TRUE/FALSE
1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without
understanding the technical details of how a computer works.
2. Computer literacy is the knowing about and understanding computers and their uses.
3. A computer does not always do whatever the instructions, or program, tell it to do.
4. Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of
information.
5. The slide rule is considered by many to be the earliest recorded calculating device.
6. Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
ANS: T PTS: 1 REF: 14
7. The external hardware components are located inside the main box or system unit of the computer.
ANS: F PTS: 1 REF: 14
8. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash
memory cards.
ANS: T PTS: 1 REF: 15
9. To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a
prompt for the user to decide the next course of action.
ANS: F PTS: 1 REF: 16
10. There are application programs that help users write their own programs using a programming language.
ANS: T PTS: 1 REF: 17
11. In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
ANS: F PTS: 1 REF: 17
12. Systems analysts design computer systems to be used within their companies.
ANS: T PTS: 1 REF: 18
13. The accompanying figure shows a notebook computer.
ANS: F PTS: 1 REF: 23
14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.
15. Tablet PCs can use either a slate or a convertible tablet PC design.
16. A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
ANS: T PTS: 1 REF: 26
17. Many networks use a network server to manage the data flowing through the network devices and the resources on a network.
ANS: T PTS: 1 REF: 27
18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a Web browser to view
Web pages.
ANS: F PTS: 1 REF: 33
19. Most browsers maintain a History list, which is a record of all Web pages visited in the last few weeks.
ANS: T PTS: 1 REF: 34
20. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers
over a network—usually the Internet.
ANS: F PTS: 1 REF: 34
MODIFIED TRUE/FALSE
1. Wireless networking has added to the convenience of home computing, allowing the use of computers in places other than
traditional locations, such as a home office. _________________________
ANS: T PTS: 1 REF: 7
2. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data,
presents the results, and can store the data or results as needed. _________________________
ANS: F, computer
PTS: 1 REF: 10
3. A user inputs data into a computer, and then the computer processes it. _________________________
ANS: T PTS: 1 REF: 11
4. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read
slide rules. _________________________
ANS: F
punched cards
punch cards
PTS: 1 REF: 12
5. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and magnetic
disks and optical discs for storage. _________________________
ANS: T PTS: 1 REF: 14
6. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to launch programs.
_________________________
ANS: T PTS: 1 REF: 17
7. Computer programmers, or end users, are the people who use a computer to obtain information.
_________________________
ANS: F, Computer users
PTS: 1 REF: 17
8. Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors,
which are used to connect a computer to a computer network. _________________________
ANS: F, adapters
PTS: 1 REF: 16
9. Multiple computing typically refers to accessing Web-based applications and data using a personal computer, mobile phone,
or any other Internet-enabled device. _________________________
ANS: F
Grid computing
Cloud computing
PTS: 1 REF: 19
10. The Web is the largest and most well-known computer network in the world. _________________________
ANS: F, Internet
PTS: 1 REF: 27
11. IP addresses and their corresponding domain names are used to identify computers available through the Internet.
_________________________
ANS: T PTS: 1 REF: 30
12. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that
will be handling that person’s e-mail (called a mail server). _________________________
ANS: T PTS: 1 REF: 31
13. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security
numbers or other information needed for identity theft. _________________________
ANS: F, phishing
PTS: 1 REF: 37
14. A(n) acronym is an online world that users can explore. _________________________
ANS: F, virtual world
PTS: 1 REF: 39
15. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of
communications today. _________________________
ANS: F, by the way
PTS: 1 REF: 38
ANS: A PTS: 1 REF: 34
30. With ____, e-mail messages stay on the mail server and are viewed using a Web browser.
a. Internet-based e-mail c. Web-com
b. Web-based e-mail d. program-based e-mail
ANS: B PTS: 1 REF: 35
31. One growing security problem is ____—in which someone else uses your identity, typically to purchase goods or services.
a. identity duplication c. identity theft
b. domain theft d. phishing
ANS: C PTS: 1 REF: 37
32. ____ is an etiquette for guiding online behavior.
a. Net rules c. Internet Rules
b. Web etiquette d. Netiquette
ANS: D PTS: 1 REF: 38
33. ____ refers to typing your entire e-mail message or discussion group post using only capital letters.
a. Spamming c. Calling
b. Phishing d. Shouting
ANS: D PTS: 1 REF: 38
34. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.
a. Spams c. Emoticons
b. Phishes d. Trojan horses
ANS: C PTS: 1 REF: 38
35. There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
a. Spammer c. Phisher
b. Snopes d. Identifier
ANS: B PTS: 1 REF: 39
Case-Based Critical Thinking Questions
Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her
client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.
36. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at
her office. What type of storage device should she use?
a. data projector c. scanner
b. firewire port d. USB flash drive
ANS: D PTS: 1 REF: 15 TOP: Critical Thinking
37. Sarah needs to prepare a simple Web page for her business. What type of application program should she use?
a. spreadsheet c. scripting language
b. word processing d. BASIC
ANS: C PTS: 1 REF: 17 TOP: Critical Thinking
38. What kind of computer would most likely fit Sarah’s needs?
a. midrange server c. notebook
b. embedded d. docking station
ANS: C PTS: 1 REF: 23 TOP: Critical Thinking
Case-Based Critical Thinking Questions
Case 1-2
Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of
the typical systems and applications software that people use. He has always enjoyed working closely with people and has a
good facility for explaining how technical systems work.
39. Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most
likely suggest that Jamie take in college?
a. systems analysis c. computer literacy
b. history of computing d. Java
ANS: D PTS: 1 REF: 17 TOP: Critical Thinking
40. What type of computer-related job would Jamie probably enjoy the most?
a. hardware designer c. systems analyst
b. computer operations personnel d. end user
ANS: B PTS: 1 REF: 18 TOP: Critical Thinking
COMPLETION
1. Computers and traditional devices we use everyday have begun to ____________________ into single units with multiple
capabilities.
ANS: converge
PTS: 1 REF: 6
2. ____________________ are regular appliances with some type of built-in computer technology.
ANS: Smart appliances
PTS: 1 REF: 7
3. ____________________ is a common alternative to traditional classroom learning that allows students to participate from
their current location, instead of physically going to the educational institution.
ANS: Distance learning
PTS: 1 REF: 7-8
4. An emerging payment option is the use of ____________________ systems—systems that allow individuals to pay for
products and services via a mobile phone or other portable device.
ANS: m-commerce
PTS: 1 REF: 10
5. Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries,
and ticketing systems.
ANS: kiosks
PTS: 1 REF: 9
6. The ____________________ being used with a computer determine the tasks the computer is able to perform.
ANS:
programs
software
PTS: 1 REF: 10
7. The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the
information processing cycle.
ANS: IPOS
PTS: 1 REF: 11
8. ____________________—technically an input or output operation, depending on which direction the information is going—
is increasingly considered the fifth primary computer operation.
ANS: Communications
PTS: 1 REF: 11
9. The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great
deal of electricity, and generated a lot of heat.
ANS:
vacuum tubes
glass tubes
tubes
PTS: 1 REF: 12
10. One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think,
reason, and learn.
ANS: artificial intelligence
PTS: 1 REF: 14
11. The physical parts of a computer are collectively referred to as ____________________.
ANS: hardware
PTS: 1 REF: 14
12. HTML is called a(n) ____________________ or scripting language.
ANS: markup
PTS: 1 REF: 17
13. ____________________ are computer professionals whose primary job responsibility is to write the programs that computers
use.
ANS: Programmers
PTS: 1 REF: 18
14. Some midrange servers consist of a collection of individual ____________________ called blades.
ANS: circuit boards
PTS: 1 REF: 25
15. Typically, individual users connect to the Internet by connecting to computers belonging to a(n) ____________________.
ANS:
ISP
Internet service provider
Internet service provider (ISP)
ISP (Internet service provider)
PTS: 1 REF: 27
16. ISP computers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of
the major high-speed networks within a country, called a(n) ____________________.
ANS: backbone network
PTS: 1 REF: 27
17. The World Wide Web refers to one resource—a collection of documents called ____________________—available through
the Internet.
ANS: Web pages
PTS: 1 REF: 28
18. One of the most common online security risks today is your PC becoming infected with (a) ____________________.
ANS:
virus
computer virus
malware program
PTS: 1 REF: 37
19. By their very nature, online communications lend themselves to ____________________. Since recipients usually do not
hear senders’ voices or see their handwriting, it is difficult to know for sure who the sender is.
ANS: anonymity
PTS: 1 REF: 39
20. A(n)____________________ would be used for applications that require extraordinary speed, accuracy, and processing
capabilities—for example, sending astronauts into space, controlling missile guidance systems and satellites, forecasting the
weather, exploring for oil, and assisting with some kinds of scientific research.
ANS: supercomputer
PTS: 1 REF: 26
ESSAY
1. Discuss the role of computers on the job.
ANS:
Although computers have been used on the job for years, their role is continually evolving. Computers were originally used
as research tools for computer experts and scientists and then as productivity tools for office workers. Today, computers are
used by all types of employees in all types of businesses—including corporate executives, retail store clerks, traveling sales
professionals, artists and musicians, engineers, police officers, insurance adjusters, delivery workers, doctors and nurses, auto
mechanics and repair personnel, and professional athletes.