Categories of Computer Hardware
Unlock all answers in this set
Unlock answersquestion
1. To discard an old computer safely, put it in a landfill.
answer
F
question
2. Application software serves as the interface between the user, the system software, and the computer hardware.
answer
F
question
3. Programmers develop programs or write the instructions that direct the computer to process data into information.
answer
T
question
4. The distinction among categories of computers is always clear-cut.
answer
F
question
5. With weights that exceed 100 tons, desktop computers can store more than 20,000 times the data and information than an average supercomputer.
answer
F
question
6. Examples of mobile users include engineers, scientists, architects, desktop publishers, and graphic artists.
answer
F
question
7. Software used by power users usually is inexpensive because of its generic design.
answer
F
question
8. Nearly every area of health care uses computers.
answer
T
question
9. An exciting development in health care is telemedicine, which is a form of long-distance health care.
answer
T
question
10. Breakthroughs in surgery, medicine, and treatments seldom result from scientists' use of computers.
answer
F
question
11. The capability of the computer to recognize spoken words is a direct result of scientific experimentation with cochlear implants.
answer
F
question
12. Cameras small enough to swallow — sometimes called a cochlear implant — take pictures inside your body.
answer
F
question
13. A satellite modem provides Internet connections using regular copper telephone lines.
answer
F
question
14. To help minimize errors, most current browsers and Web sites do not require the http:// and www portions of a Web address.
answer
T
question
15. When a Web address is entered, a user sends, or pushes, information to a Web server.
answer
F
question
16. Text links may be underlined and/or displayed in a color different from other text on the Web page.
answer
T
question
17. The two most commonly used search tools are subject directories and keywords.
answer
F
question
18. JPEG is a format that expands graphics to increase their file size, which means the file takes up less storage space.
answer
F
question
19. The more compressed the graphics file, the smaller the image and the lower the quality.
answer
T
question
20. Smaller file sizes result in slower downloading of Web pages because small files transmit slower than large files.
answer
F
question
21. Some people use the term m-commerce (mobile commerce) to identify e-commerce that takes place using mobile devices.
answer
T
question
22. Businesses seldom provide goods or services to other businesses, so little e-commerce takes place between businesses.
answer
F
question
23. When a user sends an e-mail message, an outgoing mail server that is operated by the user's Internet access provider determines how to route the message through the Internet and then sends the message.
answer
T
question
24. Newsgroup members frequently post articles as a reply to another article — either to answer a question or to comment on material in the original article.
answer
T
question
25. To start a chat session, you connect to a chat server through a program called instant messenger.
answer
F
question
26. According to netiquette, Internet users should assume all material is accurate and up-to-date.
answer
F
question
27. To use application software, a computer must be running system software, specifically, an operating system.
answer
T
question
28. Word processing software usually includes public-domain clip art.
answer
T
question
29. The spelling checker included with word processing software compares words in a document with an electronic dictionary that is part of the operating system.
answer
F
question
30. Spreadsheet software is a rarely used type of application software.
answer
F
question
31. One of the more powerful features of spreadsheet software is its capability of recalculating the rest of the worksheet when data in a worksheet changes.
answer
T
question
32. Presentation graphics software provides a variety of layouts for each individual slide.
answer
T
question
33. With a PIM, users can take information previously tracked in a weekly or daily calendar and organize and store it on their computer.
answer
T
question
34. The cost of accounting software for a small business can be several hundred thousand dollars.
answer
F
question
35. Although most word processing programs have none of the capabilities of DTP software, professional designers and graphic artists use word processing software because it supports page layout.
answer
F
question
36. Application software, such as Word and Excel, seldom include Web page authoring features.
answer
F
question
37. The programs in software suites for personal use usually can be purchased individually.
answer
F
question
38. Most personal finance software offers a variety of online services, which require access to the Internet.
answer
T
question
39. Personal DTP programs typically guide users through the development of a document by asking a series of questions, offering numerous predefined layouts, and providing standard text that can be added to documents.
answer
T
question
40. Educational software exists for very few subjects.
answer
F
question
41. A file compression utility identifies and fixes operating system and disk problems.
answer
F
question
42. The electronic components and circuitry of the system unit, such as the processor and memory, usually are part of or are connected to a circuit board called the fatherboard.
answer
F
question
43. On a personal computer, the various functions performed by the processor extend over many separate chips and often multiple circuit boards.
answer
F
question
44. The system clock is one of the factors that influences a computer's performance.
answer
T
question
45. Most processors have built-in instructions to improve the performance of multimedia and 3-D graphics.
answer
T
question
46. If buyers purchase an IBM-compatible PC, they will choose an Intel or Intel-compatible processor.
answer
T
question
47. Some heat sinks are packaged as part of a processor chip.
answer
T
question
48. Some applications draw on the idle time of home users' personal computers to achieve parallel processing.
answer
T
question
49. If a memory chip can store 100 KB, it can hold approximately 100,000 bytes.
answer
T
question
50. The processor interprets and executes a program's instructions while the program is in RAM.
answer
T
question
51. Two types of cache are memory cache and disk cache.
answer
T
question
52. When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it exists), then RAM — with a greater delay in processing for each level it must search.
answer
T
question
53. Most computers use flash memory to hold their startup instructions because it allows the computer easily to update its contents.
answer
T
question
54. Although some PC Cards contain tiny hard disks, many PC Cards are a type of flash memory card.
answer
T
question
55. A system unit with a MIDI port has the capability of recording sounds that have been created by a synthesizer and then processing the sounds (the data) to create new sounds.
answer
T
question
56. The data bus transfers information about where the data should reside in memory, and the address bus transfers actual data.
answer
F
question
57. The larger the number of bits handled by the bus, the slower the computer transfers data.
answer
F
question
58. A notebook computer usually is less expensive than a desktop computer with the same capabilities because it is less costly to miniaturize the components.
answer
F
question
59. Data consists of the steps that tell a computer how to perform a particular task.
answer
F
question
60. Even keyboards that are not ergonomically designed attempt to offer the user more comfort by including a wrist rest or palm rest.
answer
T
question
61. Some users prefer a wireless mouse because it frees up desk space and eliminates the clutter of a cord.
answer
T
question
62. As a user moves a mouse, the pointer on the screen also moves.
answer
T
question
63. Windows users work with a mouse that has only one button.
answer
F
question
64. To move the pointer using a pointing stick, push the pointing stick with a finger.
answer
T
question
65. A pointing stick requires additional desk space.
answer
F
question
66. Because they require little arm movements, users enter large amounts of data into touch screens.
answer
F
question
67. Many handheld game consoles have touch screens.
answer
T
question
68. When drawing on a graphics tablet with a pen or cursor, the tablet detects and converts the movements into digital signals that are sent in a computer.
answer
T
question
69. Digital pens that have built-in digital cameras work differently from pressure-sensitive digital pens.
answer
T
question
70. Some PDAs have a built-in mini keyboard.
answer
T
question
71. Because most smart phones include PDA capabilities, input devices used with PDAs typically also are available for smart phones.
answer
T
question
72. Enhanced resolution usually is lower than optical resolution because it uses a special formula to eliminate pixels from those generated by the optical resolution.
answer
F
question
73. Most new computers are equipped with a video capture card because all users have the need for this type of adapter card.
answer
F
question
74. With a test, an OMR device first scans the answer key to record correct answers based on patterns of light, then scans the remaining documents and matches their patterns of light against the answer key sheet.
answer
T
question
75. Exposure to a magnet or magnetic field can erase the contents of a card's magnetic stripe.
answer
T
question
76. When a bank receives a check for payment, it uses an OCR inscriber to print the amount of the check in OCR characters in the lower-right corner.
answer
F
question
77. Computers process information (output) into data (input).
answer
F
question
78. Most mobile computers and devices separate the display and other components into a different physical case.
answer
F
question
79. The lower the time in milliseconds it takes to turn a pixel on or off on an LCD monitor, the slower the response time.
answer
F
question
80. Several video standards have been developed to define the resolution, number of colors, and other display properties.
answer
T
question
81. The best analog televisions have a resolution of only 1920 x 1080 pixels.
answer
F
question
82. With game consoles, the output device often is a television.
answer
T
question
83. An LCD monitor produces more heat and uses more power than a CRT monitor.
answer
F
question
84. To minimize eye fatigue, use a CRT monitor with a dot pitch of 29 millimeters or higher.
answer
F
question
85. Ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types.
answer
T
question
86. Most ink-jet printers have at least two print cartridges: one containing black ink and the other(s) containing colors.
answer
T|
question
87. The number of pages a single ink-jet cartridge can print varies by manufacturer and the type of documents being printed.
answer
T
question
88. Laser printers for large business users print less than 15 ppm (pages per minute).
answer
F
question
89. When printing a document, laser printers process and store the entire page before they actually print it.
answer
T
question
90. Some mobile printers have a built-in wireless port through which they communicate with a computer wirelessly.
answer
T
question
91. Impact printers are noisy because a mechanism strikes against an inked ribbon that physically contacts the paper.
answer
T
question
92. Impact printers are unsuitable for printing multipart forms because they cannot print through layers of paper.
answer
F
question
93. Like a band printer, a shuttle-matrix printer prints characters in only one font and size.
answer
F
question
94. Voice output never works with voice input.
answer
F
question
95. A stand-alone fax machine scans an original document, converts the image into digitized data, and transmits the digitized image.
answer
T
question
96. Some data projectors are large devices that attach to a ceiling or wall in an auditorium.
answer
T
question
97. An LCD projector uses tiny mirrors to reflect light, which produces crisp, bright, colorful images that remain in focus and can be seen clearly even in a well-lit room.
answer
F
question
98. A digital light processing (DLP) projector, which uses liquid crystal display technology, attaches directly to a computer, and uses its own light source to display the information shown on the computer on the screen.
answer
F
question
99. Hearing-impaired users can instruct programs to display words instead of sounds.
answer
T
question
100. When a user issues a command to start application software, the operating system locates the program in memory and loads it into storage.
answer
F
question
101. When storage devices read data from storage media, they function as a source of output.
answer
F
question
102. On a magnetic disk, a sector typically stores up to 24 bytes of data.
answer
F
question
103. Current personal computer hard disks typically have storage capacities of less than 20 GB.
answer
F
question
104. A hard disk's platters typically continue to spin even after power is removed from the computer.
answer
F
question
105. A hard disk platter's spinning motion creates a cushion of air above the read/write head, which ensures that the read/write head makes contact with the platter surface instead of floating above the platter.
answer
F
question
106. Depending on the type of hard disk, transfer rates normally range from 2 MBps to 8 MBps.
answer
F
question
107. Removable hard disks have storage capacities up to 500 GB.
answer
T
question
108. The average time it takes a current floppy disk drive to locate an item on disk (access time) is 84 seconds, or approximately 1.4 minutes.
answer
F
question
109. To meet their large-scale needs, enterprises use special hardware geared for heavy use.
answer
T
question
110. On an optical disc, a land absorbs light, which is read as binary digit 0, and pits cause light to reflect, which is read as binary digit 1.
answer
F
question
111. Optical discs should be stored in a flat (horizontal) position.
answer
F
question
112. Because audio CDs and CD-ROMs use different laser technologies, a CD-ROM drive cannot be used to listen to an audio CD while working on the computer.
answer
F
question
113. The speed of a CD-ROM drive has no affect on how fast it installs programs or accesses the disc.
answer
F
question
114. Most optical disc drives can read a Picture CD.
answer
T
question
115. A popular use of CD-RW and CD-R discs is to create audio CDs.
answer
T
question
116. All DVD-ROMs are single-sided.
answer
F
question
117. Although older computers used tape cartridges, today's computers use reel-to-reel tape drives.
answer
F
question
118. Flash memory cards are quite inexpensive compared to other storage media.
answer
F
question
119. The type of flash memory card you have will determine the type of card reader/writer needed.
answer
T
question
120. The images stored on microfilm and microfiche are so large that they can be read without a microfilm or microfiche reader.
answer
F
question
121. When turning on a computer that has been powered off completely, users are performing a warm boot.
answer
F
question
122. Users today typically run multiple programs concurrently.
answer
T
question
123. When a computer is running multiple programs concurrently, the one in the background is the active program; that is, the one currently in use.
answer
F
question
124. When a computer is running multiple programs, the applications running but not currently in use are in the foreground.
answer
F
question
125. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory.
answer
F
question
126. A multiuser operating system always processes jobs on a first-come, first-served basis.
answer
F
question
127. Some operating systems include a Web browser and an e-mail program, enabling users to begin accessing the Web and communicating with others as soon as they set up the Internet connections.
answer
T
question
128. Users with broadband Internet connections are less susceptible to attacks from a hacker.
answer
F
question
129. Fragmentation speeds up disk access and thus the performance of the entire computer.
answer
F
question
130. Ghosting is a severe problem with today's displays.
answer
F
question
131. At its peak, DOS was a widely used operating system, with an estimated 70 million computers running it.
answer
T
question
132. Microsoft has continually updated its Windows operating system, incorporating new features and functions with each subsequent version.
answer
T
question
133. When programmers move application software from one UNIX version to another, they sometimes have to rewrite some of the programs.
answer
T
question
134. Through Windows Server System, programmers have the ability to use Web services, which are Web applications created with any programming language or any operating system to communicate and share data seamlessly.
answer
T
question
135. In addition to being a stand-alone operating system, UNIX also is a network operating system.
answer
T
question
136. Some devices with the Windows Mobile operating system support handwriting and voice input.
answer
T
question
137. A compressed file takes up more storage space than the original file.
answer
F
question
138. In a networked environment, each computer on the network has access to hardware on the network.
answer
T
question
139. The main differentiation among network classifications is whether they are wired or wireless.
answer
F
question
140. A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users.
answer
T
question
141. Although it can connect a larger number of computers, a client/server network typically provides an efficient means to connect 10 or fewer computers.
answer
F
question
142. To help reduce copyright infringement, today's music-sharing services are free, and music files are made public as they travel across the Internet.
answer
F
question
143. Bus networks are unpopular on LANs because they are expensive and difficult to install.
answer
F
question
144. Star networks are difficult to install and maintain.
answer
F
question
145. Communication software usually is bundled with the operating system or purchased network devices.
answer
T
question
146. Nearly the entire telephone network today uses analog technology, with the exception of the final link from the local telephone company to a home, which is digital.
answer
F
question
147. The word, modem, is derived from the combination of the words, modulate, to convert into a digital signal and, demodulate, to convert a digital signal into an analog signal.
answer
F
question
148. Cable modems currently transfer data at speeds that are much slower than either a dial-up modem or ISDN.
answer
F
question
149. Wireless access points have high-quality antennas for optimal signals.
answer
T
question
150. Only small networks use routers.
answer
F
question
151. For any home user, the hardware and software of an Ethernet network is easy to configure.
answer
F
question
152. One of the more widely used transmission media for network cabling and telephone systems is twisted-pair cable.
answer
T
question
153. Data integrity is important because computers and people use information to make decisions and take actions.
answer
T
question
154. The data in a key field is common to all records.
answer
F
question
155. A field is a group of related files.
answer
F
question
156. Often it is difficult to access data stored in separate files in different departments.
answer
T
question
157. It often is easier and faster to develop programs that use the database approach.
answer
T
question
158. Data in a database is less vulnerable than data in file processing systems.
answer
F
question
159. Like a form, a report generator is used to maintain and retrieve data.
answer
F
question
160. A DBMS provides a variety of techniques to restore a database to a usable form in case it is damaged or destroyed.
answer
T
question
161. A hypermedia database contains text links to other types of documents.
answer
F
question
162. Whereas a relational database can store more than two dimensions, a multidimensional database is a two-dimensional table.
answer
F
question
163. A relational database typically processes and summarizes large numbers of records efficiently.
answer
F
question
164. A standard query language exists for multidimensional databases.
answer
F
question
165. Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.
answer
F
question
166. Authentication verifies that an individual is a valid user.
answer
F
question
167. Biometric devices are losing popularity as a security precaution because they are an easily fooled method of identification and authentication.
answer
F
question
168. Hardware theft is the act of stealing computer equipment.
answer
T
question
169. Hardware theft and vandalism pose a serious threat to the home desktop computer user.
answer
F
question
170. Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally.
answer
T
question
171. Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
answer
T
question
172. A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
answer
T
question
173. Most organizations use available software for encryption.
answer
T
question
174. Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.
answer
T
question
175. A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
answer
F
question
176. The National Photographers Association believes that allowing even the slightest alteration could lead to misrepresentations in photographs.
answer
T
question
177. Users can purchase a software program that selectively blocks cookies.
answer
T
question
178. Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
answer
F
question
179. Many businesses use spyware to limit employees' Web access.
answer
F
question
180. Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.
answer
F
question
181. Computer addiction is an untreatable illness.
answer
F
question
182. The system development cycle should group activities or tasks into phases.
answer
T
question
183. The system development process should have standards clearly defined.
answer
T
question
184. It is crucial that everyone is aware of and agrees on any changes made to the project plan.
answer
T
question
185. A project that is feasible at one point of the system development cycle might become infeasible at a later point.
answer
T
question
186. Maintaining up-to-date documentation should be a one-time part of the system development cycle.
answer
F
question
187. The request for system services triggers the last phase in the system development cycle: support.
answer
F
question
188. Higher-level DFDs add detail and definition to the lower levels, similarly to zooming in on a computer screen.
answer
F
question
189. The project dictionary helps everyone keep track of the huge amount of details in a system.
answer
T
question
190. Each data item has an entry in the data dictionary section of the project dictionary.
answer
T
question
191. The last step in acquiring the necessary hardware and software is to identify all the hardware and software requirements of the new or modified system.
answer
F
question
192. After the systems analyst defines the technical requirements, the next step is to summarize these requirements for potential vendors.
answer
T
question
193. Some vendors will give a demonstration of the product(s) specified in a vendor proposal.
answer
T
question
194. The systems analyst may skip many of the activities in a detailed design when developing custom software.
answer
F
question
195. During input and output design, the inputs always are designed first because they help define the requirements for the outputs.
answer
F
question
196. The program development cycle is part of the implementation phase, which is part of the system development cycle.
answer
T
question
197. The advantage of the direct conversion strategy is that it is extremely safe and will not disrupt operations seriously if the new system does not work correctly the first time.
answer
F
question
198. An interpreter is a separate program that converts an entire source program into machine language before executing it.
answer
F
question
199. Hundreds of procedural languages exist.
answer
T
question
200. A just-in-time (JIT) compiler converts Java source code into machine code, and a Java interpreter executes the machine code, called bytecode, because the operating system cannot execute it.
answer
F