Вы находитесь на странице: 1из 13

Eli Klassen

Block C

Chapter 1 Critical Thinking


1a) Describe a situation where a desktop computer might be preferred over
a notebook computer.
A situation where a desktop computer may be preferred rather than a
notebook is when more computing power is needed.
b) List three advantages of purchasing a notebook computer instead of a
desktop computer.
i) A notebook is more portable than a desktop
ii) Notebooks are very convenient due to their size and power and are very
useful for places such as school
iii) Notebooks can in cases be cheaper than a desktop PC once prices of
monitors, keyboards and mice are included.
c) Describe a situation or user that would prefer a tablet PC over a notebook
computer.
A scenario where a tablet PC would be preferred to a notebook would be if
the user needed to be able to walk around with their device and use it at the
same time. For example, using it to check the stock of an item at the store
they work at.
d) Describe two occupations where it would be useful to have a hand-held
computer.
Two occupations where it would be useful to have a hand-held computer are
an employee at a retail store for checking stock, etc. and a car mechanic.
e) Describe how wearable computers are used in the health care industry.
Wearable computers are used in the health care industry to monitor health
problems such as a persons heart rate or breathing rate/flow.

2a) List and compare three input devices.


Three types of input devices are a keyboard, a mouse and a microphone. A
mouse is used to point the computer cursor around the screen, the keyboard
is used to input text, use shortcuts, etc. and finally a microphone is used to
record audio.
Eli Klassen
Block C

b) List and compare three output devices.


Monitors, disk drives and speakers are examples of output devices. A monitor
outputs the OS and what is happening on the computer, speakers output
audio from the computer and disk drives output storage from the computer.
c) List and compare two peripheral devices.
Two types of peripherals are printers and webcams. Printers are devices used
to print documents and webcams are cameras that have microphones on
them and are used to video chat, record video from your PC, etc.
d) List three different types of ports.
Three types of ports are USB, Bluetooth and parallel ports.

3) List and describe five components found on the motherboard.


Five types of components on the motherboard are expansion boards, the
CPU, a bus, RAM and ROM. Expansion boards are circuit boards that are
connected to the motherboard and improve the functionality of the
computer. The CPU processes data and handled the flow of data between the
computers units. A bus is a set of circuits that are connect the CPU to the
other components. RAM, or random access memory, is where data is
temporarily stored on the computer. ROM, or read only memory, contains the
basic operation instructions for the computer. The data in the ROM is
permanent whereas the data in the RAM is temporary. Both however are
types of memory.

4) Describe the flow of data between the components of a computer,


starting with input.
The flow of data starts with the input and moves towards the memory. From
the memory, the data moves to the CPU and back to the memory where it
finishes at the output. All of the data in a computer flows through the CPU.

5) What is cache memory used for?


The cache memory is used to store frequently used data so it can be quickly
accessed by an application.

6a) Describe one difference between operating system software and


applications software
Eli Klassen
Block C

One difference between operating systems and application software is that


operating systems operates the application software, control and input of the
computer whereas an application software does not.
b) List three different operating systems.
Three different operating systems are Windows, Mac OS X and Linux.
c) What does environment refer to?
An environment refers to the computers hardware and software
configuration.
d) What is another word for environment?
Another word for environment is platform.

7) What is a utility program? Give an example.


A utility program is a program that manages the input, output, read and
write to memory, manage the processor, maintain system security and
manage files and disks. An example of this is a disk defragmenter.

8) Why is cross-platform connectivity important to many computer users?


Cross-platform connectivity may be important to a majority of computer
users because they may want to share work files at a workplace or be able to
share files with their peers.

9a) What is the difference low and high level programming languages?
Low level programming uses either 1s and 0s to communicate to program
whereas high level programming have English like instructions that are
easier to use and understand.
b) List three high-level programming languages.
Three high level programming languages are C, Basic and COBOL.
c) What is the difference between a complier and an interpreter?
A complier converts an entire program into machine code before it is
executed and an interpreter translates and executes a single instruction
before moving on to the next one.
d) List an advantage of using an object-oriented programming language.
Eli Klassen
Block C

One perk of using object oriented programming is that it allows for more
organized, systematic and complex approaches because of the ability to
create reusable modules.

10) List four benefits of using a network.


i) Can reduce costs by the ability to share devices such as printers.
ii) Allows users to share and exchange data safely and reliably.
iii) Gives users security options such as passwords to lock certain files.
iv) Makes file management simpler through centralized software updates
and file backups.

11a) What are the two common size classifications for networks?
The two common size classifications for networks are LAN (local-area
network) and WAN (wide-area network).
b) What size classification is used to connect devices over large
geographical distances?
WAN is used to connect devices over large geographical distances.

12a) What is a network operating system?


A network operating system is software that allows users and devices to
communicate over the network.
b) What does a network environment refer to?
A network environment refers to a set of network computers that are
connected to each other to share data.
13) Describe two common network architecture models.
The two types of common network architecture models are peer to peer and
client/server. Peer to peer connection means that each computer on the
network is thought to be equal in responsibilities and resource sharing. In
client/server connections a group of computers called clients are connected
to a server. The server is a computer with more RAM, a larger hard drive and
occasionally multiple CPUs used to manage network functions.

14a) What does physical topology refer to?


Eli Klassen
Block C

Physical topology refers to the arrangement of the nodes on a network


b) What is a node?
A node is a location on the network with a device able to process information
like a computer or printer.

c) Which topology uses a hub?


A star topology uses a hub where each node is attached to a hub.
d) Which topology connects each node to form a closed loop?
A ring topology connects each node in a closed loop.
e) What is the difference between physical and logical topology?
Physical topology refers to the arrangement of nodes where logical topology
refers to the way data is passed between nodes.

15) Which netiquette rules apply in your classroom?


The netiquette rules that apply in the classroom are: not sharing your
password with other users, do not attempt to log in to another users account
without permission and use appropriate language and be respectful.

16) Explain why the binary number system was adopted for use in
computers.
The binary number system was adopted for usage because electrical circuits
on an IC have two states, on or off.

17a) What is the decimal equivalent of 10112?


The decimal equivalent of 10112 is 11.
b) What is the decimal equivalent of 2A16?
The decimal equivalent of 2A16 is 42.
18) What is Unicode?
Unicode is the representation of every letter in the alphabet whether it be
Latin, Japanese, etc. in digital code.
19a) How many bytes of data can 2GB of RAM store?
2GB of RAM can store 2,147,483,648 bytes of data.
Eli Klassen
Block C

b) How many bytes of data can a 500 GB hard drive store?


A 500 GB hard drive can store 536,870,912,000 bytes.

20a) When would an overflow error occur?


An overflow error occurs when the number of bits that are needed to show
the integers greater than the size of four bytes.
b) What are real numbers?
Real numbers are numbers that contain decimal points.
c) When would a roundoff error occur?
A roundoff error would occur when there not enough bits to store the
mantissa.

21a) What is the difference between a text file and a binary file?
A text file is human readable and a computer readable file is a binary file.
b) Explain how an extension distinguishes file types.
An application adds a unique extension that comes after the file name to
distinguish the file type.
c) Describe how organizing your files into folders would help keep you
organized.
Keeping your files in separate folders based on their contents would help you
be more organized because your files will not be spread out all over your
computer. Instead they would be in a centralized location and easy to access.

22) List two ways storage devices can be classified ad give an example of a
storage device in each category.
Two ways storage devices can be categorized is as internal and external. An
internal storage device would be a hard drive and an external storage device
would be something like a flash drive.

23) List four rules that should be followed to avoid damaging files store on
disks or DVDs.
i) Keep the magnetic media away from magnets.
Eli Klassen
Block C

ii) Hold CDs by the center hole or by the edges.


iii) Store CDs in a jewel case or sleeve to prevent scratches.
iv) Keep media away from moisture and extreme temperatures.

24a) What is the difference between an intranet and an extranet?


An intranet is a network used by a single organization whereas the extranet
is used by various authorized members of the public.
b) Who controls the internet?
No one organization or person runs the internet.

25a) What problem is associated with using a conventional modem?


Conventional modems have slow access times/speeds for most homes and
businesses.
b) Describe the differences between a DSL modem and a cable modem.
A DSL modem uses standard telephone lines with data transmission up to
640kbps and a cable modem uses a coaxial cable television network with
speeds of 2Mbps to 10Mbps.

26a) What is the most widely used internet service?


The most widely used internet service is called the World Wide Web (WWW)
b) List one benefit of e-mail over standard mail.
E-mail arrives almost instantaneously whereas standard mail takes longer to
ship to the person.
c) Write your e-mail address and label the parts of the address.
My email address is: klassen.eli@gmail.com . The klassen.eli part is the
username, the Gmail part is the host/domain name and the .com is the top
level domain.
d) What are two requirements for sending and receiving e-mail messages?
An email address and email software are both required for sending and
receiving emails.
e) List one example of a browser based email site.
One example of a browser based email site is Googles Gmail.
Eli Klassen
Block C

27a) Explain why sending an e-mail message should be thought of the same
as sending a postcard.
Sending e-mails should be thought as sending postcards because you still
need to use manners such as please and thank you on e-mails and
postcards. Also, an address is required for both except postcards have a
house or mail address and emails have an electronic address. Additionally,
anyone can read postcards as well as an email that you send.
b) Discuss with a partner and then summarize issues that could occur if e-
mail etiquette is not followed in the work place.
If e-mail etiquette is not followed in the workplace, it could lead to severe
consequences such as being fired from your job in the worst case scenario or
getting in serious trouble with your superiors. This is because employers
have the right to read your emails that are sent.

28a) List three commonly used search engines.


i) Yahoo!
ii) Google
iii) MSN
b) Which search engine do you like to use and why?
I prefer to use Google because it is simple, fast and accurate in coming up
with matches.
c) Describe the importance of using effective search criteria.
Using effective search criteria is important because most searches yield far
too many matches to be anywhere near useful. Narrowing your search
criteria helps you find the match that you are looking for a lot faster and
efficiently.
29) Write search criteria to locate web pages that contain the following
information
a) restaurants in Miami
Miami +restaurants
b) art museums in Montreal, Canada
Eli Klassen
Block C

Art museums +Montreal, Canada


c) clothing stores in your city
Clothing stores +Surrey, BC
d) alligators, but not crocodiles
Alligators crocodiles
e) the author James Patterson
Author +James Patterson OR James Patterson author

f) the phrase garbage in garbage out


Garbage in garbage out
g) George Washington and John Adams, but not Thomas Jefferson
George Washington +John Adams Thomas Jefferson
h) Travel to Florida, but not Orlando
Travel to Florida Orlando

30) Why should files only be downloaded from authentic sites?


Files should only be downloaded from authentic sites because an illegitimate
file downloaded could install a virus on your computer.

31a) List four questions to answer when evaluating a website source


i) The authors first and last name
ii) The article title
iii) The site title
iv) The publishers name
b) Why is it necessary to cite sources?
It is necessary to cite sources because the author of the site that you took
the information from needs to be credited for their work.
c) On August 12th, 2012 you accessed a posting on the Clewiston Kite
Surfing discussion list at http://www.emcschool.net/kitesurf/color.txt. The
posting was made by Tara Perez on the topic of kite colors. Write a citation
for a research paper that quotes Taras posting.
Eli Klassen
Block C

Perez, Tara. Kite Colors Clewiston Kite Surfing. n.p. n.d. August 2nd 2012.
http://www.emcschool.net/kitesurf/color.txt.

32a) What is online profiling?


Online profiling is the collection of data about consumers visiting a website.
b) What is a cookie?
A cookie is a text file created by the server computer when a user enters
information into a website. The file is stored on the users computer and
accessed when the user visits the same website.
c) What is a web beacon?
A web beacon is a tiny, transparent graphic located on web pages or e-mail
messages that are used in combination with cookies to collect data about
web page users or e-mail senders.
d) Who usually monitors the information collected by web beacons?
The monitoring of information collected by web beacons is usually done by
an outside advertising company.

33) Locate a websites private policy and document its contents.


Microsofts privacy policy: https://privacy.microsoft.com/en-
us/privacystatement
Microsoft collects data to operate effectively and provide you the best
experiences with our products. You provide some of this data directly, such
as when you create a Microsoft account, submit a search query to Bing,
speak a voice command to Cortana, upload a document to OneDrive,
purchase an MSDN subscription, sign up for Office 365, or contact us for
support. We get some of it by recording how you interact with our products
by, for example, using technologies like cookies, and receiving error reports
or usage data from software running on your device. We also obtain data
from third parties.

34) Name and briefly describe one law that helps protect the privacy of an
individual.
One law that protects the privacy of a person is called the: Electronic
Communications Act of 1986 or ECPA. It protects your privacy by making
accessing and sending electronic data without authorization a crime.
Eli Klassen
Block C

35) List three reasons why many schools have developed an Acceptable Use
Policy.
i) Inappropriate language is disallowed.
ii) Only the administrator is allowed to install/uninstall software that may be
used on the computes.
iii) Disallowing the access of other users accounts without authorization.
iv) The distribution of inappropriate materials is banned.

36) What can you do if you are turned down for credit at a bank and believe
the data use to deny credit is inaccurate?
If you believe the information is inaccurate, you can ask the bank to view the
information/files used to assess the denial and check for yourself in the
information is inaccurate.

37a) What is necessary for a federal government authority to access an


individuals financial records?
A search warrant is necessary for a federal government authority to access a
persons financial records.
b) What must a financial institution do after releasing an individuals
records?
The financial institution must notify the person after releasing their records.

38a) What is copyright infringement?


Copyright infringement is the illegal usage or reproduction of data.
b) Why is computer piracy such a concern to software developers?
Computer piracy is a concern to software developers because it costs lots of
money to develop their software and when it is upright stolen via piracy,
their future developments become jeopardized.
c) What is a computer virus?
A computer virus is a malicious program or series of instructions that can
replicate without the users knowledge.
Eli Klassen
Block C

d) Describe phishing.
Phishing is the act of sending an e-mail to a user that falsely claims to be a
legitimate business in an attempt to trick the user into revealing personal
information.

39) What ethical responsibilities does an IT professional have?


An IT professional has the ethical responsibilities to maintain system
reliability (updating software, installing new software, etc.), to take
responsibility for their career choice by evaluating their programs before
release, not releasing sensitive information or to take special care in certain
cases such as nuclear reactors. Also, IT professionals have to be aware of the
impact they have on computer users with the amount of data they possess
and are in charge of. Finally, we have to be cautious when it comes to
computers replacing humans where judgment is crucial because humans are
able to judge situations naturally but computers have to be programmed to
judge situations and could be programmed wrong and make the wrong
choice.

40) Determine if each of the following is true or false. If false, explain why.
a) Software refers to the physical components of the computer
False. Hardware refers to the physical components of the computer.
b) Linux is an operating system
True.
c) A utility program has one clearly defined task.
True.
d) Assembly language is a high-level programming language.
False, assembly language is a low-level programming language.
e) WAN connects devices over large geographical distances
True.
f) A peer-to-peer network has a server.
False, a peer-to-peer network has no server as both devices have equal
responsibilities. A client-to-server network does have a server.
g) The binary number system uses only 1s and 0s.
True.
Eli Klassen
Block C

h) A conventional modem transmits data faster than a cable modem.


False, a cable modem transmits data at 28.8 Kbps and 36.6 Kbps whereas a
cable modem transmits data from 2 Mbps to 10 Mbps.
i) An e-mail address is required to send e-mail messages.
True
j) The present time is referred to as the industrial age.
False, the present time is referred to as the information age.
k) Ergonomics is the science that studies safe work environments.
True.

Вам также может понравиться