, D Diff: 3 Objective: 12.03 Describe the common types of client/server networks as well as other networks businesses use. 76) Match each of the following terms to its definition: I. II. III. IV. V. switch firewall router bridge packet A. data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry to a network D. sends data between different collision domains on a single network E. device that sends information between two networks Answer: B, C, E, D, A Diff: 3 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 13 Behind the Scenes: How the Internet Works 1) The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. A) ISOC B) ICANN C) W3C D) IAB Answer: B Diff: 2 Objective: 13.01 Describe the management of the Internet. 171 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 2) The main path of the Internet along which data travels the fastest is known as the Internet ________. A) protocol B) highway C) backbone D) cache Answer: C Diff: 1 Objective: 13.02 Explain how the Internet's networking components interact. 3) High-speed ________ communication lines on the Internet backbone use fiber optics. A) IP B) OC C) DSL D) cable Answer: B Diff: 1 Objective: 13.02 Explain how the Internet's networking components interact. 4) Individual Internet users connect to ISPs through a(n) ________. A) User Datagram Protocol (UDP) B) T line C) optical carrier (OC) line D) point of presence (POP) Answer: D Diff: 2 Objective: 13.02 Explain how the Internet's networking components interact. 172 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) The main suite of protocols used for transmitting data on the Internet is ________. A) FTP B) TCP/IP C) SMTP D) POP Answer: B Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 6) ________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. A) Packet switching B) An open circuit C) Circuit switching D) A closed circuit Answer: C Diff: 3 Objective: 13.03 List and describe the Internet protocols used for data transmission. 7) Which of the following information is NOT contained in a packet sent over the Internet? A) The size (in bytes) of the packet B) The address to which the packet is sent C) The address from where the packet originates D) The data that are transmitted Answer: A Diff: 3 Objective: 13.03 List and describe the Internet protocols used for data transmission. 8) A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet. A) TCP B) IP C) SMTP D) NetBIOS Answer: B Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 173 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 9) A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. A) dynamic B) static C) assigned D) transition Answer: A Diff: 1 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 10) An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address. A) dynamic B) static C) fixed D) stationary Answer: B Diff: 1 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 11) IPv6 was introduced when IPv4 ________. A) became too old B) was eliminated C) no longer had enough unique addresses D) was revoked Answer: C Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 12) When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server. A) DNS B) URL C) FTP D) XML Answer: A Diff: 1 Objective: 13.05 Discuss how a numeric IP address is changed into a readable name. 174 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 13) An IP address in the form 197.169.100.1 is called a(n) ________. A) sequential access number B) dotted quad C) encryption key D) random number Answer: B Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 14) In the URL http://www.pearsonhighered.com, which of the following is the top-level domain? A) http B) www C) pearsonhighered D) .com Answer: D Diff: 2 Objective: 13.05 Discuss how a numeric IP address is changed into a readable name. 15) Which of the following is NOT used in developing websites? A) XML B) KML C) DHTML D) HTML Answer: B Diff: 3 Objective: 13.06 Compare and contrast a variety of web development languages. 16) Which of the following was created for the transfer of hypertext documents across the Internet? A) SSL B) HTTP C) FTP D) AJAX Answer: B Diff: 2 Objective: 13.06 Compare and contrast a variety of web development languages. 17) <i> is an example of an HTML ________. A) marker B) tag C) indicator D) key Answer: B Diff: 1 Objective: 13.06 Compare and contrast a variety of web development languages. 175 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 18) To boldface text in HTML, you would enclose your text in ________. A) <b> and </b> B) /b and b C) *b* and */b* D) HTM.bold.on and HTM.bold.off Answer: A Diff: 3 Objective: 13.06 Compare and contrast a variety of web development languages. 19) ________ describes the website content in terms of the data that is being described rather than how it is to be displayed. A) CGI B) JavaScript C) XML D) HTML Answer: C Diff: 2 Objective: 13.06 Compare and contrast a variety of web development languages. 20) Which of the following organizations research new Internet technologies to improve its capabilities? A) Internet Architecture Board B) Internet Society C) World Wide Web Consortium D) Internet Engineering Task Force Answer: D Diff: 2 Objective: 13.01 Describe the management of the Internet. 21) A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer. A) CGI script B) app C) applet D) JavaScript Answer: C Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 22) The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects. A) SSL B) MIME C) JSON D) DOM Answer: D Diff: 3 Objective: 13.07 Compare and contrast server-side and client-side application software. 176 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 23) Which protocol is used when sending files as attachments by e-mail? A) Multipurpose Internet Mail Extensions (MIME) B) Post Office Protocol (POP) C) Simple Mail Transfer Protocol (SMTP) D) User Datagram Protocol (UDP) Answer: A Diff: 2 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 24) In public-key encryption, the two keys, one for coding and one for decoding, are known as ________. A) code keys B) linked keys C) key tags D) a key pair Answer: D Diff: 2 Objective: 13.09 Explain how data encryption improves security. 25) Which of the following is an example of an instant messaging service? A) LinkedIn B) Monster C) WhatsApp D) Flickr Answer: C Diff: 2 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 26) ________ permits two or more people to communicate over the Internet in real time. A) E-mail B) Snapfish C) Flickr D) Instant messaging Answer: D Diff: 1 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 27) Strong encryption now requires ________-bit keys. A) 40 B) 128 C) 256 D) 512 Answer: C Diff: 3 Objective: 13.09 Explain how data encryption improves security. 177 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 28) The ________ is a consortium of organizations that develops web protocols and sets standards. Answer: World Wide Web Consortium (W3C); World Wide Web Consortium; W3C Diff: 2 Objective: 13.01 Describe the management of the Internet. 29) A typical ________ is made up of one or more network switches to which ISPs connect to each other. Answer: Internet exchange point (IXP); Internet exchange point; IXP Diff: 2 Objective: 13.02 Explain how the Internet's networking components interact. 30) ________ servers are computers that host software that enables users to buy goods and services over the web. Answer: Commerce Diff: 2 Objective: 13.02 Explain how the Internet's networking components interact. 31) ________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time. Answer: Packet switching Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 32) SMTP stands for ________. Answer: Simple Mail Transfer Protocol Diff: 3 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 33) ________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission. Answer: Circuit switching Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 34) In the acronym HTTPS, the S stands for ________. Answer: Secure Diff: 3 Objective: 13.06 Compare and contrast a variety of web development languages. 35) The ________ IP addressing scheme uses 128-bit addressing. Answer: IPv6; IP version 6; Internet Protocol version 6; Internet Protocol v6 Diff: 3 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 178 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 36) 197.169.73.63 is an example of a(n) ________. Answer: IP address; Internet Protocol address; dotted decimal number; dotted quad Diff: 1 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 37) Within an URL, .com and .edu are examples of a(n) ________. Answer: top-level domain (TLD); top-level domain; top-level domain; TLD Diff: 2 Objective: 13.05 Discuss how a numeric IP address is changed into a readable name. 38) When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses. Answer: dynamic; DHCP; Dynamic Host Configuration Protocol Diff: 1 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 39) The IPv4 protocol is beginning to be replaced by the ________ protocol. Answer: IPv6; IP version 6; Internet Protocol version 6; Internet Protocol v6 Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 40) A(n) ________ links a URL to an IP address when a web page is requested. Answer: DNS server; Domain Name System server; Domain Name System (DNS) server Diff: 2 Objective: 13.05 Discuss how a numeric IP address is changed into a readable name. 41) When a(n) ________ address is assigned to a computer, its IP address will NOT change. Answer: static Diff: 1 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 42) In the URL http://example.gov, what is the second-level domain? Answer: example Diff: 2 Objective: 13.05 Discuss how a numeric IP address is changed into a readable name. 43) Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission. Answer: Secure Sockets Layer (SSL); Secure Sockets Layer; SSL Diff: 3 Objective: 13.06 Compare and contrast a variety of web development languages. 179 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 44) PHP is a popular choice for coding ________ programs. Answer: server-side; server side Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 45) ________ is a commonly used scripting language for creating DHTML effects. Answer: JavaScript Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 46) DHTML stands for ________. Answer: Dynamic HyperText Markup Language; Dynamic HTML Diff: 3 Objective: 13.07 Compare and contrast server-side and client-side application software. 47) <i> is an example of an HTML ________. Answer: tag; italics tag Diff: 2 Objective: 13.06 Compare and contrast a variety of web development languages. 48) ________ combines HTML, cascading style sheets, and JavaScript. Answer: Dynamic HTML; DHTML Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 49) A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server. Answer: client-side; client side Diff: 1 Objective: 13.07 Compare and contrast server-side and client-side application software. 50) A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server. Answer: applet Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 51) The MIME specification stands for ________. Answer: Multipurpose Internet Mail Extensions Diff: 3 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 180 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 52) ________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message. Answer: Encryption; Private-key encryption; Public-key encryption; Private key encryption; Public key encryption Diff: 1 Objective: 13.09 Explain how data encryption improves security. 53) When using ________-key encryption, only the message sender and recipient have the code. Answer: private Diff: 1 Objective: 13.09 Explain how data encryption improves security. 54) In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding. Answer: public Diff: 2 Objective: 13.09 Explain how data encryption improves security. 55) The United States government is the sole country in charge of the Internet. Answer: FALSE Diff: 1 Objective: 13.01 Describe the management of the Internet. 56) FTP enables files to be downloaded or uploaded between computers. Answer: TRUE Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 57) When using packet switching, packets are always sent over the same route. Answer: FALSE Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 58) File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet. Answer: FALSE Diff: 2 Objective: 13.03 List and describe the Internet protocols used for data transmission. 59) IPv6 uses six groups of 16-bit numbers. Answer: FALSE Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 181 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 60) Dynamic IP addressing is accomplished using a DHCP server. Answer: TRUE Diff: 2 Objective: 13.04 Explain how each device connected to the Internet is assigned a unique address. 61) Client-side programs run on a web server rather than on your computer. Answer: FALSE Diff: 1 Objective: 13.07 Compare and contrast server-side and client-side application software. 62) An applet is a small application that resides on a server but is downloaded to, and run on, the client computer. Answer: TRUE Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 63) Node.js is used to create faster animation. Answer: FALSE Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 64) HTML is an acronym for Highly Textual Markup Language. Answer: FALSE Diff: 1 Objective: 13.06 Compare and contrast a variety of web development languages. 65) The tag <i> informs a browser that the text that follows the tag should be italicized. Answer: TRUE Diff: 1 Objective: 13.06 Compare and contrast a variety of web development languages. 66) XML technologies allow web pages to change after they have been loaded. Answer: FALSE Diff: 2 Objective: 13.06 Compare and contrast a variety of web development languages. 67) Java and JavaScript refer to the same language. Answer: FALSE Diff: 2 Objective: 13.07 Compare and contrast server-side and client-side application software. 68) Most instant messaging services provide a high level of encryption for their messages. Answer: FALSE Diff: 2 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 182 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 69) Facebook Connect is one the most popular instant messaging services. Answer: FALSE Diff: 3 Objective: 13.08 Discuss the mechanisms for communicating via e-mail and instant messaging. 70) Match each of the following TCP/IP suite protocols to its definition: I. II. III. IV. V. SMTP DHCP HTTP TCP IP A. transfers data from servers to browsers B. prepares data for transmission providing for error checking and resending lost data C. used for transmission of e-mail messages across the Internet D. sends data between computers on the Internet E. protocol that assigns dynamic IP addresses Answer: C, E, A, B, D Diff: 3 Objective: Multiple Objectives in the Chapter 71) Match each of the following terms to its definition: I. II. III. IV. V. circuit switching PGP handshaking packet switching ICANN A. breaks information down into pieces that can take different paths B. a dedicated connection is formed between two communicating parties C. allocates IP addresses D. exchange of control packets between computers E. public-key package Answer: B, E, D, A, C Diff: 3 Objective: Multiple Objectives in the Chapter 183 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 72) Match each of the following terms to its definition: I. II. III. IV. V. IP address key pair computer protocol static address dynamic address A. a set of rules for exchanging electronic information B. used in a common encryption technique C. temporary IP address for a computer that is assigned from a pool of available IP addresses D. IP address for a computer that does not change E. a unique identification number that defines each computer, service, or other device that connects to the Internet Answer: E, B, A, D, C Diff: 2 Objective: Multiple Objectives in the Chapter 73) Match each of the following terms to its definition: I. II. III. IV. V. second-level domain cascading style sheet instant messaging Internet cache private-key A. section of a hard drive that stores web page information B. used to decode an encrypted message C. list of rules that define how to display HTML elements D. communication between two or more people over the Internet in real time E. unique domain within another domain Answer: E, C, D, A, B Diff: 2 Objective: Multiple Objectives in the Chapter 184 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 74) Match each of the following servers to its definition: I. II. III. IV. V. DNS DHCP commerce web e-mail A. assigns users IP addresses for the duration of a session B. specifically deals with the SMTP communication method C. delivers HTML documents on request D. translates a domain name into an IP address E. enables users to purchase items over the Internet Answer: D, A, E, C, B Diff: 2 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) Chapter 14 Appendix A - The History of the Personal Computer 1) The first personal computer to come to the market in 1975 was the ________. A) Apple I B) Altair 8800 C) TRS-80 D) IBM PC Jr. Answer: B Diff: 2 Objective: A.01 Describe the earliest personal computer ever designed. 2) A major advancement in the Apple II was storing the operating system ________. A) on a cassette tape B) on a floppy disk C) in ROM D) in RAM Answer: C Diff: 1 Objective: A.02 Describe the distinguishing features of the Apple I and Apple II. 3) The ________ was the first portable computer. A) TRS-80 B) Osborne C) IBM PC D) ENIAC Answer: B Diff: 1 Objective: A.03 Describe the first portable computer. 4) Prior to the IBM PC, IBM primarily made ________. 185 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 A) networking equipment B) software C) copiers D) mainframe computers Answer: D Diff: 2 Objective: A.04 Describe the development of the IBM PC. 186 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) BASIC's main advantage over FORTRAN, COBAL and ALGOL was ________. A) BASIC used a GUI interface B) Beginning programming students could easily learn BASIC C) Earlier programming languages were solely for accounting and statistical applications D) Bill Gates and Paul Allen used BASIC to program the Altair Answer: B Diff: 3 Objective: A.05 Explain why BASIC was an important step in revolutionizing the software industry. 6) The 5.25 floppy disk was a significant advancement because ________. A) it had a hard protective case B) they were readily available C) it facilitated saving programs and development of operating systems D) they were on every personal computer Answer: C Diff: 3 Objective: A.06 Explain why the development of the operating system was an important step in PC development. 7) Virtually All PCs with Intel chipsets ran ________ by the early 80s. A) TRS-DOS B) CP/M C) MS-DOS D) Unix Answer: C Diff: 2 Objective: A.06 Explain why the development of the operating system was an important step in PC development. 8) Each of the following are examples of Spreadsheet applications, EXCEPT ________. A) Access B) VisiCalc C) Excel D) Lotus 1-2-3 Answer: A Diff: 1 Objective: A.07 List early application software that was developed for the PC. 9) ________ was the first computer with a graphical user interface, developed in 1972. A) Apple Lisa B) Xerox Alto C) Apple Macintosh D) Microsoft Windows Answer: B Diff: 2 Objective: A.08 Describe the features of the Lisa and Macintosh computers and their predecessor, the Xerox Alto. 187 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) Which web browser was the first introduced? A) Mosaic B) Internet Explorer C) Netscape Navigator D) Chrome Answer: A Diff: 1 Objective: A.09 List the first successful web browsers. 11) Who invented the first accurate mechanical calculator? A) Katherine Johnson B) Blaise Pascal C) Charles Babbage D) Herman Hollerith Answer: B Diff: 1 Objective: A.10 Discuss the features of the Pascalene calculator and the Jacquard loom that inspired modern computer elements. 12) Who translated an Italian description of Babbage's Engine to English and added extensive notes, creating the best description of the machine? A) Joseph Jacquard B) Herman Hollerith C) Ada Lovelace D) Blaise Pascal Answer: C Diff: 2 Objective: A.11 Discuss the contributions of Babbage's engines and the Hollerith Tabulating Machine to modern computing. 13) Grace Hopper gets credit for coining a common computing term by ________. A) removing a bug from a computer B) creating a program that translates English to machine language C) creating punch cards to be read by a computer D) removing fragments from a computer Answer: A Diff: 2 Objective: A.12 Discuss the features of the Z1, the Atanasoff-Berry Computer, and the Mark I. 188 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 14) What concept introduced in the Turing Machine became the precursor to modern RAM? A) audio cassettes in an infinite loop B) Infinite paper tape which could be written to, erased, and changed C) punch cards arranges in an infinite loop D) reel to reel tapes Answer: B Diff: 2 Objective: A.13 Discuss the major features of the Turing Machine, the ENIAC, and the UNIVAC. 15) Which invention replaced vacuum tubes in computers? A) Integrated circuits B) Magnetic tape C) Micro controllers D) Transistors Answer: D Diff: 1 Objective: A.14 Describe the milestones that led to each "generation" of computers. 16) The ________ computer introduced in 1975 had no keyboard or monitor and used switches on the front to enter data and lights on the front to display results. Answer: Altair 8800, Altair, 8800 Diff: 2 Objective: A.01 Describe the earliest personal computer ever designed. 17) Apple Computer was founded by ________ and Steve Wozniak. Answer: Steve Jobs, Jobs Diff: 2 Objective: A.02 Describe the distinguishing features of the Apple I and Apple II. 18) The Osborne was the first ________ computer. Answer: portable Diff: 2 Objective: A.03 Describe the first portable computer. 19) ________ used the term PC to market its first personal computer. Answer: IBM Diff: 2 Objective: A.04 Describe the development of the IBM PC. 20) John Kemeny and Thomas Kurtz revolutionized programming by developing the ________ programming language in 1964. Answer: Beginners All-Purpose Symbolic Instruction Code, BASIC Diff: 3 Objective: A.05 Explain why BASIC was an important step in revolutionizing the software industry. 189 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 21) Bill Gates developed the ________ operating system for IBM PCs in 1980. Answer: MS-DOS Diff: 2 Objective: A.06 Explain why the development of the operating system was an important step in PC development. 22) VisiCalc was the first ________ application. Answer: spreadsheet, spread sheet Diff: 3 Objective: A.07 List early application software that was developed for the PC. 23) A(n) ________ uses icons and a pointing device to allow users to interact with the computer. Answer: GUI, Graphical User Interface Diff: 3 Objective: A.08 Describe the features of the Lisa and Macintosh computers and their predecessor, the Xerox Alto. 24) Microsoft bundled its ________ browser in Windows 95. Answer: Internet Explorer, IE Diff: 1 Objective: A.09 List the first successful web browsers. 25) The Jacquard loom used holes punched in stiff ________ to make complex designs in fabric. Answer: cards Diff: 2 Objective: A.10 Discuss the features of the Pascalene calculator and the Jacquard loom that inspired modern computer elements. 26) ________ designed the Analytical Engine in 1834. Answer: Charles Babbage, Babbage Diff: 1 Objective: A.11 Discuss the contributions of Babbage's engines and the Hollerith Tabulating Machine to modern computing. 27) The Atanasoff-Berry Computer was the first to use ________ instead of mechanical switches. Answer: vacuum tubes Diff: 2 Objective: A.12 Discuss the features of the Z1, the Atanasoff-Berry Computer, and the Mark I. 28) The ________ was the first computer to use magnetic tape instead of punch cards. Answer: UNIVAC Diff: 2 Objective: A.13 Discuss the major features of the Turing Machine, the ENIAC, and the UNIVAC. 190 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 29) Bell Telephone Laboratories invented the ________, which replaced the vacuum tube. Answer: transistor Diff: 1 Objective: A.14 Describe the milestones that led to each "generation" of computers. 30) Babbage's engine was used for years as a mechanical calculator in odometers. Answer: FALSE Diff: 2 Objective: A.11 Discuss the contributions of Babbage's engines and the Hollerith Tabulating Machine to modern computing. 31) Howard Aiken and Grace Hopper designed the Mark series of computers used by the U.S. Navy for ballistic and gunnery calculations. Answer: TRUE Diff: 2 Objective: A.12 Discuss the features of the Z1, the Atanasoff-Berry Computer, and the Mark I. 32) The UNIVAC identified Dwight D. Eisenhower as the winner of the 1952 US Presidential race. Answer: TRUE Diff: 2 Objective: A.13 Discuss the major features of the Turing Machine, the ENIAC, and the UNIVAC. 33) Bill Gates developed the floppy disk. Answer: FALSE Diff: 2 Objective: A.06 Explain why the development of the operating system was an important step in PC development. 34) Match each of the following people with their important development: I. Steve Wozniak II. Bill Gates III. Blaise Pascal IV. Herman Hollerith V. Grace Hopper A. mechanical calculator that used gears to count by tens B. punch cards C. floppy disk D. debugging E. MS DOS Answer: C, E, A, B, D Diff: 2 Objective: Multiple Objectives in the Chapter Technology in Action, Complete, 15e (Evans et al.) 191 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 Chapter 15 Appendix B - Careers in IT 1) Jobs leaving the US for workers in other countries is known as ________. A) outsourcing B) offshoring C) outbounding D) offsourcing Answer: B Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 2) Which of the following is NOT an example of an Enabler IT type career? A) business process analysts B) network administrators C) application developers D) project managers Answer: B Diff: 1 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 3) A(n) ________ job deals with moving and storing information. A) customer interaction B) infrastructure C) enabler D) application developer Answer: B Diff: 1 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 4) ________-based jobs involve a lot of travel for short term projects and the ability to work independently. A) Office B) Home C) Project D) Field Answer: D Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 192 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 5) What type of job involves working at client locations for extended periods of time? A) Field-based B) System-based C) Office-based D) Project-based Answer: D Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 6) IT professionals generally work ________ hours per week and on-call than people in other professions. A) significantly fewer B) significantly more C) about the same D) exactly the same Answer: B Diff: 2 Objective: B.02 Explain the various challenges of IT careers. 7) Which of the following is NOT a stressor in IT careers? A) Underrepresentation of women B) Constant change C) Repetitive work D) 24/7 on-call Answer: C Diff: 3 Objective: B.02 Explain the various challenges of IT careers. 8) The paths in the development and integration division of IT in a large corporation are systems development and ________. A) information systems B) support services C) web development D) project management Answer: C Diff: 2 Objective: B.03 List and describe the various IT careers for which you can train. 9) Which IT professional primarily gathers information from end users, documents systems, and proposes solutions to solve problems in information systems? A) Systems analyst B) Programmer C) Project manager D) Database developer Answer: A Diff: 1 Objective: B.03 List and describe the various IT careers for which you can train. 193 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 10) Which IT professional generates systems documentation for end users and programmers? A) Programmer B) Technical writer C) Network administrator D) Helpdesk analyst Answer: B Diff: 1 Objective: B.03 List and describe the various IT careers for which you can train. 11) Which of the following skills are NOT typically necessary for game designers? A) Programming B) Artistic ability C) Special effects D) Video sequencing Answer: A Diff: 1 Objective: B.03 List and describe the various IT careers for which you can train. 12) The IT role responsible for generating images for websites are ________. A) network administrators B) graphic designers C) web programmers D) interface designers Answer: B Diff: 2 Objective: B.03 List and describe the various IT careers for which you can train. 13) A good way to gain IT experience while pursuing your degree is ________. A) obtaining certification B) doing an internship C) researching the field and companies D) publishing articles in IT journals Answer: B Diff: 1 Objective: B.04 Explain the various ways you can prepare for a career in IT. 14) Which of the following is NOT a typical degree preparing students for careers in IT? A) Computer Science B) Management Information Systems C) Networking Systems D) Information technology Answer: C Diff: 2 Objective: B.04 Explain the various ways you can prepare for a career in IT. 194 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 15) Which resource for finding a career in IT should be available at all colleges? A) Career resource center B) Professional organizations C) Certification workshops D) CareerBuilder.com Answer: A Diff: 2 Objective: B.05 Explain the various ways you can find a career in IT. 16) You can find very accurate ________ information for your geographical area on the web including averages nationally and locally. Answer: salary Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 17) A business is ________ when they hire a third-party firm to provide business services previously handled by in-house employees. Answer: outsourcing Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 18) Outsourcing to a firm using employees located outside the US is known as ________. Answer: offshoring Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 19) Currently, about 26% of IT jobs are held by ________. Answer: women, females Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 20) A(n) ________ job requires a lot of self-discipline and has a very little supervision or commuting and travel. Answer: home-based, home based, telecommute, telecommuting Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 21) IT skills which move well between industries are considered ________. Answer: transferable Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 195 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 22) ________ time is the hours an employee must be available to work in the event of a problem. Answer: On-call, On call Diff: 3 Objective: B.02 Explain the various challenges of IT careers. 23) A web ________ generates the words and images that appear on a website and has interdisciplinary skills in areas outside of IT, including possibilities of journalism, editing, animation, or graphic design Answer: content creator Diff: 2 Objective: B.03 List and describe the various IT careers for which you can train. 24) ________ managers direct the overall systems development process: assigning staff, budgeting, reporting to management, coaching team members, and ensuring deadlines are met. Answer: Project Diff: 1 Objective: B.03 List and describe the various IT careers for which you can train. 25) ________ install and configure database servers and ensure that the servers provide an adequate level of access to all users. Answer: Database Administrators, DBAs, DBA Diff: 1 Objective: B.03 List and describe the various IT careers for which you can train. 26) To obtain a professional ________, you usually need to pass a written exam on specific IT skills. Answer: certification Diff: 2 Objective: B.04 Explain the various ways you can prepare for a career in IT. 27) Internships often provide valuable ________ in your intended line of work. Answer: experience, job skills, skills Diff: 2 Objective: B.04 Explain the various ways you can prepare for a career in IT. 28) Professional ________ like IEEE and ACM often provide a means to network with other IT professionals. Answer: organizations Diff: 1 Objective: B.05 Explain the various ways you can find a career in IT. 29) IT Jobs are among the slowest growing jobs in the near future. Answer: FALSE Diff: 2 Objective: B.01 List the reasons why IT fields are attractive to students pursuing bachelor's degrees. 196 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net) lOMoARcPSD|10133946 30) IT skills are NOT transferable if the company you are working for becomes obsolete. Answer: FALSE Diff: 2 Objective: B.02 Explain the various challenges of IT careers. 31) Professional certifications for IT skills replace a college degree in the eyes of most employers in IT. Answer: FALSE Diff: 2 Objective: B.04 Explain the various ways you can prepare for a career in IT. 32) Developing relationships with your instructors may help you land a career, because many still work in the industry. Answer: TRUE Diff: 2 Objective: B.04 Explain the various ways you can prepare for a career in IT. 33) Match each of the following IT roles with their best descriptions: I. network administrator II. programmer III. interface designer IV. helpdesk analyst V. project manager A. create a look and feel of a website B. solve problems for customers or employees C. involved in every stage of network planning and deployment D. supervise, organize, and coach team members E. build the software that solves problems Answer: C, E, A, B, D Diff: 2 Objective: B.03 List and describe the various IT careers for which you can train. 197 Copyright © 2019 Pearson Education, Inc. Downloaded by u not getting info hahahha (nodgznspprabtiutyz@mrvpm.net)