Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Module 08 The ICT Industry Computer Concepts for End Users test bank


 

Download  file with the answers

If you are not a member register here to download this file 


 

1. Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.
a. 1940s
b. 1950s
c. 1960s
d. 1970s

2. The information industry has three major facets: _________, computers, and telecommunications.
ANSWER: content

3. The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
a. ICT industry
b. stock market
c. dot-com industry
d. Internet

4. Companies are classified into economic sectors according to the types of goods and services they provide.
a. True
b. False

5. Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.
a. 4%
b. 14%
c. 24%
d. 40%

6. The growth of the ICT industry has a generally upward trend.
a. True
b. False

7. A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
ANSWER: bubble

8. The dot-com bubble occurred between the years 2008 and 2010.
a. True
b. False

9. In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
a. goods, services
b. services, goods
c. assets, services
d. none of the above

10. Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.
a. hardware
b. software
c. computers
d. exports

11. ______________ goods are raw materials, tools, and machinery used by businesses to make consumer goods.
ANSWER: Capital

12. _______________ are two of the world’s largest exporters of ICT services.
a. South Korea and the United States
b. China and the United States
c. The United States and Japan
d. India and Ireland

13. The terms outsourcing and offshoring are the same thing.
a. True
b. False

14. ____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
ANSWER: Offshoring

15. ___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.
ANSWER: Moore’s law

16. Moore’s law accurately described the rate of chip innovation for a 50-year period of ICT industry development.
a. True
b. False

17. From the perspective of a business that creates and sells a technology product, the ____________ maps the expected profitability of a product from its inception to its demise.
a. Rogers’ bell curve
b. product life cycle
c. Gartner Hype cycle
d. none of the above

18. The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.
a. True
b. False

19. A proprietary model called the __________ represents the position of a product during its life cycle of publicity.
a. Gartner Hype Cycle
b. Rogers’ bell curve
c. product life cycle
d. disruptive technology

20. _________ technology displaces an existing business process, market, industry, or product.
ANSWER: Disruptive

21. Which of the following would not be considered a disruptive technology?
a. Digital photography replacing film photography
b. Smartphones replacing devices such as MP3 players
c. Computers with word processors replacing typewriters
d. Computers that run macOS replacing computers that run Windows 10

22. In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
ANSWER: productivity

23. Between 2001 and 2016, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.
a. True
b. False

24. ICT use in emerging nations lags behind its use in developed nations.
a. True
b. False

25. _________ is the monetary value of all the goods and services produced by a nation’s workforce on an annual basis.
a. Productivity
b. GDP
c. ITC growth
d. PLC

26. The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
a. Provide identity management and trust support services.
b. Provide disruptive technologies.
c. Provide incident management capabilities.
d. Provide Internet routing, access, and communications services.

27. __________ is the acronym that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.
ANSWER: SCADA

28. _____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent’s information systems and defensive capabilities.
ANSWER: Cyberwarfare

29. Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
a. Tallinn Manual
b. Cyberwarfare
c. SCADA
d. PLC

30. The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.
a. True
b. False

31. A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.
ANSWER: algorithm

32. A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.
a. mechanical
b. manual
c. digital
d. algorithm

33. An abacus is an example of a(n) _________ calculator.
ANSWER: manual

34. A manual calculator implements algorithms autonomously.
a. True
b. False

35. Thomas de Colmar’s _________ became the first mass-produced mechanical calculator.
ANSWER: Arithmometer

36. Which of the following would be considered a mechanical calculator?
a. Schickard’s Calculator
b. Pascaline
c. Thomas de Colmar’s Arithmometer
d. All of the above

37. Babbage’s __________ was an all-purpose computing device.
ANSWER: Analytical Engine

38. ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.
a. Babbage’s Analytical Engine
b. Schickard’s Calculator
c. The Atanasoff-Berry Computer
d. Hollerith’s tabulating machine

39. The Atanasoff-Berry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
ANSWER: vacuum tubes

40. The Atanasoff-Berry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.
a. True
b. False

41. The Atanasoff-Berry Computer is often considered the first electronic digital computer.
a. True
b. False

42. The Harvard Mark I was digital but used _________ rather than binary representation.
ANSWER: decimal

43. ________ was an electronic device designed to decode messages that were sent between the German High Command and their field officers in World War II.
ANSWER: Colossus

44. Colossus used binary arithmetic.
a. True
b. False

45. ________ was designed to calculate trajectory tables for the U.S. Army.
a. ENIAC
b. The Harvard Mark I
c. Colossus
d. The Atanasoff-Berry Computer

46. ENIAC’s memory held programs but not data.
a. True
b. False

47. Early computers that held both programs and data in memory became known as ________ architecture.
ANSWER: von Neumann

48. _____ was the first commercially successful computer.
a. Z3
b. ENIAC
c. UNIVAC
d. Colossus

49. Most computer historians agree that computers have evolved through _______ distinct generations.
a. three
b. four
c. five
d. six

50. ________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
a. First-generation
b. Second-generation
c. Third-generation
d. None of the above

51. Second-generation computers used ________ instead of vacuum tubes.
ANSWER: transistors

52. Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.
a. True
b. False

53. It was not until the ______ generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
ANSWER: third

54. High-level programming languages were available for use on ________-generation computers.
ANSWER: second

55. _______-generation computers became possible by the development of integrated circuits.
a. First
b. Second
c. Third
d. Fourth

56. Which of the following would be considered a third-generation computer?
a. IBM 360
b. UNIVAC
c. Z3
d. MITS Altair

57. A computer that used an Intel 4004 microprocessor would be considered a fourth-generation computer.
a. True
b. False

58. Computer systems such as the Mark-8 and the MITS Altair are examples of early ______ computers.
ANSWER: personal

59. The Apple II computer included color graphics.
a. True
b. False

60. When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the top-selling personal computer.
ANSWER: VisiCalc

61. A key feature of the Apple Lisa was its use of _______________.
a. vacuum tubes
b. a graphical user interface
c. transistors
d. VisiCalc

62. Which year did Apple release the first Apple Macintosh computer? ___________
ANSWER: 1984

63. ___________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.
ANSWER: Telegraphy

64. Transmitting data in a telegraph system used _______, a binary encoding system based on dots and dashes.
ANSWER: Morse code

65. Samuel Morse developed and patented a telegraph system.
a. True
b. False

66. The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.
ANSWER: gutta-percha

67. Telegraphy remained the major technology for intercontinental communication well into the ________.
a. 1930s
b. 1940s
c. 1950s
d. 1960s

68. A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.
ANSWER: telephone

69. The first telephone was invented and patented by Alexander Graham Bell in ________.
a. 1776
b. 1876
c. 1906
d. 1922

70. The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.
a. True
b. False

71. Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.
ANSWER: exchange

72. A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
ANSWER: common carrier

73. Which of the following would not be considered a common carrier?
a. Telegraph
b. Telephone
c. Cell phone services
d. Radio stations

74. Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.
ANSWER: radio

75. Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States.
a. True
b. False

76. The years between 1920 and 1960 are considered the Golden Age of ________.
ANSWER: Radio

77. Radio technology is the basis for cell phones and Wi-Fi.
a. True
b. False

78. A(n) __________ is a device that uses a low-power radio transmitter to carry out two-way voice communications.
a. cellular telephone
b. radio
c. telegraph
d. television

79. Two-way radio technology went portable during World War I.
a. True
b. False

80. The Motorola DynaTAC 8000X was the first handheld ___________ telephone.
ANSWER: cellular

81. What generation of cellular phone technology was the first to offer true mobile broadband?
a. 1G
b. 2G
c. 3G
d. 4G

82. The first cellular phones to access the Internet and the Web were available in 1996.
a. True
b. False

83. The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.
ANSWER: television

84. 1996 was the year that cable _______ service made its debut.
ANSWER: Internet

85. Technology workers encompass jobs such as telephone cable installers and radio broadcasters.
a. True
b. False

86. Historically, IT departments were part of an organization’s finance department.
a. True
b. False

87. A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
ANSWER: professional

88. Which of the following job descriptions best matches that of a systems analyst?
a. Analyzes a computer system’s vulnerability to threats from viruses, worms, unauthorized access, and physical damage
b. Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services
c. Plans, installs, and maintains one or more local area networks and may also manage cloud resources
d. Troubleshoots hardware and software problems. Good interpersonal skills and patience are required for this job

89. A(n) ________ administrator analyzes a company’s data to determine the most effective way to collect and store it.
ANSWER: database

90. A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.
ANSWER: programmer

91. A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
ANSWER: network

92. A Web site developer manages an organization’s online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.
a. True
b. False

93. If you are hired as an entry-level programmer, your job title would typically be a(n) ___________ programmer.
ANSWER: associate

94. _________ workers are not official employees of a company.
ANSWER: Contract

95. A(n) _______________ uses available technology to work from home or an off-site location.
ANSWER: telecommuter

96. Which of the following descriptions best matches that of computer engineering degree?
a. Focuses on computer architecture and how to program computers to make them work effectively and efficiently
b. Focuses on applying computers to business problems
c. Focuses on computer equipment and software used by businesses
d. Focuses on the design of computer hardware and peripheral devices, often at the chip level

97. Which of the following descriptions best matches that of computer science degree?
a. Focuses on computer architecture and how to program computers to make them work effectively and efficiently
b. Focuses on applying computers to business problems
c. Focuses on computer equipment and software used by businesses
d. Focuses on the design of computer hardware and peripheral devices, often at the chip level

98. An information _________ degree focuses on computer equipment and software used by businesses.
ANSWER: technology

99. Certification alone is sufficient to qualify for a job in the IT industry.
a. True
b. False

100. __________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.
ANSWER: Certificates

101. _______ certification, offered by Certiport, covers basic computing knowledge and skills.
ANSWER: IC3

102. With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.
ANSWER: security

103. Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.
ANSWER: source

104. Which one of the following options offers self-study training to career-minded individuals who might not have the time or means to complete a traditional degree program?
a. Badge
b. Nanodegree
c. Certificate
d. None of the above

105. HTML is the best format for an effective resume.
a. True
b. False

106. Which of the following options is a useful format for your resume?
a. Print
b. Email
c. HTML
d. All of the above

107. Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.
a. True
b. False

108. Which of the following is not an example of an Information Technology Law?
a. United States Copyright Act
b. The Espionage Act of 1917
c. Digital Millennium Copyright Act
d. Children’s Internet Protection Act

109. Which of the following information technology laws makes it illegal to circumvent copy-protection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?
a. Electronic Communications Privacy Act
b. Fair Use Doctrine
c. United States Copyright Act
d. Digital Millennium Copyright Act

110. The term professional _______ refers to on-the-job choices and actions that reflect a person’s values.
ANSWER: ethics

111. ___________ is the obligation not to disclose willingly any information that should be kept private.
ANSWER: Confidentiality

112. With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
ANSWER: proprietary

113. Many employment contracts contain a ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
a. proprietary information
b. non-compete clause
c. confidentiality disclosure
d. privacy statement

114. A _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
a. non-compete clause
b. confidentiality statement
c. proprietary information
d. code of ethics

115. ____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
ANSWER: Whistleblowing

116. The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers.
a. True
b. False

117. Whistleblowing is risky under any circumstances.
a. True
b. False

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!