Chapter 11

advertisement
Personal Finance
Chapter 11
11-1 Key Terms:
Computer system –
Hardware –
Software –
Computer Network –
Central processing unit (CPU) –
Program –
Computer language –
Operating system software –
Application software -
11-1 Checkpoints:
List the four main elements of a computer system…
What are common input devices?
How do internal and external memory differ?
11-1 Assessment:
1. An optical scanner is a device in the _ ? _ component of a computer system.
a. input
b. output
c. memory
d. processing
2. A list of potential customers for your new product would be created using _ ? _ software.
a. desktop publishing
b. word processing
c. spreadsheet
d. database
3. Which of the following is an example of auxiliary storage?
a. CPU
b. DVD
c. monitor
d. software
11-2 Key Terms:
Management information system (MIS) –
Computer-assisted instruction (CAI) –
e-commerce -
11-2 Checkpoints:
What are the four components of a management information system?
What service industries make extensive use of computers?
What do the notations B2C and B2B mean?
11-2 Assessment:
An example data would be:
a. a company sales report
b. a list of employee qualifications
c. a government economic forecase
d. payroll records
2. CAI refers to
a. paying bills online
b. electronic inventory control
c. providing health care to remote areas
d. individualized instruction
3. When a packaged food producer sells items to a restaurant, this is considered to be a _ ?_
e-commerce transaction.
a. B2C
b. B2B
c. C2B
d. C2C
11-3 Key Terms:
Robotics –
Artificial intelligence (AI)
Expert system –
Computer – aided design (CAD) –
Telecommuting –
Piracy –
Computer virus -
11-3 Checkpoints:
How is computer – aided design (CAD) used by businesses?
What types of technology tools are available to students?
How do companies suffer from software piracy?
11-3 Assessment:
1. Telecommuting refers to
a. the use of computers to design products
b. working at home by computer
c. difficulties from overusing computers
d. illegal acts of office workers
2. Hidden software code that can damage computer operations is
a. piracy
b. a displaced worker
c. a virus
d. a computer literacy
3. Which of the following is an example of computer literacy?
a. data entry
b. identity theft
c. piracy
d. telecommuting
Download