Professional Documents
Culture Documents
Information Technology 1
Information Technology 1
Programs that enable users to perform specific tasks on a computer, such as writing letters or
playing games
A. Internet address
B. Portable computer
C. Application software
D. Virtualization
2. A programmable, electronic device that accepts data input, performs processing operations on that
data, and outputs and stores the results
A. Output
B. Web server
C. Computer network
D. Computer
3. To start up a computer
A. Input
B. Boot
C. Data
D. Netbook
4. The knowledge and understanding of basic computer fundamentals
A. Supercomputer
B. Computer literacy
C. World Wide Web (WWW)
D. Computer network
5. The physical parts of a computer system, such as the keyboard, monitor, printer, and so forth
A. Storage
B. Username
C. Hardware
D. Internet
6. Information overload
Cost
Data inaccuracy
Software unreliability
A. Digital piracy
B. Advantages of computer use
C. Carpal tunnel syndrome
D. Disadvantages if computer use
7. Aided globalization and the resulting outsourcing of jobs, as well as structural unemployment (the
obsolescence of certain jobs)
A. Carpal tunnel syndrome
B. Examples if unethical behaviour
C. Computer technology
D. Computer ethics
8. The field of study concerned with the fit between people and their work environments
A. Ergonomics
B. Digital piracy
C. Automation
D. Outsourcing
9. 1. Hands, wrists, elbow, eyes, back, neck, etc
2. Take frequent breaks
3. Practice proper posture while using computers
A. Health Risks
B. Computer crimes
C. Other limitations
D. Data security
10. Personal and private information can be obtained by others if not protected properly
A. Privacy Violations
B. Other limitations
C. Waste time/energy
D. Impact on Environment
11. competition; supplier; buyer; threat of new entrants; threat of substittes
A. Moore's Law
B. Expert System - def (4 parts) & pros and cons
C. integrated circuit
D. IT & Porter's Five Forces
12. run public key system in reverse
A. backbone network
B. Cryptography (2 ways)
C. integrated circuit
D. Digital signature
13.1). sender & receiver must authenticate each other before sending any real data
2). all 'real' data must flow encrypted through the web
3). no integrated info can be for intruder's advantage
A. Compatibility regarding how a new technology is more valuable (2 points)
B. Requirements for transmitting sensitive info through the web (3 points)
C. Arguments FOR Net Neutrality
D. Bitcoin features (5 points)
14. 1. price as high as possible without making it profitable for entrants
2. limit price is lower than monopoly price
3. signal you're willing to cut price if necessary
4. discourage entry
A. IT & Porter's Five Forces
B. Requirements for transmitting sensitive info through the web (3 points)
C. 4 Strategies for existing market leader of digital goods
D. Moore's Law
15. 32 bit number given to each device connected to the internet, represented by 4 number segments
separated by dots.
A. IP address
B. Transistor
C. Fair Use
D. internet
16.A professional who finds out the requirements for the business unit and then translates those
requirements into documentation that the programmers can work with.
A. Data Integration
B. Business Analyst
C. ASCII (American Standard Code for Information Interchange)
D. Byte
17. Power of information now moved to desktop computers so individual workers could control data,
words, and images. PCs were not as widespread in the home yet.
a. Match-Index Function
b. Central Processing Unit (CPU)
c. Personal Computing Devices
d. Pivot Table Report Filter
18. An electronic device operating under the control of instructions stored in its own memory that can
accept, manipulate, and store data
a. Supercomputer
b. A Table
c. Volatility
d. Computer
19.A computer that is portable and can be used while traveling
a. Minicomputer
b. Smartphone
c. Laptop
d. RAM
20.The critical point in a situation that leads to a new and irreversible development.
A. Tipping Point
B. Finance Control
C. Decision Making
D. Control Unit
21. Are applications in the computer that enables the user to use them to perform certain
functions.For example, Microsoft or Websites
a. Hardware
b. Information
c. Software
d. Computer
22. Are the physical tangible parts of the computer. These components completes the computer
structure. For example, Keyboard, Screen, Monitor, mouse or the hard drives
a. Computer
b. Hardware
c. Software
d. Information and Communication Technology
23. a structured set of data held in a computer, especially one that is accessible in various ways.
A. Internet
B. Pop Ups
C. Database
D. Hardware
24. involving or relating to the use of computer technology.
a. Email
b. Software
c. Drones
d. Digital
25. Drones
unmanned aircraft used for spying and locating enemies
a. Digital
b. Hardware
c. Drones
d. Internet
TEST I (1-23 Items) Choose the correct answer in the table below.
1. A fully functioning portable computer that opens to reveal a screen and a keyboard; also called a
laptop computer
3. The background work area displayed on the screen for computers running Microsoft Windows
5. The instructions, also called computer programs, that are used to tell a computer what it should
do
6. Subcontracting of portions of a job to a third party to reduce cost, time & energy
11. Limits the number of instructions the CPU can execute to increase processing speed.
12. Mainframe computers were used for businesses rather than personal use. Thus, the power of
information was controlled by select few individuals such as corporate managers.
14. A mobile phone that performs a lot of the same functions of a computer
15. Hans and Ola want people to realize that things are changing and changing for the good in a lot
of areas that were misconceived as bad due to ignorance. They hope that the test that they
have created will be used in interviews and job recruiting, so that employers hire people who
are invested in knowing what is going on in the world.
17. Is the electronic device that is able to encode,process,store and retrive information
19. A software program you can use to find Web sites, Web pages, and Internet files.
20. Cheating act dishonestly or unfairly in order to gain an advantage, especially in a game or
examination.
22. a software program capable of reproducing itself and usually capable of causing great harm to
files or other programs on the same computer
23. an unexpected browser window, especially one generated for the purpose of advertising.
24. A general name for the business function and academic discipline covering the application of
people, technologies, and procedures to solve business problems. → Management Information
System (MIS)
25. A character encoding standard for electronic communication. Standard characters are
represented in Binary format for computers to read. → Virtualization
TEST III : TRUE OR FALSE. Write the word TRUE if the statement is correct and FALSE if the statement is
incorrect.
1. A document, typically containing hyperlinks to other documents, located on a Web server and
available through the World Wide Web → Web page
2. Electronic messages sent from one user to another over the Internet or other
network → Electronic mail (e-mail)
3. A collection of computers and other hardware devices that are connected together to share
hardware, software, and data, as well as to communicate electronically with one another → Computer
literacy
4. A computer that is continually connected to the Internet and hosts Web pages that are
accessible through the Internet → Web site
7. Learning using computers, designed to benefit students without requiring that they are at a
specific location in a specific time → Outsourcing
12. 1. US government can prevent powerful online service providers such as Comcast, Verizon from
controlling internet traffic in a way that suits their own financial interests.
2. prevent cable-TV providers who also sell high-speed internet service from luring customers away from
internet only services. → 2 Issues with Crowd-Sourcing
13. The U.S. regulatory body for internet usage: Federal Communication Commission; rivals,
agencies, Federal Trade Commission.
1. edge-providers: Google, FB, Netflix, etc.
2. infrastructure provider: engineering groups
3. D.C. based advocacy group: ISPs, backbone companies → Data Analytics (technical & practical)
14. confidentiality
authenticity
non-repudiation → 4 Issues with Information Security
15. 1. ISPs may lose incentives to invest in new projects and expanding to new areas
2. Broadband hogs, such as Netflix now paying a fee, won't have to. → Arguments FOR Net Neutrality
16. A computer input device that uses a set of keys to put data into the computer. → keyboard
17. Reducing costs, improving customer satisfaction, creating competitive advantage, generating
growth, streamlining a supply chain, or global expansion → Common IT project goals.
18. Number of bits the CPU can process at any one time → Cloud Storage
19. A general name for the business function and academic discipline covering the application of
people, technologies, and procedures to solve business problems. → Management Information System
(MIS)
20. A character encoding standard for electronic communication. Standard characters are
represented in Binary format for computers to read. → Virtualization