5
Chapter 5 (Input & Output) / chap.7 True/False 1. On notebook and some handheld computers, PDAs, and smart phones, the keyboard is built in the top of the system unit. 2. An air mouse is a newer type of motion-sensing mouse that allows you to control objects, media players, and slide shows by moving the mouse in predetermined directions through the air. 3. Resolution is the number of horizontal and vertical pixels in a display device 4. A video conference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data 5. Plasma monitors offer larger screen sizes and richer colors than LCD monitors. 6. Most photo printers are PictBridge enabled, which requires the use of a computer to print pictures 7. A line printer is a high-speed impact printer that prints one character at a time. 8. The advantage of a multifunction peripheral is that it is significantly more expensive than if you purchase each device separately. 1. An ergonomic keyboard _______. a. is used to enter data into a biometric device b. has a design that reduces wrist and hand injuries c. transmits data using wireless technology d. is built into the top of a handheld computer 2. Two types of pen input are _______. a. digital pen and touch screen b. stylus and digital pen c. trackball and stylus d. pointing stick and digital pen 3. A _______ controls the movement and actions of players or objects in video games or computer games. a. control pad b. pointing stick c. gamepad d. touchpad 4. A(n) _______ is a type of digital video camera that enables a home or small business user to capture video and still images, send e-mail messages with video attachments, add live images to instant messages, broadcast live images over the Internet, and make video telephone calls. a. PC camera b. digital video camera c. Web cam d. optical mouse 5. RFID is a technology that uses _______ to communicate with a tag placed in or attached to an object, an animal, or a person. a. a thin wire b. pixels c. light waves d. radio signals 6. The speed of an ink-jet printer is measured by the number of _______ it can print. a. pages per minute (ppm) b. dots per inch (dpi) c. characters per second (cps) d. lines per page (lpp) 7. Most surround sound computer speaker systems include one or two center speakers and two or more _______ that are positioned so sound emits from all directions. a. headphones b. subwoofers c. satellite speakers d. none of the above 8. A(n) _______ is an output device for blind users. a. head-mounted pointer b. Braille printer c. on-screen keyboard d. all of the above

Exercise 1

Embed Size (px)

DESCRIPTION

good

Citation preview

Page 1: Exercise 1

Chapter 5 (Input & Output) / chap.7

True/False

1. On notebook and some handheld computers, PDAs, and smart phones, the keyboard is built in the

top of the system unit.

2. An air mouse is a newer type of motion-sensing mouse that allows you to control objects, media

players, and slide shows by moving the mouse in predetermined directions through the air.

3. Resolution is the number of horizontal and vertical pixels in a display device

4. A video conference is a meeting between two or more geographically separated people who use a

network or the Internet to transmit audio and video data

5. Plasma monitors offer larger screen sizes and richer colors than LCD monitors.

6. Most photo printers are PictBridge enabled, which requires the use of a computer to print pictures

7. A line printer is a high-speed impact printer that prints one character at a time.

8. The advantage of a multifunction peripheral is that it is significantly more expensive than if you

purchase each device separately.

1. An ergonomic keyboard _______.

a. is used to enter data into a biometric device

b. has a design that reduces wrist and hand injuries

c. transmits data using wireless technology

d. is built into the top of a handheld computer

2. Two types of pen input are _______.

a. digital pen and touch screen

b. stylus and digital pen

c. trackball and stylus

d. pointing stick and digital pen

3. A _______ controls the movement and actions of

players or objects in video games or computer games.

a. control pad

b. pointing stick

c. gamepad

d. touchpad

4. A(n) _______ is a type of digital video camera that

enables a home or small business user to capture video

and still images, send e-mail messages with video

attachments, add live images to instant messages,

broadcast live images over the Internet, and make video

telephone calls.

a. PC camera

b. digital video camera

c. Web cam

d. optical mouse

5. RFID is a technology that uses _______ to

communicate with a tag placed in or attached to an

object, an animal, or a person.

a. a thin wire

b. pixels

c. light waves

d. radio signals

6. The speed of an ink-jet printer is measured by the

number of _______ it can print.

a. pages per minute (ppm)

b. dots per inch (dpi)

c. characters per second (cps)

d. lines per page (lpp)

7. Most surround sound computer speaker systems

include one or two center speakers and two or more

_______ that are positioned so sound emits from all

directions.

a. headphones

b. subwoofers

c. satellite speakers

d. none of the above

8. A(n) _______ is an output device for blind users.

a. head-mounted pointer

b. Braille printer

c. on-screen keyboard

d. all of the above

Page 2: Exercise 1

Chapter 7 (Storage) / chap.8

True/False

1. Secondary storage is the physical material on which a computer keeps data, instructions, and information.

2. Reading is the process of transferring data, instructions, and information from memory to a storage medium

3. A sector is a narrow recording band that forms a full circle on the surface of the disk.

4. A typical hard disk usually contains only one platter.

5. A removable hard disk is a separate, free-standing hard disk that connects with a cable to a port on the system unit.

6. A floppy disk is a portable storage medium.

7. A CD-ROM can be read from and written on any number of times.

8. A UMD can store up to 4.8 GB of games, movies, or music.

9. BD-RE and HD DVD-RW are competing high-capacity rewritable DVD formats.

10. Unlike PC Cards, ExpressCard modules can be used to add memory, storage, communications, multimedia, and security capabilities to a computer.

1. _______ measures the amount of time it takes a

storage device to locate an item on a storage

medium.

a. Capacity

b. Access time

c. A storage medium

d. Reading

2. A group of two or more integrated hard disks is

called a _______.

a. backup

b. platter

c. RAID

d. portable hard disk

3. A(n) _______ is a self-contained unit that you

insert in and remove from a slot or USB port in a

device or a computer.

a. RAID

b. pocket hard drive

c. online storage

d. disk controller

4. Users subscribe to an online storage service to

_______.

a. access files from any computer that has Internet

access

b. allow others to access files

c. store offsite backups of data

d. all of the above

5. _______ technology works with specially coated

optical discs to etch labels directly on the disc.

a. SCSI

b. SATA

c. LightSaber

d. LightScribe

6. _______ storage requires sequential access.

a. Hard disk

b. DVD

c. Floppy disk

d. Tape

7. A _______ is a memory storage device that

plugs in a USB port on a computer or mobile

device.

a. PC Card

b. UMD

c. USB flash drive

d. Memory Stick

8. Microfilm and microfiche _______.

a. are expensive

b. have the longest life of any storage media

c. greatly increase the amount of paper firms must

handle

d. all of the above

Page 3: Exercise 1

Chapter 8 (Operating System & Utility Software) / chap.9

True/False

1. The operating system that a computer uses sometimes is called the level

2. Booting is the process of permanently removing a computer from operation.m

3. In a command-line interface, you interact with menus and visual images such as buttons

and other graphical objects to issue commands

4. When spooling print jobs to a buffer, multiple print jobs line up in a queue in the buffer

5. A folder is a specific named location on a storage medium that contains related

documents

6. A personal firewall is a utility program that detects and protects a personal computer from

unauthorized intrusions.

7. A disk defragmenter is a utility that reorganizes the files and unused space on a

computer’s hard disk so the operating system accesses data more quickly and programs

run faster.

8. Linux is open source software, which means its code cannot be modified or redistributed.

9. Web filtering software is a program that secretly collects information about a user, often

related to the user’s Web browsing habits

10. Compressed files sometimes are called utility files

1. In the Windows Vista operating system, the _____

interface provides an enhanced visual look, additional

navigation options, and animation.

a. Plug and Play

b. Windows Vista Basic

c. Mac OS X

d. Windows Aero

2. A _____ is a small program that tells the operating

system how to communicate with a specific device.

a. buffer

b. driver

c. performance monitor

d. device

3. A _____ is a program that attempts to locate a file on

your computer based on criteria you specify.

a. file manager

b. search utility

c. Startup folder

d. worm

4. Defragmenting reorganizes the files on a disk so they

are located in _____ access time.

a. noncontiguous sectors, which slows

b. noncontiguous sectors, which speeds

c. contiguous sectors, which slows

d. contiguous sectors, which speeds

5. The operating system on most PDAs and small

devices, called a(n) _____, resides on a ROM chip.

a. network operating system

b. embedded operating system

c. stand-alone operating system

d. stand-alone utility program

6. Personal firewalls, backup utilities, and screen savers

are examples of _____.

a. antivirus programs

b. network operating systems

c. stand-alone operating systems

d. stand-alone utility programs

7. _____ software is a program that restricts access to

certain material on the Web.

a. Antivirus

b. Spyware remover

c. Web filtering

d. Adware

8. A _____ is a program that allows you to view images

and animation, listen to audio, and watch video files on

your computer.

a. file manager

b. media player

c. service pack d. Media Center PC

Page 4: Exercise 1

Chapter 9 (Communication & Network) / chap.10

True/False

1. Computer communications describes a process in which two or more computers or devices transfer

data, instructions, and information

2. E-mail is the transmission of messages and files via a computer network.

3. A 3G network uses infrared technology to provide users with high-speed wireless Internet

connections

4. A network is a collection of computers and devices connected together via communications devices

and transmission media.

5. A metropolitan area network (MAN) is a network that covers a small geographic area using a

communications channel that uses a single type of media

6. Ethernet is a network standard that specifies no central computer or device on the network (nodes)

should control when data can be transmitted

7. A dial-up line is a temporary connection that uses one or more analog telephone lines for

communications.

8. Fiber to the Home (FTTH) refers to small businesses that use fiber-optic cables to access the

Internet.

9. A cable modem is a digital modem that sends and receives digital data over the cable television

network.

10. Routers along the Internet backbone forward data packets to their destination using the fastest

available path

11. Noise is an electrical disturbance that can degrade communications

1. A_____ is a coffeehouse, restaurant, or other location

that provides personal computers with Internet access to

its customers.

a. hot spot

b. cybercafé

c. wireless Internet access point

d. none of the above

2. _____ includes tools that enable users to share

documents via online meetings and communicate with

other connected users.

a. A document management system

b. Electronic data exchange

c. Collaborative software

d. A file sharing network

3. A _____ network is a third-party business that

provides networking services for a fee.

a. star

b. client/server

c. value-added

d. file sharing

4. _____ is a newer network standard developed by IEEE

that specifies how wireless devices communicate over

the air in a wide area.

a. Wi-Fi

b. WiMAX

c. 802.16

d. Both b and c

5. Communications software consists of programs that do

all of the following, except _____.

a. help users establish a connection to another computer

or network

b. manage the transmission of data, instructions, and

information

c. provide an interface for users to communicate with one

another

d. convert a computer’s analog signals into digital signals

for transmission

6. The most popular T-carrier line is the _____.

a. T1 line

b. ATM

c. T3 line

d. DSL

7. DSL, cable television Internet service, and satellites

offer_____ transmission.

a. baseband

b. IrDA

c. microwave

d. broadband

8. _____ consists of a single copper wire surrounded by

at least three layers.

a. Fiber-optic cable

b. Infrared

c. Twisted-pair cable d. Coaxial cable

Page 5: Exercise 1

Chapter 10 (Security, Ethics, Privacy) / chap.5

True/False

1. Any illegal act involving a computer generally is referred to as a cybercrime.

2. Hackers often claim the intent of their security breaches is to improve security.

3. A firewall is hardware and/or software that allows users to bypass security controls when accessing

a program, computer, or network

4. In order to safeguard against unauthorized access and use of its computers, a company should have

a digital certificate

5. Biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is

linked to a payment method such as a checking account or credit card

6. Digital signatures often are used to ensure that an impostor is not participating in an Internet

transaction

7. A digital certificate warns a user that software has been pirated.

8. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of computer

viruses, worms, and Trojan horses

9. Spam is an unsolicited e-mail message or newsgroup posting sent to multiple recipients or

newsgroups at once.

10. Green computing involves reducing the electricity while using a computer, but the practice

increases environmental waste.

1. Malware is a term that can be used to describe _____.

a. viruses

b. worms

c. Trojan horses

d. all of the above

2. The _____ is the destructive event or prank that

malware is intended to deliver.

a. hash

b. payload

c. cookie

d. spam

3. A _____ is a compromised computer whose owner is

completely unaware the computer is being controlled

remotely by an outsider.

a. ghost

b. Trojan horse

c. back door

d. zombie

4. Physical access controls, such as locked doors and

windows, usually are adequate to protect against_____.

a. software piracy

b. unauthorized access

c. hardware theft

d. all of the above

5. Unencrypted, readable data is called _____.

a. hypertext

b. ciphertext

c. subtext

d. plaintext

6. A _____ gives authors and artists exclusive rights to

duplicate, publish, and sell their materials.

a. password

b. license

c. copyright

d. firewall

7. As related to the use of computers, ______ is defined

as gaining unauthorized access or obtaining confidential

information by taking advantage of the trusting human

nature of some victims and the naivety of others.

a. phishing

b. a virus hoax

c. social engineering

d. pharming

8. _____ involves the examination of computer media,

programs, data and log files on computers, servers, and

networks.

a. Encryption key

b. E-mail filtering

c. Forensics analysis

d. Trusted source