Chapter 01
Chapter 01
TRUE/FALSE
1. Just as you can learn to drive a car without knowing much about car engines, you can learn to use a
computer without understanding the technical details of how a computer works.
2. Computer literacy is the knowing about and understanding computers and their uses.
3. A computer does not always do whatever the instructions, or program, tell it to do.
4. Information processing is a vital activity today because the success of many businesses depends
heavily on the wise use of information.
5. The slide rule is considered by many to be the earliest recorded calculating device.
7. The external hardware components are located inside the main box or system unit of the computer.
8. Storage devices are hardware used to store data on or access data from storage media, such as CD
discs, DVD discs, or flash memory cards.
9. To begin to use a computer, the user first turns on the power by pressing the power button, and then
the computer displays a prompt for the user to decide the next course of action.
10. There are application programs that help users write their own programs using a programming
language.
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
ANS: T PTS: 1 REF: 17
11. In addition to hardware, software, data, and procedures, the fifth major component of a computer
system are codes.
12. Systems analysts design computer systems to be used within their companies.
14. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen
and keyboard.
15. Tablet PCs can use either a slate or a convertible tablet PC design.
16. A mainframe computer is the standard choice for large organizations that need to manage large
amounts of centralized data.
17. Many networks use a network server to manage the data flowing through the network devices and the
resources on a network.
18. Once you have an Internet connection, you are ready to begin programming the Web—that is, using a
Web browser to view Web pages.
20. Satellite communication (more commonly called s-com) is the process of exchanging electronic
messages between computers over a network—usually the Internet.
MODIFIED TRUE/FALSE
1. Wireless networking has added to the convenience of home computing, allowing the use of computers
in places other than traditional locations, such as a home office. _________________________
2. A(n) display screen can be defined as a programmable, electronic device that accepts data, performs
operations on that data, presents the results, and can store the data or results as needed.
_________________________
ANS: F, computer
PTS: 1 REF: 10
3. A user inputs data into a computer, and then the computer processes it. _________________________
4. Dr. Herman Hollerith’s Punch Card Tabulating Machine and Sorter was the first electromechanical
machine that could read slide rules. _________________________
ANS: F
punched cards
punch cards
PTS: 1 REF: 12
5. Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for
output, and magnetic disks and optical discs for storage. _________________________
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
6. The Start button is used to open the Start menu—shown in the accompanying figure—which is used to
launch programs. _________________________
7. Computer programmers, or end users, are the people who use a computer to obtain information.
_________________________
PTS: 1 REF: 17
8. Communications hardware includes modems, which are used to connect a computer to the Internet and
network projectors, which are used to connect a computer to a computer network.
_________________________
ANS: F, adapters
PTS: 1 REF: 16
9. Multiple computing typically refers to accessing Web-based applications and data using a personal
computer, mobile phone, or any other Internet-enabled device. _________________________
ANS: F
Grid computing
Cloud computing
PTS: 1 REF: 19
10. The Web is the largest and most well-known computer network in the world.
_________________________
ANS: F, Internet
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
PTS: 1 REF: 27
11. IP addresses and their corresponding domain names are used to identify computers available through
the Internet. _________________________
12. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name
for the computer that will be handling that person’s e-mail (called a mail server).
_________________________
13. In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to
obtain social security numbers or other information needed for identity theft.
_________________________
ANS: F, phishing
PTS: 1 REF: 37
14. A(n) acronym is an online world that users can explore. _________________________
PTS: 1 REF: 39
15. Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in
all types of communications today. _________________________
PTS: 1 REF: 38
MULTIPLE CHOICE
1. Fifty years ago, computers were used primarily by researchers and ____.
a. musicians c. writers
b. scientists d. designers
ANS: B PTS: 1 REF: 5
2. In the early 1980s, things began to change. ____ were invented and computer use increased
dramatically.
a. Printers c. Microcomputers
b. Networks d. Computers
ANS: C PTS: 1 REF: 6
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
3. Computing technologies make it possible to have ____, traditional appliances with some type of
built-in computer or communications technology.
a. design appliances c. home computers
b. smart computers d. smart appliances
ANS: D PTS: 1 REF: 7
4. A growing number of college campuses have wireless ____ on campus that allow students to use their
PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
a. hotspots c. com spots
b. hotpoints d. com points
ANS: A PTS: 1 REF: 7
5. As shown in the accompanying figure, the computer is used extensively for access control at many
organizations, such as ____ that allow individuals to enter the office building, punch in or out of work,
or access the company network by providing the proper credentials or being authenticated via a
fingerprint or hand scan.
a. bar codes c. collaboration systems
b. virtual reality glasses d. authentication systems
ANS: D PTS: 1 REF: 8
7. In addition to the four primary computer operations, today’s computers typically also perform ____
functions.
a. calculations c. sorting
b. communications d. programming
ANS: B PTS: 1 REF: 11
9. Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task
in ____, instead of the decade it usually took to process the data by hand.
a. two and a half years c. four and a half years
b. three and a half years d. five and a half years
ANS: A PTS: 1 REF: 12
10. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing ____ to be even smaller and more reliable than earlier computers.
a. second-generation computers c. fourth-generation computers
b. third-generation computers d. fifth-generation computers
ANS: B PTS: 1 REF: 13
11. The most common input devices today are the keyboard and ____.
a. printer c. speaker
b. mouse d. monitor
ANS: B PTS: 1 REF: 14
12. Two of the most common types of communications hardware are ____ and network adapters.
a. ports c. monitors
b. slide rules d. modems
ANS: D PTS: 1 REF: 16
13. The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
a. hardware c. software
b. port d. adapter
ANS: C PTS: 1 REF: 16
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
14. The Windows ____ shown in the figure above contains the following objects: Windows, Icons, Menus,
Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
a. command c. general menu
b. toolbox d. desktop
ANS: D PTS: 1 REF: 17
15. Programming languages come in many varieties—for example, BASIC, Visual Basic, Pascal,
COBOL, C++, and ____.
a. TCP/IP c. PDF
b. Rextore d. Java
ANS: D PTS: 1 REF: 17
16. Anyone who uses a computer is a(n) ____, including an accountant electronically preparing a client’s
taxes.
a. computer programmer c. Web user
b. application user d. computer user
ANS: D PTS: 1 REF: 18
17. A ____ is loosely defined as a very small device that has some built-in computing or Internet
capability.
a. mainframe computer c. mobile device
b. midrange server d. personal computer
ANS: C PTS: 1 REF: 19
18. A personal computer (PC) or ____ is a small computer system designed to be used by one person at a
time.
a. processor c. microchip
b. microcomputer d. small processor
ANS: B PTS: 1 REF: 21
19. Conventional PCs are often referred to as ____ because the complete computer system fits on or next
to a desk.
a. desktop PCs c. super PCs
b. laptop PCs d. processor PCs
ANS: A PTS: 1 REF: 21
20. The accompanying figure corresponds to the ____ style for desktop PCs.
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
a. all-in-one case c. desktop case
b. tower case d. sub case
ANS: A PTS: 1 REF: 21
21. Most notebooks follow the traditional ____ design in which the monitor is on the inside top half of the
PC, and the keyboard and touch pad are on the inside bottom half.
a. clamshell c. IBM
b. Microsoft d. book
ANS: A PTS: 1 REF: 23
23. A(n) ____ is a medium-sized computer used to host programs and data for a small network.
a. mainframe computer c. midrange server
b. super server d. Internet server
ANS: C PTS: 1 REF: 25
24. A ____ is a collection of hardware and other devices that are connected together so that users can share
hardware, software, and data, as well as electronically communicate with each other.
a. computer bank c. data bank
b. database d. computer network
ANS: D PTS: 1 REF: 27
25. ____ are unique numerical or text-based addresses used to identify resources accessible through the
Internet, such as computers, Web pages, and people.
a. Computer addresses c. Domain IDs
b. Machine IDs d. Internet addresses
ANS: D PTS: 1 REF: 29
26. Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a
____ uniquely identifies a Web page.
a. universal resource identifier (URI) c. uniform resource locator (URL)
b. Web ID (WID) d. Web resource identifier (WRI)
ANS: C PTS: 1 REF: 30-31
27. To contact people using the Internet, you most often use their ____.
a. domain names c. usernames
b. e-mail addresses d. passwords
ANS: B PTS: 1 REF: 31
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
28. To navigate to a new Web page for which you know the URL, type that URL in the browser’s ____
and press Enter.
a. Address bar c. Address button
b. Domain bar d. Name button
ANS: A PTS: 1 REF: 33
29. There are a number of special Web pages, called ____, available to help you locate what you are
looking for on the Internet.
a. search sites c. domain sites
b. domain identifications d. Internet repositories
ANS: A PTS: 1 REF: 34
30. With ____, e-mail messages stay on the mail server and are viewed using a Web browser.
a. Internet-based e-mail c. Web-com
b. Web-based e-mail d. program-based e-mail
ANS: B PTS: 1 REF: 35
31. One growing security problem is ____—in which someone else uses your identity, typically to
purchase goods or services.
a. identity duplication c. identity theft
b. domain theft d. phishing
ANS: C PTS: 1 REF: 37
33. ____ refers to typing your entire e-mail message or discussion group post using only capital letters.
a. Spamming c. Calling
b. Phishing d. Shouting
ANS: D PTS: 1 REF: 38
34. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with
keyboard symbols.
a. Spams c. Emoticons
b. Phishes d. Trojan horses
ANS: C PTS: 1 REF: 38
35. There are independent Web sites (such as the ____ Web site) that report on the validity of current
online rumors and stories.
a. Spammer c. Phisher
b. Snopes d. Identifier
ANS: B PTS: 1 REF: 39
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Case-Based Critical Thinking Questions
Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she
can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties.
36. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy
these to the computer at her office. What type of storage device should she use?
a. data projector c. scanner
b. firewire port d. USB flash drive
ANS: D PTS: 1 REF: 15 TOP: Critical Thinking
37. Sarah needs to prepare a simple Web page for her business. What type of application program should
she use?
a. spreadsheet c. scripting language
b. word processing d. BASIC
ANS: C PTS: 1 REF: 17 TOP: Critical Thinking
38. What kind of computer would most likely fit Sarah’s needs?
a. midrange server c. notebook
b. embedded d. docking station
ANS: C PTS: 1 REF: 23 TOP: Critical Thinking
Case 1-2
Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and
has a broad knowledge of the typical systems and applications software that people use. He has always
enjoyed working closely with people and has a good facility for explaining how technical systems
work.
39. Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What
course would she most likely suggest that Jamie take in college?
a. systems analysis c. computer literacy
b. history of computing d. Java
ANS: D PTS: 1 REF: 17 TOP: Critical Thinking
40. What type of computer-related job would Jamie probably enjoy the most?
a. hardware designer c. systems analyst
b. computer operations personnel d. end user
ANS: B PTS: 1 REF: 18 TOP: Critical Thinking
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
COMPLETION
1. Computers and traditional devices we use everyday have begun to ____________________ into single
units with multiple capabilities.
ANS: converge
PTS: 1 REF: 6
2. ____________________ are regular appliances with some type of built-in computer technology.
PTS: 1 REF: 7
ANS: m-commerce
PTS: 1 REF: 10
ANS: kiosks
PTS: 1 REF: 9
6. The ____________________ being used with a computer determine the tasks the computer is able to
perform.
ANS:
programs
software
PTS: 1 REF: 10
7. The progression of input, processing, output, and storage is sometimes referred to as the
____________________ cycle or the information processing cycle.
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
ANS: IPOS
PTS: 1 REF: 11
ANS: Communications
PTS: 1 REF: 11
9. The first computers were powered by thousands of ____________________ that needed replacing
constantly, required a great deal of electricity, and generated a lot of heat.
ANS:
vacuum tubes
glass tubes
tubes
PTS: 1 REF: 12
10. One common opinion is that fifth-generation computers will be based on ____________________,
allowing them to think, reason, and learn.
PTS: 1 REF: 14
ANS: hardware
PTS: 1 REF: 14
ANS: markup
PTS: 1 REF: 17
13. ____________________ are computer professionals whose primary job responsibility is to write the
programs that computers use.
ANS: Programmers
PTS: 1 REF: 18
14. Some midrange servers consist of a collection of individual ____________________ called blades.
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
ANS: circuit boards
PTS: 1 REF: 25
15. Typically, individual users connect to the Internet by connecting to computers belonging to a(n)
____________________.
ANS:
ISP
Internet service provider
Internet service provider (ISP)
ISP (Internet service provider)
PTS: 1 REF: 27
16. ISP computers are continually connected to a larger network, called a regional network, which, in turn,
is connected to one of the major high-speed networks within a country, called a(n)
____________________.
PTS: 1 REF: 27
17. The World Wide Web refers to one resource—a collection of documents called
____________________—available through the Internet.
PTS: 1 REF: 28
18. One of the most common online security risks today is your PC becoming infected with (a)
____________________.
ANS:
virus
computer virus
malware program
PTS: 1 REF: 37
19. By their very nature, online communications lend themselves to ____________________. Since
recipients usually do not hear senders’ voices or see their handwriting, it is difficult to know for sure
who the sender is.
ANS: anonymity
PTS: 1 REF: 39
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
20. A(n)____________________ would be used for applications that require extraordinary speed,
accuracy, and processing capabilities—for example, sending astronauts into space, controlling missile
guidance systems and satellites, forecasting the weather, exploring for oil, and assisting with some
kinds of scientific research.
ANS: supercomputer
PTS: 1 REF: 26
ESSAY
ANS:
Although computers have been used on the job for years, their role is continually evolving. Computers
were originally used as research tools for computer experts and scientists and then as productivity tools
for office workers. Today, computers are used by all types of employees in all types of
businesses—including corporate executives, retail store clerks, traveling sales professionals, artists and
musicians, engineers, police officers, insurance adjusters, delivery workers, doctors and nurses, auto
mechanics and repair personnel, and professional athletes.
ANS:
The four primary operations of a computer can be defined as follows:
Input—entering data into the computer.
Processing—performing operations on the data.
Output—presenting the results.
Storage—saving data, programs, or output for future use.
ANS:
The second generation of computers began when the transistor—a small device made of
semiconductor material that acts like a switch to open or close electronic circuits—started to replace
the vacuum tube. Transistors allowed second-generation computers to be physically smaller, more
powerful, cheaper, more energy-efficient, and more reliable than first-generation computers. Typically,
programs and data were input on punched cards and magnetic tape, output was on punched cards and
paper printouts, and magnetic tape and disks were used for storage. Programming languages (such as
FORTRAN and COBOL) were also developed and implemented during this generation.
5. Define the six categories into which computers are generally classified.
ANS:
Computers are generally classified in one of six categories, based on size, capability, and price.
- Embedded computers—tiny computers embedded into products to perform specific functions or tasks
for that product.
- Mobile devices—mobile phones and other communications devices with computing or Internet
capabilities.
- Personal computers—conventional desktop, notebook, tablet, and handheld computers.
- Midrange servers—computers that host data and programs available to a small group of users.
- Mainframe computers—powerful computers used to host a large amount of data and programs
available to a wide group of users.
- Supercomputers—extremely powerful computers used for complex computations and processing.
© 2011 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different
from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.