ex7-ex11ans - Chu Hai College

advertisement
EX7
1. A network attached storage (NAS) device is a server connected to a network with the sole
purpose of providing storage. Any user or device connected to the network can access
files on the NAS device. These devices often use a RAID configuration. In the past,
enterprises were the primary users of NAS. With the introduction of smaller, less
expensive NAS devices, however, some home and small business users opt to add up to 6
TB or more of hard disk storage space to their network with a NAS device.
2. Advantages of SAS over parallel SCSI include thinner, longer cables; reduced
interference; less expensive; support for many more connected devices at once; and faster
speeds. In addition to hard disks, SAS interfaces support connections to optical disc
drives, printers, scanners, digital cameras, and other devices.
3. A standard CD-ROM is called a single-session disc because manufacturers write all items
on the disc at one time. Multisession means you can write on part of the disc at one time
and another part at a later time. Many people use archive discs or Picture CDs to preserve
their photos. When you post and share photos online on a photo sharing community, you
can choose to save your collection of online photos on an archive disc. An archive disc
stores photos from an online photo center in the jpg file format, usually at a maximum
resolution of 7200 pixels per photo. A Kodak Picture CD is a single-session CD-ROM
that stores digital versions of film using a jpg file format at a lower resolution, typically
1024 x 1536 pixels.
4. Memory cards enable mobile users easily to transport digital photos, music, or files to and
from mobile devices and computers or other devices. Common types of flash memory
cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity
(SDHC), microSD, microSDHC, xD Picture Card, Memory Stick, and Memory Stick
Micro (M2). CompactFlash cards have a storage capacity of 512 MB to 100 GB and are
used in digital cameras, smart phones, PDAs, photo printers, portable media players,
notebook computers, and desktop computers. Secure Digital cards have a storage capacity
of 512 MB to 8 GB and are used in digital cameras, digital video cameras, smart phones,
PDAs, photo printers, and portable media players. SDHC cards have a storage capacity of
4 to 32 GB and are used in digital cameras. microSD cards have a capacity of 1 to 2 GB
and are used in smart phones, portable media players, handheld game consoles, and
handheld navigation devices. MicroSDHC cards have a capacity of 4 to 16 GB and are
used in the same items as the microSD cards. xD Picture Cards have a storage capacity of
256 MB to 2 GB and are used in digital cameras and photo printers. Memory Stick PRO
Duo cards have a storage capacity of 1 to 16 GB and are used in digital cameras, smart
phones, and handheld game consoles. Memory Stick Micro (M2) cards have a capacity of
1 to 16 GB and are used in smart phones.
5. Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually
about 4 x 6 inches. Microfilm and microfiche use is widespread, with many companies
allowing you to search through and view microfilm images online. Libraries use these
media to store back issues of newspapers, magazines, and genealogy records. Some large
organizations use microfilm and microfiche to archive inactive files. Some banks use
them to store transactions and canceled checks. The U.S. Army uses them to store
personnel records.
EX8
1. A cold boot is performed when you turn on a computer that has been powered off
completely. A warm boot, by contrast, is the process of using the operating system to restart a
computer. A memory resident part of an operating system, such as the kernel, remains in
memory while the computer is running. A nonresident part of an operating system remains on
the hard disk until it is needed.
2. A user interface controls how you enter data and instructions and how information
displays on the screen. In a command-line interface, a user types commands or presses
special keys on the keyboard to enter data and instructions. With a graphical user interface
(GUI), you interact with menus and visual images such as icons, buttons, and other graphical
objects to issue commands.
3. Many popular programs, including most operating systems, include an automatic update
feature that automatically provides updates to the program. With an operating system, these
updates can include fixes to program bugs, or errors, enhancements to security, modifications
to device drivers, access to new or expanded components such as desktop themes or games,
and even updates to application software on the computer such as a Web browser or an e-mail
program. Many software makers provide free downloadable updates, sometimes called a
service pack, to users who have registered and/or activated their software. With operating
systems, the automatic update feature automatically alerts users when an update is available;
further, it can be configured to download and install the update automatically.
4. During the backup process, the backup utility monitors progress and alerts you if it
needs additional media, such as another disc. Many backup programs compress, or shrink the
size of, files during the backup process. By compressing the files, the backup program
requires less storage space for the backup files than for the original files. In the event you
need to use a backup file, a restore utility reverses the process and returns backed up files to
their original form. Backup utilities work with restore utilities.
5. Windows Embedded CE is a scaled-down Windows operating system designed for use
on communications, entertainment, and computing devices with limited functionality.
Windows Mobile, an operating system based on Windows Embedded CE, includes
functionality, programs, and a user interface designed for specific types of smart phones and
PDAs. A competing operating system to Windows Mobile is Palm OS, which runs on smart
phones and PDAs. With Palm OS devices, users manage schedules and contacts, phone
messages, notes, task and address lists, and appointments. iPhone OS, developed by Apple, is
an operating system for the iPhone and iPod touch, Apple’s smart phone and touch screen
portable media player, respectively. The BlackBerry operating system runs on handheld
devices supplied by RIM (Research In Motion). BlackBerry devices provide PIM capabilities
such as managing schedules, contacts, and appointments, as well as phone capabilities.
Embedded Linux is a scaled-down Linux operating system designed for smart phones, PDAs,
portable media players, Internet telephones, and many other types of devices and computers
requiring an embedded operating system. Symbian OS is an open source multitasking
operating system designed for smart phones. In addition to making phone calls, users of
Symbian OS can maintain contact lists; save appointments; browse the Web; and send and
receive text and picture messages, e-mail messages, and faxes using a smart phone.
EX9
1. A mobile device with text messaging, also called SMS (short message service),
capability allows users to send and receive short text messages on a phone or other mobile
device or computer. Text messaging services typically provide users with several options for
sending and receiving messages: • Mobile to Mobile: send a message from your mobile
device to another mobile device • Mobile to E-Mail: send a message from your mobile device
to an e-mail address anywhere in the world • Web to Mobile: send a message from a text
messaging Web site to a mobile device, or request that a Web site alert a mobile device with
messages of breaking news and other updates, such as sports scores, stock prices, and
weather forecasts • Mobile to Provider: send a message by entering a common short code
(CSC), which is a four- or five-digit number assigned to a specific content or wireless service
provider, followed by the message, such as a vote for a television program contestant or an
entry for a sweepstakes.
2. A global positioning system (GPS) is a navigation system that consists of one or more
earth-based receivers that accept and analyze signals sent by satellites in order to determine
the receiver’s geographic location. The first and most used application of GPS technology is
to assist people with determining where they are located. The data obtained from a GPS,
however, can be applied to a variety of other uses: creating a map, ascertaining the best route
between two points, locating a lost person or stolen object, monitoring the movement of a
person or object, determining altitude, and calculating speed. Many vehicles use GPSs to
provide drivers with directions or other information, such as alternate traffic routes,
automatically call for help if the airbag is deployed, dispatch roadside assistance, unlock the
driver’s side door if keys are locked in the car, and track the vehicle if it is stolen. Hikers and
remote campers may carry GPS receivers in case they need emergency help or directions.
Some GPS receivers work in conjunction with a cellular wireless network. Parents, for
example, can locate a child’s whereabouts through a cell phone equipped with a GPS
receiver.
3. A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school computer laboratory, office building, or
closely positioned group of buildings. A metropolitan area network (MAN) is a high-speed
network that connects local area networks in a metropolitan area such as a city or town and
handles the bulk of communications activity across that region. A wide area network (WAN)
is a network that covers a large geographic area (such as a city, country, or the world) using a
communications channel that combines many types of media. A wireless LAN (WLAN) is a
LAN that uses no physical wires.
4. A network topology refers to the layout of computers and devices in a communications
network. Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and
ATM.
5.
Three types of digital modems are ISDN modems, DSL modems, and cable modems. An
ISDN modem sends digital data and information from a computer to an ISDN line and
receives digital data and information from an ISDN line. A DSL modem sends digital data
and information from a computer to a DSL line and receives digital data and information
from a DSL line. ISDN and DSL modems usually are external devices, in which one end
connects to the telephone line and the other end connects to a port on the system unit. A cable
modem, sometimes called a broadband modem, is a digital modem that sends and receives
digital data over the cable television (CATV) network.
EX11
1. An antivirus program scans for programs that attempt to modify the boot program, the
operating system, and other programs that normally are read from but not modified. In
addition, many antivirus programs automatically scan files downloaded from the Web, e-mail
attachments, opened files, and all types of removable media inserted in the computer. One
technique that antivirus programs use to identify a virus is to look for virus signatures. A
virus signature, also called a virus definition, is a known specific pattern of virus code. A
virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
2. The United States Department of Energy (DOE) and the United States Environmental
Protection Agency (EPA) developed the ENERGY STAR program to help reduce the amount
of electricity used by computers and related devices. This program encourages manufacturers
to create energy-efficient devices that require little power when they are not in use. For
example, many devices switch to sleep or power save mode after a specified number of
inactive minutes or hours. Computers and devices that meet the ENERGY STAR guidelines
display an ENERGY STAR label. Because of the huge volumes of electronic waste, the U.S.
federal government has proposed a bill that would require computer recycling across the
country. Many state and local governments have methods in place to make it easy for
consumers to recycle this type of equipment. Many computer manufacturers, office supply
stores, and other agencies offer free recycling to consumers and organizations.
3. Information privacy refers to the right of individuals and companies to deny or restrict
the collection and use of information about them. Five ways to protect your personal
information are: 1) Fill in only necessary information on rebate, warranty, and registration
forms. 2) Do not preprint your telephone number or Social Security number on personal
checks. 3) Have an unlisted or unpublished telephone number. 4) If Caller ID is available in
your area, find out how to block your number from displaying on the receiver’s system. 5) Do
not write your telephone number on charge or credit receipts. (Answers may vary. See Figure
11-31 on page 584.)
4. The two methods for avoiding phishing attacks are to first, never click a link in an
e-mail message; instead, retype the Web address in your browser. Second, use a phishing
filter. A phishing filter is a program that warns or blocks you from potentially fraudulent or
suspicious Web sites. Some Web browsers include phishing filters. To further help deter
spam and phishing scams, Microsoft and others are developing standards that require e-mail
messages contain sender identification so that recipients can verify the legitimacy of
messages. With clickjacking, an object that can be clicked on a Web site, such as a button,
image, or link, contains a malicious program. When a user clicks the disguised object, a
variety of nefarious events may occur. For example, the user may be redirected to a phony
Web site that requests personal information, or a virus may download to the computer.
5.
Many businesses use content filtering to limit employees’ Web access. These businesses
argue that employees are unproductive when visiting inappropriate or objectionable Web
sites. Some schools, libraries, and parents use content filtering to restrict access to minors.
Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the
ICRA. If content at the Web site goes beyond the rating limits set in the Web browser
software, a user cannot access the Web site. Concerned parents can set the rating limits and
prevent these limits from being changed by using a password.
<END>
Download