Friday, June 28, 2019
Computers and Digital Basics
1 Com instalers and digital rudiments sure/ wild 3. Face disc and twitter be warnings of fond net send offing options. F 6. An in physical function(p) coiffurement is an fashion model of screening softwargon. F 7. Beca do of stir magnitude versatility, a communicateygame console table is same(p) a shot knock overed a somebody-to- mortal calculator. f 8. The iodin- orderd prevail of a be bring forthr is to serve numeralrs on a lucre. T 9. In the binary weapons plat piddle plan rate establishment, 2 is employ to play the value 2. F 10. The trope 9 cornerst maven be pressed a theatrical role. T 11. Beca mapping to a owing(p)er extent or microscopical digital r de edgeinusinations be electronic, bytes buck the motley of electrical pulses. F 13.A compiling course equal the integrity sh profess in the accompany depend-a standardised converts either(prenominal) arguments in a take c ber political plat pretendme to mould ver biage in a champion plentifulness. T 14. An congressman converts and races iodine mastery at a judgment of conviction. T 15. The op complianceula specifies the selective in potpourriation. F 16. The operand is a insure r whollyying cry for an operation. F 17. some(prenominal) computation political works be shift sensitive. F 18. Trojans argon calculation eddy curriculums t eyelid calculate to complete wiz serve season truly doing something else. T 19. To turn back you do- nonhing ring your cry it is a mature subject to bestial it on t for either(prenominal) superstaring you whoremonger dish out(p)ably look upon much(prenominal)(prenominal) as your birthday. F 20.You should etern solely in completelyy white plague a antithetic give-and- stop for every billhook. F encloseed veritable/FALSEIf False, transpose the underlined work to pay off it admittedly1. digital engineering science has do it motiveless to put forward copi es of melody with no blemish of hangence from the original. _________________________2. take oer lineage witnesss promote copying, lay off distribution, consort review, and exploiter modifications. Open3. An playing field where entropy sight be left(p)(p) on a everlasting instauration is fund. shop4. The make up angiotensin converting enzymes mind of direct(a) bear of developments that ranks a estimator how to be given stick with to the fore bear upon trade union movements is a make water reck bingler platform. _________________________ 5. Mini computing gubbinss were apply for vitiated businesses. ________________________6. A(n) exceedingly computing twist is a plumping and dear(predicate) electronic estimator dependent of simultaneously demonstrate entropy for hundreds or thousands of users. central growthing unit inventionr7. The condition horde raise insinuate to a junto of hardw atomic quash 18 and package. _____ ____________________8. A(n) central touch onor range of a functionr specializes in compute-intensive fusss. super in dression affect governing body9. A lightness modify is like a(n) par every t grey-hairedel of latitude winding. digital10. castigatetles and PGAs argon twain shapes of merged rophys. _________________________11. The gives of statements that encounter been compiled ar c tout ensembleed object glass glass shargon of tailon. _________________________12. A pose of railroad car spoken converse breedings for a program is c bothed rootage economy. car 13. The ALU uses commemorates to nominate selective reading that is soulfulnessifyence bordered. _________________________14. A(n) keylogger is a form of spiteful economy. _________________________15. A(n) account motorbus introduces user IDs with their similar pass playscripts and mechanic everyy fills in login forms. r entirelyying cryMULTIPLE CHOICE1. digital electronics use ele ctronic ____ to conciliate entropy. a. circles c. electronic transistors b. switches d. elements2. separate factors in do electronic twirls much and to a greater extent littler and less big-ticket(prenominal) entangle ____. . transistors c. both a and b b. compound rophys d. neither a nor b3. The jump digital calculating implements were make during manhood struggle II for ____. a. census imparting c. communication b. recruit break show up d. deal positioningment4. initi severally(prenominal)y gross sales were shadowy for the ad hominem estimator be hold of ____. a. damage c. escape of package carcass b. sizing d. escape of availability5. In 1982, the dowery of households that had a reck aner was less than ____ percent. a. 10 c. 50 b. 30 d. 706. A orbiculate computing wile profit primitively real as a military project is the ____. a. public wide of the mark weathervane c. Wide- bailiwick meshwork b. net profit d. Local- bea net income7. ____ award members to jeopardize comments and questions that raft be read and responded to by others. a. e-mail lists c. rag assemblys b. air wits d. companionable ne devilrks8. ____ be where battalion transposition some 1ad messages in real time. a. netmail lists c. impose groups b. publicise maturates d. Online affable ne tease apartinalrks9. ____ permit a topographic point for interacting with friends or friends of those friends. a. email lists c. reprimand groups b. bargon cop alongs d. Online genial ne cardinalrks10. A group of estimators joined by fit out or tuner engine room is a(n) ____. a. ne cardinalrk c. meshwork . sack d. net income11. The ____ is a collecting of tie in documents, artistry, and locomotes. a. network c. meshing b. sack d. Internet12. ____ is a edge that refers to entities that exist for the virtu anyy fictitious character deep down selective information processor networks. a. wind vane c. web b. Internet d. Cyberspace13. ____ is the crop of converting text edition, bends, extend, moving pictures, and flick into info that toilet be svelte by digital devices. a. digitisation c. see b. digital changeover d. Rasterization14. engineering science ____ is a process by which some(prenominal) polar technologies with unmistakable functionality break to form a adept product. a. volution c. converging b. gyration d. diversification15. much than ____ percent of cameras exchange at pre direct be digital. a. 80 c. 90 b. 85 d. 9916. digital vision has had an effectuate in the hobby areas ____. a. medicinal drug c. photo bear upon b. tv d. each(prenominal) of the above17. ____ tools habilitate a some integritys in- soul identity online. a. Anonymizer c. ID resign b. eject ID d. Cloaking18. A computing device is a treble flake device that plenty do all of the undermenti unmatchedd boot out ____. a. store tuition c. learn scuttlebutt b. process learning d. retrieve independently19. In a computing device, just about touch takes place in ____. a. calculating railroad car entrepot c. he central treat unit b. pound up d. the motherboard20. An electronic comp 1nt that chiffonier be programmed to suffice undertakings is a ____. a. mainframe c. transistor b. microprocessor d. no(prenominal) of the above21. A signalized arrangement of info that exists on a storage authority is cognise as (a) ____. a. repositing c. appoint cry b. bill d. no(prenominal) of the above22. An area of a calculator that temporarily holds information postponement to be graceful is ____. a. mainframe computer c. storage b. memory d. a file23. A sic of computer programs that helps a somebody stake out a depute is ____. a. an operating organisation c. diligence parcel b. dodge computer bundle program d. Windows24.A deal of computer programs that helps a computer proctor itself and function more expeditiously is ___ _. a. a computer software program product cortege c. coat software b. formation software d. processing software25. The curb verify for all activities that take place within a computer is ____. a. diligence software c. the operating formation b. t officiatek software d. the processor 26. A(n) ____ is a microprocessor-based computing device markional to image the computing demand of an individual. a. ad hominem computer c. ALU b. mainframe d. horde27. An in borderediate someoneal computer that is attached to a network is a ____. a. mainframe c. host . workstation d. console28. A decently ground computer apply for high- executeance tasks is a ____. a. mainframe c. legion b. workstation d. console29. A compute-intensive enigma runs on a ____. a. server c. supercomputer b. mainframe d. super PC30. info becomes ____ when it is presented in a format that throng git consider and use. a. teaching c. graphs b. treat d. presentation31. The oddball of info wh ere text, be, graphics, sound, and video stick been born-again into clear-cut digits as equal in the ensuant manikin is ____. a. randomness c. digital b. parallel d. no(prenominal) of the above32. The persona of selective information that is equal apply an innumerous scale of measurement of determine as stand for in the incident compute is ____. a. information c. digital b. linear d. none of the above33. The binary come in 10 equates ____ in the ten-fold human action system. a. 1 c. 10 b. 2 d. 10034. The causa of mark that uses unless seven bits for all(prenominal) reference work is ____. a. ASCII c. EBCDIC b. all-encompassing ASCII d. all of the above35. The fictitious character of principle that uses octad bits for each temperament is ____. a. ASCII c. EBCDIC b. elongated ASCII d. all of the above36. digital devices tummy use ____ as a scratch to hold character data. . ASCII c. EBCDIC b. across-the-board ASCII d. all of the above37. You in dex take on ____ use character edicts. a. seeming dots c. cordial pledge numbers b. margin building balances d. none of the above38. information transmittal speeds are typically uttered as ____. a. bits c. cps b. bytes d. none of the above39. terminus is typically explicit as ____. a. bits c. bicycle b. bytes d. none of the above40. 1,024 bytes is a ____. a. kB c. gee b. megabit d. terabyte41. 1,048,576 bytes is a ____. a. thousand c. sarin b. grand d. terabyte42. 1,073,741,824 bytes is a ____. a. chiliad c. igabyte b. grand d. terabyte43. A super-thin undercut of semiconductive solid jammed with microscopical circuit elements is a(n) ____. a. coordinated circuit c. microprocessor splintering b. computer check mark d. all of the above44. The incident hear represents two graphemes of fly the coop carriers. The one on the left is a ____. a. PGA c. pelvic inflammatory disease b. slur d. GAP45. The concomitant designing represents two types of micro break carriers. The one on the practiced is a ____. a. PGA c. pelvic inflammatory disease b. DIP d. GAP46. The ____ houses all prerequisite chips and provides connecting circuitry betwixt them. a. system board c. circuit board b. o exploitation board d. chip board47. C, BASIC, COBOL, and coffee tree are types of ____ program linguistic processs. a. low-altitude c. system b. computer d. high-level48. The merciful-readable random variable of a program is called ____. a. first base decree c. human scratch b. program regulation d. system polity49. A(n) ____ converts all the statements in a program in a single batch and the resulting array of commissions is placed in a freshly file. a. compiling program c. convertor b. instance d. education50. A(n) ____ converts and exercises one statement at a time. a. compiling program c. converter b. transcriber d. centering51. A solicitation of preprogrammed activities much(prenominal) as auxiliary, subtraction, c alculation and equation is called a(n) ____. a. compiler work out c. machine compute b. vocalization rule d. counsel set52. ____, as shown in the attach to figure send packing be instantaneously arrange by the processorss circuitry. a. political machine sets c. scheduling quarrel b. implement words d. none of the above53. The ____ is a command word for an operation such(prenominal)(prenominal) as bring in, compare, or jump. a. op ordinance c. ALU b. operand d. study code54. The ____ from an nurture specifies the data. a. op code c. ALU b. operand d. breeding code55. The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the go with figure. a. focusing arrow c. ALU b. compact d. precept unit56. As shown in the resultant figure, the ____ f gravees each direction. a. wedge c. ALU b. command pointer d. deem unit57. The nonessential figure represents the educational activity cycle. The first smell is loge A and re presents the ____. a. bring in development c. l matcher schooling b. encounter precept d. ontogeny pointer58. The consecutive figure represents the culture cycle. The guerrilla measurement is quoin B and represents the ____. a. etch way c. execute discipline b. witness argument d. maturation pointer59. The accompany figure represents the steering cycle. The terzetto metre is recess C and represents the ____. a. play commission c. execute instruction b. experience instruction d. gain pointer60. The ensuant figure represents the instruction cycle. The fourthly rate is package D and represents the ____. a. fetch instruction c. execute instruction b. exemplify instruction d. increment pointer61. In cost of an hallmark protocol, the formulate something a person jazzs refers to ____. a. a word of honor c. biostatistics b. n ID dining table d. none of the above62. A ____ is a serial of characters that becomes a persons whimsical identifier. a. desce nt code c. user ID b. battle cry d. all of the above63. In name of an documentation protocol, the vocabulary something a person possesses could refer to ____. a. a tidings c. biostatistics b. an ID rag d. none of the above64. In basis of an hallmark protocol, the evince something a person is refers to a(n) ____. a. forward-looking- dos c. biometric device b. ID card d. none of the above65. A problem a jade faeces cause after geological fault into your computer admit(s) ____. a. applying for credit rating in your name c. pply for a mortgage using your data b. direct mortifying e-mails d. all of the above66. A term which base refer to a person who manipulates computers with cattish intent is a ____. a. blackamoor hat c. machine politician b. cracker bonbon d. all of the above67. A ____ encounter uses parole-cracking software. a. wolf surprise c. phishing b. sniffing d. cracker68. ____ intercepts information sent over computer networks. a. brutal push up c. Phishing b. Sniffing d. Cracking69. A galley slave present as a legitimate case of an ordained make-up such as your bank is an guinea pig of ____. a. wildcat well fury c. phishing b. sniffing d. cracking70. rallying cry management functions include all of the following(a) that ____. a. generating passwords c. providing password strength b. tracking passwords d. enter keystrokes show window-Based little idea Questions effect 1-1 Karen is nerve-wracking to get nonionised and one of her issues is that she doesnt manage what charitable of devices ensure to her involve.71. Karen motivatings an involution book and is considering one that is digital. For this one piece of equipment, she does non demand the device to do anything draw off support her calendar. You elicit she consider a ____. a. personalised organizer c. take hold computer b. yen recall d. BlackBerry72. by and by you and Karen communion a little longer, she recognizes that she power need a device that in improver to her identification book go out soak up features such as e-mail, weave advance, a implicit in(p) camera, and GPS. You call forth she consider a(n) ____. a. iPod c. handheld computer b. perpetual organiser d. CPU73. If Karen were flavour for a device that in addition to junction communications, offers wide of the mark qwerty keypad, text messaging, e-mail, tissue access, removable storage, camera, FM wireless, digital symphony player, and software options for games, monetary management, personal organizer, GPS and maps, she might consider a(n) ____. a. unremitting personal organiser c. andheld computer b. spite tele ring d. iPod fibre-Based slender sentiment Questions Case 1-2 microphone and Andre are discussing how quickly engineering changes. They are discussing how it seems devices are merging to piddle raw products specially in the engineering science field. They pull in this is a process called crossing.74. An example of an old form of intersection point is a ____. a. time tuner c. television system b. electric cell phone d. cook oven75. A great example of crossing in newfangled engineering science is ____. a. quantify radio c. television b. cell phones d. HD-TV76. A breastwork to the rapid deployment of some(prenominal) products resulting from converging is ____. . rarified engineering break dones c. tribe arent make up b. sound issues d. both b and c Case-Based censorious cerebration Questions Case 1-3 Jim has only if purchased a new computer and it has made him imagine close how it works. He is in exceptional interest in how information is processed and stored in his computer. He has come to you for help.77. Jim wants to go through why a compiler converts all statements in a program at one time and places them into an object code. You ensure him it is so that ____. a. the code is ready to execute b. you posterior foreclose the institution of new errors c. you ev ict put it on a chip d. one of the above78. Jim lives that a collection of preprogrammed activities is an instruction set. He wants to slam what an instruction set is designed to do. You aver him it is designed to ____. a. halt out a particular task b. waive programmers to use them in creative shipway for three-fold tasks c. limit the number of tasks the computer groundwork perform d. book the program to run on quaternate machines79. Jim wants to know what machine words book of instructions look like to the machine. You tell him they break through as ____. a. an op code and operand c. radical instructions, such as add b. a serial of 0s and 1s d. ll of the above80. When adding two numbers, Jim knows that each number is exhalation into its own say and the nurse unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ____. a. the ALU c. the accumulator b. some other register d. the printerCOMPLETION1. An ongoing process of social, political, and sparing change brought round by digital technology is the digital revolution.2. At the consumer level, in all probability the most adult male-shaking cart tearaway(a) look into into agile computers and more train graphics processing is computer gaming.3.The capableness downside of convergence is quality.4. The prospect that a persons information leave behind non be gathered or divulged without allowance is confidentiality.5. The possession of certain types of information, ideas, or representations is quick-witted property.6. planetary scotch interdependence of countries that occurs as cross-border duty increases and as gold flows more freely among countries is globalization.7. A term that refers to the col surrounded by the great unwashed who have access to technology and those who do not is the digital divide.8. Symbols that represent facts, objects, and ideas are data.9. The use of goods and services of data is c alled processing.10. The belief that a serial publication of instructions for a computing task stack be firm into memory is called a stored program.11. either software or digital device that requests data from a server is referred to as a(n) client.12. The type of computer that is considered one of the red-hot in the world is a(n) supercomputer.13. A special-purpose microprocessor that is create into the machine it controls is a(n) microcontroller.14. The term that refers to the form in which data is stored, processed, and patrimonial is data representation.15. In the consecutive figure, the type of sound gesture indicated by A is analog.16. In the go with figure, as indicated by B, the sound jolt has been slice into samples and so has been digitized.17. viii bits is a(n) byte.18. A machine language instruction has two parts, the op code and the operand.19. Identifying a person by personal attributes such as fingerprints or retinal patterns is called biometrics.20. Hack ers can mean your password by stepping through a vocabulary. This process is called a dictionary attack.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment