Information Technology Student worksheet

advertisement
Student Name 1, Student Name 2
Monday, February 08, 2016
BIM Teacher/Period
Part I Directions: Cut & Paste, Fill-in-the-blank.
1. Pair up with your table partner and find Appendix A in the Office 2007 book.
2. Read through the Appendix and assignment together, discuss your personal experiences with
computers whether on-the-job or at home (like do you have a laptop, desktop, MAC, PC or what do
you wish you had, have you ever used a bar code scanner, do you Facebook, Skype/Oovoo, webcam..?).
3. Use the Word Bank table at the bottom of this assignment to fill-in-the-blanks.
4. As you find the answers you should Cut & Paste them from the Word Bank to the appropriate
number in the assignment. Take turns cutting and pasting so both of you get practice.
5. When you are complete the Word Bank table should be blank.
6. Fill in the header and follow your teacher’s instructions for printing and grading.
1)
A computer is used to 1) _______________,
2)
2)______________, and 3)_____________ data.
3)
You enter data into a computer via 4) ________ devices.
Examples of these include:
5)_____, 6)_____, 7)_____, 8)______, 9)_____
The 10)______ is a silicon chip that processes data and
carries out instructions given to the computer.
The CPU, computer memory and other electronic parts are
stored on the computer’s 11)_________.
4)
5)
6)
7)
8)
9)
10)
11)
A 12)____________________ can be both an input and
output device because you can pull information from it or save
information to it. Examples of these devices include:
13)______, 14)_____, 15)_____, 16)______, 17)______.
12)
13)
14)
15)
16)
17)
The device that displays the results of the computer
processing is an 18)________________. Examples include:
19)_______________ and 20)________________.
18)
19)
20)
Computers have two types of memory 21)_____ and 22)____.
21)
22)
The speed of a computer is measured by 23)_____________.
23)
A 24)____ is two or more computers connected to share data.
Computers connected within a small area such as a home,
office, school, or building is called a 25) _________.
There are three common pieces of network equipment used to
build a network, the first is used to access the network, the
second to convert the data to send and the third to join two
or more networks. They are the 26) __________________.
24)
25)
26)
Student Name 1, Student Name 2
Monday, February 08, 2016
Networks can be set up as 27)______________________.
The 28)__________ is the largest network in the world.
27)
28)
Network technology is often referred to as 29) __________,
the personal computer is called the 30)____________ and
the shared information is stored on the 31)____________.
If the computer is storing web pages it is called the 32)___.
29)
30)
31)
32)
To connect to the internet you need to subscribe to an 33) __.
Dial-up internet connections are becoming obsolete as we move
to always-on, faster technologies known as Digital Subscriber
Lines (DSL). DSL comes from different companies using
different medium including 34)____, 35)____ and 36)____.
33)
Systems software refers to operating systems software.
There are basically two widely used types of operating system
software including 37)_______ and 38)________.
The first personal computer was invented in 1974. It was
mass marketed by 39) ____ in 1977 and by 40) _____ in 1981.
You can change the way software or hardware works by using
your computer’s 41)________. Examples of this include
changing the speed of mouse clicks or the screen resolution.
42)__________ are software that runs the peripherals.
Most configurations are changed automatically with
43) ________ software that comes with the computer’s
operating system.
44) __________ are software programs that can damage
your computer. They are created by people called 45)
__________ and enter your computer without your
knowledge. 46) _________ is a type of virus that tracks
what you do on your computer for data-mining purposes.
There are programs to protect your computer from viruses
and spyware called 47) _______________. Installing these
programs and running them on a regular basis is part of
computer maintenance.
Another type of maintenance is disk maintenance. You should
run a program that looks for bad disk sectors and corrupted
files. This is called optimizing or 48)__________ the disk.
With the Internet boom has come a higher need to increase
security and privacy of your electronic information. With the
growing number of financial transactions taking place online
49)______________ is a growing problem.
Another security breach is a criminal activity that is used by
people to fraudulently obtain your password information, this
is called 50) _________________.
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)
BIM Teacher/Period
Student Name 1, Student Name 2
Monday, February 08, 2016
BIM Teacher/Period
Store
Network
Identity Theft
RAM – random access memory
Keyboard
Magnetic Tape
Apple
LAN (Local Area Network)
Scanner
Spyware
Client-server
Network Card, Modem and Router
IBM
Hard Disk Drive
Cable
ROM – read-only memory
Retrieve
Monitor
Hackers
Internet Service Provider (ISP)
Drivers
DVD
Microphone
Bar Code Reader
Input
Viruses
Satellite
Flash, Stick or USB Drive
Internet
Wired or Wireless
Phishing
Macintosh (MAC)
Client
Web server
Manipulate
Central Processing Unit (CPU)
Mouse/Touchpad
Printer
Output Device
Utility software
CD
Storage Device
Motherboard
Microsoft Windows (PC)
Defragmenting
Server
Plug and Play
Fiber Optic (FIOS)
Megahertz (MHz) & Gigahertz (GHz)
Antivirus & Spyware Protection
Part II: Using the knowledge you gained during the video and this exercise, complete the following:
Scenario:
You and your partner have decided to go into business together. You plan to have a small two person office.
Using shapes/clipart in WORD draw a diagram showing two computers. Connect the computers to each
other to share files and connect to peripheral devices you will need in your business. You must choose a
minimum of 5 peripheral devices. Using text boxes, label the peripheral devices with their name and whether
they are an input, output or input/output device.
Add a page break after your diagram and on the second page write no more than one page about your office.
You must use a minimum of ten words from the word bank. These words must be bolded and
underlined. You may talk about whether you chose MACs or PCs, laptops or desktops, software you will
need and peripheral devices you would have in your office and how they are connected. You may expand
your topics to include other devices needed to operate your business like phones, copy machines and other
internet uses like Skype/Oovoo and Facebook and how you might use the Internet for your business.
Rubric (This is a major grade) Wait for printing instructions from your teacher:
1. 50 points Part I – one point per question
2. 50 points Part II
a. 15 points diagram complete with two computers, 5 peripheral
b. 15 points peripheral devices, labeled with name and input, output or input/output
c. 20 points – two points per word from word bank
Download