Understanding Information Systems and Computing

Quiz 1&2

To effectively and efficiently use computers, you need to know the parts of an information system, which include people, procedures, software, hardware, data and the Internet. Here between data and information, the total amount you are paid for the week should be information and the number of hours you worked in a week and your pay rate are data. There are two major kinds of software discussed in Chapter1: system software and application software. Midrange computers are computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. They are normally referred to as servers. One that is a holding area for data, instructions, and information is called memory. Another component that controls and manipulates data to produce information is called microprocessor. Users can use the Internet to connect and access more powerful computers, software, and storage of other computers on the Internet rather than relying solely on their computers. This is what is called cloud computing.

The Internet is the physical network while the Web is a multimedia interface to the available online resources.

The first part of every uniform resource locator (URL) presents the Protocol used to connect to the resource.

Apple’s Mail and Microsoft’s Outlook are examples of client-based e-mail systems while Google’s Gmail and Microsoft’s Hotmail are examples of web-based systems. They provide special programs called search engines that you can use to locate specific information on the web. They also provide other special programs called spiders continually look for new information and update the search services’ databases. eBay.com represents C2C, Amazon.com is one of the most widely used B2C. The basic components of cloud computing are clients, Internet, service providers. System type of software works with end users, application software, and computer hardware to handle the majority of technical details. Functions, formulas, charts, and what-if analysis are common features of database management systems (DBMS), F. Dialog boxes provide additional information and request user input. General-purpose applications include all of the following except: web authoring. These organize commonly used commands into a set of tabs Ribbons. In a Ribbon GUI, a gallery displays the alternative choices. In an image editor, photographs consist of thousands of dots or pixels that form images. Here pixels means picture elements. To touch up photographs to remove scratches and other imperfections of bitmap or raster images, we should use image editors. Illustration programs are specialized graphics programs for editing bitmap or raster images F. Every app that is written for a particular type of mobile device can also run on other types of devices such as desktops or laptops but not the other way around F. Most operating systems support the ability to switch between different applications. This is called Multitasking. The category of operating system used for handheld devices Embedded OS. Disk Cleanup is a utility program included with Windows 10 that eliminates unused files and applications. Embedded operating systems, also known as Real-time operating systems and RTOS, are entirely stored within a device. Network operating systems are typically located on one of the connected computers’ hard disks. This computer, which is called Network server coordinates all communication between the other computers. BitDefender, Kaspersky, and Norton are examples of utility suites. When you experience problems after installing a new program or changing system settings, the system restore utility can help by reversing the changes and bringing your computer to a previous point in time. Microsoft’s Cortana and Apple’s Siri are a good utilities example of Virtual assistants. Mobile operating systems, also known as mobile OS, are a special type of operating system for smartphones, tablets, and wearable computers. They are neither stand-alone operating systems nor embedded operating systems F. Multicore is a new type of processor that can provide two or more separate and independent CPUs. Slot is a system board component that provides a connection point for specialized cards or circuit boards. Port is a socket for external devices to connect to the system unit. Cache is a type of memory that improves processing by acting as a temporary high-speed holding area between the memory and the CPU. RAM is a type of memory that is volatile or loses its contents when power is turned off. A chip is also called a silicon chip, semiconductor, or integrated circuit. Computers with multicore processors knows how to divide tasks into parts and distribute parts across each core—this is an operation or technology called parallel processing. Unlike most other expansion buses that share a single bus line or path with several devices, the PCI Express bus provides a single dedicated path for each connected device. Which of the following offers a combination of the features of RAM and ROM, Flash Memory. Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices, eSATA. The ALU tells the rest of the computer system how to carry out a program’s instructions F. The number of bits that can travel simultaneously down a bus is known as the word size F. This reading device is used in banks to read the numbers on the bottom of checks and deposit slips MICR. Printer speed is measured in the number of words printed per minute F. The two categories of laser printers discussed in this chapter are Personal & Shared. This type of flat-panel monitors use a thin layer of organic compound to produce light, OLED. Ultra-high-definition television (UHDTV) is very useful to graphic artists, designers, and publishers because it can freeze video sequences to create high-quality still images, which can then be edited and stored for later use. Optical scanners recognize individual letters or images, F. E-ink produces images that reflect light like ordinary paper, making the display easy to read, T. RFID (radio-frequency identification) tags are tiny chips that can be embedded in consumer products, driver’s licenses, passports, etc. Information stored in the chips can be read using a magnetic card reader, F. Printers that are widely used with ATMs and gasoline pumps to print receipts are examples of cloud printers, F. Which of the following is introduced in the book and widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records, UPC. Amazon’s Echo, Apple’s HomePod, and Google’s Home are examples of devices on the market that exclusively offer access to virtual assistants with voice recognition. Multifunctional devices (MFD) typically combines the capabilities of a scanner, printer, fax, and copy machine. Ergonomics is defined as the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. It is generally true that, the higher the dot pitch, the clearer the images produced, F. Multitouch screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. Internal hard disk often stores the operating system, T. Storage that retains its data after the power is turned off is referred to as nonvolatile storage. One way to improve the storage capacity of a hard disk is to use file compression. Disk caching is the process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. Solid state storage like RAM because data can be updated. Facebook is an example of cloud storage, F. One reason that makes solid-state storage devices different from hard disks is solid-state storage devices normally have a higher capacity, T. According to Chapter 7, both RAID and optical discs are not a mass storage device, F. DVDs use tracks, sectors, and cylinders to store and organize files, F. In a SAN system, the user’s computer must provide the disk space for data, and the SAN provides the file system for storing data, F. Head crash occurs when a read-write head makes contact with the hard disk’s surface or with particles on its surface. Mass storage devices that support an enterprise storage system may include file servers, network attached storage, RAID systems, and organizational cloud storage. Chapter 7 introduced five categories of secondary storage. They are introduced in the order of hard disks, solid-state storage, optical storage, cloud storage, and mass storage. The four important characteristics of secondary storage introduced in Chapter 7 are media, Capacity, Storage devices, and Access speed. When a read-write head makes contact with the hard disk’s surface or with particles on its surface, a disaster called head crash occurs. The concept related to using computer networks to link people and resources is called connectivity. Coaxial cable is a high-frequency transmission cable that delivers television signals as well as connects computers in a network. Bluetooth is a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet. The speed with which a modem transmits data is called its transfer rate. Bus, ring, star, tree, and mesh are five types of network topologies. Every computer on the Internet has a unique numeric address called a IP address. Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities, Hotspots. Network gateway is a device that allows one LAN to be linked to other LANs or to larger networks. Broadband is the bandwidth typically used for DSL, cable, and satellite connections to the Internet. Sometimes NIC is referred to as a LAN adapter, these expansion cards connect a computer to a network. Work with firewalls to protect an organization’s network, answer: intrusion detection system. A widely used Internet protocol that requires sending and receiving devices to be identified by an IP address, answer: TCP/IP. Type of network topology in which each device is connected to a common cable called a backbone, answer: BUS. Microwave communication is a wireless connection which is sometimes referred to as line-of-sight communication. Protocols is a set of communication rules for exchanging data between computers. In a computer network, a node that requests and uses resources available from other nodes is generally called a client. Tree network, also known as a hierarchical network, is often used to share corporate-wide data. Peer-to-peer network, nodes have equal authority and can act as both clients and servers. Extranet is a private network that employ Internet technologies to connect more than one organization. Small data files that are deposited on a user’s hard disk when they visit a website are called cookies. Programs used to secretly record and report an individual’s activities on the Internet are called spyware.