Module 08 The ICT Industry Computer Concepts for End Users test bank
Download file with the answers
Module 08 The ICT Industry
1 file(s) 375.59 KB
If you are not a member register here to download this file
1. Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.
a. 1940s
b. 1950s
c. 1960s
d. 1970s
2. The information industry has three major facets: _________, computers, and telecommunications.
ANSWER: content
3. The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
a. ICT industry
b. stock market
c. dot-com industry
d. Internet
4. Companies are classified into economic sectors according to the types of goods and services they provide.
a. True
b. False
5. Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.
a. 4%
b. 14%
c. 24%
d. 40%
6. The growth of the ICT industry has a generally upward trend.
a. True
b. False
7. A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
ANSWER: bubble
8. The dot-com bubble occurred between the years 2008 and 2010.
a. True
b. False
9. In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
a. goods, services
b. services, goods
c. assets, services
d. none of the above
10. Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.
a. hardware
b. software
c. computers
d. exports
11. ______________ goods are raw materials, tools, and machinery used by businesses to make consumer goods.
ANSWER: Capital
12. _______________ are two of the world’s largest exporters of ICT services.
a. South Korea and the United States
b. China and the United States
c. The United States and Japan
d. India and Ireland
13. The terms outsourcing and offshoring are the same thing.
a. True
b. False
14. ____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
ANSWER: Offshoring
15. ___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.
ANSWER: Moore’s law
16. Moore’s law accurately described the rate of chip innovation for a 50-year period of ICT industry development.
a. True
b. False
17. From the perspective of a business that creates and sells a technology product, the ____________ maps the expected profitability of a product from its inception to its demise.
a. Rogers’ bell curve
b. product life cycle
c. Gartner Hype cycle
d. none of the above
18. The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.
a. True
b. False
19. A proprietary model called the __________ represents the position of a product during its life cycle of publicity.
a. Gartner Hype Cycle
b. Rogers’ bell curve
c. product life cycle
d. disruptive technology
20. _________ technology displaces an existing business process, market, industry, or product.
ANSWER: Disruptive
21. Which of the following would not be considered a disruptive technology?
a. Digital photography replacing film photography
b. Smartphones replacing devices such as MP3 players
c. Computers with word processors replacing typewriters
d. Computers that run macOS replacing computers that run Windows 10
22. In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
ANSWER: productivity
23. Between 2001 and 2016, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.
a. True
b. False
24. ICT use in emerging nations lags behind its use in developed nations.
a. True
b. False
25. _________ is the monetary value of all the goods and services produced by a nation’s workforce on an annual basis.
a. Productivity
b. GDP
c. ITC growth
d. PLC
26. The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
a. Provide identity management and trust support services.
b. Provide disruptive technologies.
c. Provide incident management capabilities.
d. Provide Internet routing, access, and communications services.
27. __________ is the acronym that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.
ANSWER: SCADA
28. _____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent’s information systems and defensive capabilities.
ANSWER: Cyberwarfare
29. Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
a. Tallinn Manual
b. Cyberwarfare
c. SCADA
d. PLC
30. The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.
a. True
b. False
31. A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.
ANSWER: algorithm
32. A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.
a. mechanical
b. manual
c. digital
d. algorithm
33. An abacus is an example of a(n) _________ calculator.
ANSWER: manual
34. A manual calculator implements algorithms autonomously.
a. True
b. False
35. Thomas de Colmar’s _________ became the first mass-produced mechanical calculator.
ANSWER: Arithmometer
36. Which of the following would be considered a mechanical calculator?
a. Schickard’s Calculator
b. Pascaline
c. Thomas de Colmar’s Arithmometer
d. All of the above
37. Babbage’s __________ was an all-purpose computing device.
ANSWER: Analytical Engine
38. ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.
a. Babbage’s Analytical Engine
b. Schickard’s Calculator
c. The Atanasoff-Berry Computer
d. Hollerith’s tabulating machine
39. The Atanasoff-Berry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
ANSWER: vacuum tubes
40. The Atanasoff-Berry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.
a. True
b. False
41. The Atanasoff-Berry Computer is often considered the first electronic digital computer.
a. True
b. False
42. The Harvard Mark I was digital but used _________ rather than binary representation.
ANSWER: decimal
43. ________ was an electronic device designed to decode messages that were sent between the German High Command and their field officers in World War II.
ANSWER: Colossus
44. Colossus used binary arithmetic.
a. True
b. False
45. ________ was designed to calculate trajectory tables for the U.S. Army.
a. ENIAC
b. The Harvard Mark I
c. Colossus
d. The Atanasoff-Berry Computer
46. ENIAC’s memory held programs but not data.
a. True
b. False
47. Early computers that held both programs and data in memory became known as ________ architecture.
ANSWER: von Neumann
48. _____ was the first commercially successful computer.
a. Z3
b. ENIAC
c. UNIVAC
d. Colossus
49. Most computer historians agree that computers have evolved through _______ distinct generations.
a. three
b. four
c. five
d. six
50. ________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
a. First-generation
b. Second-generation
c. Third-generation
d. None of the above
51. Second-generation computers used ________ instead of vacuum tubes.
ANSWER: transistors
52. Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.
a. True
b. False
53. It was not until the ______ generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
ANSWER: third
54. High-level programming languages were available for use on ________-generation computers.
ANSWER: second
55. _______-generation computers became possible by the development of integrated circuits.
a. First
b. Second
c. Third
d. Fourth
56. Which of the following would be considered a third-generation computer?
a. IBM 360
b. UNIVAC
c. Z3
d. MITS Altair
57. A computer that used an Intel 4004 microprocessor would be considered a fourth-generation computer.
a. True
b. False
58. Computer systems such as the Mark-8 and the MITS Altair are examples of early ______ computers.
ANSWER: personal
59. The Apple II computer included color graphics.
a. True
b. False
60. When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the top-selling personal computer.
ANSWER: VisiCalc
61. A key feature of the Apple Lisa was its use of _______________.
a. vacuum tubes
b. a graphical user interface
c. transistors
d. VisiCalc
62. Which year did Apple release the first Apple Macintosh computer? ___________
ANSWER: 1984
63. ___________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.
ANSWER: Telegraphy
64. Transmitting data in a telegraph system used _______, a binary encoding system based on dots and dashes.
ANSWER: Morse code
65. Samuel Morse developed and patented a telegraph system.
a. True
b. False
66. The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.
ANSWER: gutta-percha
67. Telegraphy remained the major technology for intercontinental communication well into the ________.
a. 1930s
b. 1940s
c. 1950s
d. 1960s
68. A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.
ANSWER: telephone
69. The first telephone was invented and patented by Alexander Graham Bell in ________.
a. 1776
b. 1876
c. 1906
d. 1922
70. The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.
a. True
b. False
71. Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.
ANSWER: exchange
72. A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
ANSWER: common carrier
73. Which of the following would not be considered a common carrier?
a. Telegraph
b. Telephone
c. Cell phone services
d. Radio stations
74. Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.
ANSWER: radio
75. Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States.
a. True
b. False
76. The years between 1920 and 1960 are considered the Golden Age of ________.
ANSWER: Radio
77. Radio technology is the basis for cell phones and Wi-Fi.
a. True
b. False
78. A(n) __________ is a device that uses a low-power radio transmitter to carry out two-way voice communications.
a. cellular telephone
b. radio
c. telegraph
d. television
79. Two-way radio technology went portable during World War I.
a. True
b. False
80. The Motorola DynaTAC 8000X was the first handheld ___________ telephone.
ANSWER: cellular
81. What generation of cellular phone technology was the first to offer true mobile broadband?
a. 1G
b. 2G
c. 3G
d. 4G
82. The first cellular phones to access the Internet and the Web were available in 1996.
a. True
b. False
83. The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.
ANSWER: television
84. 1996 was the year that cable _______ service made its debut.
ANSWER: Internet
85. Technology workers encompass jobs such as telephone cable installers and radio broadcasters.
a. True
b. False
86. Historically, IT departments were part of an organization’s finance department.
a. True
b. False
87. A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
ANSWER: professional
88. Which of the following job descriptions best matches that of a systems analyst?
a. Analyzes a computer system’s vulnerability to threats from viruses, worms, unauthorized access, and physical damage
b. Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services
c. Plans, installs, and maintains one or more local area networks and may also manage cloud resources
d. Troubleshoots hardware and software problems. Good interpersonal skills and patience are required for this job
89. A(n) ________ administrator analyzes a company’s data to determine the most effective way to collect and store it.
ANSWER: database
90. A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.
ANSWER: programmer
91. A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
ANSWER: network
92. A Web site developer manages an organization’s online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.
a. True
b. False
93. If you are hired as an entry-level programmer, your job title would typically be a(n) ___________ programmer.
ANSWER: associate
94. _________ workers are not official employees of a company.
ANSWER: Contract
95. A(n) _______________ uses available technology to work from home or an off-site location.
ANSWER: telecommuter
96. Which of the following descriptions best matches that of computer engineering degree?
a. Focuses on computer architecture and how to program computers to make them work effectively and efficiently
b. Focuses on applying computers to business problems
c. Focuses on computer equipment and software used by businesses
d. Focuses on the design of computer hardware and peripheral devices, often at the chip level
97. Which of the following descriptions best matches that of computer science degree?
a. Focuses on computer architecture and how to program computers to make them work effectively and efficiently
b. Focuses on applying computers to business problems
c. Focuses on computer equipment and software used by businesses
d. Focuses on the design of computer hardware and peripheral devices, often at the chip level
98. An information _________ degree focuses on computer equipment and software used by businesses.
ANSWER: technology
99. Certification alone is sufficient to qualify for a job in the IT industry.
a. True
b. False
100. __________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.
ANSWER: Certificates
101. _______ certification, offered by Certiport, covers basic computing knowledge and skills.
ANSWER: IC3
102. With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.
ANSWER: security
103. Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.
ANSWER: source
104. Which one of the following options offers self-study training to career-minded individuals who might not have the time or means to complete a traditional degree program?
a. Badge
b. Nanodegree
c. Certificate
d. None of the above
105. HTML is the best format for an effective resume.
a. True
b. False
106. Which of the following options is a useful format for your resume?
a. Print
b. Email
c. HTML
d. All of the above
107. Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.
a. True
b. False
108. Which of the following is not an example of an Information Technology Law?
a. United States Copyright Act
b. The Espionage Act of 1917
c. Digital Millennium Copyright Act
d. Children’s Internet Protection Act
109. Which of the following information technology laws makes it illegal to circumvent copy-protection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?
a. Electronic Communications Privacy Act
b. Fair Use Doctrine
c. United States Copyright Act
d. Digital Millennium Copyright Act
110. The term professional _______ refers to on-the-job choices and actions that reflect a person’s values.
ANSWER: ethics
111. ___________ is the obligation not to disclose willingly any information that should be kept private.
ANSWER: Confidentiality
112. With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
ANSWER: proprietary
113. Many employment contracts contain a ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
a. proprietary information
b. non-compete clause
c. confidentiality disclosure
d. privacy statement
114. A _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
a. non-compete clause
b. confidentiality statement
c. proprietary information
d. code of ethics
115. ____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
ANSWER: Whistleblowing
116. The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers.
a. True
b. False
117. Whistleblowing is risky under any circumstances.
a. True
b. False
Leave a reply