Free Essay

Introduction to Computer

In: Computers and Technology

Submitted By karatefeet
Words 2580
Pages 11
1)
A computer is unique compared to any other machine because of its ability to ________.

process large amounts of information simultaneously

process complex math functions

change its programming

use many different types of software

Score: 1

2)
Bits are used to measure ________.

storage capacity

data transfer and Internet connection rates

the size of files

the amount of time a user is connected to the Internet

Score: 1

3)
The smallest, most lightweight, and inexpensive computer is the ________.

notebook

laptop

netbook

client

Score: 0

4)
Distributed computing distributes ________.

the processing of tasks across a group of computers

power ability across all users

Internet usage across the entire network

disk storage for all computer users

Score: 1

5)
Smartphones use ________ technology, allowing users to perform several functions with one device.

embedded design

invisible computing

convergence

grid computing

Score: 1

6)
The intersection of a row and a column in a spreadsheet is called a ________.

field

text

cell

record

Score: 1

7)
Shaynia has been working with her colleagues on a Word document. Each of the parties may want to edit the document and view any alterations that have been made to the document as well. Which feature will Shaynia and her colleagues be working with in Microsoft Word?

Mail merge

Graphics

Track changes

Formatting

Score: 1

8)
When you purchase software in a box, reading the ________ is important to know if the software will function properly.

shareware requirements

EULA

system requirements

SaaS

Score: 1

9)
The term "cloud" in cloud computing means ________.

free financial software

websites for creating documents

the Internet

extra storage files located on the computer

Score: 1

10)
Which of the following best describes where cloud service providers build large datacenters?

In very populated areas so as to recruit the most specialized employees

In major metropolitan areas near the heart of the city

Remote, inexpensive locations near green power utilities

Offshore in foreign countries

Score: 1

11)
The sequence of folders to a file or a folder is known as its ________.

library

organization

public folder

path

Score: 1

12)
Sharon has a document that she wants to share with all the people at work. Where can Sharon place the document so everyone can view it from their own office computers?

Desktop folder

Shared folder

Private folder

Department folder

Score: 1

13)
Shelly wants to save a document file on her PC. She wants to use the colon (:) in her file name, but her computer teacher informs her that she cannot. Which of the following describes the reason why the colon cannot be used in a file name?

The colon is used exclusively for deleting folders and cannot be used in a file name.

The colon is strictly used for moving files from one folder to another.

The colon is exclusively used to indicate a drive on the computer. An example is C: drive.

Colons are symbols that represent programs accessed on the start menu.

Score: 1

14)
A(n) ________ is a procedure that you would use to solve a problem.

attribute

parameter

algorithm

property

Score: 1

15)
Default programs are connected with which of the following?

Devices

File types

File folders

Paths

Score: 1

16)
The ________ is the brain of the computer.

CPU

BIOS

RAM

ALU

Score: 1

17)
________ uses multiple processors, or multi-core processors, to share processing tasks.

Massive processing

Distributed processing

Pipelining

Parallel processing

Score: 1

18)
The ________ houses the power supply, memory, and drive bays of the computer.

CPU

ALU

system unit

control unit

Score: 1

19)
Which of the following is non-volatile?

CMOS

ROM

RAM

cache memory

Score: 1

20)
A wired NIC is sometimes call a(n) ________ card.

modulator-demodulator

Ethernet

PictBridge

Wi-Fi

Score: 1

21)
________ provides the user with an interface to communicate with the computer's hardware.

Utility software

The operating system

Application software

Open source software

Score: 1

22)
The ________ software makes the computer run.

system

application

coding

programming

Score: 1

23)
The programs that make up Control Panel are sometimes referred to as control panel________.

applications

ops

applets

apps

Score: 1

24)
One advantage of Windows Embedded OS is that it ________.

has a familiar user interface

is a large program

is installed on Windows PCs

has been around since the 1980s

Score: 1

25)
A ________ network does NOT require a NOS.

client-server

peer-to-peer

bus

ring

Score: 1

26)
Businesses should use a ________ network in order to share resources.

peer-to-peer

hybrid

ring

client-server

Score: 1

27)
Files saved to a hard disk are stored in ________.

clusters

areas

platters

partitions

Score: 1

28)
The Windows ________ utility rearranges fragmented files on a hard drive in order to improve efficiency.

Optimize Drives

Error Checking

Disk Cleanup

Check Disk

Score: 1

29)
All of the following are examples of malware, EXCEPT ________.

worms

spyware

viruses

spam

Score: 1

30)
Windows ________ helps to protect a computer form viruses and spyware.

Protector

Check Disk

Defender

Disk Cleanup

Score: 1

31)
________ software blocks unauthorized access to your computer.

Firewall

Gateway

Anti-spam

Antivirus

Score: 1

32)
To project your computer from adware, you would purchase ________ software.

antispyware

firewall

antivirus

anti-spam

Score: 1

33)
Which of the following is NOT typically one of the important features when selecting a digital camera?

Weight

Lenses

Storage type

Resolution

Score: 1

34)
When you evaluate a camera's picture quality, the resolution is expressed in ________.

macropixels

micropixels

megapixels

gigapixels

Score: 1

35)
________ counteracts camera shake and allows you to take sharper images.

burst mode

fixed-focus

image stabilization

shutter lag

Score: 1

36)
The time between a person pressing the button and the camera taking the picture is called ________.

shutter delay

shutter lag

tag time

latency

Score: 1

37)
Compact system cameras are also called ________.

DSLRs

autofocus cameras

superzooms

point-and-shoot cameras

Score: 1

38)
Which camera would be the best choice for a professional photographer who prefers to manually adjust the focus and exposure for each image?

CSC

Advanced point-and-shoot

DSLR

Point-and-shoot

Score: 1

39)
________ allows you to sync your photos between your iPhone and your Mac.

Picasa

Photobucket

Flickr

iCloud

Score: 1

40)
________ printers produce lab-quality prints of your photos.

Laser

Dye-sublimation

Dot matrix

Ink jet

Score: 1

41)
Which of the following is an industry standard that enables a camera to connect directly to a printer?

Flickr

Shutterfly

Geotagging

PictBridge

Score: 1

42)
MP3 stands for ________.

Mega-audio 3

MPEG-1 Audio Layer 3

MPEG-3

Megapixel Audio3

Score: 1

43)
When you transfer music from a CD to your computer, you ________ the CD.

copy

rip

tag

burn

Score: 1

44)
One disadvantage to using speech recognition software is that it ________.

is complicated to use

takes time to learn your speech patterns

is expensive

is not readily available for use

Score: 1

45)
________ provide the ability to carry on two-way communication with people in different states.

Webcams

PictBridges

Podcasts

Weblogs

Score: 1

46)
Portable media players use ________ to store music.

hard drives

flash memory

ROM

RAM

Score: 1

47)
The iPad runs ________.

iOS

Android

OS X

OS Mavericks

Score: 1

48)
One disadvantage to e-ink technology used with some e-readers is that it ________.

has a short battery life

causes eye strain

requires an external light for night reading

cannot be read in bright light

Score: 1

49)
The Internet was originally created as a communication system for the ________.

Department of Defense

Department of Education

U.S. Congress

University System

Score: 1

50)
The original Internet ________.

had only two nodes

came into existence in 1990

was invented by Tim Berners-Lee

was called ARPANET

Score: 1

51)
The first point-and-click graphical web browser was ________, which later became Netscape.

Mosaic

Chrome

Safari

Internet Explorer

Score: 1

52)
For which of the following uses was the Internet2 NOT designed?

Business

Education

Collaboration

Research

Score: 1

53)
Which of the following could become a member of the Internet2?

Facebook

Library of Congress

CNN

Amazon

Score: 1

54)
Which of the following statements about cable Internet access is TRUE?

It is universally available.

It is slower than dial-up.

You share the bandwidth with your neighbors.

Speeds range from 1 Kbps to 100 Kbps.

Score: 1

55)
If you use satellite Internet access, you can expect the speed to be comparable to those of a ________ connection.

cable Internet access

dial-up

DSL

FTTH

Score: 1

56)
In the URL http://www.irs.gov, http is the ________.

TLD

domain name

protocol

subdomain

Score: 1

57)
In the URL http://www.irs.gov, irs is the ________.

domain name

TLD

subdomain

protocol

Score: 1

58)
Google's free online storage is called Google ________.

Drive

Earth

Play

Chrome

Score: 1

59)
Which of the following is NOT a Boolean operator that can be used to search the web?

NOT

AND

OR

BUT

Score: 1

60)
Which of the following is the search term to find information about Chevrolet vehicles excluding the Corvette model?

chevrolet BUT corvette

chevrolet OR corvette

chevrolet NOT corvette

chevrolet AND corvette

Score: 1

61)
Which of the following is a method of synchronous online communication?

Forum

Email

Newsgroup

Instant Messaging

Score: 1

62)
A moderated chat room ensures that ________.

no one under the age of 18 is online

parental controls are in effect

all content is screened

only subscribers participate

Score: 1

63)
________ is a service that allows Apple users to place video phone calls to other users.

FaceTime

Google Voice

iChat

iMessage

Score: 1

64)
________ communication allows you to send a message to someone who is not online at the same time.

Synchronous

Static

Dynamic

Asynchronous

Score: 1

65)
Email sends electronic messages using ________ technology.

push-and-pull

store-and-forward

forward-and-push

get-and-put

Score: 1

66)
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.

password

signature

verification

captcha

Score: 1

67)
The tools that enable users to create user-generated content, connect, network, and share are called social ________.

media

connections

methods

channels

Score: 1

68)
In a virtual community, you can communicate with other people by using a(n) ________.

alias

profile

captcha

avatar

Score: 1

69)
All of the information that someone can find out about you by searching the web is called your ________.

tagged information

avatar

digital footprint

folksonomy

Score: 1

70)
Podcasts allow time ________, which means that you can listen on your own schedule.

warping

shifting

lagging

delay

Score: 1

71)
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.

crowdsourcing

crowdsampling

crowdresourcing

crowdreferencing

Score: 1

72)
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.

B2C

B2B

C2A

A2C

Score: 1

73)
________ e-commerce allows anyone to sell or trade your items online.

C2B

B2B

C2C

B2C

Score: 1

74)
One of the most popular C2C websites is ________.

Amazon

PayPal

eBay

Google Checkout

Score: 1

75)
You would most likely find a P2P network in a(n) ________.

home

university

library

corporation

Score: 1

76)
A corporation would want to utilize a ________ network.

client-server

peer-to-peer

workgroup

homegroup

Score: 1

77)
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________.

PAN

MAN

LAN

WAN

Score: 1

78)
One of the most important reasons for Ethernet standards is they ________.

prevent overburdening your computer

assure equipment from different manufacturers is compatible

can prevent unauthorized users from accessing the Internet

allow the government to keep tabs on what you are doing

Score: 0

79)
Which of the following is NOT a common LAN topology?

Hierarchical

Ring

Bus

Star

Score: 1

80)
Network speeds are measured in ________ per second.

nanos

hertz

bytes

bits

Score: 1

81)
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

terminator

switch

repeater

Score: 1

82)
A ________ can be set by an employer to prevent you from accessing eBay.

switch

wireless access point

firewall

router

Score: 1

83)
A ________ is a network composed of a group of clients and servers under the control of one central security database.

protocol

homegroup

domain

workgroup

Score: 1

84)
Which of the following is contained within the security database?

Your network protocol

Your network topology

Your IP address

Your user name and password

Score: 1

85)
The rules for communication between devices are called ________.

queues

packets

stacks

protocols

Score: 1

86)
Which of the following cybercrimes is considered to be a form of harassment?

Phishing

Clickjacking

Cyber-stalking

Pharming

Score: 1

87)
Cyber-harassment is ________.

harassment of one adult by another, using a computer

watching someone else's computer remotely

having an argument in an online forum

receiving a message claiming that a friend needs your help and money

Score: 1

88)
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

cyberbullying

phishing

pharming

cyber-stalking

Score: 1

89)
An email claiming that you have won a lottery might be an example of ________.

cyberbullying

cyber-harassment

computer fraud

cyber-stalking

Score: 1

90)
________ attacks have political or social agendas.

Cyber-stalking

Cyber-terrorism

Cybercrime

Computer fraud

Score: 1

91)
Hacking for the purpose of making a political statement is called ________.

cracking

sneaking

hacktivism

politicking

Score: 1

92)
Not all ________ is bad since it can give you the opportunity to try a program without buying it.

spyware

spam

malware

adware

Score: 1

93)
An email containing a virus hoax is dangerous because it ________.

can send copies of itself through the email program

contains a virus

causes people to search for and delete important files

sends your password to a criminal

Score: 1

94)
If your computer has a ________, someone else can gain access to it, but the fact that it is compromised is well hidden.

zombie

rootkit

logic bomb

botnet

Score: 1

95)
To secure your wireless network at home you should ________.

back up the computers on the network

use wireless encryption with a difficult passphrase

password-protect important document files

set the SSID to CLOSED

Score: 1

96)
You should use a(n) ________ account for everyday computing on a computer running Windows.

administrator

visitor

guest

standard

Score: 1

97)
When you need to make changes, install hardware, or configure settings, you will need to use the ________ account on your computer.

master

guest

administrator

client

Score: 1

98)
Which of the following would be the strongest password?

p@ssw*rd

p22w0r6

customer

p@55W0?d

Score: 1

99)
When you enter your credit card information in a website, you can ensure that the website is encrypted by looking for ________ in the address bar.

https

shttp

http

ssl

Score: 1

100)
The ________ was created in an effort to make it easier for victims to report cybercrimes.

Computer Fraud and Abuse Act

Homeland Security Act

USA PATRIOT Act

Internet Crime Complaint Center

Score: 1…...

Similar Documents

Premium Essay

Introductions Into Computers

...In the world of technology and computers, there has always been a way to make programs applications more advanced more simplistic and better than ever before with updates. When everything also is made into the way of life of computers, there’s always one thing to provide out the details and the simplistic trails of operating systems. Without the limitations of these operating systems, many would wonder as a society what could have happened if the operating system was never invented. Without operating systems and computers, things could and would have proceeded into the complications of today and things might not have changed if it wasn’t for the internet and different frustrations of doing many things by hand, but in the ways of introducing technology now is very simplistic. Using computers now in the present have been used as a daily important part of our lives to stay communicated to the world and to the rest of the others in real time. Running on computers have been of choice running operating systems to stay on top of programs and applications to get and take care of the other particles of tasks needed to be done or just for leisure and entertainment. Using operating systems known in short terms for “OS” is all on the society’s choice running what they think is the best for what they can get for the computer. There is all but one OS out of the major ones that is running for free without price, and that would be Linux. In today’s society, there’s a lot that Linux can......

Words: 309 - Pages: 2

Free Essay

Introduction to Computer Security

...CSS150-1302B-04 Introduction to Computer Security Phase 3: Discussion Board 3 Networks, Cryptography, and Malicious Activity Professor: Shawn Murray June 5, 2013 In this paper I will discuss a malicious computer worm that spread rather quickly and affected thousands of people and targeted a company in Utah. I will discuss how the worm spread in detail. Lastly, I will discuss how to prevent / defend against such worms. On January 26, 2004 MyDoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi was a computer worm that affected Microsoft Windows (wildammo.com, 2010). MyDoom in 2004 had set the record for spreading the fastest through email. It was said to be started by e-mail spammers through junk mail being sent. That was one way the worm was sent. MyDoom was also sent out as failure sent messages. One of the messages that MyDoom had sent out was “Andy; I’m just doing my job, nothing personal, sorry.” (wildammo.com, 2010). With messages such as that and sent failure / system error messages, one whom was not knowledgeable of such worms would foolishly open it. These messages including but not limited to the one mentioned above brought suspicion to a lot of people and it was believed that the maker of the worm was paid. To date, the author of MyDoom is not known. It is thought though that MyDoom was created in Russia by a programmer (wildammo.com, 2010). In the result of MyDoom globally internet access had slowed......

Words: 622 - Pages: 3

Free Essay

Introduction Computer Addiction

...Introduction It is undeniable that the computer has become an essential gadget for daily lives of every human being. The Internet is an absolute necessity for both adults and children. It is impossible to believe to do anything without the Internet, especially from the youth’s perspective. Youths today spend too much time on the computer, surfing the Internet for hours. Some have become much too addicted and don’t realize that they actually suffer from Internet Addiction Disorder (IAD). Let’s have a look at how computers directly have effects upon youths nowadays. One of the main consequences of spending too much time on the computer that youths are likely to disregard is personal neglect. When one is too obsessed with surfing the Internet, they tend to pay no attention to their standard of living apart from the computer which they are using. Some may not take bath, clean their room, or eat well as they are much too focused on what they are doing virtually. Because of the long hours spent engaged with a computer, youths often have eating irregularities, such as skipping meals or overeating. This indirectly leads to health disorders, for instance, malnutrition of the youth’s body. Isolation, avoidance and no family bonding at all is another outcome which happens in a youth’s life when they get excessively addicted with the Internet. Because of spending too much time on the computer, youths have a propensity to reduce socializing with others. They tend to feel that......

Words: 522 - Pages: 3

Premium Essay

An Introduction to the Computer Security Problem

...Essay 1 What Is There to Worry About? An Introduction to the Computer Security Problem Donald L. Brinkley and Roger R. Schell This essay provides an overview of the vulnerabilities and threats to information security in computer systems. It begins with a historical presentation of past experiences with vulnerabilities in communication security along with present and future computer security experiences. The historical perspective demonstrates that misplaced confidence in the security of a system is worse than having no confidence at all in its security. Next, the essay describes four broad areas of computer misuse: (1) theft of computational resources, (2) disruption of computational services, (3) unauthorized disclosure of information in a computer, and (4) unauthorized modification of information in a computer. Classes of techniques whereby computer misuse results in the unauthorized disclosure and modification of information are then described and examples are provided. These classes are (1) human error, (2) user abuse of authority, (3) direct probing, (4) probing with malicious software, (5) direct penetration, and (6) subversion of security mechanism. The roles of Trojan horses, viruses, worms, bombs, and other kinds of malicious software are described and examples provided. In the past few decades, we have seen the implementation of myriads of computer systems of all sizes and their interconnection over computer networks. These systems handle and are required to......

Words: 13185 - Pages: 53

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security......

Words: 1194 - Pages: 5

Premium Essay

Introduction of Computer

...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan......

Words: 26839 - Pages: 108

Free Essay

Introduction to Computer and Network Hardware:

...Best Device for Your Needs Introduction to Computer and Network Hardware: ITCO103 - 1401A – 01 IP 1 Best Device for Your Needs Many people are updating their smartphones, laptops and desktops. There are so many options to choose from brand, size and performance. This paper will discuss and compare some of today’s best bargain laptops and computers that will also offer some of today’s most updated software and features. I will also discuss two of the most popular smartphones comparing and contrasting each devices features. While shopping on the internet for the best computer system I had hundreds of choices. I decided to narrow my choices down by picking a device that had all the features I needed in a computer system, but had a reasonable price tag for a full time worker and a part time student budget. The best option for me is the Dell Inspiron 660, and the Canon PIXMA MG2220 all-n-one printer it has all the features and needs that I would need in a personal home desktop system. The price point for this desktop is around $529.00. This device can be purchased at Wal-Mart, Best Buy, and Hhgreeg making it accessible to most for in store purchase. This desktop is also available for purchase online as well from the dell website directly for the price listed above. The system software consists of OS Provided Microsoft Windows 7 Home Premium 64-bit Edition. The system setup......

Words: 1468 - Pages: 6

Premium Essay

Introduction to Computers

...Windows 7 Presentation APTECH COMPUTER EDUCATION What is an OS ? • Operating systems provide a software platform on top of which other programs, called application programs, can run. History of Microsoft Windows • 1980-MS-DOS • 1982–1985: Introducing Windows 1.0 • 1987–1992: Windows 2.0–2.11—More windows, more speed • 1990–1994: Windows 3.0–Windows NT—Getting the graphics • Windows NT • 1995–2001: Windows 95—the PC comes of age (and don't forget the Internet) • 1998–2000: Windows 98, Windows 2000, Windows Me Continue… • Windows 2000 Professional • 2001–2005: Windows XP—Stable, usable, and fast • 2006–2008: Windows Vista—Smart on security • 2009–Today: Windows 7(The version of Kernel is 7.0 or above 6.0) • Expecting Windows 8 Hardware Requirements Flavors of Windows 7 • • • • • • Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate Editions of Windows 7 Windows 7 Ultimate Windows 7 Home Premium Windows 7 Enterprise Windows 7 • Standard Professional consumer edition Consumers Windows 7 Home • Does not include Premium Windows 7 Home Basic Windows 7 Starter business features Windows 7 Targeted for value PCs enthusiasts for want all all for accessing for edition in targeted markets, in environments, • Business-focused edition,emergingwhomanagedWindows 7 small factor PCs full Windows The Professional editioncustomer. and lowermeant markets7 standardtechnicalfor......

Words: 2139 - Pages: 9

Free Essay

Introduction to Computer Addiction

...Since my freshman year of high school, I have used a computer for at least an hour (a conservative minimum) virtually every single day. At one point I would return from soccer practice at 6pm, shower, eat dinner, and then play about three hours of computer games before beginning my homework. My friends and I would plan computer game matches during 4 th period calculus rather than pay attention. My vision has declined since then from 20/20 to 20/25. I can easily spend hours on the computer, but I often tell myself that I do not have time to go running. The first thing I do when I return to my apartment is check my email. When I experience “writer's block” while using Microsoft Word, I have an overpowering urge to sign onto AOL Instant Messenger. Once “online,” I find it extremely difficult to sign off. Help me, Dr. Phil. The inspiration of this project is based on the following assumptions: A significant amount of college students share my experience of computer abuse. They find themselves staying on their computers longer than expected and sacrificing their daily objectives as a consequence. Because time is a scarce resource, computer use must be replacing other activities. Also, as the technology sector grows, jobs are becoming less physically demanding. Many employees sit down for hours, whether they are secretaries, programmers, researchers, administrative officials, etc, concentrating on small characters on their computer monitors. Not only is this substituting more......

Words: 361 - Pages: 2

Premium Essay

Introduction to Computer

...Topics: Chapter 1 – Working Together Computers are everywhere. Watching television, driving a car, using a charge card, ordering fast food, and the more obvious activity of typing a term paper on a personal computer, all involve interaction with computers. For one day, have each member of your team make a list of every computer he or she encounters (be careful not to limit yourselves just to the computers you see). Meet with the members of your team and combine your lists. Consider how each computer is used. How were the tasks the computers perform done before computers? Use PowerPoint to create a group presentation and share your findings with the class. Chapter 2 – Working Together This chapter lists 12 types of Web sites: portal, news, informational, business/marketing, educational, entertainment, advocacy, blog, wiki, online social network, content aggregator, and personal. Working as a team, use the Internet to find at least two examples of each type of Web site. For each Web site, identify the Web address, the multimedia elements used, the purpose of the Web site, and type of Web site. Explain why you classified each site as you did. Then, keeping in mind the purpose of each Web site, rank the sites in terms of their effectiveness. Share your findings in a report and/or a PowerPoint presentation with the class. Chapter 3 – Working Together In any software application, each program is not exactly the same. Different spreadsheet programs, for......

Words: 539 - Pages: 3

Free Essay

Introduction to Computers

...Introduction to Computers and the Internet 2 1) Basic browser buttons: The same picture is blown up twice below, so that the labels are easier to read. 2) Favorites: A favorite (or a bookmark, depending on your browser) is a link to a page that you store in your web browser. This makes it easier to pull up that page because you do not have to remember its full address, search for it, or click through links on a page to get to it. If there is a page you want to remember or like to go to a lot, you may want to add it to your favorites. Here you can see the pages that are currently saved on your computer or add a new one. 3) Home Page(s): The home page is the page or pages that the browser pulls up when you first open it. You can set it to open more than one, and you can choose what it opens first. To do this, you will want to use the “home” icon. [pic] Clicking on the icon will make the browser pull up the home page, but by clicking on the arrow immediately to the left of it, you can set a new home page. Here you can see the current home page highlighted and the options to change or remove home pages. If you choose to add or change, you will see this: You can either make the page you are currently on the home page, or tell the browser to bring it up in addition to the page(s) it is already opening. If you find that you have too many home pages, you may want to remove some, like......

Words: 355 - Pages: 2

Premium Essay

Introduction to Human Computer Interaction

...Introduction of Human Computer Interaction Human computer interaction is communication between user and system, and is the study of the way in which computer technology influences human work and activities. With the rapid advancement of technology, our lives almost depend on computer or any kind of machine. For example computer, Global Positioning System (GPS), cell phone, and even for tuning musical instrument you have a digital device that helps tune your instrument. Therefore it is very important that the interface of any device should be very user friendly, meaning the person who does not have much knowledge of system should be able to use it. Because not all of our populations are computer or technology literate, but still they have to use it because of requirement and necessity (Dix, A. 2009, pp. 1327-1331). Analysis of Google Home Page The strength of Google is the simple look and feel which every single user can access and gain useful information. The speed of the search engine is amazing and can gain any information within no time. Google has the provision to integrate with various languages and its localized search is an added features compared to other search engines. The information is well organized. Google’s products are its major strength which has created a huge user base. This enhances the trust to its customers and shareholders. Google search indexes has various file formats including the very popular PDF file format and Microsoft Office files...

Words: 1339 - Pages: 6

Premium Essay

Essential Introduction Computer

...Essential Introduction to Computers 1. Define the term computer and discuss the four basic computer operations: input, processing, output, and storage 2. Define data and information 3. Explain the principle components of the computer and their use 4. Describe the use and handling of floppy disks and hard disks 5. Discuss computer software and explain the difference between system software and application software 6. Identify several types of personal computer application software 7. Discuss computer communications channels and equipment and the Internet and World Wide Web 8. Explain how to purchase, install, and maintain a personal computer, a notebook computer, and a handheld computer 9. Define e-commerce 1. Computer: Input, Processing, Output, and Storage In today's world, computers are used for almost every task imaginable. Routine activities such as paying bills, buying groceries, or communicating with a friend can be done with a computer. That is why it is important not only to know how to use a computer, but also to understand the components of a computer and what they do. Recent studies report that almost 40% of homes surveyed have personal computers, and this number is growing. Given the widespread use of computers, computer literacy - a knowledge and understanding of computers and computer uses - has become an essential ingredient in the recipe for success in today's world. Florida was the first state to demand computer......

Words: 2855 - Pages: 12

Premium Essay

Introduction to Computers - Key Terms

...Chapter 1 - Introduction to Computers - Key Terms (pages 1-15) Barcode - (p. 7, 294) used to index documents scanned within a document management systems. Bit - (p. 294) the level of voltage (low or high) in a computer that provides the binary states of 0 and 1 that computers use to represent characters. Bluetooth port - (p. 294) technology that uses radio waves to provide hands-free cellular phone communications. Blu-Ray disc - (p. 294) storage device, similar to CDs and DVDs, but are able to store even larger amounts of data. Bus network - (p. 294) computers networked together that are lined up on a single cable. Byte - (p. 294) eight bits treated as a single unit by a computer to represent a character. Cache memory - (p. 294) a type of memory located on the central processing unit (CPU) that can also be on a part of the processor. Central processing unit (CPU) - (p. 295) the brain of the computer, or the circuits that make the electrical parts function. Client/server network - (p. 295) large networks that could run hundreds of computers in various counties or states. Compact disc (CD) - (p. 296) discs that use a finely focused laser beam to write and read data. Computers on wheels (COWs) - (p. 296) term used to refer to notebook computers mounted on carts and moved with the user. Daisy chain network - (p. 296) the easiest way to add more computers into a network by connecting each computer to the next in a series. Device driver - (p. 297) a specific type......

Words: 1585 - Pages: 7

Free Essay

Computer Introduction

...vedere la matrice assegnata a ciascuna variabile, semplicemente digitare il nome della variabile. Numeri MATLAB usa notazione decimale e convenzionale, con un punto decimale e opzionale ed indicando quantit` positive o il segno meno, per numeri negativi. La notazione scientifica usa la lettera e per a specificare la potenza decimale.I numeri immaginari usano i o j, come un suffisso. Degli esempi di numeri legali sono: 3 9.6397238 1i -99 1.60210e-20 -3.14159j 10 0.0001 6.02252e23 3e5i Tutti i numeri che usano il format long specificato dall’IEEE sono immagazzinati internamente con lo standard floating-point. I numeri floating-point hanno una precisione limitata di 16 cifre decimali significative e una serie limitata da 10^-308 a 10^308+. (Il computer di VAX usa una configurazione diversa, ma la sua precisione e serie sono quasi le stesse.) Operatori Le espressioni usano operatori di aritmetica familiari e le regole della precedenza. + * / \ Addizione Sottrazione Moltiplicazione Divisione Left division (sono descritte nella sezione su matrici e Algebra Lineare in MATLAB) ^ ’ () potenza Asse coniugato complesso trasposto Valutazione specifiche di ordine. Funzioni MATLAB prevede un gran numero di funzioni matematiche standard,incluso abs, sqrt, exp, e sin. La radice quadrata o il logaritmo di un numero negativo non ` un errore; il risultato complesso ` prodotto e e automaticamente. MATLAB prevede anche funzioni matematiche molto pi` avanzate, incluso Bessel u e gamma function.......

Words: 9607 - Pages: 39

Robo-Dog Se Déchaîne HD 2017 VF | Moto Guzzi Stornello Scrambler America 125 - 1969 | InuYasha: The Final Act (Official)