Professional Documents
Culture Documents
2
7. A utility program is a program that has one clearly defined task, such as managing files and
disks. A device driver is a utility program is needed for printing, viewing graphics, using a
CD/DVD drive, and using peripherals.
8. Answers will vary. A possible answer is:
Cross-platform connectivity is important to many computer users because they own more
than one computing device, such as a hand-held device and a desktop computer and they
need to be able to share files, e-mail messages, etc. between the devices.
9. a) High-level programming languages contain English-like instruction and need to be
compiled or interpreted in order to communicate with the computer. Low-level languages
consist of 0s and 1s and can communicate directly with the computer.
b) Answers will vary. A possible answer is:
Three high level programming languages are Fortran, C, and Basic.
c) A compiler is a program that converts an entire program into machine code before the
program is executed. An interpreter translates and executes an instruction before moving
on to the next instruction in the program.
d) Answers will vary. A possible answer is:
One advantage of using an object-oriented programming language is modules can be
created that can be used over and over again in a variety of programs.
10. Answers will vary. A possible answer is:
Four benefits of using a network are:
They allow users to reliably share and exchange data.
They can reduce costs by sharing devices such as printers.
They can be set up to allow users access to only specific files.
They simplify the process of creating backup copies of files.
11. a) The two most common size classifications for networks are LAN and WAN.
b) A WAN is used to connect devices over large geographical distances.
12. a) A network operating system is software that allows users and devices to communicate
over a network.
b) A network environment refers to a set of networked computers running an operating
system that can handle the communication between the computers.
13. Client/server and peer-to-peer are two common network architecture models. A client/
server network consists of a small group of computers, called clients connected to a server.
In peer-to-peer network, each computer on the network is considered equal in terms of
responsibilities and resource sharing.
14.
3
16. The electrical circuits on an integrated circuit have one of two states, off or on. Therefore, the
binary number system (base 2), which uses only two digits (0 and 1), was adopted for use
in computers. Numbers and letters are represented with a code that consists of eight binary
digits grouped together to represent a single number or letter. Each 0 or 1 in the binary code
is called a bit (BInary digiT) and an 8-bit unit is called a byte.
17. a) The decimal equivalent of 10112 is 11.
b) The decimal equivalent of 2A16 is 42.
18. Unicode is a digital code that can be used to represent every letter of an alphabet and
symbols of every culture (=, @, , and so on). Unicode uses a set of sixteen 1s and 0s to form a
16-bit binary code for each symbol.
19. a) 2 GB of RAM can store 2,147,483,640 bytes of data.
b) A 500 GB hard drive can store 536,870,910,000 bytes of data.
20. a) An overflow error occurs when the number of bits that are needed to represent the integer
is greater than the size of four bytes.
b) Real numbers are numbers that contain decimal points.
c) A roundoff error occurs when there are not enough bits to store the mantissa.
21. a) Human-readable files are called text files, and computer-readable files are called binary
files.
b) An application adds a unique file name extension to the files it creates making it possible
to distinguish between file types. For example, a DOCX file is created in Microsoft Word.
c) Answers will vary A possible answer is:
Organizing files into folders is considered a good practice because it keeps related files
together.
22. Storage devices can be classified as internal and external. A hard disk is typically an internal
device but can also be external. A keychain or memory stick is an example of an external
storage device.
23. Four rules that should be followed to avoid damaging files stored on disks or CD/DVDs are:
Keep media away from food.
Keep magnetic media away from magnets.
Handle CD/DVDs by the center hole or by the edges.
Keep media away from moisture and extreme temperatures.
24. a) An intranet is a network that is used by a single organization, such as a corporation or
school, and is only accessible by authorized users. An extranet is an extended intranet that
provides various levels of access to authorized members of the public.
b) No one person or organization controls the Internet.
25. a) A problem associated with conventional modems is slow access time.
b) A DSL modem uses standard telephone lines and a cable modem uses a coaxial cable
instead of analog phone lines.
26. a) The most widely used Internet service is the World Wide Web (WWW).
b) One benefit of e-mail over standard mail is that e-mail can be received in a matter of
seconds, even if the recipient is located half way around the world.
c) Answers will vary. A possible answer is:
For the e-mail address student@lpdatafiles.com, student is the user name, lpdatafiles
is the host or domain name, and com is the top-level domain.
An Introduction to Programming Using Microsoft Visual Basic 2010
2012 EMC Publishing, LLC
d) An e-mail address and e-mail software are required for sending and receiving e-mail
messages.
e) Hotmail! is an example of a browser-based e-mail site.
27. a) E-mail messages are not private and are easily accessible for others to read, similar to how
a postcard contains a message that can be read by anyone who handles the postcard.
b) Answers will vary. A possible answer is:
Issues that could occur if e-mail etiquette is not followed in the workplace:
E-mail messages could be misinterpreted.
E-mail messages could offend recipients.
28. a) Answers will vary. A possible answer is:
Yahoo!, Google, and Excite are three commonly used search engines.
b) Answers will vary. A possible answer is:
I prefer to use Yahoo! because I like the option of using directories or subject trees that
Yahoo! offers.
c) Search criteria is single words or phrases that are used by search engines to determine a
match. Using effective search criteria is important because it will help you find what you
are looking for quickly.
29.
30. Files should only be downloaded from known, authentic websites since downloadable files
are often associated with viruses.
31. a) Four questions to answer when evaluating a website source are:
On what date was the web page last updated?
Is the information incorrect or incomplete in order to give a particular or slanted
view of a topic?
Is the information truthful and trustworthy?
Does the author present his or her credentials?
b) It is necessary to cite sources to give credit to the original author and allow the reader to
locate the cited information.
c) Perez, Tara. Kite Colors.. Clewiston Kite Surfing discussion list. 2 Aug. 2012. <http://
www.lpdatafiles.com/kitesurf/color.txt>.
32. a) Online profiling is a marketing technique of collecting data about consumers visiting a
website.
b) A cookie is a text file created by the server computer when a user enters information into a
website.
c) Web beacons are tiny, transparent graphics located on web pages or in e-mail messages
that are used in combination with cookies to collect data about web page users or e-mail
senders.
d) The information collected by web beacons is usually monitored by an outside advertising
company
5
33. Answers will vary.
34. The Electronic Communications Privacy Act of 1986 (ECPA) makes it a crime to access
electronic data without authorization and also prohibits unauthorized release of such data.
35. Three reasons why many schools have developed an Acceptable Use Policy are: Internet
content, unproductive use, and copyright.
36. Under the Fair Credit Reporting Act, if you are denied credit you are allowed to see the files
used to make the credit determination.
37. a) A subpoena is necessary for a federal government authority to access an individuals
financial records.
b) A financial institution must notify the individual of who has had access to the individuals
records.
38. a) Copyright infringement includes duplication of computer software when copies are being
used by individuals who have not paid for the software.
b) Piracy is the distribution of illegal copies of software.
c) A virus is a program or series of instructions that can replicate without the users
knowledge.
d) Phishing is the acct of sending an e-mail to a user falsely claiming to be a legitimate
business in an attempt to trick the user into revealing personal information that could be
used for crimes, such as identity theft.
39. An IT professional has ethical responsibilities related to system reliability, since businesses,
schools, and organizations rely on IT professionals to maintain their computer systems. They
also have an ethical responsibility to ensure the reliability of computer software, making sure
that it is appropriately tested.
40.