You are on page 1of 3

NILO, Jarred Kyle D.

ITS100 FOPI101

1. List types of computers and mobile devices.


Types of computers: desktop, laptop, server, mainframe, supercomputer, embedded computer.
Types of mobile devices: smartphone, tablet, phablet, handheld computer.
2. Describe how personal computers often are differentiated.
Personal computers are often differentiated by their processing power, memory capacity,
storage capacity, screen size and type, and form factor.
3. Explain how to avoid malware infections.
To avoid malware infections, it is important to keep operating systems and software up to date,
use antivirus and anti-malware software, avoid suspicious links and downloads, and practice
safe browsing habits.
4. Define the term, motherboard.
The motherboard is the main circuit board in a computer that connects all the components,
including the processor, memory, and storage devices.
5. Describe the roles of the processor and memory.
The processor is the brain of the computer that performs calculations and manages data flow.
Memory, also known as RAM, is the temporary storage space where data and instructions are
processed by the processor.
6. Differentiate among traditional and ultrathin laptops, tablets, phablets, and handheld
computers.
Traditional laptops are larger, heavier, and have more processing power and storage capacity.
Ultrathin laptops are lighter and thinner with longer battery life. Tablets are touch screen devices
with larger screens and fewer ports. Phablets are a hybrid of a smartphone and a tablet, with
larger screens and the ability to make calls. Handheld computers are small devices that are
designed for portability and are often used in industrial settings.
7. To interact with a tablet, you may use a touch screen or a(n) .
To interact with a tablet, you may use a touch screen or a stylus.
8.
List steps to protect yourself from webcam spying.
Steps to protect yourself from webcam spying include covering the webcam when not in use,
disabling or uninstalling the webcam software when not needed, keeping antivirus and anti-
malware software up to date, and being cautious when downloading and installing software.

9. List considerations when purchasing a mobile computer. Explain the importance of built-
in ports and slots.
Considerations when purchasing a mobile computer include processing power, battery life,
screen size and type, storage capacity, and form factor. Built-in ports and slots are important for
connecting peripherals, such as external hard drives, printers, and memory cards.
10. A(n) desktop may be less expensive and take up less space.
A(n) all-in-one desktop may be less expensive and take up less space.
11. Identify types of desktop users and explain how each user’s computer needs may differ.
Types of desktop users include home users, gamers, professionals, and businesses. Home
users may prioritize affordability and ease of use. Gamers may prioritize processing power and
graphics performance. Professionals may prioritize portability and battery life. Businesses may
prioritize manageability, security, and scalability.
12. Identify how you can purchase the appropriate desktop computer for your needs.
To purchase the appropriate desktop computer for your needs, it is important to consider
processing power, memory and storage capacity, graphics performance, form factor, and
budget. Reading reviews and consulting with knowledgeable sales representatives can also be
helpful.
13. Describe the purpose and functions of a server. Differentiate among rack, blade, and
tower servers.
A server is a computer that provides shared resources and services to other computers on a
network. Servers can perform various functions, including file sharing, email, web hosting, and
database management. Rack servers are designed to be mounted on a rack. Blade servers are
compact servers that are designed to be installed in blade enclosures. Tower servers are
designed to be placed on a desktop or floor.
14. Define virtualization as it relates to servers. Define the terms, server farm and
mainframe.
Virtualization is the process of creating a virtual version of a computer system or resource, such
as a server, operating system, or storage device. It allows multiple virtual machines to run on a
single physical machine, which can improve efficiency, flexibility, and cost-effectiveness.
A server farm is a collection of servers that are used to provide shared resources and services
to other computers on a network. It can be used to improve scalability, reliability, and
performance.
A mainframe is a large, powerful computer that is used by organizations to process large
amounts of data and run mission-critical applications. It is typically designed for high availability,
reliability, and security.

15. Define the terms, terminal and thin client. List the advantages of a thin client.
A terminal is a device that allows users to access a remote computer or server, typically through
a network connection. It provides a user interface for interacting with the remote system.
A thin client is a device that relies on a server to perform most of its processing and data
storage functions. It is designed to be simple and cost-effective, with minimal hardware and
software requirements. The advantages of a thin client include lower cost, reduced
maintenance, improved security, and centralized management.
16. Identify situations where POS terminals, ATMs, and self-service kiosks might be used.
List ATM safety guidelines.
POS terminals are used in retail environments to process transactions and manage inventory.
ATMs are used to withdraw cash, check account balances, and perform other banking
transactions. Self-service kiosks can be used for a variety of purposes, such as ticketing,
information retrieval, and ordering.
ATM safety guidelines include being aware of your surroundings, covering the keypad when
entering your PIN, not accepting help from strangers, and immediately reporting any suspicious
activity or devices.
17. A(n) supercomputer is used to solve complex, sophisticated mathematical calculations,
such as those used in petroleum exploration.
A supercomputer is a high-performance computer that is designed to perform complex
calculations and simulations at a very fast speed. It is used in scientific research, engineering,
and other applications that require massive amounts of processing power.
18. List cloud computing resources. Describe how businesses use cloud computing to
manage resources.
Cloud computing resources include infrastructure as a service (IaaS), platform as a service
(PaaS), and software as a service (SaaS). IaaS provides virtualized computing resources, such
as servers and storage, over the internet. PaaS provides a platform for developing, testing, and
deploying applications, without the need for on-premises infrastructure. SaaS provides access
to software applications over the internet, without the need for local installation or maintenance.
Businesses use cloud computing to manage resources by leveraging the scalability, flexibility,
and cost-effectiveness of cloud services. They can use cloud computing to store and process
data, run applications, and manage infrastructure, without the need for on-premises hardware
and software.
19. List types of mobile devices. Describe features of a smartphone.
Types of mobile devices include smartphones, tablets, phablets, and handheld computers.
A smartphone is a mobile device that can make calls, send messages, and access the internet.
It typically has a touch screen interface, a camera, and a range of built-in sensors, such as GPS
and accelerometers. Smartphones can also run a variety of apps, such as social media,
productivity, and entertainment apps.

20. Explain the issues surrounding the recycling of e-waste.


E-waste recycling poses environmental and ethical challenges due to the presence of
hazardous materials and the risk of illegal exports. Proper disposal of e-waste is necessary to
prevent environmental contamination and loss of valuable resources. Many countries have
implemented regulations and standards for e-waste recycling, and individuals and businesses
can also take steps to ensure responsible recycling practices.

You might also like