IIT: Chapter 15 – Computer Careers and Certification

I. True/False

  1. True
  2. False
  3. True
  4. True
  5. False
  6. False
  7. True
  8. True
  9. True
  10. False

II. Multiple Choice

  1. A. chief technology officer (CTO)
  2. C. data communications analyst/VoIP specialist
  3. C. articulation agreement
  4. A. Computer information systems (CIS)
  5. D. all of the above
  6. B. user groups and trade schools
  7. D. Certified Software Development Associate (CSDA)
  8. B. CCNA

III. Matching

  1. E-commerce director – (h) Creates and maintains a data dictionary and monitors database performance.
  2. Database analyst – (d) Uses data modeling techniques and tools to analyze, tune, and specify data usage within an application area.
  3. Technical writer – (j) Works with the analyst, programmer, and user to create system documentation and user materials.
  4. Technical lead – (g) Guide design, development, and maintenance tasks.
  5. Database administrator – (h) Creates and maintains a data dictionary and monitors database performance.
  6. Desktop publisher/compositor – (b) Formats and combines text and graphics to produce publication-ready materials.
  7. Quality assurance specialist – (f) Reviews programs and documentation to ensure they meet the organization’s standards.
  8. Webmaster/Web administrator – (i) Maintains an organization’s Web site; creates or helps users create Web pages; oversees Web site performance.
  9. Corporate trainer – (a) Teaches employees how to use software, design and develop systems, program, and perform other computer-related activities.
  10. Chief security officer (CSO) – (c) Responsible for physical security of an organization’s property and people.

IV. Short Answer

  1. What is an advantage of attending a trade school?
    • Advantage of attending a trade school is time savings. Trade schools teach specific skills instead of requiring students take a broad range of courses in the sciences and humanities.

    What factors should you consider when selecting a trade school?

    • Factors that should be considered when selecting a trade school are ask the advisers if the trade school has an articulation agreement with a nearby college or university and ensures that if the students transfer to a college or university, they will receive credit for most of the courses taken at their current school.
  2. What are the benefits of professional growth and continuing education?
    • Staying aware of new products and services in the computer industry because technology changes so rapidly.

    What are some ways you can keep up to date about industry trends and technologies?

    • Participate in professional growth and continuing education activities such as workshops, seminars, conferences, conventions, and trade shows.
  3. How should you go about choosing a certification?
    • About choosing a certification, it should be reflected on your career goals and interest.

    Describe four options for preparing for certification.

    • Self-study: Flexible self-study programs help professionals prepare for certification at their own pace and supplement other training methods.
    • Online training classes: Online training allows students to set their own pace in an interactive environment and combines the technological advantages of computer-based training with the connectivity of the internet or a company’s intranet.
    • Instructor-led training: Available in a variety of forms, including seminars, which typically are held for several days during a week, boot camps, which immerse students in intensive course work for up to two weeks, and academic-style classes, which span a period of several weeks or months.
    • Web resources: The certification sponsor’s web site generally contains descriptions of the available certifications, with FAQs and links to authorized training and testing centers.
  4. What is the focus of programmer/developer certification, and what other types of certification are beneficial to those interested in programmer/developer certification?
    • The focus of programmer / developer certification is training programs that prepare applications for the certification test. Other types of certification are beneficial to those interested in programmer / developer certification are Certified Software Development Associate (CSDA), Certified Software Development Professional (CSDP), IBM Certified Solution Developer, Microsoft Certified Professional Developer (MCPD), Sun Certified Enterprise Architect (SCEA), Sun Certified Java Developer (SCJD), Sun Certified Java Programmer (SCJP), and Sun Certified Mobile Application Developer (SCMAD).

    Who might be interested in programmer/developer certification?

    • Those people who might be interested in programmer / developer certification are Java programmers, Mobile application developers, Oracle database managers, Programming consultants, SQL programmers, Web software developers, XML developers.
  5. Describe hardware certification.
    • Hardware certification vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company’s current and future computing needs.

    Who might be interested in hardware certification?

    • People in the following careers may be interested in hardware certification are cable installation technicians, computer repair technicians, corporate trainers, help desk specialists, IT consultants, system engineers and administrators.

IIT: Chapter 14 – Enterprise Computing

I. True/False

  1. True
  2. False
  3. False
  4. True
  5. False
  6. False
  7. True
  8. True
  9. True
  10. True

II. Multiple Choice

  1. C. SMBs
  2. B. reduces costs of maintenance and increases
  3. A. Business intelligence
  4. B. quality control software
  5. A. VPN tunnel
  6. D. legacy system
  7. A. Fibre Channel
  8. D. selective backup

III. Matching

  1. Core activities – (h) Business activities that relate to the main mission of a company.
  2. Quality control system – (f) Helps an organization maintain or improve the quality of its products or services.
  3. Decision support system (DSS) – (b) Helps users analyze data and make decisions.
  4. Expert system – (e) Captures and stores the knowledge of human experts and then imitates human reasoning and decision making.
  5. EDI – (d) A set of standards that controls the transfer of business data and information among computers both within and among enterprises.
  6. Extranet – (g) Portion of a company’s network that allows customers or suppliers of a company to access parts of an enterprise’s intranet.
  7. Workflow – (a) Process that identifies the specific set of steps involved in completing a project.
  8. RAID – (j) A group of two or more integrated hard disks.
  9. Scalability – (i) Measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.
  10. Failover – (c) Process of one system automatically taking the place of a failed system.

IV. Short Answer

  1. What are the responsibilities of managers?
    • Managers are responsible for coordinating and controlling an organization’s resources.

    What four activities do managers perform to coordinate resources?

    • Planning, organizing, leading and controlling.
  2. What is a content management system (CMS)?
    • An information system that is a combination of database, software, and procedures that organizes and allows access to various forms of documents and other files , including images and multimedia content.

    What type of content may be processed by a content management system?

    • Type of CMS are information about files and data which called as metadata.
  3. Describe two types of virtualization.
    • Server virtualization: Provides the capability to divide a physical server logically into many virtual servers.
    • Storage virtualization: Provide capability to create a single logical storage device from many physical storage devices.

    What are cloud and grid computing, and why do companies use them?

    • Cloud computing is an internet service that provide computing needs to computer users. Grid computing combines many servers and/or personal computers on a network, such as internet, to act as one large computer.

      Companies use them because using cloud and grid computing are more economical than building new computing capacity internally. Besides that these technologies provide flexible and massive online computing power.

  4. What are five types of e-commerce?
    • E-Retail, Finance, Travel, Entertainment and Media, Health

    Describe three of the five types that you listed.

    • E-Retail: Occurs when retailers use the web to sell their products and services, such as amazon.com.
    • Entertainment and media: Music, video, news, sporting events, and 3D multiplayer games are a growing part of the web’s future. Newsprints on the web is not replacing the newspaper, but enhancing it and reaching different populations. Examples: itunes.com.
    • Health: Many web sites provide up to date medical, fitness, nutrition, or exercise information. Some web sites offer the capability to listen in on health-related seminars and discussions, such as health.gov.
  5. What does a backup plan contain?
    • The location of backup data, supplies, and equipment, The personnel responsible for gathering backup resources and transporting them to the alternate computer facility, and a schedule indicating the order in which, and approximate time by which, each application should be up and running.

    What factors contribute to the success of a backup plan?

    • Back up all the critical resources, the location of the alternate computer facility, enter into a reciprocal back up relationship

IIT: Chapter 13 – Programming Languages and Program Development

I. True/False

  1. True
  2. True
  3. True
  4. True
  5. True
  6. False
  7. False
  8. True
  9. False
  10. False

II. Multiple Choice

  1. B. interpreter
  2. C. event driven
  3. C. Java
  4. A. SQL
  5. A. VBScript
  6. C. SharePoint Designer
  7. B. Flash
  8. B. encapsulation

III. Matching

  1. Java – (g) Object-oriented language that uses a just-in-time compiler.
  2. C++ – (d) Object-oriented extension of the C programming language.
  3. F# – (j) Combines the benefits of an object-oriented language and a functional language.
  4. 4GL – (i) Nonprocedural language that enables users and programmers to access data in a database.
  5. Macro – (c) Series of statements that instructs an application how to complete a task.
  6. PHP – (e) Free, open source scripting language.
  7. API – (a) Collection of tools that programmers use to interact with an environment such as a Web site or operating system.
  8. Pretest – (h) Process of testing a condition at the beginning of a loop.
  9. Posttest – (b) Process of testing a condition at the end of a loop.
  10. Code review – (f) Process of programmers, quality control testers, and/or peers reviewing code in order to locate and fix errors so that the final programs work correctly.

IV. Short Answer

  1. How is a compiler different from an interpreter?
    • A compiler is a separate program that converts the entire source program into machine language before executing it. Interpreter is a program used to convert a source program into machine language and then executes the machine language instructions.

    What is the advantage, and disadvantage, of an interpreter?

    • The advantage of an interpreter is that when it finds errors, it displays feedback immediately. The programmer can correct any errors before the interpreter translates the next line of code. The disadvantage is that interpreted programs do not run as fast as compiled programs. This is because an interpreter must translate the source program to machine language each time the program executes. Once a program is compiled, by contrast, users simply execute the object code to run the program.
  2. What is a major benefit of OOP?
    • The major benefit of OOP is the ability to reuse and modify existing objects.

    How is RAD (rapid application development) used for developing software?

    • RAD is a method for developing software. RAD used to writes and implements a program in segments instead of waiting until the program is completed.
  3. What is included in an integrated development environment?
    • Tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.

    Describe the programming languages in the Visual Studio suite.

    • Visual Basic is a programming language that allows programmers easily to build complex task-oriented object-based programs.
    • Visual C++ is a programming language based on C++. Not only is Visual C++ a powerful object-oriented programming language, it enables programmers to write Windows, Windows Mobile, and .NET applications quickly and efficiently.
    • Visual C# is a programming language that combines programming elements of C++ with an easier, rapid development environment.
  4. How is XML used?
    • The uses of XML is to separate the web page content from its format, allowing the web browser to display the content of a web page in a form appropriate for the display device.

    Describe two applications of XML.

    • RSS 2.0, stands for Really Simple Syndication, and ATOM, specifications that content aggregators use to distribute content to subscribers.
  5. Describe two activities performed by the programmer when documenting a solution.
    • The two activities are reviewing the program code, and reviewing all the documentation.

      First, programmers review the program for any dead code and remove it. Dead code is any program instructions that a program never executes.

      Next, programmers should run the program one final time to verify it still works. After reviewing the program code, the programmer gives the program and all of its documentation to the systems analyst. The documentation includes all charts, solution algorithms, test data, and program code listings that contain global and internal comments. The programmer should be sure all documentation is complete and accurate. This becomes especially valuable if the program requires changes in the future.

    Why is proper documentation important?

    • Proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

IIT: Chapter 12 – Information System Development

I. True/False

  1. True
  2. True
  3. False
  4. False
  5. False
  6. True
  7. False
  8. False
  9. True
  10. True
  11. False

II. Multiple Choice

  1. A. extreme project management
  2. B. PERT chart
  3. C. project request
  4. A. mandated by management or some other governing body
  5. C. decision table
  6. D. system proposal
  7. A. Computer-Aided Software Engineering (CASE)
  8. D. acceptance.

III. Matching

  1. System developer – (h) Responsible for designing and developing an information system.
  2. Project manager – (e) Controls the activities during system development.
  3. Request for system services – (a) Becomes the first item in the project notebook and triggers the planning phase.
  4. Process modeling – (b) Analysis and design technique that describes processes that transform inputs into outputs.
  5. Project dictionary – (i) Contains all the documentation and deliverables of a project.
  6. Data dictionary – (g) Stores a name, description, and other details about each data item.
  7. Object – (f) An item that can contain both data and the procedures that read or manipulate that data.
  8. Packaged software – (j) Mass-produced, copyrighted, prewritten software available for purchase.
  9. Prototype – (c) Working model of the proposed system.
  10. Performance monitoring – (d) Shows how actors interact with an information system.

IV. Short Answer

  1. What is system development?
    • System development is a set of activities used to build an information system. An information system (IS) is hardware, software, data, people, and procedures that work together to produce quality information.

    Describe the five phases of the system development life cycle (SDLC).

    • Picture1
  2. What are four types of feasibility, and what does each measure?
    • Operational feasibility measures how well the proposed information system will work.
    • Schedule feasibility measures whether the established deadlines for the project are reasonable.
    • Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
    • Economic feasibility measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.

    What are six techniques used to gather data and information?

    • Review documentation, observe, survey, interview, JAD sessions, and research.
  3. How is UML used?
    • The UML is a graphical tool that enables analysts to document a system. It consists of many inter related diagrams.

    How is a use case diagram different from a class diagram?

    • A case diagram graphically shows how actors interact with the information system. An actor is the user / entity and the use case is function that actor can perform, while class diagram graphically shows classes and one or more lower levels, called subclasses, in a system. Lower levels (subclasses) contain attributes of higher levels (classes) in concept called inheritance.

      A class diagram graphically shows classes and subclasses in a system. On a class diagram, objects are grouped into classes. Each class can have one or more lower levels called subclasses. Each subclass inherits the methods and attributes of the objects in its higher-level class.

  4. What are the three major activities of the operation, support, and security phase?
    • Perform maintenance activities, monitor system performance, assess system security.

    Describe each type of maintenance activity.

    • Corrective maintenance: The process of diagnosing and correcting errors in an information system.
    • Adaptive maintenance: The process of including new features or capabilities in an information system.
    • Performance monitoring: The process to determine whether the system is inefficient or unstable at any point.
    • Perfective maintenance: The process to investigate solutions to make the information system more efficient and reliable.
  5. What is a computer security plan?
    • A computer security plan summarizes in writing all of the safeguards that are in place to protect an organization’s information assets.

    What three things should a computer security plan do?

    • Identify all information assets of an organization, including hardware, software, documentation, procedures, people, data, facilities, and supplies.
    • Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur. Place an estimated value on each risk, including lost business.
    • For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.

IIT: Chapter 11 – Computer Security and Safety, Ethics, and Privacy

I. True/False

  1. True
  2. True
  3. False
  4. True
  5. False
  6. True
  7. True
  8. True
  9. True
  10. True
  11. True
  12. False

II. Multiple Choice

  1. B. rootkit
  2. D. all of the above
  3. A. denial of service attack
  4. C. Digital forensics
  5. C. hardware theft
  6. D. encryption key
  7. D. power usage effectiveness (PUE)
  8. C. social engineering

III. Matching

  1. Virus – (j) Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
  2. Trusted source – (d) Organization or person you believe will not send a virus infected file knowingly.
  3. Quarantine – (e) Area of the hard disk that holds an infected file until the infection can be removed.
  4. Botnet – (g) Group of compromised computers connected to a network such as the Internet that is being used as part of a network that attacks other networks, usually for nefarious purposes.
  5. Spoofing – (i) Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  6. Personal firewall – (c) Protects a personal computer and its data from unauthorized intrusions.
  7. Passphrase – (b) Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
  8. Encryption algorithm – (a) Set of steps that can convert readable plaintext into unreadable ciphertext.
  9. Biometric device – (h) Translates a personal characteristic into digital code.
  10. Surge protector – (f) Uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.

IIT: Chapter 10 – Database Management

I. True/False

  1. True
  2. False
  3. False
  4. True
  5. False
  6. False
  7. True
  8. True
  9. False
  10. True

II. Multiple Choice

  1. B. Timely
  2. A. composite key
  3. D. File maintenance
  4. B. determines whether a number is within a specified range
  5. A. less complexity
  6. B. data dictionary
  7. B. principle of least privilege
  8. A. decides on the proper placement of fields

III. Matching

  1. Field name – (e) Uniquely identifies each field.
  2. Field size – (g) Defines the maximum number of characters a field can contain.
  3. Data type – (c) Specifies the kind of data a field can contain and how the field is used.
  4. Primary key – (b) Field that uniquely identifies each record in a file.
  5. Query language – (j) Consists of simple, English-like statements that allow users to specify the data to display, print, or store.
  6. Log – (a) Listing of activities that modify the contents of a database.
  7. Recovery utility – (i) Uses the logs and/or backups to restore a database when it becomes damaged or destroyed.
  8. GIS – (d) Database that stores maps and other geographic data.
  9. Data modeler – (h) Person who focuses on the meaning and usage of data.
  10. Database administrator – (f) Creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures.

IIT: Chapter 9 – Communications and Networks

I. True/False

  1. True
  2. False
  3. True
  4. False
  5. True
  6. True
  7. False
  8. False
  9. False
  10. True
  11. True

II. Multiple Choice

  1. C. visual voice mail
  2. C. a web conference
  3. C. provides for storage and management of a company’s documents
  4. D. mashup
  5. B. hubs and switches
  6. A. RFID
  7. D. coaxial cable
  8. B. mobile TV

III. Matching

  1. Picture messaging – (e) Allows users to send pictures and sound files, as well as short text messages, to a phone or other mobile device, or a computer.
  2. Groupware- (j) Software that helps groups of people share information over a network.
  3. Extranet – (h) Allows customers or suppliers to access part of a company’s intranet.
  4. IrDA – (d) Specification to transmit data wirelessly among computers and devices via infrared light waves.
  5. ATM – (f) Service that carries voice, data, video, and multimedia at very high speeds.
  6. Dial-up modem – (a) Communications device that can convert digital signals to analog signals and analog signals to digital signals, so that data can travel along an analog telephone line.
  7. Digital modem – (g) Communications device that sends and receives data and information to and from a digital line.
  8. Bandwidth – (b) Amount of data, instructions, and information that can travel over a communications channel.
  9. Transmission media – (c) Materials or substances capable of carrying one or more signals.
  10. Noise – (i) Electrical disturbance that can degrade communications.

IV. Short Answer

  1. What is text messaging?
    • A mobile device with text messaging, also called SMS (short message service), capability allows users to send and receive short text messages, typically fewer than 300 characters, on a phone or other mobile device or computer.

    What are some options for sending and receiving text messages?

    • Mobile to Mobile: Send a message from your mobile device to another mobile device.
    • Mobile to E-Mail: Send a message from your mobile device to an e-mail address anywhere in the world.
    • Web to Mobile: Send a message from a text messaging Web site to a mobile device, or request that a Web site alert a mobile device with messages of breaking news and other updates, such as sports scores, stock prices, and weather forecasts.
    • Mobile to Provider: Send a message by entering a common short code (CSC), which is a four-or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes.
  2. Describe how the global positioning system (GPS) works.
    • GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS receiver.
    • A GPS receiver (such as in a car, wearable device, a smart phone, or a collar) determines its location on Earth by analyzing at least 3 separate satellite signals from the 24 satellites in orbit.

    How do individuals use GPS technology?

    • Many mobile devices such as smart phones have GPS capability built into the device or as an add-on feature. Some users carry a handheld GPS receiver; others mount a receiver to an object such as an automobile, boat, airplane, farm and construction equipment, or computer.
  3. How are a local area network (LAN), a metropolitan area network (MAN), and a wide are network (WAN) different?
    • LAN is a network that connects computers and device in limited geographical area such as home and office building. MAN is a high speed network that connects local area networks in the metropolitan area such as a city or town. WAN is a network that covers a large geographical area such as a country or the world.

    What is a wireless LAN?

    • Wireless LAN (WLAN) is a LAN that uses no physical wires. Computers and devices that access a wireless LAN must have build-in wireless capability or the appropriate wireless network card, USB network adapter, ExpressCard module, PC Card, or flash card.
  4. What is a network topology?
    • Network topolgy refers to the layout of the computers and devices in a communications network. Three commonly used network topologies are star, bus, and ring.

    What are the five types of digital dedicated lines?

    • ISDN lines, DLS, FTTP, T-carrier lines, and ATM.
  5. What are three different types of digital modems?
    • ISDN modem, DSL modem, and cable modem.

    How does each one function?

    • ISDN modem sends digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line. DLS modem sends digital data and information from a computer to a DSL line and receive digital data and information from DSL line. Cable modem, called a broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network.

IIT: Chapter 8 – Operating Systems and Utility Programs

I. True/False

  1. False
  2. False
  3. True
  4. False
  5. False
  6. True
  7. True
  8. True
  9. False
  10. True

II. Multiple Choice

  1. B. CMOS
  2. B. Windows ReadyBoost
  3. C. gadget
  4. A. index
  5. B. contiguous sectors, which slows
  6. D. Windows Firewall
  7. C. Adware
  8. A. phishing filter

III. Matching

  1. Sleep mode – (f) Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state.
  2. Hibernate – (c) Saves any open documents and programs to a hard disk before removing power from the computer.
  3. Page – (g) With virtual memory, the amount of data and program instructions that can be swapped at a given time.
  4. User name – (d) Unique combination of characters that identifies one specific user.
  5. Aero Flip 3D – (e) Works with the mouse to flip through windows by rolling the wheel on the mouse.
  6. UNIX – (h) Multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
  7. Virtualization – (a) The practice of sharing or pooling computing resources, such as servers.
  8. NetWare – (b) Server operating system designed for client/server networks.
  9. Google Android – (i) Operating system for mobile devices.
  10. Shortcut – (j) An icon on the desktop or in a folder that provides a user with immediate access to a program or file.

IV. Short Answer

  1. How is a cold boot different from a warm boot?
    • Cold boot is when turning on a computer that has been power off completely, whereas warm boot is the process of using the operating system to restart computer. Warm boot properly closes any running processes and programs, however it does not save any unsaved work.

    How is a memory-resident part of an operating system different from a nonresident part of an operating system?

    • Memory resident means it remains in memory while the computer is running. Nonresident memory is the remaining instructions on a storage medium until they are needed.
  2. What is a user interface?
    • User interface controls how you enter data and instructions and how information is displayed on the screen. Two types of user interfaces are graphical and command-line.

    How are graphical and command-line user interfaces different?

    • With a graphical user interface (GUI), you interact with menus and visual images such as buttons and other graphical objects to issue commands. Meanwhile in a command-line interface, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
  3. What is the purpose of an automatic update feature?
    • The purpose is to provide updates to the programs include fixes to program bugs, or error, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games and even updates to applications software on the computer such as web browser or an email programs.

    Why and when might a user receive a service pack?

    • Service packs are available to users who have registered and/or activated their software.
  4. What happens during a backup?
    • During the back up process, the utility monitors progress and alerts you if it needs additional media, such as another disc. Many backup programs compress, or shrink the size of, files during the backup process. By compressing the files, the backup program requires less storage space for the backup files than for the original files.

    What is the purpose of a restore utility?

    • Restores utility reserves the process and return backed files to their original form.
  5. Describe four embedded operating systems.
    • Windows Embedded CE is a scaled down Windows operating system designed for use on communications, entertainment and computing devices with limited functionally.
    • Windows Mobile is an operating system based on Windows embedded CE, includes functionality, programs, and a user interface designed for specific types of smart phones and PDAs.
    • Blackberry operating system runs on handheld devices supplied by RIM (Research In Motion).
    • Google Android is an operating system designed by Google for mobile devices.

    What are the uses for each of the four types?

    • Windows Embedded CE use for VoIP telephones, industrial control devices, digital cameras, point of sale terminals, automated teller machine, digital photo frames. Besides that, Windows Embedded CE supports color, sounds multitasking, multimedia, email, internet access, and web browsing.
    • Windows Mobile operating system users have access to all the basic PIM (Personal Information Manager) functions such as contact list, schedules, task, calendars, and notes. Also provides numerous additional features that allows users to check email, browse the web, listen to the music, take pictures, and so on.
    • Blackberry operating system uses to managing schedule, contacts, and appointment as well as phone capabilities and provide wireless functionality,
    • Google Android allows programmers to design programs specifically for devices supporting this operating system.

IIT: Chapter 7 – Storage

I. True/False

  1. True
  2. False
  3. False
  4. False
  5. False
  6. False
  7. True
  8. True
  9. False
  10. True
  11. False
  12. False
  13. True

II. Multiple Choice

  1. B. transfer rate
  2. C. longitudinal recording
  3. D. RAID
  4. D. all of the above
  5. A. optical disc
  6. C. LightScribe
  7. B. tape library
  8. B. magnetic stripe

III. Matching

  1. Capacity – (h) The number of bytes (characters) a storage medium can hold.
  2. Cluster – (c) Smallest unit of disk space that stores data and information.
  3. Cylinder – (a) Vertical section of a track that passes through all platters.
  4. Head crash (e) Occurs when a read/write head touches the surface of a platter on a hard disk.
  5. Backup – (f) Duplicate of a file, program, or disk placed on a separate storage medium that you can use in case the original is lost, damaged, or destroyed.
  6. Disk cache – (j) Memory chips that the processor uses to store frequently accessed items.
  7. Disk controller – (d) Special-purpose chip and electronic circuits that control the transfer of items to and from the system bus.
  8. eSATA – (b) External disk interface that is much faster than USB and FireWire.
  9. Solid state media – (i) Media which consist entirely of electronic components, such as integrated circuits, and contain no moving parts.
  10. Solid state drive – (g) A storage device that typically uses flash memory to store data, instructions, and information.

IV. Short Answer

  1. What is network and attached storage?
    • Network and attached storage is a server connected to a network with the sole pur-pose of providing storage

    How much hard disk storage can home and small business users add to their network with a NAS device?

    • Up to 6 TB or more of hard disk storage space.
  2. What are the advantages of SAS (serial-attached SCSI)?
    • Thinner, longer cables, reduced interference and less expensive.

    What types of devices can be connected to SAS interfaces?

    • Optical disc drives, printers, scanners, digital cameras, and other devices.
  3. How is a single-session disc different from multisession disc?
    • In single-session disc, manufacturers write all items on the disc at one time. In multisession disc, users can write on part of the disc at one time and another part at a later time.

    What is the purpose of archive discs and Picture CDs?

    • Stores photos from an online photo center in the jpg file format.
  4. Why do users use memory cards?
    • Memory cards enable mobile users easily to transport digital photos, music, or files to and from mobile devices and computers or other devices.

    Name five types of memory cards and describe some of the characteristics of each card.

    • SDHC : 4 to 32 GB Digital, Digital cameras
    • XD Picture Card: 256 MB to 2 GB, Digital cameras, photo printers
    • Memory Stick Micro (M2) : 1 to 16 GB, Smart phones
    • Memory Stick PRO Duo : 1 to 16 GB, Digital cameras, smart phones, handheld game consoles
    • MicroSD : 1 to 2 GB, Smart phones, portable media players, handheld game consoles, handheld, navigation devices
  5. What is one difference between microfilm and microfiche?
    • Microfilm is a 100 to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4 x 6 inches.

    What are some uses of microfilm and microfiche?

    • They greatly reduce the amount of paper firms must handle. They are inexpensive and have the longest life of any storage media.

IIT: Chapter 6 – Output

I. True/False

  1. True
  2. True
  3. False
  4. True
  5. False
  6. False
  7. True
  8. False
  9. False
  10. True
  11. False
  12. False
  13. False

II. Multiple Choice

  1. D. letters,reports, and e-mail messages
  2. D. LED
  3. A. DisplayPort
  4. D. diagonal
  5. D. dots per inch (dpi)
  6. B. if the multifunction peripheral breaks down, all functions are lost
  7. C. interactive whiteboard
  8. D. Force feedback

III. Matching

  1. Display device – (d) An output device that visually conveys text, graphics, and video information.
  2. LCD monitor – (j) A desktop monitor that uses a liquid crystal display to produce images.
  3. Head-mounted display (HMD) – (g) A display in a helmet, goggles, or glasses.
  4. Nit – (h) Unit of visible light intensity equal to once candela per square meter.
  5. Candela – (f) Standard unit of luminous intensity.
  6. Aspect ratio – (c) Defines a display’s width relative to its height.
  7. Hard copy – (a) Printed information that exists physically and is a more permanent form of output.
  8. Nonimpact printer – (e) Forms characters and graphics on a piece of paper without actually striking the paper.
  9. Audio output device – (b) Component of a computer that produces music, speech, or other sounds, such as beeps.
  10. Tactile output – (i) Provides the user with a physical response from a device.

IV. Short Answer

  1. How does resolution affect images displayed on a monitor?
    • Resolution is the number of horizontal and vertical pixels in a display device. High resolution uses a great number of pixels and provides a smoother, sharper, and clearer image. As the resolution is increased, some items on the screen appear smaller.

    How does resolution relate to the size of an LCD monitor or screen?

    • Resolution generally is proportional to the size of the device. For example, a widescreen 9-inch LCD monitor typically has a resolution of 1440 x 900, while a widescreen 22-inch LCD monitor has a resolution of 1680 x 1050.
  2. Describe some of the features of HDTV.
    • HDTV works with digital broadcast signals, transmits digital sound, supports wide screen, and provides resolution up to 1920 x 1080 pixels.
  3. How do game console users set up the output for the consoles?

    • Users plug one end of a cable in the game console and the other end in the video port on the television.
  4. What are two types of wireless printing technology?
    • Bluetooth printing and infrared printing
  5. How do they differ in how they communicate with a computer or other device?

    • With bluetooth, computer can transmit output to a printer via radio waves. The devices do not need to be aligned with each other. They can be at a distance under 30-foot range. With infrared, the devices use infrared light waves. Both device IrDA ports need to be lined up together.
  6. How does an ink-jet printer work?
    • An ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper.
  7. What are the differences between dye-sublimation printers used by professionals as compared to home or small business users?

    • Professionals often use the printer for photographic quality purposes, and it would cost thousands of dollars with the images in a wide range of sizes. Home or small business users typically print images in only one or two sizes and are much slower than the professional counterparts. They are also less expensive / cheaper.
  8. What might be included with a surround sound system for a computer?
    • Center speaker, satellite speakers, and subwoofer.
  9. What is audio resolution and what are the three examples of audio resolution?

    • Audio resolution is the number of bytes that represent sound in a given time. It’s stated as a bit rate such as 8-bit, 16-bit, or 24-bit.