Computer Concepts Unit 8

29 August 2022
4.7 (114 reviews)
36 test answers

Unlock all answers in this set

Unlock answers (32)
question
A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions. a. noncompete clause​ b. confidentiality statement c. ​proprietary information d. ​code of ethics
answer
d. ​code of ethics
question
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses. a. ​proprietary information b. ​noncompete clause c. ​confidentiality disclosure d. ​privacy statement
answer
b. ​noncompete clause
question
Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs? a. ​Electronic Communications Privacy Act b. ​Fair Use Doctrine c. ​United States Copyright Act d. ​Digital Millennium Copyright Act
answer
d. ​Digital Millennium Copyright Act
question
​Which of the following is not an example of an Information Technology Law? a. ​United States Copyright Act b. ​The Espionage Act of 1917 c. ​Digital Millennium Copyright Act d. ​Children's Internet Protection Act
answer
b. ​The Espionage Act of 1917
question
Which of the following options is a useful format for your resume? a. ​Print b. ​Email c. ​HTML d. ​all of the above
answer
d. ​all of the above
question
Which of the following options offer selfstudy training to careerminded individuals who might not have the time or means to complete a traditional degree program? a. ​Badge b. ​Nanodegree c. ​Certificate d. ​none of the above
answer
b. ​Nanodegree
question
Which of the following descriptions best matches that of computer science degree? a. ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently. b. ​Focuses on applying computers to business problems. c. ​Focuses on computer equipment and software used by businesses. d. ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.
answer
a. ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently.
question
Which of the following descriptions best matches that of computer engineering degree? a. ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently. b. ​Focuses on applying computers to business problems. c. ​Focuses on computer equipment and software used by businesses. d. ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.
answer
d. ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.
question
Which of the following job descriptions best matches that of a systems analyst? a. ​Analyzes a computer system's vulnerability to threats from viruses, worms, unauthorized access, and physical damage. b. ​Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services. c. ​Plans, installs, and maintains one or more local area networks and may also manage cloud resources. d. ​Troubleshoots hardware and software problems. Good interpersonal skills and patience are required for this job.
answer
b. ​Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services.
question
What generation of cell phone technology was the first to offer true mobile broadband? a. ​1G b. ​2G c. ​3G d. ​4G
answer
d. ​4G
question
A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications. a. ​cellular telephone b. ​radio c. ​telegraph d. ​television
answer
a. ​cellular telephone
question
Which of the following would not be considered a common carrier? a. ​Telegraph b. ​Telephone c. ​Cell phone services d. ​Radio
answer
d. ​Radio
question
​The first telephone was invented and patented by Alexander Graham Bell in ________. a. ​1776 b. ​1876 c. ​1886 d. ​1906
answer
b. ​1876
question
Telegraphy remained the major technology for intercontinental communication well into the ________. a. ​1930s b. ​1940s c. ​1950s d. ​1960s
answer
c. ​1950s
question
A key feature of the Apple Lisa was its use of _______________.​ a. ​vacuum tubes b. ​graphical user interface c. ​transistors d. ​VisiCalc
answer
b. ​graphical user interface
question
Which of the following would be considered a thirdgeneration computer? a. ​IBM 360 b. ​UNIVAC c. ​Z3 d. ​MITS Altair
answer
a. ​IBM 360
question
______generation computers became possible by the development of integrated circuits. a. ​First b. ​Second c. ​Third d. ​Fourth
answer
c. ​Third
question
_______ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data. a. ​Firstgeneration b. ​Secondgeneration c. ​Thirdgeneration d. ​none of the above
answer
a. ​Firstgeneration
question
Most computer historians agree that computers have evolved through _______ distinct generations. a. ​three b. ​four c. ​five d. ​six
answer
b. ​four
question
​_____ was the first commercially successful computer. a. ​Z3 b. ​ENIAC c. ​UNIVAC d. ​Colossus
answer
c. ​UNIVAC
question
_______ was designed to calculate trajectory tables for the U.S. Army. a. ​ENIAC b. ​Harvard Mark I c. ​Colossus d. ​AtanasoffBerry Computer
answer
a. ​ENIAC
question
The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields. a. ​Babbage's Analytical Engine b. ​Schickard's Calculator c. ​AtanasoffBerry Computer d. ​Hollerith Tabulating Machine
answer
d. ​Hollerith Tabulating Machine
question
Which of the following i would be considered a mechanical calculator? a. ​Schickard's Calculator b. ​Pascaline c. ​de Colmar's Arithmometer d. ​all of the above
answer
d. ​all of the above
question
A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm. a. mechanical​ b. ​manual c. ​digital d. ​algorithm
answer
b. ​manual
question
Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare. a. ​Tallinn Manual b. ​Cyberwarfare c. ​SCADA d. ​PLC
answer
a. ​Tallinn Manual
question
The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them? a. ​Provide identity management and trust support services b. ​Provide disruptive technologies c. ​Provide incident management capabilities d. ​Provide Internet routing, access, and communications services
answer
b. ​Provide disruptive technologies
question
​_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis. a. Productivity​ b. ​GDP c. ​ITC growth d. ​PLC
answer
b. ​GDP
question
. ​Which of the following would not be considered a disruptive technology? a. ​Digital photography replacing film photography. b. ​Smartphones replacing devices such as MP3 players. c. ​Computers with word processors replacing typewriters. d. ​Computers that run OS X replacing computers that run Windows 8.
answer
d. ​Computers that run OS X replacing computers that run Windows 8.
question
A proprietary model called the __________ represents the position of a product during its life cycle of publicity. a. ​Gartner Hype Cycle b. ​Rogers' bell curve c. ​Product life cycle d. ​Disruptive technology
answer
a. ​Gartner Hype Cycle
question
From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise. a. ​Roger's bell curve b. ​product life cycle c. ​Gartner Hype cycle d. ​none of the above
answer
b. ​product life cycle
question
_____________ are two of the world's largest exporters of ICT services. a. ​South Korea and U.S. b. ​China and U.S. c. U.S. and Japan​ d. ​India and Ireland
answer
d. ​India and Ireland
question
Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum. a. ​hardware b. ​software c. ​computers d. ​exports
answer
b. ​software
question
In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer. a. ​goods, services b. ​services, goods c. ​assets, services d. ​none of the above
answer
a. ​goods, services
question
​Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security. a. 4%​ b. ​14% c. ​24% d. ​40%
answer
a. 4%​
question
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​ a. ​ICT industry b. ​stock market c. ​dotcom industry d. ​Internet
answer
a. ​ICT industry
question
Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________. a. ​1940s b. ​1950s c. ​1960s d. ​1970s
answer
c. ​1960s