Deck 1: Computers and Digital Basics

Full screen (f)
exit full mode
Question
Suppose that you walk into an office and see the devices pictured to the right. You would probably assume that they are the screen, keyboard, and mouse for a(n)
Suppose that you walk into an office and see the devices pictured to the right. You would probably assume that they are the screen, keyboard, and mouse for a(n)   computer, workstation, or server.<div style=padding-top: 35px> computer, workstation, or server.
Use Space or
up arrow
down arrow
to flip the card.
Question
List the four phases of the digital revolution.
Question
You receive an e-mail message asking you to join a circle of friends. You assume that the message was generated in conjunction with an online
You receive an e-mail message asking you to join a circle of friends. You assume that the message was generated in conjunction with an online   network, such as Facebook, and if you become a member, you will be able to socialize online.<div style=padding-top: 35px> network, such as Facebook, and if you become a member, you will be able to socialize online.
Question
Define the term convergence and provide examples of at least five devices that are converging.
Question
You're planning a trip to Finland, but when you access the hotel site, the prices are listed in euros. To find the price in U.S. dollars, you access a currency converter from your portable phone. That's an example of
You're planning a trip to Finland, but when you access the hotel site, the prices are listed in euros. To find the price in U.S. dollars, you access a currency converter from your portable phone. That's an example of   computing, representative of the fourth phase of the digital revolution.<div style=padding-top: 35px> computing, representative of the fourth phase of the digital revolution.
Question
Describe at least two social, political, and economic effects of the digital revolution.
Question
You're visiting an antique shop and notice a collection of old-fashioned radios. They actually feature a dial for tuning in different radio stations. You immediately recognize this as a(n)
You're visiting an antique shop and notice a collection of old-fashioned radios. They actually feature a dial for tuning in different radio stations. You immediately recognize this as a(n)   device because it deals with an infinite scale of values, rather than discrete values.<div style=padding-top: 35px> device because it deals with an infinite scale of values, rather than discrete values.
Question
Draw a diagram to explain how a computer makes use of input, processing, storage, memory, output, and stored programs.
Question
While attending a meeting at work, you hear one of the executives wondering if "unit code" would be helpful. After a moment of puzzlement, you realize that the executive really meant
While attending a meeting at work, you hear one of the executives wondering if unit code would be helpful. After a moment of puzzlement, you realize that the executive really meant   , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.  <div style=padding-top: 35px> , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.
While attending a meeting at work, you hear one of the executives wondering if unit code would be helpful. After a moment of puzzlement, you realize that the executive really meant   , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.  <div style=padding-top: 35px>
Question
Describe the difference between system software, an operating system, application software, and a computer program.
Question
You have a storage device that offers 2 GB of storage space. It is currently empty. Your friend wants to give you a large digital photo that's 16 MB. Will it fit on your storage device?
You have a storage device that offers 2 GB of storage space. It is currently empty. Your friend wants to give you a large digital photo that's 16 MB. Will it fit on your storage device?  <div style=padding-top: 35px>
Question
List, briefly describe, and rank (in terms of computing capacity) the characteristics of each computer category described in Section B of this chapter.
Question
Your bank is giving customers the choice of using a fourdigit PIN or a password that can contain up to ten letters and numbers. The
Your bank is giving customers the choice of using a fourdigit PIN or a password that can contain up to ten letters and numbers. The   is more secure, so that's what you decide to use.<div style=padding-top: 35px> is more secure, so that's what you decide to use.
Question
List the characteristics that handheld computers and dedicated handheld devices have in common with personal computers, and list factors by which they differ.
Question
You need to select a password for your online PayPal account. Which of the following passwords would be the LEAST secure: jeff683, hddtmrutc, gargantuan, fanhotshot, bb#ii22jeffry, or high348?
You need to select a password for your online PayPal account. Which of the following passwords would be the LEAST secure: jeff683, hddtmrutc, gargantuan, fanhotshot, bb#ii22jeffry, or high348?  <div style=padding-top: 35px>
Question
Define the term microcontroller and provide three examples of devices in which microcontrollers are found.
Question
Explain the technical difference between data and information.
Question
Provide three examples of digital devices and three examples of analog devices.
Question
List the ASCII representation for B and the binary representation for 18; draw a stepped waveform showing a digital sound; and draw a diagram showing how color is represented in a graphic.
Question
List and define all the chapter terms, such as bit , byte , and kibibyte , that pertain to quantifying data.
Question
Use the terms integrated circuits , microprocessor , and system board in a meaningful sentence.
Question
Describe how compilers and interpreters work with high-level programming languages, source code, and object code.
Question
Make a storyboard showing how a microprocessor's ALU would add the numbers 2 and 8.
Question
Explain how hackers use dictionary and brute force attacks.
Question
Provide examples of five secure passwords and five passwords that might be easy to crack.
Question
Data
Data   was the computing technology behind the first phase of the digital revolution.<div style=padding-top: 35px> was the computing technology behind the first phase of the digital revolution.
Question
  software refers to any software that is installed on a computer's hard drive.<div style=padding-top: 35px> software refers to any software that is installed on a computer's hard drive.
Question
A computer
A computer   is a group of computers linked together to share data and resources.<div style=padding-top: 35px> is a group of computers linked together to share data and resources.
Question
The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called
The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called   .<div style=padding-top: 35px> .
Question
  computing provides access to information, applications, communications, and storage over the Internet.<div style=padding-top: 35px> computing provides access to information, applications, communications, and storage over the Internet.
Question
A computer is a digital device that processes data according to a series
A computer is a digital device that processes data according to a series   of instructions called a program or software.<div style=padding-top: 35px> of instructions called a program or software.
Question
Computer data is temporarily stored in
Computer data is temporarily stored in   , but is usually transferred to   where it can be left on a more permanent basis.<div style=padding-top: 35px> , but is usually transferred to
Computer data is temporarily stored in   , but is usually transferred to   where it can be left on a more permanent basis.<div style=padding-top: 35px> where it can be left on a more permanent basis.
Question
  computers are available in desktop and portable models.<div style=padding-top: 35px> computers are available in desktop and portable models.
Question
A digital device, such as a computer, is called a(n)
A digital device, such as a computer, is called a(n)   when it requests data from a server.<div style=padding-top: 35px> when it requests data from a server.
Question
A(n)
A(n)   is a special-purpose microprocessor that is built into the machine it controls.<div style=padding-top: 35px> is a special-purpose microprocessor that is built into the machine it controls.
Question
Data
Data   refers to the format in which data is stored, processed, and transferred.<div style=padding-top: 35px> refers to the format in which data is stored, processed, and transferred.
Question
Digital devices often use the
Digital devices often use the   number system to represent numeric data.<div style=padding-top: 35px> number system to represent numeric data.
Question
Most computers use Unicode or Extended
Most computers use Unicode or Extended   code to represent character data. (Hint: Use the acronym.)<div style=padding-top: 35px> code to represent character data. (Hint: Use the acronym.)
Question
KB is the abbreviation for
KB is the abbreviation for   .<div style=padding-top: 35px> .
Question
Integrated circuits are fabricated from
Integrated circuits are fabricated from   materials that have properties of a conductor and an insulator.<div style=padding-top: 35px> materials that have properties of a conductor and an insulator.
Question
A(n)
A(n)   converts all of the source code instructions into object code, which becomes a new file containing   code.<div style=padding-top: 35px> converts all of the source code instructions into object code, which becomes a new file containing
A(n)   converts all of the source code instructions into object code, which becomes a new file containing   code.<div style=padding-top: 35px> code.
Question
A microprocessor is hard-wired to perform a set of activities called a(n)
A microprocessor is hard-wired to perform a set of activities called a(n)   set.<div style=padding-top: 35px> set.
Question
A machine language instruction has two parts: a(n)
A machine language instruction has two parts: a(n)   code and an operand.<div style=padding-top: 35px> code and an operand.
Question
The ALU in your computer's microprocessor holds data in
The ALU in your computer's microprocessor holds data in   .<div style=padding-top: 35px> .
Question
The microprocessor's control unit contains a(n)
The microprocessor's control unit contains a(n)   pointer that holds the address of the instruction being executed.<div style=padding-top: 35px> pointer that holds the address of the instruction being executed.
Question
An authentication
An authentication   is any method that confirms a person's identity using something the person knows, something the person possesses, or something the person is.<div style=padding-top: 35px> is any method that confirms a person's identity using something the person knows, something the person possesses, or something the person is.
Question
On a(n)
On a(n)   -sensitive server, the user ID BJP is different than bjp.<div style=padding-top: 35px> -sensitive server, the user ID BJP is different than bjp.
Question
A(n)
A(n)   attack can guess your password if you are using common passwords or everyday words.<div style=padding-top: 35px> attack can guess your password if you are using common passwords or everyday words.
Question
A(n)
A(n)   scam looks like a request from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password.<div style=padding-top: 35px> scam looks like a request from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password.
Question
Most browsers include a built-in password
Most browsers include a built-in password   that remembers the user IDs and passwords you use when logging in to Web sites or online e-mail.<div style=padding-top: 35px> that remembers the user IDs and passwords you use when logging in to Web sites or online e-mail.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Computers and Digital Basics
1
Suppose that you walk into an office and see the devices pictured to the right. You would probably assume that they are the screen, keyboard, and mouse for a(n)
Suppose that you walk into an office and see the devices pictured to the right. You would probably assume that they are the screen, keyboard, and mouse for a(n)   computer, workstation, or server. computer, workstation, or server.
Personal computer
A computer is electronic devices which takes input signal from user, process the signal and give result or response according to input. Generally a computer consists of three things: input device (like keyboard, mouse), CPU and output device (screen).
According to size, cost and capability computer is classified into personal computer, workstation, server and super computer.
A Personal computer is microprocessor based general-purpose computer which fulfill the basic computing need of person. It is very useful for the user with respect to its sizing and cost.
This computer is embedded with operating system having following qualities that is- Interactive, User friendly, Time sharing, Multiprocessing and Multiple user.
Therefore, the appropriate word to fill in the blank is Personal.
2
List the four phases of the digital revolution.
not answer
3
You receive an e-mail message asking you to join a circle of friends. You assume that the message was generated in conjunction with an online
You receive an e-mail message asking you to join a circle of friends. You assume that the message was generated in conjunction with an online   network, such as Facebook, and if you become a member, you will be able to socialize online. network, such as Facebook, and if you become a member, you will be able to socialize online.
Social network
A Social network is a kind of network which provides the services and platform to build up social relation among various people. These networks consist of a representation of each user and their social links with other people and various other additional services.
These networks mainly use the internet as a means for interacting with other people. Facebook, Google+, Twitter, e-mail, and instant messaging are some of the social networking site design for the people to interact with each other. These people may or may not be known to each other.
Social networking sites allow user to share their ideas, pictures, posts, activities, event, and interest with people on their network.
Therefore, appropriate word to fill in the blank is Social.
4
Define the term convergence and provide examples of at least five devices that are converging.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
You're planning a trip to Finland, but when you access the hotel site, the prices are listed in euros. To find the price in U.S. dollars, you access a currency converter from your portable phone. That's an example of
You're planning a trip to Finland, but when you access the hotel site, the prices are listed in euros. To find the price in U.S. dollars, you access a currency converter from your portable phone. That's an example of   computing, representative of the fourth phase of the digital revolution. computing, representative of the fourth phase of the digital revolution.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Describe at least two social, political, and economic effects of the digital revolution.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
You're visiting an antique shop and notice a collection of old-fashioned radios. They actually feature a dial for tuning in different radio stations. You immediately recognize this as a(n)
You're visiting an antique shop and notice a collection of old-fashioned radios. They actually feature a dial for tuning in different radio stations. You immediately recognize this as a(n)   device because it deals with an infinite scale of values, rather than discrete values. device because it deals with an infinite scale of values, rather than discrete values.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Draw a diagram to explain how a computer makes use of input, processing, storage, memory, output, and stored programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
While attending a meeting at work, you hear one of the executives wondering if "unit code" would be helpful. After a moment of puzzlement, you realize that the executive really meant
While attending a meeting at work, you hear one of the executives wondering if unit code would be helpful. After a moment of puzzlement, you realize that the executive really meant   , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.  , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.
While attending a meeting at work, you hear one of the executives wondering if unit code would be helpful. After a moment of puzzlement, you realize that the executive really meant   , and that it would allow your company software to be translated into the Cyrillic alphabet used by the Russian language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Describe the difference between system software, an operating system, application software, and a computer program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
You have a storage device that offers 2 GB of storage space. It is currently empty. Your friend wants to give you a large digital photo that's 16 MB. Will it fit on your storage device?
You have a storage device that offers 2 GB of storage space. It is currently empty. Your friend wants to give you a large digital photo that's 16 MB. Will it fit on your storage device?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
List, briefly describe, and rank (in terms of computing capacity) the characteristics of each computer category described in Section B of this chapter.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Your bank is giving customers the choice of using a fourdigit PIN or a password that can contain up to ten letters and numbers. The
Your bank is giving customers the choice of using a fourdigit PIN or a password that can contain up to ten letters and numbers. The   is more secure, so that's what you decide to use. is more secure, so that's what you decide to use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
List the characteristics that handheld computers and dedicated handheld devices have in common with personal computers, and list factors by which they differ.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
You need to select a password for your online PayPal account. Which of the following passwords would be the LEAST secure: jeff683, hddtmrutc, gargantuan, fanhotshot, bb#ii22jeffry, or high348?
You need to select a password for your online PayPal account. Which of the following passwords would be the LEAST secure: jeff683, hddtmrutc, gargantuan, fanhotshot, bb#ii22jeffry, or high348?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Define the term microcontroller and provide three examples of devices in which microcontrollers are found.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Explain the technical difference between data and information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Provide three examples of digital devices and three examples of analog devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
List the ASCII representation for B and the binary representation for 18; draw a stepped waveform showing a digital sound; and draw a diagram showing how color is represented in a graphic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
List and define all the chapter terms, such as bit , byte , and kibibyte , that pertain to quantifying data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Use the terms integrated circuits , microprocessor , and system board in a meaningful sentence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Describe how compilers and interpreters work with high-level programming languages, source code, and object code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Make a storyboard showing how a microprocessor's ALU would add the numbers 2 and 8.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Explain how hackers use dictionary and brute force attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Provide examples of five secure passwords and five passwords that might be easy to crack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Data
Data   was the computing technology behind the first phase of the digital revolution. was the computing technology behind the first phase of the digital revolution.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
  software refers to any software that is installed on a computer's hard drive. software refers to any software that is installed on a computer's hard drive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A computer
A computer   is a group of computers linked together to share data and resources. is a group of computers linked together to share data and resources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called
The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called   . .
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
  computing provides access to information, applications, communications, and storage over the Internet. computing provides access to information, applications, communications, and storage over the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A computer is a digital device that processes data according to a series
A computer is a digital device that processes data according to a series   of instructions called a program or software. of instructions called a program or software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Computer data is temporarily stored in
Computer data is temporarily stored in   , but is usually transferred to   where it can be left on a more permanent basis. , but is usually transferred to
Computer data is temporarily stored in   , but is usually transferred to   where it can be left on a more permanent basis. where it can be left on a more permanent basis.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
  computers are available in desktop and portable models. computers are available in desktop and portable models.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A digital device, such as a computer, is called a(n)
A digital device, such as a computer, is called a(n)   when it requests data from a server. when it requests data from a server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)
A(n)   is a special-purpose microprocessor that is built into the machine it controls. is a special-purpose microprocessor that is built into the machine it controls.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Data
Data   refers to the format in which data is stored, processed, and transferred. refers to the format in which data is stored, processed, and transferred.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Digital devices often use the
Digital devices often use the   number system to represent numeric data. number system to represent numeric data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Most computers use Unicode or Extended
Most computers use Unicode or Extended   code to represent character data. (Hint: Use the acronym.) code to represent character data. (Hint: Use the acronym.)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
KB is the abbreviation for
KB is the abbreviation for   . .
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Integrated circuits are fabricated from
Integrated circuits are fabricated from   materials that have properties of a conductor and an insulator. materials that have properties of a conductor and an insulator.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
A(n)
A(n)   converts all of the source code instructions into object code, which becomes a new file containing   code. converts all of the source code instructions into object code, which becomes a new file containing
A(n)   converts all of the source code instructions into object code, which becomes a new file containing   code. code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A microprocessor is hard-wired to perform a set of activities called a(n)
A microprocessor is hard-wired to perform a set of activities called a(n)   set. set.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
A machine language instruction has two parts: a(n)
A machine language instruction has two parts: a(n)   code and an operand. code and an operand.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
The ALU in your computer's microprocessor holds data in
The ALU in your computer's microprocessor holds data in   . .
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
The microprocessor's control unit contains a(n)
The microprocessor's control unit contains a(n)   pointer that holds the address of the instruction being executed. pointer that holds the address of the instruction being executed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
An authentication
An authentication   is any method that confirms a person's identity using something the person knows, something the person possesses, or something the person is. is any method that confirms a person's identity using something the person knows, something the person possesses, or something the person is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
On a(n)
On a(n)   -sensitive server, the user ID BJP is different than bjp. -sensitive server, the user ID BJP is different than bjp.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
A(n)
A(n)   attack can guess your password if you are using common passwords or everyday words. attack can guess your password if you are using common passwords or everyday words.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)
A(n)   scam looks like a request from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password. scam looks like a request from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Most browsers include a built-in password
Most browsers include a built-in password   that remembers the user IDs and passwords you use when logging in to Web sites or online e-mail. that remembers the user IDs and passwords you use when logging in to Web sites or online e-mail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.