You are on page 1of 5

1

Chapter 1 Review Question Answers


1. a) Answers will vary. A possible answer is:
A desktop may be preferred over a notebook computer if the computer user is always at
their desk, doesnt travel, and prefers a larger screen.

b) Answers will vary. A possible answer is:
Three advantages of purchasing a notebook computer instead of a desktop computer are a
notebook computer is portable, light weight, and can run on batteries.

c) Answers will vary. A possible answer is:
A user may prefer a tablet PC over a notebook computer if they prefer to write instead of
key data.

d) Answers will vary. A possible answer is:
Two occupations where it would be useful to have a hand-held PC are sales and parcel
delivery.

e) Wearable computers are used in the health care field to monitor health problems, such as
heart rate and respiratory flow.
2. a) Answers will vary. A possible answer is:
Input devices include keyboards, digital cameras, and scanners. A keyboard is used to
enter data, a digital camera is used to import digital photographs, and a scanner uses a
laser to create a digital image from artwork.

b) Answers will vary. A possible answer is:
Output devices include monitors, printers, and memory keys. A monitor displays data, a
printer generates characters and graphics on paper, and a memory key stores files.

c) Answers will vary. A possible answer is:
Peripheral devices are used to make the computer more versatile and include printers and
scanners.

d) Answers will vary. A possible answer is:
Three types of ports are serial, parallel, and USB.
3. Five components found on the motherboard are:
Expansion boards, which are circuit boards that connect to the motherboard to add
functionality to the computer.
The Central Processing Unit, which processes data and controls the flow of data.
The bus, which is a set of circuits that connect the CPU to other components.
ROM (Read Only Memory), which contains the most basic operating instructions for
the computer.
RAM (Random Access Memory), which is memory where data and instructions are
stored temporarily.
4. Data is input into the computers memory, it is processed in the CPU and put back into the
memory, and then the data is output.
5. Cache memory is high-speed memory used to store frequently used data so that it can be
quickly retrieved by an application.
6. a) Operating system software is run automatically when the computer is turned on and
enables the user to communicate with the computer. Applications software allows the user
to perform specific tasks.

b) Three operating systems are Windows, Linux, and Unix.

c) Environment refers to a computers hardware and software configuration.

d) Another word for environment is platform.

An Introduction to Programming Using Microsoft Visual Basic 2010


2012 EMC Publishing, LLC

2
7. A utility program is a program that has one clearly defined task, such as managing files and
disks. A device driver is a utility program is needed for printing, viewing graphics, using a
CD/DVD drive, and using peripherals.
8. Answers will vary. A possible answer is:

Cross-platform connectivity is important to many computer users because they own more
than one computing device, such as a hand-held device and a desktop computer and they
need to be able to share files, e-mail messages, etc. between the devices.
9. a) High-level programming languages contain English-like instruction and need to be
compiled or interpreted in order to communicate with the computer. Low-level languages
consist of 0s and 1s and can communicate directly with the computer.

b) Answers will vary. A possible answer is:
Three high level programming languages are Fortran, C, and Basic.

c) A compiler is a program that converts an entire program into machine code before the
program is executed. An interpreter translates and executes an instruction before moving
on to the next instruction in the program.

d) Answers will vary. A possible answer is:
One advantage of using an object-oriented programming language is modules can be
created that can be used over and over again in a variety of programs.
10. Answers will vary. A possible answer is:

Four benefits of using a network are:
They allow users to reliably share and exchange data.
They can reduce costs by sharing devices such as printers.
They can be set up to allow users access to only specific files.
They simplify the process of creating backup copies of files.
11. a) The two most common size classifications for networks are LAN and WAN.

b) A WAN is used to connect devices over large geographical distances.
12. a) A network operating system is software that allows users and devices to communicate
over a network.

b) A network environment refers to a set of networked computers running an operating
system that can handle the communication between the computers.
13. Client/server and peer-to-peer are two common network architecture models. A client/
server network consists of a small group of computers, called clients connected to a server.
In peer-to-peer network, each computer on the network is considered equal in terms of
responsibilities and resource sharing.
14.



a) Physical topology refers to the arrangement of the nodes on a network.


b) A node is a location on the network capable of processing information.
c) A star topology uses a hub.
d) A ring topology connects each node to form a closed loop.
e) Physical topology refers to the arrangement of the nodes on a network, and logical
topology refers to the way data is passed between the nodes on the network.

15. Answers will vary. A possible answer is:



Three netiquette rules are:
Do not attempt to access the account of another user without authorization.
Do not share your password, and change it periodically.
Use appropriate subject matter and language, and be considerate of other peoples
beliefs and opinions.
An Introduction to Programming Using Microsoft Visual Basic 2010
2012 EMC Publishing, LLC

3
16. The electrical circuits on an integrated circuit have one of two states, off or on. Therefore, the
binary number system (base 2), which uses only two digits (0 and 1), was adopted for use
in computers. Numbers and letters are represented with a code that consists of eight binary
digits grouped together to represent a single number or letter. Each 0 or 1 in the binary code
is called a bit (BInary digiT) and an 8-bit unit is called a byte.
17. a) The decimal equivalent of 10112 is 11.

b) The decimal equivalent of 2A16 is 42.
18. Unicode is a digital code that can be used to represent every letter of an alphabet and
symbols of every culture (=, @, , and so on). Unicode uses a set of sixteen 1s and 0s to form a
16-bit binary code for each symbol.
19. a) 2 GB of RAM can store 2,147,483,640 bytes of data.

b) A 500 GB hard drive can store 536,870,910,000 bytes of data.
20. a) An overflow error occurs when the number of bits that are needed to represent the integer
is greater than the size of four bytes.

b) Real numbers are numbers that contain decimal points.

c) A roundoff error occurs when there are not enough bits to store the mantissa.
21. a) Human-readable files are called text files, and computer-readable files are called binary
files.

b) An application adds a unique file name extension to the files it creates making it possible
to distinguish between file types. For example, a DOCX file is created in Microsoft Word.

c) Answers will vary A possible answer is:
Organizing files into folders is considered a good practice because it keeps related files
together.
22. Storage devices can be classified as internal and external. A hard disk is typically an internal
device but can also be external. A keychain or memory stick is an example of an external
storage device.
23. Four rules that should be followed to avoid damaging files stored on disks or CD/DVDs are:
Keep media away from food.
Keep magnetic media away from magnets.
Handle CD/DVDs by the center hole or by the edges.
Keep media away from moisture and extreme temperatures.
24. a) An intranet is a network that is used by a single organization, such as a corporation or
school, and is only accessible by authorized users. An extranet is an extended intranet that
provides various levels of access to authorized members of the public.

b) No one person or organization controls the Internet.
25. a) A problem associated with conventional modems is slow access time.

b) A DSL modem uses standard telephone lines and a cable modem uses a coaxial cable
instead of analog phone lines.
26. a) The most widely used Internet service is the World Wide Web (WWW).

b) One benefit of e-mail over standard mail is that e-mail can be received in a matter of
seconds, even if the recipient is located half way around the world.

c) Answers will vary. A possible answer is:

For the e-mail address student@lpdatafiles.com, student is the user name, lpdatafiles
is the host or domain name, and com is the top-level domain.
An Introduction to Programming Using Microsoft Visual Basic 2010
2012 EMC Publishing, LLC

d) An e-mail address and e-mail software are required for sending and receiving e-mail
messages.
e) Hotmail! is an example of a browser-based e-mail site.

27. a) E-mail messages are not private and are easily accessible for others to read, similar to how
a postcard contains a message that can be read by anyone who handles the postcard.

b) Answers will vary. A possible answer is:
Issues that could occur if e-mail etiquette is not followed in the workplace:
E-mail messages could be misinterpreted.
E-mail messages could offend recipients.
28. a) Answers will vary. A possible answer is:
Yahoo!, Google, and Excite are three commonly used search engines.

b) Answers will vary. A possible answer is:
I prefer to use Yahoo! because I like the option of using directories or subject trees that
Yahoo! offers.

c) Search criteria is single words or phrases that are used by search engines to determine a
match. Using effective search criteria is important because it will help you find what you
are looking for quickly.
29.







Answers should be similar to:


a) restaurants +miami
b) art +museum +montreal +canada
c) clothing stores +city name
d) alligators crocodiles
e) james +patterson
f) garbage in garbage out
g) george +washington +john +adams thomas jefferson
h) travel +florida orlando

30. Files should only be downloaded from known, authentic websites since downloadable files
are often associated with viruses.
31. a) Four questions to answer when evaluating a website source are:
On what date was the web page last updated?
Is the information incorrect or incomplete in order to give a particular or slanted
view of a topic?
Is the information truthful and trustworthy?
Does the author present his or her credentials?

b) It is necessary to cite sources to give credit to the original author and allow the reader to
locate the cited information.

c) Perez, Tara. Kite Colors.. Clewiston Kite Surfing discussion list. 2 Aug. 2012. <http://
www.lpdatafiles.com/kitesurf/color.txt>.
32. a) Online profiling is a marketing technique of collecting data about consumers visiting a
website.

b) A cookie is a text file created by the server computer when a user enters information into a
website.

c) Web beacons are tiny, transparent graphics located on web pages or in e-mail messages
that are used in combination with cookies to collect data about web page users or e-mail
senders.

d) The information collected by web beacons is usually monitored by an outside advertising
company

An Introduction to Programming Using Microsoft Visual Basic 2010


2012 EMC Publishing, LLC

5
33. Answers will vary.
34. The Electronic Communications Privacy Act of 1986 (ECPA) makes it a crime to access
electronic data without authorization and also prohibits unauthorized release of such data.
35. Three reasons why many schools have developed an Acceptable Use Policy are: Internet
content, unproductive use, and copyright.

36. Under the Fair Credit Reporting Act, if you are denied credit you are allowed to see the files
used to make the credit determination.
37. a) A subpoena is necessary for a federal government authority to access an individuals
financial records.

b) A financial institution must notify the individual of who has had access to the individuals
records.
38. a) Copyright infringement includes duplication of computer software when copies are being
used by individuals who have not paid for the software.

b) Piracy is the distribution of illegal copies of software.

c) A virus is a program or series of instructions that can replicate without the users
knowledge.

d) Phishing is the acct of sending an e-mail to a user falsely claiming to be a legitimate
business in an attempt to trick the user into revealing personal information that could be
used for crimes, such as identity theft.
39. An IT professional has ethical responsibilities related to system reliability, since businesses,
schools, and organizations rely on IT professionals to maintain their computer systems. They
also have an ethical responsibility to ensure the reliability of computer software, making sure
that it is appropriately tested.
40.









a) False. Software refers to programs.


b) True.
c) True.
d) False. Assembly language is a low-level programming language.
e) True.
f) False. A peer-to-peer network does not have a server.
g) True.
h) False. A cable modem transmits data faster than a conventional modem.
i) True.
j) False. The present time is referred to as the information age.
k) True.

An Introduction to Programming Using Microsoft Visual Basic 2010


2012 EMC Publishing, LLC

You might also like