Вы находитесь на странице: 1из 5

1.

A) If you are an animator then a desktop computer is better because it has


more power.
B) It is portable, smaller, wireless.
C) Someone that travels a lot and needs something very portable.
D) If you where someone that has to go to places for work, and if you are
doing inventory for a stock and you need to know what you have in stock.
E) They are used to track peoples heart rate and the amount of steps you
take.
2. A) Microphone, mouse, and keyboard.
B) Headphones, Printer, and speakers.
C) Printers, used to print things. Webcam used to talk to people with you face.
3. Process socket: The brain of the computer. Memory slots: Slots to insert ram.
Video Card slot: A slot to insert a video card. Power connectors: used to power the
motherboard to operate. Expansion slots: Used to install better sound cards, video
capture card and more.
4. Input to memory to CPU to memory to output.
5. High speed memory, used to store frequently used data. And can be retrieved
quickly by an application.
6. A) An operating system would run automatically. While an application would have
to be started manually.
B) Mac OSX, Windows, and Linux
C) Computer software and hardware configuration.
D) Operating Systems
7. A program that is run by the OS
8. It is useful because if someone needs your help and you are at home, then you
can connect to there computer from your computer.
9. A) Low programming is for machines and assembly language. High programming
is a third generation programming language.
B) C, Fortran, Basic, COBOL
C) Compiler converts an entire program into a machine code. A Interpreter is a
program that translates and executes an instruction before moving.
D) it can be used over and over again.
10. You can transfer data quickly, Communication, Sharing programs, and sharing
printers.\

11. A) LAN and HAN


B) Broadband Technology

12. A) Software that allows users and devices to communicate over a network.
B) A software or hardware that makes the network.
13. Peer-to-Peer and Client/server.
14. A) the physical components of a network.
B) A node is a location on the network capable of processing information.
C) A star topology is attached to a hub.
D) A ring topology forms a loop.
E) Physical topology is where it is the physical components that make up a
network. A Logical topology how is appears connected to the user.
15. A topology loop
16. Because the circuits on the IC have one of two steps, On or Off.
17. A) 11
B) 42
18. A digital code that uses a set of sixteen 1s and 0s to form a 16 bit binary code.
19. A) 2147483648 Bytes
B) 536870912000 Bytes
20. A) an overflow error occurs when the number of bits that are needed to
represent the integer is greater than four bytes.
B) Numbers that contain decimal points.
C) A round off error occurs when there are not enough bits to hold the mantissa.
21. A) A text file is in English and a binary file is in 0s and 1s.
B) Is determines what application can read the file.
C) Everything would be in one place for that category and not all over the place.
22. External or internal. External hard drive like a USB. A internal hard drive like a
SSD.
23. Be careful when putting disk in tray, Try not to scratch the back on the disk,
Hold CD/DVD by the edges, Store CD/DVD in sleeves.

24. A) A Intranet is a network that is used by a single organization and only


assessable by authorized users. A Extranet is a extended intranet that provides
various levels of access to authorized members of the public.
B) The Internet service provider controls the internet for you.
25. A) It uses telephone lines to convert analog signals to digital data.
B) A cable modem transmits data through a coaxial cable television network
while a DLS modem used standard telephone phone lines.
26. A) In 2013 the most widely used internet service was MEGA. A cloud storage
website.
B) E-Mail will arrive fast to the person and is cheaper and less of a wait.
C) brohalo2000@gmail.com brohalo2000 is the username, gmail is the domain
name, and .com is the top-level domain.
D) You must have an email address. You must have the persons email that you
want to email to.
E) gmail.com
27. A) They both can look the same. They are both sending you a message.
B) There can be a lack of communication in the workplace. If something goes
wring then the higher people will not know about it.
28. A) Google.ca | bing.com | yahoo.com
B) I prefer google because I like the way it looks and I have love all the
applications it has with it.
C) If you dont search specifically what you want to look up then you are going to
find other things.
29. A) Restaurants in Miami
B) Art museum in Montreal Canada
C) Clothing stores in Vancouver
D) Alligator but not crocodiles
E) James Patterson
F) The phrase garbage in garbage out
G) George Washington and john Adams -ThomasJefferson
H) Travel to Florida but not Orlando
30. Because if you download something from a third party site then it may contain a
virus that can harm your computer.

31. A) how easy is it to use? How much effort is in the website? How modern dose it
look? Dose the website own all the content on the website.
B) So if the content is not yours then the credit goes to the person that worked
hard and made the piece.
C) The page was not found.
32. A) A marketing technique that collects online data about consumers.
B) Text file created by the server computer when user enters information into a
website.
C) A tiny, transparent graphic located on a webpage used to collect data about
the webpage user.
D) The website administrator.
33. http://www.shell.ca/en/about-our-website/privacy-policy.html
34. Email, if website offers email we may collect the information.
35. To prevent students for going to websites that are not allowed in school, to
prevent students from downloading games, to prevent students from getting off
task from their work.
36. You can try a different bank.
37. A) If the use of work protected by copyright law without permission.
B) They must get the records copyrighted.

38. A) You may not use the content as your own.


B) Because software devolopers are people that make money from the software
they make, and when someone steals your software then you dont get money.
C) The act of someone sending an email to a user claiming to be a legitimate
business in an attempt to trick the user into revealing personal info.

39. You must be able to help people out and work well with others. You must be able
to do what your told.

40. A) False, Software is in the computer.

B) True
C) True
D) True
E) True
F) False, It gose from one peer to the other.
G) True
H) True
I) true
J) True
K) True

Вам также может понравиться