Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Kunjaw Ptki Lengkap

Download as pdf or txt
Download as pdf or txt
You are on page 1of 88

1.

The ____________ was developed as a substitute for the vacuum tube


in 1948.

Your Answer: transistor

Correct. The transistor was developed as a substitute for the vacuum


tube in 1948.

2. A(n) ____________ is a microprocessor used as a component of a larger


system.

Your Answer: server


Correct Answer: embedded system

Refer to Embedded Systems

3. A personal computer designed to sit on a table for extended periods of


time is a ____________.

Your Answer: desktop computer

Correct. A personal computer designed to sit on a table for extended


periods of time is a desktop computer.

4. ____________ are superpowerful computers constructed out of


thousands of microprocessors.

Your Answer: Mainframe computers


Correct Answer: Supercomputers

Refer to Mainframes and Supercomputers

5. The most significant breakthrough in Internet software was the


development of the ___________.

Your Answer: ARPANET


Correct Answer: World Wide Web

Refer to Computer Connections: The Internet Revolution


6. The time period when most people earn their living working with words,
numbers, and ideas is called the ____________.

Your Answer: agricultural age


Correct Answer: information age

7. ____________ are applications stored on the Web, providing access


through multiple computers with Internet access.

Your Answer: Web applications

Correct. Web applications are applications stored on the Web, providing


access through multiple computers with Internet access.

8. External drives, keyboards, printers, scanners, and monitors are all


examples of ____________.

Your Answer: embedded systems


Correct Answer: peripherals

Refer to Personal Computers and Workstations

9. A computer that gives other computers connected to the network access


to data, programs, or other resources is called a(n) ____________.

Your Answer: embedded system


Correct Answer: server

Refer to Servers

10. Which of the following is the timeline for the creation of the World Wide
Web (WWW) and the Internet?

Your Answer: The Internet was created in the 1960s, and the WWW
was created in the 1990s.

Correct. The Internet was created in the 1960s, and the WWW was
created in the 1990s.

11. Which of the following is a type of silicon chip?

Your Answer: Integrated circuit

Correct. An integrated circuit is a type of silicon chip.


12. Before microcomputers (PCs) became the norm, most information
processing took place on which type of computer?

Your Answer: PDA


Correct Answer: Mainframe

Refer to Mainframes and Supercomputers

13. A personal computer designed with portability in mind is called a


____________.

Your Answer: personal data assistant


Correct Answer: laptop computer

Refer to Personal Computers and Workstations

14. Two examples of Web 2.0 sites are ___________.

Your Answer: Facebook and MySpace

Correct. Two examples of Web 2.0 sites are Facebook and MySpace.

15. A change in thinking that results in a new way of seeing the world is a
paradigm shift.

Your Answer: True

Correct. A change in thinking that results in a new way of seeing the


world is a paradigm shift.

16. In the industrial age, most people work in jobs that require working with
words, numbers, and ideas instead of planting corn or making shoes.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Into the Information Age

17. A branch of computer science that explores the use of computers in


tasks requiring intelligence, imagination, and insight is called computer
intelligence.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Applications: Digital Technology in Action

18. The difference between the information technology "haves" and "have
nots" is called the digital divide.

Your Answer: True

Correct. The difference between the information technology "haves" and


"have nots" is called the digital divide.

19. Moore's law states that computer power doubles every 18 months.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Computers in Perspective

20. The first microprocessor was a single silicon chip that contained all of a
computer's computational components.

Your Answer: True

Correct. The first microprocessor was a single silicon chip that contained
all of a computer's computational components.

21. Match the following terms with the correct definition.

Option Your Answer: Correct Answer: Comments

21.1 Embedded A. Provides C. A Incorrect. A


system software, data, microprocessor server provides
and other used as a software, data,
resources to component of a and other
other computers larger system resources to
over a network other computers
over a network.

21.2 Smart B. A computer E. Combines the Incorrect. A


phone that uses a functions of a mainframe is a
technique, called phone, a camera, computer that
timeshare, to a PDA, a game uses a
communicate machine, and a technique, called
with several users music/video timeshare, to
simultaneously. player with communicate
Internet with several
connectivity users
simultaneously.
21.3 Laptop C. A F. A portable Incorrect. An
computer microprocessor personal embedded
used as a computer system is a
component of a microprocessor
larger system used as a
component of a
larger system.

21.4 Peripheral D. An additional D. An additional Correct!


device, such as a device, such as a
keyboard, mouse, keyboard, mouse,
or monitor that is or monitor that is
usually attached usually attached
to a computer to a computer
using cables using cables

21.5 Server E. Combines the A. Provides Incorrect. A


functions of a software, data, smart phone
phone, a camera, and other combines the
a PDA, a game resources to functions of a
machine, and a other computers phone, a
music/video over a network camera, a PDA,
player with a game
Internet machine, and a
connectivity music/video
player with
Internet
connectivity.

21.6 Mainframe F. A portable B. A computer Incorrect. A


personal that uses a laptop computer
computer technique, called is a portable
timeshare, to personal
communicate computer.
with several users
simultaneously.

Some of the terms are matched incorrectly.


BAB 2

1. A gigabyte (GB) is equal to approximately ____________.

Your Answer: 1,000 terabytes (TB)


Correct Answer: 1,000 megabytes (MB)

Refer to Bits, Bytes, and Buzzwords

2. The ____________ is the circuit board that contains a computer's CPU.

Your Answer: microprocessor


Correct Answer: motherboard

Refer to The CPU: The Real Computer

3. Computer memory that stores programs and data that needs to be


instantly accessible to the CPU is called ____________.

Your Answer: read-only memory (ROM)


Correct Answer: random access memory (RAM)

Refer to What Computers Do

4. The most widely used code that represents each letter, digit, and special
character as a unique string of 8 bits is ____________.

Your Answer: Unicode


Correct Answer: ASCII

Refer to Bits as Codes

5. When software that is written for one processor works with another
processor, it is considered ____________.

Your Answer: standardized


Correct Answer: compatible

Refer to Compatibility

6. The processor's ____________ is the design that determines how the


components of the CPU are put and work together on the chip.

Your Answer: system


Correct Answer: architecture

Refer to Performance

7. Which of the following are common input devices?

Your Answer: Monitors and printers


Correct Answer: Keyboards and pointing devices

Refer to What Computers Do

8. A single chip that contains multiple cores that run simultaneously is a(n)
____________.

Your Answer: parallel processor


Correct Answer: multicore processor

Refer to Performance

9. The hardware component that executes the steps in a software program


and contains the circuitry to perform instructions is called the
____________.

Your Answer: arithmetic logic unit (ALU)


Correct Answer: central processing unit (CPU)

Refer to How It Works: The CPU

10. ____________ is used to store start-up instructions and other critical


information for all modern computers.

Your Answer: RAM


Correct Answer: ROM

Refer to The Computer's Memory

11. Because flash memory can keep its contents without a flow of electricity,
it is said to be ____________.

Your Answer: nonvolatile

Correct. Because flash memory can keep its contents without a flow of
electricity, it is said to be nonvolatile.
12. Which of the following is a special, low-energy type of RAM that can
store small amounts of data for a long time using battery power?

Your Answer: ALU


Correct Answer: CMOS

Refer to The Computer's Memory

13. For most computer memory, access time is measured in ____________.

Your Answer: megahertz


Correct Answer: nanoseconds

Refer to The Computer's Memory

14. PC cards and ExpressCards that can be inserted or removed from a


computer's slot without powering down the system are called
__________.

Your Answer: memory modules


Correct Answer: hot-swappable

Refer to Buses, Ports, and Peripherals

15. A petabyte is equivalent to 1,024 terabytes.

Your Answer: True

Correct. A petabyte is equivalent to 1,024 terabytes.

16. The most widely used computer code, ASCII, supports Japanese and
Arabic.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Bits as Codes

17. The ALU translates an instruction into a form that can be read by the
CPU.

Your Answer: True


Correct Answer: False

Incorrect. Refer to How It Works: The CPU

18. One gigahertz (GHz) equals one clock cycle per second.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Performance

19. Computers perform five basic functions: receive input, process


information, produce output, store information, and create new products.

Your Answer: True


Correct Answer: False

Incorrect. Refer to What Computers Do

20. The more modern language coding scheme that supports over 100,000
unique characters, including Chinese, Greek, and Japanese is known as
Unicode.

Your Answer: True

Correct. The more modern language coding scheme that supports over
100,000 unique characters, including Chinese, Greek, and Japanese is
known as Unicode.

21. Match each of the following terms to the correct definition.

Option Your Answer: Correct Answer: Comments

21.1 DIMM A. Memory that F. Circuit board for Incorrect. ROM is


contains a RAM chips memory that
computer's start- contains a
up instructions computer's start-
up instructions.

21.2 CMOS A. Memory that B. Stores the Incorrect. ROM is


contains a computer's date, memory that
computer's start- time, and calendar contains a
up instructions computer's start-
up instructions.

21.3 ROM A. Memory that A. Memory that Correct!


contains a contains a
computer's start- computer's start-up
up instructions instructions

21.4 RAM A. Memory that D. Volatile computer Incorrect. ROM is


contains a memory memory that
computer's start- contains a
up instructions computer's start-
up instructions.

21.5 Bay A. Memory that C. Open areas in the Incorrect. ROM is


contains a system box for disk memory that
computer's start- drives and other contains a
up instructions devices computer's start-
up instructions.

21.6 Cache A. Memory that E. Small memory Incorrect. ROM is


contains a space used by the memory that
computer's start- CPU to eliminate contains a
up instructions bottlenecks in computer's start-
processing up instructions.

Some of the terms are matched incorrectly.


BAB 3

1. Evidence suggests that typing on a standard keyboard, which forces you to


hold your arms and wrists at unnatural angles, may lead to ____________.

Your Answer: keyboard fatigue


Correct Answer: repetitive-stress injuries

Refer to The Keyboard

2. A ____________, a small flat panel that is sensitive to light pressure, is


sometimes used instead of a mouse.

Your Answer: wireless mouse


Correct Answer: touchpad

Refer to Pointing Devices

3. A _____________ input device allows multi-finger or multi-hand gestures


to accomplish complex tasks more quickly.

Your Answer: Bluetooth mouse


Correct Answer: multi-touch

Refer to Multi-Touch Input Devices

4. A device that uses reflected light to determine the location of pencil marks
on a standardized test answer sheet or other similar form is a(n)
_____________.

Your Answer: point-of-sale terminal


Correct Answer: optical mark reader

Refer to Reading Tools

5. A ____________ captures snapshots of the real world and saves them as


bit patterns on flash memory cards.

Your Answer: webcam


Correct Answer: digital camera

Refer to Digitizing Devices and Sensors


6. A type of software that converts voice data into words that can be edited
and printed is called ____________ software.

Your Answer: speech recognition

Correct. A type of software that converts voice data into words that can be
edited and printed is called speech recognition software.

7. A(n) ____________ converts a computer's internal bit patterns into a form


that humans can understand.

Your Answer: sensor device


Correct Answer: output device

Refer to Output: From Pulses to People

8. Images on a computer screen are made up of tiny dots called


____________.

Your Answer: speckles


Correct Answer: pixels

Refer to Screen Output

9. A hard copy of the image on the monitor can be produced by a


____________.

Your Answer: printer

Correct. A hard copy of the image on the monitor can be produced by a


printer.

10. ____________ that contain both microphones and earphones can be used
for telephone and teleconferencing applications.

Your Answer: Audio jacks


Correct Answer: Headsets

Refer to Output You Can Hear

11. A common storage device on mainframe computers and some PCs that
writes data onto and reads data off of a magnetically coated ribbon of tape
is a(n) ____________.

Your Answer: floppy drive


Correct Answer: tape drive

Refer to Magnetic Tape

12. A(n) _____________ uses laser beams to read and write bits of data on a
reflective aluminum layer of the disc.

Your Answer: optical disc drive

Correct. An optical disc drive uses laser beams to read and write bits of
data on a reflective aluminum layer of the disc.

13. A science that studies people at work and designs work environments that
enable people to interact efficiently and safely with things is called
____________.

Your Answer: ergonomics

Correct. A science that studies people at work and designs work


environments that enable people to interact efficiently and safely with
things is called ergonomics.

14. ____________ drives can read and write data on Blu-ray discs, DVDs, and
CDs.

Your Answer: BD-RW

Correct. BD-RW drives can read and write data on Blu-ray discs, DVDs, and
CDs.

15. Speech recognition technology can assist someone who cannot use their
hands for computer inputting.

Your Answer: True

Correct. Speech recognition technology can assist someone who cannot use
their hands for computer inputting.

16. When using a graphics tablet, a stylus is NOT a good choice for a pointing
device.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Pointing Devices


17. Nearly all new monitors use flat-panel LED display technology.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Screen Output

18. The USB (universal serial bus) is an example of a legacy port.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Ports and Slots Revisited

19. Solid-state storage devices are rewritable memory devices with no moving
parts.

Your Answer: True

Correct. Solid-state storage devices are rewritable memory devices with no


moving parts.

20. Three technological trends that are changing the way people think about
and use computer peripherals are wireless technology, computer networks,
and the Internet "cloud."

Your Answer: True

Correct. Three technological trends that are changing the way people think
about and use computer peripherals are wireless technology, computer
networks, and the Internet "cloud."

21. Match the following terms to the correct definitions.

Option Your Correct Answer: Comments


Answer:

21.1 Serial port A. Allows A. Allows data to be Correct!


data to be sent and received one
sent and bit at a time
received one
bit at a
time

21.2 Parallel A. Allows F. Used to attach Incorrect. A


port data to be printers that send and serial port allows
sent and receive bits in data to be sent
received one groups and received one
bit at a bit at a time.
time

21.3 Legacy A. Allows B. A slow port not Incorrect. A


port data to be generally used on PCs serial port allows
sent and anymore data to be sent
received one and received one
bit at a bit at a time.
time

21.4 Interface A. Allows D. Allow devices Incorrect. A


standards data to be produced by one serial port allows
sent and manufacturer to data to be sent
received one attach to systems and received one
bit at a made by another bit at a time.
time manufacturer

21.5 USB port A. Allows C. Today's PCs and Incorrect. A


data to be Macs include one or serial port allows
sent and more of these; allows data to be sent
received one data transfer rates of and received one
bit at a up to 480 Mbps bit at a time.
time

21.6 FireWire A. Allows E. High-speed Incorrect. A


port data to be connection ideal for serial port allows
sent and data intensive data to be sent
received one applications and received one
bit at a bit at a time.
time

Some of the terms are matched incorrectly.


Bab 4
1. ____________ software cannot be legally copied or
distributed to others.

Your Answer: Open-source


Correct Answer: Copyrighted

Refer to Licensing

2. The best known example of open-source software is


____________.

Your Answer: Linux

Correct. The best known example of open-source


software is Linux.

3. A computer language that uses numeric codes to


represent the most basic computer operations is
called native ____________.

Your Answer: machine language

Correct. A computer language that uses numeric


codes to represent the most basic computer
operations is called native machine language.

4. A ______________ translates programs from a


high-level computer language, such as C#, into
machine language.

Your Answer: compiler

Correct. A compiler translates programs from a


high-level computer language, such as C#, into
machine language.

5. ___________, usually provided either on a disc or


on a Web site, includes instructions for installing and
using the software.

Your Answer: Documentation

Correct. Documentation, usually provided either on


a disc or on a Web site, includes instructions for
installing and using the software.
6. A ____________ limits your right to install and use
the software on multiple computers, copy discs,
install software on hard drives, and transfer
information to other users.

Your Answer: copyright


Correct Answer: software license

Refer to Licensing

7. Software that is not copyrighted and is free for the


taking is called ____________.

Your Answer: productivity software


Correct Answer: public-domain software

Refer to Distribution

8. A ____________ is a collection of Web pages that


are interactive and collaborative documents that can
be edited by anyone.

Your Answer: wiki

Correct. A wiki is a collection of Web pages that are


interactive and collaborative documents that can be
edited by anyone.

9. A ____________ is a Web application that provides


services by combining data or functionality from two
or more external sources.

Your Answer: wiki


Correct Answer: mashup

Refer to Web Applications

10. ____________ on a multiuser system ensures that


users are who they claim to they are.

Your Answer: Authorization


Correct Answer: Authentication

Refer to What the Operating System Does


11. A program that does system maintenance and
repairs that the operating system does not
automatically handle is called a ____________.

Your Answer: system program


Correct Answer: utility program

Refer to Utility Programs and Device Drivers

12. Putting electronic marks on a disk, dividing it into a


series of concentric tracks, and dividing each track
into a collection of sectors is called ____________.

Your Answer: clustering


Correct Answer: formatting

Refer to Disk Formatting and Defragmentation

13. The results of intellectual activities in the arts,


science, and industry are called _____________.

Your Answer: trademark property


Correct Answer: intellectual property

Refer to Intellectual Property and the Law

14. The look and feel of the computing experience from


a human point of view is the ____________.

Your Answer: user interface

Correct. The look and feel of the computing


experience from a human point of view is the user
interface.

15. The unauthorized copying and selling of software is


called software piracy.

Your Answer: True

Correct. The unauthorized copying and selling of


software is called software piracy.
16. C:\Users\Course\chapter4.docx represents a
pathname.

Your Answer: True

Correct. C:\Users\Course\chapter4.docx represents


a pathname.

17. The primary purpose of intellectual property laws is


to encourage and reward innovation.

Your Answer: True

Correct. The primary purpose of intellectual property


laws is to encourage and reward innovation.

18. The affective computers being developed by MIT


and IBM will be able to read the user's mind.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Inventing the Future:


Tomorrow's User Interfaces 1: From WIMP to SILK

19. A fragmented file is a file that is saved to


noncontiguous clusters on a hard disk.

Your Answer: True

Correct. A fragmented file is a file that is saved to


noncontiguous clusters on a hard disk.

20. Dual tasking allows a computer to run several


programs at the same time.

Your Answer: True


Correct Answer: False

Incorrect. Refer to What the Operating System Does

21. Match the following terms to their definitions.


Option Your Correct Comment
Answer: Answer: s

21. Taskbar A. A user D. A feature Incorrect.


interface of Windows A menu-
1 that that driven
allows provides interface is
users to one-click a user
choose access to interface
command open that allows
s from applications users to
on-screen choose
lists commands
from on-
screen
lists.

21. MS-DOS A. A user B. The Incorrect.


interface standard A menu-
2 that operating driven
allows system on interface is
users to IBM- a user
choose compatible interface
command computers that allows
s from that used a users to
on-screen command- choose
lists line commands
interface from on-
screen
lists.

21. Command A. A user C. A user Incorrect.


-line interface interface A menu-
3 interface that that driven
allows requires the interface is
users to user to type a user
choose commands interface
command into the that allows
s from computer users to
on-screen choose
lists commands
from on-
screen
lists.

21. Character A. A user F. A user Incorrect.


-based interface interface A menu-
4 interface that based on driven
allows characters interface is
users to rather than a user
choose on interface
command graphics that allows
s from users to
on-screen choose
lists commands
from on-
screen
lists.

21. Graphical A. A user E. A user Incorrect.


user interface interfaced A menu-
5 that based on driven
interface allows windows, interface is
(GUI) users to icons, and a user
choose mouse- interface
command driven drop- that allows
s from down users to
on-screen menus choose
lists commands
from on-
screen
lists.

21. Menu- A. A user A. A user Correct!


driven interface interface
6 interface that that allows
allows users to
users to choose
choose commands
command from on-
s from screen
on-screen lists
lists

Some of the terms are matched incorrectly.


BAB 5

1. Which of the following is a flexible, portable, paper-like material that can


erase itself and display new text and images when a new page is
displayed?

Your Answer: E-paper

Correct. E-paper is a flexible, portable, paper-like material that can erase


itself and display new text and images when a new page is displayed.

2. ____________ is a capability that most of today's word processers have


that allows them to produce personalized form letters.

Your Answer: Mail merge

Correct. Mail merge is a capability that most of today's word processers


have that allows them to produce personalized form letters.

3. Documents that are used in the first step of the publishing process,
which can include articles, drawings, maps, or photos, are called
___________.

Your Answer: storyboard documents


Correct Answer: source documents

Refer to What Is Desktop Publishing?

4. A document publishing program that allows documents to be shared


across multiple platforms is called ____________.

Your Answer: Microsoft Word


Correct Answer: Adobe Acrobat

Refer to What Is Desktop Publishing?

5. A user can add words to Microsoft Word's dictionary using the


____________.

Your Answer: mail merge tool


Correct Answer: spelling checker tool

Refer to Spelling Checkers


6. ____________ fonts represent characters that can be increased or
decreased in size without distortion.

Your Answer: Unscalable


Correct Answer: Scalable

Refer to How It Works: Font Technology

7. Page-layout software allows desktop publishers to control the space


between a pair of letters by using ____________.

Your Answer: extension


Correct Answer: kerning

Refer to What Is Desktop Publishing?

8. A ____________ program makes short work of tasks that involve


repetitive calculations, such as budgeting, business projections, grade
books, checkbooks, and more.

Your Answer: desktop publishing


Correct Answer: spreadsheet

Refer to The Spreadsheet: Software for Simulation and Speculation

9. ____________ software is designed to turn continuous speech into


written text, which increases productivity while reducing the risk of
repetitive strain injuries.

Your Answer: Talkwriter


Correct Answer: Dictation

Refer to Processing Handwriting and Speech

10. ____________ software uses shape, location in space, color, brightness,


and motion to help scientists and mathematicians understand
relationships that are not apparent.

Your Answer: Simulation


Correct Answer: Scientific-visualization

Refer to Scientific Visualization


11. In a computer model, a set of concepts and ideas designed to mimic
some type of system is called a(n) ____________.

Your Answer: formula


Correct Answer: abstraction

Refer to Calculated Risks: Computer Modeling and Simulation

12. ____________ software helps professionals and students go beyond the


capabilities of spreadsheets to create, manipulate, and solve complex
equations.

Your Answer: Statistical-analysis


Correct Answer: Math-processing

Refer to Automatic Mathematics

13. ____________ is the science of collecting and analyzing data.

Your Answer: Statistics

Correct. Statistics is the science of collecting and analyzing data.

14. A ____________ chart is used to discover a relationship between two


variables.

Your Answer: bar


Correct Answer: scatter

Refer to Spreadsheet Graphics: From Digits to Drawings

15. GIGO is a term that means what you see on the screen is almost exactly
what you will see on the printed page.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Word Processing Tools and Techniques

16. Outlines and form letters can be produced using Microsoft Word
software.

Your Answer: True


Correct. Outlines and form letters can be produced using Microsoft Word
software.

17. The intersection of a row and a column in a spreadsheet is a cell.

Your Answer: True

Correct. The intersection of a row and a column in a spreadsheet is a


cell.

18. When creating a professional-looking document, you should avoid using


italics, boldface, all caps, underlines, and any other styles for emphasis.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Working Wisdom: Creating Professional-Looking


Documents

19. Desktop publishing saves companies money by allowing them to produce


brochures and other publications they need in-house.

Your Answer: True

Correct. Desktop publishing saves companies money by allowing them to


produce brochures and other publications they need in-house.

20. Pie charts show trends or relationships over time or the relative
distribution of one variable through another.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Spreadsheet Graphics: From Digits to Drawings

21. Match each computer software application with the correct definition.

Option Your Answer: Correct Comments


Answer:

21.1 Microsoft A. Word A. Word Correct!


Word processing processing
software software
21.2 Adobe A. Word B. Portable Incorrect. Microsoft
Acrobat processing document format Word is word
software software processing software.

21.3 Intuit A. Word C. Accounting Incorrect. Microsoft


Quicken processing software Word is word
software processing software.

21.4 Adobe B. Portable E. Desktop Incorrect. Adobe


InDesign document publishing Acrobat is portable
format software document format
software software.

21.5 Microsoft A. Word D. Spreadsheet Incorrect. Microsoft


Excel processing software Word is word
software processing software.

Some of the terms are matched incorrectly.


BAB 6

1. An image on a computer screen is made up of a matrix of ____________.

Your Answer: pixels

Correct. An image on a computer screen is made up of a matrix of pixels.

2. Cameras connected to a computer can transfer images directly to a


computer in ____________.

Your Answer: editing mode


Correct Answer: real time

Refer to Analog and Digital Video

3. A(n) ____________ image-editing program offers artists and editors the


ability to control textures, shading, and fine detail.

Your Answer: animation


Correct Answer: bitmapped

Refer to Drawing: Object-Oriented Graphics

4. ____________ software creates smaller files that are faster to transfer


over the Internet.

Your Answer: Bitmap


Correct Answer: Compression

Refer to Data Compression

5. Bitmapped graphics sometimes are called ____________.

Your Answer: digital graphics


Correct Answer: raster graphics

Refer to Painting: Bitmapped Graphics

6. Apple iPhoto, Google Picasa, and Adobe Lightroom are examples of


____________.

Your Answer: drawing software


Correct Answer: photo management software
Refer to Image Processing: Photographic Editing by Computer

7. Vector graphics also are referred to as ____________.

Your Answer: PDF images


Correct Answer: object-oriented graphics

Refer to Drawing: Object-Oriented Graphics

8. Predrawn images that users can legally cut and paste into their own
documents are called ____________.

Your Answer: graphic images


Correct Answer: clip art

Refer to Working Wisdom: Creating Smart Art

9. Computers are used to design three-dimensional products in a branch of


engineering known as ____________.

Your Answer: computer science


Correct Answer: computer-aided design (CAD)

Refer to CAD/CAM: Turning Pictures into Products

10. A ____________, a still picture drawn by artists, was used to develop


animation before computers.

Your Answer: vector


Correct Answer: frame

Refer to Animation: Graphics in Time

11. A ____________ converts analog videos and broadcasts to digital format.

Your Answer: video editor


Correct Answer: video digitizer

Refer to Analog and Digital Video


12. ____________ uses computer displays to add virtual information to a
person's sensory perceptions.

Your Answer: Augmented reality

Correct. Augmented reality uses computer displays to add virtual


information to a person's sensory perceptions.

13. ____________ creates an environment in which multiple remote users


can interact with each other and with computer-generated objects using
multiple cameras and high-speed networks.

Your Answer: Virtual reality


Correct Answer: Tele-immersion

Refer to Inventing the Future: Shared Virtual Spaces

14. ____________ allows the viewer/listener to control the information flow.

Your Answer: Reality multimedia


Correct Answer: Interactive multimedia

Refer to Interactive Multimedia: Eye, Ear, Hand, and Mind

15. Multimedia usually means using a combination of text, graphics,


animation, video, music, voice, and sound effects.

Your Answer: True

Correct. Multimedia usually means using a combination of text, graphics,


animation, video, music, voice and sound effects.

16. Tim Berners-Lee founded the World Wide Web Consortium (W3C).

Your Answer: False


Correct Answer: True

Incorrect. Refer to Tim Berners-Lee Weaves the Web for Everybody

17. PPI is the resolution of a screen, while DPI is the resolution on printed
documents.

Your Answer: True


Correct. PPI is the resolution of a screen, while DPI is the resolution on
printed documents.

18. CAD software is used by videographers to develop digital movies.

Your Answer: True


Correct Answer: False

Incorrect. Refer to CAD/CAM: Turning Pictures into Products

19. Digital photos created by digital cameras are bitmapped images.

Your Answer: True

Correct. Digital photos created by digital cameras are bitmapped images.

20. Gray-scale graphics use up to 256 different colors to render images on a


monitor.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Painting: Bitmapped Graphics

21. Match the following terms with the correct definition.

Option Your Answer: Correct Comments


Answer:

21.1 Animation A. Electronic E. Creating Incorrect. The


instrument that motion from still synthesizer is an
produces sounds images electronic
using instrument that
mathematical produces sounds
formulas using
mathematical
formulas.

21.2 Tweening B. The complete D. Using Incorrect. A


reworking of a software to help remix is the
song using fresh fill in the complete
instrumentation, movement of the reworking of a
rhythms, and objects in- song using fresh
audio samples between frames instrumentation,
of an animation rhythms, and
audio samples.

21.3 Podcast A. Electronic F. A radio-style Incorrect. The


instrument that program that synthesizer is an
produces sounds can be electronic
using downloaded to a instrument that
mathematical computer produces sounds
formulas using
mathematical
formulas.

21.4 Sampling A. Electronic C. The number Incorrect. The


rate instrument that of sound synthesizer is an
produces sounds "snapshots" the electronic
using recording instrument that
mathematical equipment takes produces sounds
formulas each second using
mathematical
formulas.

21.5 Synthesizer A. Electronic A. Electronic Correct!


instrument that instrument that
produces sounds produces sounds
using using
mathematical mathematical
formulas formulas

21.6 Remix A. Electronic B. The complete Incorrect. The


instrument that reworking of a synthesizer is an
produces sounds song using fresh electronic
using instrumentation, instrument that
mathematical rhythms, and produces sounds
formulas audio samples using
mathematical
formulas.

Some of the terms are matched incorrectly.


BAB 7

1. ____________ make it easier to store large amounts of information,


retrieve information quickly and flexibly, and organize and reorganize
information.

Your Answer: Tables


Correct Answer: Databases

Refer to What Good Is a Database?

2. A _____________ is a feature of databases that blurs the line between


application programs and development tools.

Your Answer: form


Correct Answer: stored query

Refer to Database Queries

3. _____________ is a standard language that allows users to query


databases without learning a new programming language.

Your Answer: Java


Correct Answer: SQL

Refer to Complex Queries

4. A ______________ program automates appointment calendar, to-do list,


and address/phone book functions.

Your Answer: graphical information system (GIS)


Correct Answer: personal information manager (PIM)

Refer to Personal Information Managers

5. A ____________ can manipulate data in a large collection of tables,


cross-referencing between tables as needed.

Your Answer: personal information manager


Correct Answer: database-management system

Refer to What Is a Database-Management System?


6. A ____________ is a field shared by all the tables that use data from a
table.

Your Answer: key field

Correct. A key field is a field shared by all the tables that use data from a
table.

7. A ___________ system enables users to access data stored on large


server systems using PCs or smart phones through a network or the
Internet.

Your Answer: data-mining


Correct Answer: client/server

Refer to Downsizing and Decentralizing

8. The discovery and extraction of hidden predictive information from large


databases is called ____________.

Your Answer: real-time processing


Correct Answer: data mining

Refer to Data Mining

9. A database that stores data in cubes rather than 2-D tables is a(n)
____________.

Your Answer: multidimensional database

Correct. A database that stores data in cubes rather than 2-D tables is a
multidimensional database.

10. ____________ eliminates dirty data to correct errors in a database.

Your Answer: Error deletion


Correct Answer: Data scrubbing

Refer to Maintaining Database Integrity

11. Fraudulent credit card charges, massive phone bills, threats from
collection agencies, and arrests are sometimes the result of
___________.

Your Answer: record matching


Correct Answer: identity theft

Refer to Personal Data: All about You

12. According to the U.S. Supreme Court, the right to privacy is implied by
which document?

Your Answer: The Children's Online Privacy Protection Act


Correct Answer: U.S. Constitution

Refer to Big Brother and Big Business

13. The ____________ regulates the use of government data in determining


eligibility for federal benefits.

Your Answer: 1988 Computer Matching and Privacy Protection Act

Correct. The 1988 Computer Matching and Privacy Protection Act


regulated the use of government data in determining eligibility for federal
benefits.

14. ____________ is the result of massive disk drives, inexpensive memory,


and sophisticated software that replaced batch processing for most
applications.

Your Answer: Real-time processing


Correct Answer: Interactive processing

Refer to Real-Time Computing

15. Privacy is usually referred to as an individual's right to have control over


confidential personal information.

Your Answer: True

Correct. Privacy is usually referred to as an individual's right to have


control over confidential personal information.

16. SQL is a full-featured programming language similar to Java or C#.

Your Answer: True


Correct Answer: False

Incorrect. Refer to How It Works: The Language of Database Queries


17. A media database can serve as an index to separately stored video and
audio files because they are too large to store in a database.

Your Answer: True

Correct. A media database can serve as an index to separately stored


video and audio files because they are too large to store in a database.

18. Privacy breaches may be innocent mistakes, strategic actions, or


malicious mischief, and may not always involve computers.

Your Answer: True

Correct. Privacy breaches may be innocent mistakes, strategic actions, or


malicious mischief, and may not always involve computers.

19. Databases are only useful for small quantities of information.

Your Answer: True


Correct Answer: False

Incorrect. Refer to What Good Is a Database?

20. A database table contains records made up of discrete chunks of


information called fields.

Your Answer: True

Correct. A database table contains records made up of discrete chunks of


information called fields.

21. Match the following terms to the correct definition.

Option Your Answer: Correct Answer: Comments

21.1 Table A. All the F. A collection of Incorrect. A record


information related contains all the
related to a information information related
person, product, to a person,
or event product, or event.

21.2 Field A. All the B. A discrete Incorrect. A record


information chunk of contains all the
related to a information in a information related
person, product, record to a person,
or event product, or event.
21.3 Record A. All the A. All the Correct!
information information
related to a related to a
person, product, person, product,
or event or event

21.4 Database A. All the D. A collection of Incorrect. A record


information related tables contains all the
related to a information related
person, product, to a person,
or event product, or event.

21.5 Form A. All the C. Shows one Incorrect. A record


view information record on the contains all the
related to a screen at a time information related
person, product, to a person,
or event product, or event.

21.6 Report A. All the E. Shows the Incorrect. A record


information selected fields and contains all the
related to a records in an information related
person, product, easy-to-read to a person,
or event format product, or event.

Some of the terms are matched incorrectly.


BAB 8

1. Which of the following is a network in which computers and peripherals


are located physically close together, often in the same building, and
does not include a radio transmitter?

Your Answer: PAN


Correct Answer: LAN

Refer to Networks Near and Far

2. In ___________, tiny radio transmitters in each node send and receive


data through the air.

Your Answer: personal area networks


Correct Answer: wireless networks

Refer to Networks Near and Far

3. Hardware devices or software programs that make it possible for


messages to pass from the originating computer's LAN through a chain
of intermediate networks to reach the LAN of the destination computer
are called ____________.

Your Answer: meshes


Correct Answer: routers

Refer to Networks Near and Far

4. ____________ carries traffic at speeds of 1 gigabit of data per second


when all the LAN devices are compatible with that speed.

Your Answer: Fast Ethernet


Correct Answer: Gigabit Ethernet

Refer to The Importance of Bandwidth

5. A significant delay between the time a message is sent and the time it is
received is called ____________.

Your Answer: dial-up


Correct Answer: latency

Refer to Linking In: Internet Connection Technologies


6. ____________ is not often used in networks due to distance and line-of-
sight limitations.

Your Answer: VPN


Correct Answer: Infrared wireless

Refer to Wireless Network Technology

7. A type of wireless technology named for a Danish king is ____________.

Your Answer: Bluetooth

Correct. A type of wireless technology named for a Danish king is


Bluetooth.

8. ____________ networks use the IP packet-switching technology used by


the Internet.

Your Answer: 4G

Correct. 4G networks use the IP packet-switching technology used by


the Internet.

9. A device that uses signals broadcast by three or four visible satellites to


determine its position is called a ____________.

Your Answer: 2G transceiver


Correct Answer: GPS receiver

Refer to Specialized Networks: From GPS to Digital Money

10. A ____________ accepts, prioritizes, and processes print jobs in a


client/server network.

Your Answer: print list


Correct Answer: print server

Refer to The Network Advantage

11. A ____________ is one or more computers shared between multiple


users and used as storehouses for software and data.

Your Answer: file server


A file server is one or more computers shared between multiple users
and used as storehouses for software and data.

12. SMTP, POP, and IMAP are protocols used by ____________.

Your Answer: Web bugs


Correct Answer: email programs

Refer to The Many Faces of Email

13. A ____________ is a piece of invisible code that notifies the sender


when an email message was opened and may report information to the
sender regarding the recipient's computer or email program.

Your Answer: VPN


Correct Answer: Web bug

Refer to The Many Faces of Email

14. Unsolicited, junk email messages are called ____________.

Your Answer: phish


Correct Answer: spam

Refer to Email Issues

15. Each device on a network, including printers, scanners, computers, and


drives, are called nodes.

Your Answer: True

Correct. Each device on a network, including printers, scanners,


computers, and drives, are called nodes.

16. A blog is an online journal that is usually published on a public Web site.

Your Answer: True

Correct. A blog is an online journal that is usually published on a public


Web site.

17. A forum provides real-time (synchronous) communication to users.


Your Answer: True
Correct Answer: False

Incorrect. Refer to Instant Messaging, Text Messaging, and


Teleconferencing: Real-Time Communication

18. Wi-Fi technology allows notebook computer users to access the Internet
at hotspots.

Your Answer: True

Correct. Wi-Fi technology allows notebook computer users to access the


Internet at hotspots.

19. Large organizations sometimes use a backbone network to connect its


WANs.

Your Answer: False

Correct. Large organizations sometimes use a backbone network to


connect its LANs.

20. Viral digital videos carry concealed computer viruses.

Your Answer: True


Correct Answer: False

Incorrect. Refer to The Network Advantage

21. Match the following terms and acronyms to the correct definitions.

Option Your Answer: Correct Answer: Comments

21.1 Firewall A. Software used A. Software used to Correct!


to block block unauthorized
unauthorized data transfers
data transfers

21.2 WiMAX A. Software used C. Provides Wi-Fi- Incorrect.


to block style access to a Software used to
unauthorized 25-square mile block
data transfers area, and supports unauthorized data
line-of-sight transfers is called
connections up to a firewall.
30 miles away

21.3 Hotspot B. Uses the D. A wireless access Incorrect. A VPN


Internet to point uses the Internet
provide secure to provide secure
access to an access to an
organization's organization's
network network.

21.4 VPN A. Software used B. Uses the Internet Incorrect.


to block to provide secure Software used to
unauthorized access to an block
data transfers organization's unauthorized data
network transfers is called
a firewall.

21.5 PAN B. Uses the E. A network that Incorrect. A VPN


Internet to allows linked uses the Internet
provide secure personal electronic to provide secure
access to an devices to access to an
organization's communicate with organization's
network each other network.

21.6 WEP A. Software used F. Provides Incorrect.


to block encryption for Software used to
unauthorized wireless networks block
data transfers unauthorized data
transfers is called
a firewall.

Some of the terms are matched incorrectly.


BAB 9

1. A ____________ is a software robot that explores the Web and retrieves


information about pages and indexes the information in a database.

Your Answer: spider

Correct. A spider is a software robot that explores the Web and retrieves
information about pages and indexes the information in a database.

2. A(n) ____________ makes it possible to add or update text, images, or


other Web site content without using HTML or a Web authoring program.

Your Answer: content-management system (CMS)

Correct. A content-management system (CMS) makes it possible to add


or update text, images, or other Web site content without using HTML or
a Web authoring program.

3. Adobe Dreamweaver, Microsoft Expression Web, and Apple's iWeb are


examples of ____________.

Your Answer: Web sites


Correct Answer: Web authoring software

Refer to Web Protocols and Web Publishing

4. Which of the following is NOT an example of a Web portal?

Your Answer: Froogle

Correct. Froogle is NOT an example of a Web portal.

5. Which protocol is used to upload and download files from file servers?

Your Answer: TCP/IP


Correct Answer: FTP

Refer to Internet Servers

6. ____________ files are sound files that begin to play before the file
completely downloads.

Your Answer: Streaming audio


Correct. Streaming audio files are sound files that begin to play before
the file completely downloads.

7. Which of the following is NOT an Internet programming language?

Your Answer: PHP


Correct Answer: FTP

Refer to Dynamic Web Programming Tools

8. The ____________ is decentralized and is growing too fast to track.

Your Answer: TCP protocol


Correct Answer: Internet

Refer to Counting Connections

9. A ____________ is a small portion of an Internet message that has all


the information routers need to transfer sections of information from
network to network toward the destination.

Your Answer: packet

Correct. A packet is a small portion of an Internet message that has all


the information routers need to transfer sections of information from
network to network toward the destination.

10. ____________ is the language of the Internet, which allows cross-


network communication between different types of computers and
networks.

Your Answer: VoIP


Correct Answer: TCP/IP

Refer to Internet Protocols

11. ____________ supports multicast, which solves the shortage-of-


addresses problem for IP addresses.

Your Answer: TCP/IP


Correct Answer: IPv6

Refer to Internet Protocols


12. Numerical IP addresses are mapped to domain names by the Internet's
____________.

Your Answer: online service


Correct Answer: domain name system (DNS)

Refer to Internet Addresses

13. A(n) ____________ stores applications and provides them to client


programs that request them.

Your Answer: file server


Correct Answer: application server

Refer to Internet Servers

14. The ____________ describes the separation of people who have easy
access to computers and the Internet from those who do not have
access.

Your Answer: digital divide

Correct. The digital divide describes the separation of people who have
easy access to computers and the Internet from those who do not have
access.

15. A uniform resource locator (URL) is made of a protocol, the address of


the host that contains the resource, and the path to the specific resource
on the host.

Your Answer: True

Correct. A uniform resource locator (URL) is made of a protocol, the


address of the host that contains the resource, and the path to the
specific resource on the host.

16. The World Wide Web is a distributed browsing and searching system
developed at MIT by Tim Berners-Lee.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Inside the Web


17. Facebook and Twitter are build-it-yourself Web 2.0 social networking
communities.

Your Answer: True

Correct. Facebook and Twitter are build-it-yourself Web 2.0 social


networking communities.

18. Filtering software keeps malware from invading your computer.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Freedom's Abuses

19. The Internet is controlled by a joint commission from the United States
and China.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Inside the Internet

20. Cyberspace describes a shared virtual reality, complete with sensations


such as sight and sound.

Your Answer: True

Correct. Cyberspace describes a shared virtual reality, complete with


sensations such as sight and sound.

21. Match the following terms to the correct definition.

Option Your Answer: Correct Comments


Answer:

21.1 Applet A. A markup C. Tiny Incorrect. XML is


language that application built a markup
represents the using Java language that
contextual represents the
meaning of contextual
data meaning of data.

21.2 Silverlight B. Small files E. Popular client- Incorrect.


deposited on a side tool used to Cookies are small
visitor's hard create interactive files deposited on
drive that track media-rich Web a visitor's hard
visits, activities, components drive that track
and preferences
visits, activities,
and preferences.

21.3 XML B. Small files A. A markup Incorrect.


deposited on a language that Cookies are small
visitor's hard represents the files deposited on
drive that track contextual a visitor's hard
visits, activities, meaning of data drive that track
and preferences visits, activities,
and preferences.

21.4 XHTML A. A markup D. A markup Incorrect. XML is


language that language that a markup
represents the combines language that
contextual features of HTML represents the
meaning of and XML contextual
data meaning of data.

21.5 Cookies A. A markup B. Small files Incorrect. XML is


language that deposited on a a markup
represents the visitor's hard language that
contextual drive that track represents the
meaning of visits, activities, contextual
data and preferences meaning of data.

21.6 Static Web A. A markup F. A site with Incorrect. XML is


site language that content that a markup
represents the seldom changes language that
contextual represents the
meaning of contextual
data meaning of data.

Some of the terms are matched incorrectly.


BAB 10

1. Which of the following is NOT a purpose of antivirus software?

Your Answer: Notify a user if a virus is found


Correct Answer: Copy the name of the virus and send it to Microsoft
for inspection

Refer to Malware Wars

2. A type of program that gathers user information and sends it to an


outside source through the Internet is called ___________.

Your Answer: spyware

Correct. A type of program that gathers user information and sends it to


an outside source through the Internet is called spyware.

3. Which type of software plugs potential security breaches in the operating


system or applications?

Your Answer: Spybot


Correct Answer: Security patches

Refer to Malware Wars

4. ____________ technology allows multiple hard disks to operate as a


single unit, providing the ability to keep copies of important data in
several locations.

Your Answer: RTF


Correct Answer: RAID

Refer to Backups and Other Precautions

5. An ID card with a photo that contains digitally encoded identification in a


built-in memory chip is called a(n) ____________.

Your Answer: access key


Correct Answer: smart card

Refer to Physical Access Restrictions


6. A complex system that assumes almost full responsibility for a task
without human input, verification, or decision making is called a(n)
____________.

Your Answer: audit-control system


Correct Answer: autonomous system

Refer to Autonomous Systems

7. A(n) ____________ is a secret numerical code that allows a message to


be transmitted or stored as an indecipherable garble of characters.

Your Answer: encryption key

Correct. An encryption key is a secret numerical code that allows a


message to be transmitted or stored as an indecipherable garble of
characters.

8. ____________ perform illegal hacks for political reasons, which they


consider to be for the greater public good.

Your Answer: Webjackers


Correct Answer: Hactivists

Refer to Hacking and Electronic Trespassing

9. A ____________ is a virus that attaches itself to documents with


embedded programs that automate tasks.

Your Answer: worm


Correct Answer: macro virus

Refer to Viruses

10. A technology that collects information from computer users without their
knowledge or consent is called ____________.

Your Answer: spyware

Correct. A technology that collects information from computer users


without their knowledge or consent is called spyware.

11. A logic bomb is a type of ____________.

Your Answer: macro virus


Correct Answer: Trojan horse

Refer to Trojan Horses

12. ____________ are Internet-connected computers that have been


hijacked using viruses to perform malicious acts without the knowledge
of their users and owners.

Your Answer: Auditor computers


Correct Answer: Zombie computers

Refer to Hacking and Electronic Trespassing

13. A(n) __________ that is traditionally used on computer networks is


called a symmetric secret key system.

Your Answer: cryptosystem

Correct. A cryptosystem that is traditionally used on computer networks


is called a symmetric secret key system.

14. ____________ cause more damage to computers, networks, and


programs than all the viruses put together.

Your Answer: Bugs

Correct. Bugs cause more damage to computers, networks, and


programs than all the viruses put together.

15. All corporations in the U.S. work together with the U.S. government to
protect networks.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Cyberwarfare and Cyberterrorism

16. While risks involved in computer use can be reduced, they cannot be
eliminated.

Your Answer: True

Correct. While risks involved in computer use can be reduced, they


cannot be eliminated.
17. When someone uses a disc, flash drive, or a computer network with an
infected machine, a virus can jump from one computer to another.

Your Answer: True

Correct. When someone uses a disc, flash drive, or a computer network


with an infected machine, a virus can jump from one computer to
another.

18. Most computer viruses are NOT operating-system specific.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Viruses

19. Since synthetic DNA is possible, the efforts of biohackers to create and
modify organisms in home laboratories have succeeded.

Your Answer: True


Correct Answer: False

Correct. Since synthetic DNA is possible, the efforts of biohackers to


create and modify organisms in home laboratories have succeeded.

20. Today's typical computer contains components from dozens of countries.

Your Answer: True

Correct. Today's typical computer contains components from dozens of


countries.

21. Match the following terms to the correct definitions.

Option Your Correct Answer: Comments


Answer:

21.1 Phishing A. C. Requesting Incorrect.


Malicious passwords and other Malware is
software sensitive data under malicious
false pretenses software.

21.2 Malware A. A. Malicious software Correct!


Malicious
software
21.3 Spoofing A. F. Masquerading as Incorrect.
Malicious somebody else to trick Malware is
software the target into doing malicious
something they might software.
not otherwise do

21.4 Cyberstalking A. E. A form of Incorrect.


Malicious harassment that takes Malware is
software place on the Internet malicious
software.

21.5 Cybercrime A. B. Any crime Incorrect.


Malicious committed through Malware is
software use of computer or malicious
network technology software.

21.6 Denial-of- A. D. Bombard servers Incorrect.


service Malicious and Web sites with Malware is
attacks software bogus traffic until they malicious
are shut down software.

Some of the terms are matched incorrectly.


BAB 11

1. Which of the following allows documents to be transmitted and stored


electronically without loss of formatting?

Your Answer: PDF

Correct. PDF allows documents to be transmitted and stored electronically


without loss of formatting.

2. When students work together on technology-enhanced projects, it is


sometimes called ____________.

Your Answer: PDF


Correct Answer: CBCL

Refer to Productivity, Multimedia, and E-Learning 2.0

3. ____________ is the use of electronic digital technology to facilitate


teaching and learning.

Your Answer: E-learning

Correct. E-learning is the use of electronic digital technology to facilitate


teaching and learning.

4. For patients in remote locations, doctors use the Web to practice


____________.

Your Answer: telemetry


Correct Answer: telemedicine

Refer to Where Computers Work

5. ____________ separates software and data from PC hardware, by using


software and data stored on servers in an IT center or in the Internet
cloud.

Your Answer: A satellite office


Correct Answer: Desktop virtualization

Refer to Enterprise Computing


6. When a job has been transformed by automation to require less skill, it is
called ____________.

Your Answer: computer demolished


Correct Answer: de-skilling

Refer to De-Skilling and Up-Skilling

7. A(n) _____________ refers to someone who resists technological change.

Your Answer: technophobe


Correct Answer: Luddite

Refer to Workers Against Machines

8. ____________ embeds lessons in animated games, in smart phone apps,


or in Web-based instructional packages.

Your Answer: CBT

Correct. CBT embeds lessons in animated games, in smart phone apps, or


in Web-based instructional packages.

9. ____________ include(s) educational programs that allow(s) students to


learn through exploration and invention.

Your Answer: Blended learning


Correct Answer: Educational simulations

Refer to Simulations and Games

10. ____________ is a computer language used to teach children to program


computers.

Your Answer: The Sims


Correct Answer: LOGO

Refer to Programming Tools

11. ____________ is a combination of e-learning with face-to-face teaching.

Your Answer: Blended learning

Correct. Blended learning is a combination of e-learning with face-to-face


teaching.
12. One of the fastest growing computer markets today is called
____________.

Your Answer: SOHO

Correct. One of the fastest growing computer markets today is called


SOHO.

13. ____________ is the creation of worldwide businesses and markets.

Your Answer: Globalization

Correct. Globalization is the creation of worldwide businesses and


markets.

14. ____________ is the fear of technology.

Your Answer: Globalism


Correct Answer: Technophobia

Refer to Information Age Education

15. Filtering software blocks viruses from personal computers.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Education and Information

16. An electronic cottage is a small m-commerce business that sells


information online.

Your Answer: False

Correct. An electronic cottage is a home where technology enables a


person to work at home.

17. Computers are used in many fields, including entertainment, publishing,


medicine, airlines, science, and education.

Your Answer: True


Correct. Computers are used in many fields, including entertainment,
publishing, medicine, airlines, science, and education.

18. Extranets are used by partners and customers of a particular business.

Your Answer: True

Correct. Extranets are used by partners and customers of a particular


business.

19. While early predictions stated that computers would significantly reduce
the flow of paper-based information, this has not happened.

Your Answer: False


Correct Answer: True

Incorrect. Refer to The Paperless Office

20. Narrowcasting allows for corporate news programs aimed at companies


and large groups.

Your Answer: False

Correct. Narrowcasting allows for personalized news programs aimed at


individuals or narrow groups.

21. Match the following terms to the correct definition.

Option Your Answer: Correct Comments


Answer:

21.1 Telemedicine C. Allows users B. Computers Incorrect.


to share used to monitor Groupware
calendars, send vital signs from allows users to
messages, a distance. share calendars,
access data, and send messages,
work on access data,
documents and work on
simultaneously documents
simultaneously.

21.2 Groupware A. The path of C. Allows users Incorrect. Work


information as it to share flow is the path
flows through a calendars, send of information
workgroup messages, as it flows
access data, and through a
work on workgroup.
documents
simultaneously
21.3 Robot A. The path of E. A computer- Incorrect. Work
information as it controlled flow is the path
flows through a machine of information
workgroup as it flows
through a
workgroup.

21.4 Thin client A. The path of F. A low-cost Incorrect. Work


information as it computer that flow is the path
flows through a can't function of information
workgroup without access as it flows
to servers through a
workgroup.

21.5 Work flow A. The path of A. The path of Correct!


information as it information as it
flows through a flows through a
workgroup workgroup

21.6 Electronic A. The path of D. Buying and Incorrect. Work


commerce information as it selling products flow is the path
flows through a through the of information
workgroup Internet as it flows
through a
workgroup.

Some of the terms are matched incorrectly.


BAB 12

1. Which of the following models views a business as a series of activities


that adds value to a product or service?

Your Answer: Value added


Correct Answer: Value chain

Refer to The Value Chain Model

2. Which type of software is used by many large organizations to create


and maintain large databases?

Your Answer: Data entry


Correct Answer: Data warehousing

Refer to Information Systems for Business Transactions

3. A(n) ____________ occurs when two or more companies share


information.

Your Answer: information partnership

Correct. An information partnership occurs when two or more companies


share information.

4. Selling a product to a customer, entering employee work hours, or


processing a payment to a vendor are examples of which type of event
in an organization?

Your Answer: Transaction

Correct. Selling a product to a customer, entering employee work hours,


or processing a payment to a vendor are examples of a transaction in an
organization.

5. ____________ refers to the flow of data between countries.

Your Answer: Outsourcing


Correct Answer: Transborder data flow

Refer to Supply Chain Management and Outsourcing


6. The direct, computer-to-computer exchange of standardized, common
business transaction documents, such as purchase orders and invoices,
between business partners is called ____________.

Your Answer: group decision support systems (GDSS)


Correct Answer: electronic data interchange (EDI)

Refer to Supply Chain Management and Outsourcing

7. A(n) ____________ combines features of MIS and DDS to support


unstructured decision making by top managers.

Your Answer: expert system (ES)


Correct Answer: executive information system (EIS)

Refer to Executive Information Systems

8. Systems that provide too many reports, too many summaries, and too
many details cause managers to experience ____________.

Your Answer: erroneous decision making


Correct Answer: information overload

Refer to Information Systems in Perspective

9. An information system used at any level of a company that helps the


company gain an advantage over competitors is called a(n)
____________.

Your Answer: management information system


Correct Answer: strategic information system

Refer to Strategic Information Systems

10. A set of activities that helps individuals to efficiently use resources to


achieve an organization's goals is called ____________.

Your Answer: management

Correct. A set of activities that helps individuals to efficiently use


resources to achieve an organization's goals is called management.

11. A ____________ is a network of organizations that supply raw


materials, manufacture products, and distribute products to customers.
Your Answer: supply chain

Correct. A supply chain is a network of organizations that supply raw


materials, manufacture products, and distribute products to customers.

12. ____________ states that semiconductor technology absorbs the


functions of what previously were discrete electronic components onto a
single new chip.

Your Answer: Grove's Law


Correct Answer: The Cannibal Principle

Refer to Andy Grove, the Paranoid Chip Merchant

13. A system designed to create products and services for customers is


called a ____________.

Your Answer: manufacturing organization


Correct Answer: business organization

Refer to Business Organizations as Systems

14. The time, effort, and money a customer or supplier would have to
expend when changing to a competitor's product or service is called
____________.

Your Answer: business expenses


Correct Answer: switching costs

Refer to Strategic Information Systems

15. An expert system is a basic accounting and record-keeping system that


tracks daily transactions necessary to conduct business.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Expert Systems

16. A set of interrelated parts that work together to accomplish a purpose is


called a system.

Your Answer: True


Correct. A set of interrelated parts that work together to accomplish a
purpose is called a system.

17. Strategic planning defines the company's mission, identifies the


company's environment and internal strengths and weaknesses, and
describes the company's competitive strategy.

Your Answer: True

Correct. Strategic planning defines the company's mission, identifies the


company's environment and internal strengths and weaknesses, and
describes the company's competitive strategy.

18. Handing the responsibility for developing and operating the information
systems to another firm is called outsourcing.

Your Answer: True

Correct. Handing the responsibility for developing and operating the


information systems to another firm is called outsourcing.

19. Too many reports, too many printouts, too many summaries, and too
many details are known as critical success factors.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Strategic Planning

20. When the primary and support activities of an organization produce the
desired output with lower costs, the organization's efficiency increases.

Your Answer: True

Correct. When the primary and support activities of an organization


produce the desired output with lower costs, the organization's efficiency
increases.

21. Match the following terms to the correct definition.

Option Your Answer: Correct Answer: Comments


21.1 GIS A. System that A. System that works Correct!
works with with maps
maps

21.2 GDSS B. Executive in E. System that Incorrect. The CIO


charge of the enhances is the executive in
information collaborative work charge of the
systems information
division systems division.

21.3 CIO B. Executive in B. Executive in charge Correct!


charge of the of the information
information systems division
systems
division

21.4 ES A. System that F. Provides Incorrect. A GIS is


works with information from a a system that
maps knowledgeable works with maps.
person

21.5 DSS A. System that C. System for making Incorrect. A GIS is


works with semistructured a system that
maps decisions works with maps.

21.6 EIS A. System that D. A system that Incorrect. A GIS is


works with provides support for a system that
maps unstructured decision works with maps.
making by top
managers

Some of the terms are matched incorrectly.


BAB 13

1. ____________ is the process of increasing traffic to Web sites by


improving search engine rankings for targeted keywords.

Your Answer: Search engine optimization (SEO)

Correct. Search engine optimization (SEO) is the process of increasing


traffic to Web sites by improving search engine rankings for targeted
keywords.

2. The ____________ puts strict limits on what cable companies can do


with customer records.

Your Answer: European Union Data Protection Directive


Correct Answer: Communications Act

Refer to E-Commerce Ethics

3. The _____________, issued in October 1998 by the EU, establishes a


high level of legal protection for the privacy of individuals and personal
data.

Your Answer: Health Insurance Portability and Accountability Act


Correct Answer: Data Protection Directive

Refer to E-Commerce Ethics

4. The trend of separating commerce into its component parts and


outsourcing some of those parts is called ____________.

Your Answer: interaction


Correct Answer: disaggregation

Refer to Disaggregation: Commerce in the Cloud

5. In ____________, smart phones, tables, PDAs, laptops, and other


portable electronic devices are used to conduct commerce while on the
move.

Your Answer: online retail commerce


Correct Answer: mobile commerce (m-commerce)

Refer to Mobile Commerce


6. The ____________ is an extranet that was developed as an Internet
VPN to provide a global infrastructure for trading partners within the
automotive industry.

Your Answer: Vehicular Information Exchange (VIE)


Correct Answer: Automotive Network Exchange (ANX)

Refer to B2B: Extranets for Commerce and Communication

7. A(n) ____________ uses a public network with special protocols that


provide a secure, private "tunnel" across the network between business
partners' intranets.

Your Answer: virtual private network (VPN)

Correct. A virtual private network (VPN) uses a public network with


special protocols that provide a secure, private "tunnel" across the
network between business partners' intranets.

8. ____________ refers to methodologies, software, and Internet


capabilities for managing customer relationships.

Your Answer: A business intranet


Correct Answer: Customer relationship management (CRM)

Refer to Distribution of Information Management Tools

9. The use of information and communication technology in support of


business activities is called ____________.

Your Answer: B2B


Correct Answer: electronic business

Refer to Business on Internet Time

10. ____________ were Internet businesses that commercialized the World


Wide Web in the 1990s.

Your Answer: E-businesses


Correct Answer: Dot-coms

Refer to Business on Internet Time

11. B2B, B2C, C2C, and B2E are examples of ____________.


Your Answer: e-commerce models

Correct. B2B, B2C, C2C, and B2E are examples of e-commerce models.

12. ____________ refers to the tail of the statistical curve that appears
when you rank books, movies, or tunes by popularity as reflected in
sales or rentals.

Your Answer: Medium Curve


Correct Answer: Long Tail

Refer to The Long Tail

13. ____________ is a critical part of everyday business.

Your Answer: Scruples


Correct Answer: Ethics

Refer to E-Commerce Ethics

14. The basic idea of e-commerce is that at least two parties, a business and
a seller, use network technology to exchange information, products, or
services.

Your Answer: True


Correct Answer: False

Incorrect. Refer to E-Business 1.0: Intranets, Extranets, and E-Sales

15. An intranet can improve a business's bottom line by decreasing the


speed of B2B transactions.

Your Answer: False

Correct. An intranet can improve a business's bottom line by increasing


the speed of B2B transactions.

16. Facebook, MySpace, LinkedIn, and other social networking sites provide
resources and services to millions of users for a small fee.

Your Answer: True


Correct Answer: False

Refer to The "Free" Market


17. Electronic payment systems, such as PayPal, allow people to make
purchases from strangers without revealing their credit card numbers.

Your Answer: True

Correct. Electronic payment systems, such as PayPal, allow people to


make purchases from strangers without revealing their credit card
numbers.

18. eBay is an example of the consumer-to-consumer (C2C) e-commerce.

Your Answer: True

Correct. eBay is an example of the consumer-to-consumer (C2C) e-


commerce.

19. B2C is an e-business that uses an intranet to support its internal value
chain activities.

Your Answer: True


Correct Answer: False

Incorrect. Refer to B2E: Intranets for Internal Communication

20. The Children's Online Privacy Protection Act of 1998 (COPPA) requires
consent before collecting, using, or disclosing personal information about
children ages 12 and under.

Your Answer: True

Correct. The Children's Online Privacy Protection Act of 1998 (COPPA)


requires consent before collecting, using, or disclosing personal
information about children ages 12 and under.

21. Match the following terms with the correct definition.

Option Your Answer: Correct Answer: Comments

21.1 C2C A. An individual A. An individual Correct!


selling his used selling his used bike
bike to to someone else
someone else through eBay
through eBay

21.2 B2B A. An individual B. Retail clothing Incorrect. An


selling his used store buying individual selling his
bike to used bike to
someone else dresses from a someone else
through eBay designer through eBay is an
example of C2C.

21.3 B2E A. An individual C. Company posting Incorrect. An


selling his used a new health individual selling his
bike to insurance option for used bike to
someone else employees someone else
through eBay through eBay is an
example of C2C.

21.4 B2C A. An individual D. Soon-to-be Incorrect. An


selling his used father buying a individual selling his
bike to "How to Raise a used bike to
someone else Child" book from an someone else
through eBay online bookstore through eBay is an
example of C2C.

Some of the terms are matched incorrectly.


BAB 14

1. Which of the following techniques is used by programmers to write


algorithms in English-like statements to allow for easier coding?

Your Answer: Flowcharting


Correct Answer: Pseudocode

Refer to How People Make Programs

2. When converting to a new system, which approach simply replaces the


old system with the new system?

Your Answer: Parallel systems


Correct Answer: Direct cutover

Refer to Implementation

3. Which of the following is NOT a high-level programming language?

Your Answer: FORTRAN


Correct Answer: Assembly language

Refer to Machine Language and Assembly Language

4. ____________ is the first computer language designed for developing


business software.

Your Answer: FORTRAN


Correct Answer: COBOL

Refer to Grace Murray Hopper Sails on Software

5. A(n) ____________ is a set of step-by-step instructions that solve a


problem.

Your Answer: data structure


Correct Answer: algorithm

Refer to How People Make Programs

6. ____________ is a low-level language and is functionally equivalent to


machine language.
Your Answer: Assembler language
Correct Answer: Assembly language

Refer to Machine Language and Assembly Language

7. ____________ is a programming language designed specifically for


children.

Your Answer: POGO


Correct Answer: LOGO

Refer to High-Level Languages

8. A structured program is built of smaller programs called ____________.

Your Answer: modules

Correct. A structured program is built of smaller programs called


modules.

9. Visual programming languages, such as Visual Basic, make programming


easier for ____________.

Your Answer: Web designers


Correct Answer: nonprogrammers

Refer to Visual Programming

10. A(n) ____________ makes it possible for users to request information


from a database using English-like questions.

Your Answer: visual language


Correct Answer: query language

Refer to Fourth-Generation and Fifth-Generation Languages

11. ____________ is the best-known agile model of program development.

Your Answer: Team programming


Correct Answer: Extreme programming

Refer to Agile Development and Extreme Programming


12. ____________ is a page description language for Web pages.

Your Answer: AJAX


Correct Answer: HTML

Refer to Programming for the Web

13. Two programming tools designed specifically for programming for the
cloud are ____________.

Your Answer: COBOL and Bloom


Correct Answer: Bloom and Mirage

Refer to Programming for the Cloud

14. The person who uses information systems directly or uses the
information produced by a system is called a(n) ____________.

Your Answer: office clerk


Correct Answer: end user

Refer to Systems Development

15. Database management, graphics, artificial intelligence, and networks are


examples of specializations within the field of computer science.

Your Answer: True

Correct. Database management, graphics, artificial intelligence, and


networks are examples of specializations within the field of computer
science.

16. The programming process is called an algorithm.

Your Answer: False

Correct. The programming process is made up of four steps: defining the


problem; devising, refining, and testing the algorithm; writing the
program; and testing and debugging the program.

17. Logic errors are caused by errors in the logical structure, which results in
differences between what the program is supposed to do and what it
actually does.

Your Answer: True


Correct. Logic errors are caused by errors in the logical structure, which
results in differences between what the program is supposed to do and
what it actually does.

18. Assembly language makes it easy to reuse features from one program in
another program.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Object-Oriented Programming

19. A compiler is used to translate high-level programs to machine language.

Your Answer: True

Correct. A compiler is used to translate high-level programs into machine


language.

20. It is impossible to eliminate 100 percent of bugs in commercial software.

Your Answer: False


Correct Answer: True

Incorrect. Refer to Software Warranties

21. Match the following terms with the correct definition.

Option Your Answer: Correct Comments


Answer:

21.1 System A. Shows the B. Graphical Incorrect. A


flowchart rules that apply depiction of the decision table
and which physical system shows the rules
actions to take that exists or is that apply and
when certain proposed which actions to
conditions take when certain
occur conditions occur.

21.2 Data flow A. Shows the D. Simple Incorrect. A


diagram rules that apply graphical decision table
(DFD) and which depiction of the shows the rules
actions to take movement of that apply and
when certain data through a which actions to
conditions system take when certain
occur conditions occur.

21.3 Data A. Shows the E. Catalog of all Incorrect. A


dictionary rules that apply the data decision table
and which descriptions in shows the rules
actions to take a system that apply and
when certain which actions to
conditions take when certain
occur conditions occur.

21.4 Decision F. Software A. Shows the Incorrect.


table package that rules that apply Computer-aided
includes and which systems
charting tools, actions to take engineering
data dictionary, when certain (CASE) is a
and code conditions software package
generators occur that includes
charting tools,
data dictionary,
and code
generators.

21.5 Data A. Shows the C. Set of data Incorrect. A


structure rules that apply elements used decision table
and which together shows the rules
actions to take that apply and
when certain which actions to
conditions take when certain
occur conditions occur.

21.6 Computer- (blank) F Incorrect!


aided
systems
engineering
(CASE)

Some of the terms are matched incorrectly.


BAB 15

1. The underlying meaning of words and phrases is called ____________.

Your Answer: heuristics


Correct Answer: semantics

Refer to Nonsense and Common Sense

2. ____________ is a humanoid robot developed by Honda that can walk,


run, recognize gestures and faces, and display "intelligent" behaviors.

Your Answer: AARON


Correct Answer: ASIMO

Refer to Steel-Collar Workers

3. ____________ can make knowledge available, even when experts are


unavailable.

Your Answer: An online encyclopedia


Correct Answer: Expert systems

Refer to Artificial Experts

4. ____________ are used in scientific research, loan processing, stock


market analysis, and to detect credit card fraud.

Your Answer: Speech digitizers


Correct Answer: Neural nets

Refer to Neural Networks

5. The root of the Czech word for "forced labor" is the term ____________.

Your Answer: mechanical arm


Correct Answer: robot

Refer to What Is a Robot?

6. A(n) ____________ is the point where old models will have to be


discarded because of the creation of greater-than-human intelligence.

Your Answer: singularity


Correct. A singularity is the point where old models will have to be
discarded because of the creation of greater-than-human intelligence.

7. AI concepts applied to networks instead of to individual computers is


called ____________.

Your Answer: distributed intelligence

Correct. AI concepts applied to networks instead of to individual


computers is called distributed intelligence.

8. ____________ was one of the first software programs that used a


limited form of natural language to converse.

Your Answer: BABEL


Correct Answer: ELIZA

Refer to Conversation without Communication

9. One reason that games such as checkers and chess were used in early AI
work is that they have clearly defined rules and unmistakable goals.

Your Answer: True

Correct. One reason that games such as checkers and chess were used in
early AI work is that they have clearly defined rules and unmistakable
goals.

10. Expert systems interact only with robots specifically programmed to


communicate with the systems.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Artificial Experts

11. All computers use natural-language when communicating with humans.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Natural-Language Communication


12. In 1950, Alan Turing developed one of the first tests to determine
whether computers are intelligent.

Your Answer: True

Correct. In 1950, Alan Turing developed one of the first tests to


determine whether computers are intelligent.

13. Since computers are machines, it is not reasonable for psychologists to


work with computer scientists on AI projects.

Your Answer: True


Correct Answer: False

Refer to What Is Artificial Intelligence?

14. Match the following terms to the correct definition.

Option Your Correct Answer: Comments


Answer:

14.1 Pattern A. Locates and C. Identifying Incorrect. Optical


recognition identifies recurring patterns character
printed in input data recognition (OCR)
characters in software locates
images and and identifies
converts them printed characters
to text codes, in images and
allowing a converts them to
computer to text codes,
"read" text allowing a
computer to
"read" text.

14.2 Speech A. Locates and F. Uses pattern Incorrect. Optical


recognition identifies recognition character
printed techniques to recognition (OCR)
characters in interpret human software locates
images and speech and identifies
converts them printed characters
to text codes, in images and
allowing a converts them to
computer to text codes,
"read" text allowing a
computer to
"read" text.

14.3 Digitized A. Locates and B. Prerecorded Incorrect. Optical


speech identifies speech used in character
printed automated recognition (OCR)
characters in telephone software locates
images and directory and identifies
converts them assistance, printed characters
to text codes, navigation in images and
allowing a guidance systems converts them to
in cars, and other text codes,
computer to instances where a allowing a
"read" text limited computer to
vocabulary is "read" text.
practical

14.4 Synthetic A. Locates and E. Speech created Incorrect. Optical


speech identifies by using software character
printed to convert text recognition (OCR)
characters in into phonetic software locates
images and sounds and identifies
converts them printed characters
to text codes, in images and
allowing a converts them to
computer to text codes,
"read" text allowing a
computer to
"read" text.

14.5 Neural A. Locates and D. Distributed, Incorrect. Optical


networks identifies parallel character
printed computing recognition (OCR)
characters in systems inspired software locates
images and by the structure and identifies
converts them of the human printed characters
to text codes, brain in images and
allowing a converts them to
computer to text codes,
"read" text allowing a
computer to
"read" text.

14.6 Optical A. Locates and A. Locates and Correct!


character identifies identifies printed
recognition printed characters in
(OCR) characters in images and
software images and converts them to
converts them text codes,
to text codes, allowing a
allowing a computer to
computer to "read" text
"read" text

Some of the terms are matched incorrectly.


TAMBAHAN

1. The three or four letters following the period in a file name are called the
____________.

Your Answer: annotation


Correct Answer: extension

Refer to File Management Basics

2. The process of reducing the size of a file so that it takes up less disk
space is called ____________.

Your Answer: file compacting


Correct Answer: file compression

Refer to File Compression Basics

3. The World Wide Web is accessible through programs called


____________.

Your Answer: Web servers


Correct Answer: Web browsers

Refer to World Wide Web Basics

4. A ______________ is a function included in most email programs that


helps keep unwanted email out of your inbox.

Your Answer: security box


Correct Answer: spam filter

Refer to Internet Security Basics

5. A(n) ____________ is a hierarchical list or catalog of Web sites


assembled by researchers.

Your Answer: search engine


Correct Answer: directory

Refer to Web Search Basics

6. In font sizes, one point is equal to ____________.


Your Answer: 1/3 inch
Correct Answer: 1/72 inch

Refer to Formatting Characters

7. A(n) ____________ is a file that has instructions that can be performed


by the computer.

Your Answer: application file


Correct Answer: executable file

Refer to Software Basics

8. The ____________ temporarily stores chunks of text, which makes it


possible to cut a sentence from one part of a document and paste it into
another part of the document.

Your Answer: Clipboard

Correct. The Clipboard temporarily stores chunks of text, which makes it


possible to cut a sentence from one part of a document and paste it into
another part of the document.

9. The ____________ uses RAM for instant access to information needed to


perform program actions.

Your Answer: CPU

Correct. The CPU uses RAM for instant access to information needed to
perform program actions.

10. The DVD/CD-RW drive on a computer is a(n) ____________.

Your Answer: USB drive


Correct Answer: optical drive

Refer to Hardware Basics

11. A keyboard, mouse, monitor, and printer are examples of computer


____________.

Your Answer: add-ons


Correct Answer: peripherals

Refer to Hardware Basics


12. In which of the following applications was a file named budget.pdf
created?

Your Answer: Adobe Acrobat

Correct. A file named budget.pdf was created in Adobe Acrobat.

13. To perform a backup, a backup drive must be attached directly to the


individual computer.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Backup Basics

14. Backups can only be created on magnetic tape, CD-R, or DVD-R.

Your Answer: True


Correct Answer: False

Incorrect. Refer to Backup Basics

15. Microsoft Windows is the operating system used by most PCs today.

Your Answer: True

Correct. Microsoft Windows is the operating system used by most PCs


today.

16. Files with a .zip extension do not need to be decompressed before using
them in an application.

Your Answer: True


Correct Answer: False

Incorrect. Refer to File Compression Basics

17. Changing the way text displays on a page is called formatting.

Your Answer: False


Correct Answer: True
Incorrect. Refer to Formatting Characters

18. Saving files into folders is a good way to organize a collection of


documents and other files.

Your Answer: False


Correct Answer: True

Incorrect. Refer to File Organization Basics

19. Match the following terms to the correct definition.

Option Your Correct Answer: Comments


Answer:

19.1 Document A. A file A. A file created by Correct!


created by an an application
application

19.2 WYSIWYG A. A file C. A feature in which Incorrect. A


created by an the words and document is a
application images on the screen file created by
will appear almost an application.
exactly the same on
paper when they are
printed.

19.3 Applications A. A file D. Software tools Incorrect. A


created by an that enable people to document is a
application use a computer for a file created by
specific purpose an application.

19.4 Font A. A file E. A size and style of Incorrect. A


created by an typeface, such as 12- document is a
application point Arial file created by
an application.

19.5 Drag-and- A. A file B. Technology that Incorrect. A


drop created by an allows you to move a document is a
application selected block of text file created by
without cutting and an application.
pasting it

Some of the terms are matched incorrectly.


TTS

BAB 1

Word bank

APPLICATIONS ARITIFICIALINTELLIGENCE BROWSERS COLLABORATIVE FIRMWARE HYPERTEXT


INFORMATION MOORESLAW NETBOOK SERVER SILICONVALLEY TRANSISTOR WORKSTATION C

hapter 1: Exploring Our Digital Planet Across 2. programs that serve as navigable windows into the
web 5. a computer that provides other network-connected computers with access to data and
programs 8. invented in 1948 as a substitute for the vacuum tube 9. a high-end desktop computer
with massive computing power 10. software programs that transform computers to supercomputers
for particular needs 11. the nickname for san jose, california because dozens of semiconductor
manufacturing companies were located there 12. the age in which most people earn their living
working with words, numbers, and ideas 13. no-frills notebook computer Down 1. the prediction
that the number of transistors that can be packed into a silicon chip of the same price would double
every two years 3. the most current computing phase that started about 2005 4. the branch of
computer science in which computers perform tasks that people, rather than machines, typically do
6. links on web pages that connect pages 7. a hybrid of hardware and software that is immortalized
on a silicon chip

BAB 2

Across

2. groups of wires where information travels between components, BUSES

4. a keyboard is an example of what type of device, INPUT

7. a computer that transmits information via light waves rather than electrical pulses, OPTICAL

11. the part of the computer that contains the CPU, MOTHERBOARD

Down

1. the code that represents each character as an 8-bit code, ASCII

2. the smallest unit of information a computer can process, BIT

3. a speaker is an example of what type of device, OUTPUT

5. one-million bytes, MEGABYTE

6. the acronym for the nonvolatile memory that can only be read, ROM

8. the acronym for the computer's memory that needs to be instantly available to the CPU, RAM

9. a collection of 8 bits, BYTE

10. the timing device that produces electrical pulses to synchronize a computer's operations, CLOCK
Multiple Choice

1. A gigabyte (GB) is equal to approximately, 1000 MEGABYTES (MB)

2. The ________ is the circuit board that contains a computer's CPU, MOTHERBOARD

3. Computer memory that stores program and data that needs to be instantly accesible to the CPU is
called, RANDOM ACCESS MEMORY (RAM)

4. The most widely used code that represents each letter, digit, and special character as a unique
string of bits is, ASCII

5. When software that is written for one processor works with another processor, it is considered,
COMPATIBLE

6. The Processor's _______ is the design that determines how the components of the CPU are put
and work together on the chip, ARCHITECTURE

7. Which of the following are common input devices, KEYBOARDS AND POINTING DEVICES

8. A single chip that contains multiple cores that run simultaneously is a(n), MULTIPLE PROCESSOR

9. The Hardware Component that executes the steps in a software program and contains the circuity
to perform instructions is called the, CENTRAL PROCESSING UNIT (CPU)

10. ________ is used to store start-up instructions and other critical information of all modern
computers, ROM

11. Because flash memory can keep its contents without a flow of electricity, it is said to be,
NONVOLATILE

12. Which of the following is a special, low-energy type of RAM that can store small amounts of data
for a long time using battery power, CMOS

13. For most computer memory, access time is measured in, NANOSECONDS

14. PC cards and ExpressCards that can be inserted or removed from a computer's slot without
powering down the system called, HOT-SWAPPABLE

15. A petabyte is equivalent to 1024 terabytes, TRUE

16. The most widely used computer code, ASCII, supports Japanese and Arabic, FALSE

17. The ALU translates an instruction into a form that can be read by the CPU, FALSE

18. One gigahertz (GHz) equals one clock cycle per second, FALSE

19. Computers perform five basic function : receive input, process information, produce output,
store information, and create new products, FALSE

20. The more modern language coding scheme that supports over 100 000 unique characters,
including Chinese, Greek, and Japanese is known ad Unicode, TRUE

21.1 DIMM, F. CIRCUIT BOARD FOR RAM CHIPS


21.2 CMOS, B. STORES THE COMPUTER'S DATE, TIME, AND CALENDAR

21.3 ROM, A. MEMORY THAT CONTAINS A COMPUTER START-UP INSTRUCTIONS

21.4 RAM, D. VOLATILE COMPUTER MEMORY

21.5 Bay, C. OPEN AREAS IN THE SYSTEM BOX FOR DISK DRIVES AND OTHER DEVICES

21.6 Cache, E. SMALL MEMORY SPACES USED BY THE CPU TO ELIMINATE BOTTLENECKS IN
PROCESSING

BAB 3

1. The digital video camera used for video conferencing. WEBCAM

1. Apple's ipod is the example of what type of device. MULTITOUCH

3. The tiny dots that make up displayed images. PIXELS

4. The type of printer that sprays ink directly onto paper. INKJET

5. The type of keyboard based on the placement of letters. QWERTY

6. The type of keyboard that places your arms at a less painful position. ERGONOMIC

7. The type of scanner used for high-end publishing and museum archiving. DRUM

8. The fractional relationship between the width and heigth of a display. ASPECTRATIO

9. The type of printer that selectively heats images on special paper. THERMAL

10. The architectural design that enables users to add peripherals. OPEN

11. The type of computer feedback that simulates the visual output. HAPTIC

1. Evidence suggest that typing on a standart keyboard, which forces you to hold your arms and
wrists at unatural angles, may lead to... REPETITIVE-STRESS INJURIES

2. A ..., a small flat panel that is sensitive to light pressure, is sometimes used instead of a mouse.
TOUCHPAD

3. A ... input device allows multi-finger or multi-hand gestures to accomplish complex tasks more
quickly. MULTI-TOUCH

4. A device that uses reflected light to determine the location of pencil marks on a standardized test
answer sheet or other similar from is a(n)... OPTICAL MARK READER

5. A ... captures snapshot of the real world and saves them as bit patterns on flash memory cards.
DIGITAL CAMERA

6. A type of software that converts voice data into words that can be edited and printed is called ...
software. SPEECH RECOGNITION
7. A(n) ... converts a computer's internal bit patterns into a form that humans can understand.
OUTPUT DEVICE

8. Images on a computers screen are made up of tiny dots called... PIXLELS

9. A hard copy of the image on the monitor can be produced by a... PRINTER

10. ... that contain both microphones and earphones can be used for telephone and
teleconferencing applications. HEADSETS

11. A common storage device on mainframe computers and some PCs that writes data onto and
reads data off a magnetically coated ribbon of tape is a(n)... TAPE DRIVE

12. A(n) ... uses laser beams to read and write bits of data on a reflective aluminum layer of the disc.
OPTICAL DISC DRIVE

13. A science that studies people at work and design work environments that enable people to
interact efficiently and safely with things is called... ERGONOMICS

14. ... drives can read and write data on Blu-ray discs, DVDs, and CDs. BD-RW

15. Speech recognition technology can assist someone who cannot use their hands for computer
inputting. TRUE

16. When using a graphics tablet, a stylus is NOT a good choice for a pointing device. FALSE

17. Nearly all new monitors use flat-panel LED display technology. FALSE

18. The USB (universal serial bus) is an example of a legacy port. FALSE

19. Solid-state storage devices are rewritable memory devices with no moving parts. TRUE

20. Three technological trends that are changing the way people think about and use computer
peripherals are wireless technology, computer networks, and the internet "cloud." TRUE

21.1 Allows data to be sent and received one bit at a time. SERIAL PORT

21.2 Used to attach printers that send and receive bits in groups. PARALLEL PORT

21.3 A slow port not generally used on PCs anymore. LEGACY PORT

21.4 Allow devices produced by one manufacturer to attach to systems made by another
manufacturer. INTERFACE STANDARDS

21.5 Today's PCs and Macs include one or more of these; allows data transfer rates of up to 480
Mbps. USB PORT

21.6 High-speed connection ideal for data intensive applications. FIREWIRE PORT

BAB 4

Word bank BUGS COMPILER DEVICEDRIVERS MAC MASHUP MENUS MULTITASKING PIRACY PLUGIN
README SERVICEPACKS UTILITYPROGRAMS

Across 1. tools for doing system maintenance that aren't done automatically by the operating
system 4. files that include installation instructions 6. free software updates 7. translator program
that translates high-level languages to machine language 9. a program that interacts with the host
program and extends its functionality 11. the unauthorized use of software 12. errors in software
Down 2. the concurrent execution of multiple applications 3. programs that allow input/output
devices to communicate with a computer 5. web applications that provide a service by combining
functionality from two or more sources 8. on-screen lists where users choose commands 10. the first
computer to develop the graphical user interface

BAB 5

CROSSWORD CHAPTER 5

1. alignment of text on a line. JUSTIFICICATION

2. spacing between lines of text. LEADING

3. text that appears on the bottom of a page. FOOTER

4. when words appear on a screen as they will on a printed page. WYSIWYG

5. tool for finding synonyms. THESAURUS

6. a storage of presteps within documents that can be used as starting points for future documents.
TEMPLATES

7. spacing between each pair of letters. KERNING

8. tool used with a database for producing personalized from letters. MAILMERGE

9. adobe's software program that enables documents to be viewed on any PC. PDF

10. multistep sequences of instructions that automate a repetitive task. MACROS

11. software designed to be used by a workgroup. GROUPWARE

12. the use of single ink color to add interest. SPOTCOLOR

1. which of the following is a flexible, portable, paper-like material that can erase itself and display
new text and images when a new page is diplayed? E-PAPER

2. ... is a capability that most of today's word processors have that allows them to produce
personalized from letters. MAIL MERGE

3. documents that are used in the first step of the publising process. which can include articles,
drawings, maps, or photos, are called... SOURCE DOCUMENTS

4. a documents publishing program that allows documents to be shared across multiple platforms is
called... ADOBE ACROBAT

5. a user can add words to Microsoft Word's dictionary using the... SPELLING CHECKER TOOL

6. ... fonts represent characters that can be increased or decreased in size without distortion.
SCALABLE
7. page-layout software allows desktop publishers to control the space between a pair of letters by
using... KERNING

8. a ... program makes short work of tasks that involve repetitive calculations, such as budgeting,
business projections, grade books, checkbooks, and more. SPREADSHEET

9. ... software is designed to turn continuous speech into written text, which increases productivity
while reducing the risk of repetitive strain injuries. DICTATION

10. ... software uses shape, location is space, color, brightness, and motion to help scientists and
mathematicians understand relationships that are not apparent. SCIENTIFIC-VISUALIZATION

11. in a computer model, a set of concepts and ideas designed to mimic some type of system is
called a(n)... ABSTRACTION

12. ... software helps professionals and students go beyond the capabilities of spreadsheets to
create, manipulate, and solve complex equations. MATH-PROCESSING

13. ... is the science of collecting and analyzing data. STATISTICS

14. a ... chart is used to discover a relationship between two variables. SCATTER

15. GIGO is a term that means what you see on the screen is almost exactly what you will see on the
printed page. FALSE

16. outlines and form letters can be produced using Microsoft Word software. TRUE

17. the intersections of a row and a column in a spreadsheet is a cell. TRUE

18. when creating a professional-looking document, you should avoid using italics, boldface, all caps,
underlines, and any other styles for emphasis. FALSE

19. desktop publishing saves companies money by allowing them to produce brochures and other
publications they need in-house. TRUE

20. pie charts show trends or realtionships over time or the relative distribution of one varibale
through another. FALSE

21.1 Microsoft Word WORD PROCESSING SOFTWARE

21.2 Adobe Acrobat PORTABLE DOCUMENT FORMAT SOFTWARE

21.3 Intuit Quicken ACCOUNTING SOFTWARE

21.4 Adobe InDesign DESKTOP PUBLISHING SOFTWARE

21.5 Microsoft Excel SPREADSHEET SOFTWARE

BAB 6

Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING
Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples

BAB 7

Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING

Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples

BAB 8

Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS Across 2. malicious software 3. a malicious network that's
been hijacked using viruses to perform harm without the owners knowledge 5. the type of trojan
horse that is programmed to attack in response to an event 7. embedded programs that automate
tasks 10. fishing for sensitive information under false pretenses 11. in 2001 this worm targeted
servers running microsoft software 12. the acronym for the type of attack where servers are
bombarded with bogus traffic to shut them down Down 1. hacking as a form of political activism 4.
pretending to be someone else to trick them into doing something they otherwise would not do

BAB 9

Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING

Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples

BAB 10
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS

Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do

BAB 11

Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS

Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do

BAB 12

Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS

Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do

BAB 13

Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS

Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do

BAB 14
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS Across 2. malicious software 3. a malicious network that's
been hijacked using viruses to perform harm without the owners knowledge 5. the type of trojan
horse that is programmed to attack in response to an event 7. embedded programs that automate
tasks 10. fishing for sensitive information under false pretenses 11. in 2001 this worm targeted
servers running microsoft software 12. the acronym for the type of attack where servers are
bombarded with bogus traffic to shut them down Down 1. hacking as a form of political activism 4.
pretending to be someone else to trick them into doing something they otherwise would not do

BAB 15

Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS

Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do

TAMBAHAN

Word bank APPLICATIONS CLIPBOARD DRAG EXTENSION FILECOMPRESSION HYPERLINKS PORTALS


SANS-SERIF SERIF SYSTEMUNIT URL VIRUS WORDWRAP

Across 1. on a web page, the words, pictures, or menus that act like buttons 4. a string of three or
four characters that follows a period at the end of a filename 7. the process of reducing the size of
files 9. software tools that allow you to use the computer for specific purposes 11. where data is
temporarily stored for later usage in a word-processing program 13. fonts with plainer, cleaner lines
Down 2. where the CPU is housed 3. executable programs delivered by email that have malicious
intent on a computer system 5. to move the mouse while holding down the button 6. the feature in
a word processor where words are automatically moved to the next line when they don't fit 8. the
unique address of a web page 10. web sites designed as first-stop gateways for the internet 12. fonts
with fine lines at the ends of the main strokes of each character

You might also like