Deck 1: Introduction to the World of Computers

ملء الشاشة (f)
exit full mode
سؤال
Systems analysts design computer systems to be used within their companies.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Satellite communication (more commonly called s-com)is the process of exchanging electronic messages between computers over a network-usually the Internet.
سؤال
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
سؤال
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
سؤال
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
سؤال
  The accompanying figure shows a notebook computer.<div style=padding-top: 35px> The accompanying figure shows a notebook computer.
سؤال
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
سؤال
There are application programs that help users write their own programs using a programming language.
سؤال
Notebook computers (also called laptops)are fully functioning computers that open to reveal a screen and keyboard.
سؤال
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
سؤال
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
سؤال
The external hardware components are located inside the main box or system unit of the computer.
سؤال
The slide rule is considered by many to be the earliest recorded calculating device.
سؤال
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
سؤال
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
سؤال
Small office networks enable workers to access company records stored on a network server.
سؤال
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
سؤال
Computer literacy is knowing about and understanding computers and their uses.
سؤال
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
سؤال
A computer does not always do whatever the instructions, or program, tell it to do.
سؤال
Fifty years ago, computers were used primarily by researchers and ____.

A)musicians
B)scientists
C)writers
D)designers
سؤال
The ISP is the largest and most well-known computer network in the world. _________________________
سؤال
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop . _________________________
سؤال
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A)hotspots
B)hotpoints
C)com spots
D)com points
سؤال
In piracy , identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
سؤال
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
سؤال
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
سؤال
Abbreviations or acronyms, such as BTW for " between the words ," are commonly used to save time in all types of communications today. _________________________
سؤال
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A)bar codes B)virtual reality glasses C)collaboration systems D)authentication systems <div style=padding-top: 35px> As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A)bar codes
B)virtual reality glasses
C)collaboration systems
D)authentication systems
سؤال
A(n)display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
سؤال
A user inputs data into a computer, and then the computer processes it. _________________________
سؤال
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A)design appliances
B)smart computers
C)home computers
D)smart appliances
سؤال
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules . _________________________
سؤال
In cloud worlds, online users can explore anonymously. _________________________
سؤال
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors , which are used to connect a computer to a computer network. _________________________
سؤال
An e-mail address consists of a(n)username , followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
سؤال
In the early 1980s, ____ were invented and computer use increased dramatically.

A)Printers
B)Networks
C)Microcomputers
D)Computers
سؤال
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
سؤال
Wireless networking allows the use of computers in virtually any location. _________________________
سؤال
Computer programmers are the people who use a computer to obtain information. _________________________
سؤال
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A)second-generation computers
B)third-generation computers
C)fourth-generation computers
D)fifth-generation computers
سؤال
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A)Cloud storage
B)HTML
C)Java Script
D)Application software
سؤال
Programming languages come in many varieties-for example, BASIC, Visual Basic, Pascal, COBOL, C++, and ____.

A)TCP/IP
B)Rextore
C)PDF
D)Java
سؤال
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A)desktop computers
B)laptop computers
C)super computers
D)processor computers
سؤال
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A)mainframe computer
B)midrange server
C)mobile device
D)personal computer
سؤال
Hybrid notebook-tablet computers are also called ____.

A)convertible tablets
B)netbooks
C)laptops
D)PDAs
سؤال
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A)command B)toolbox C)general menu D)desktop <div style=padding-top: 35px> The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A)command
B)toolbox
C)general menu
D)desktop
سؤال
When data is processed into a meaningful form, it becomes ____.

A)information
B)code
C)a program
D)a database
سؤال
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A)hardware
B)port
C)software
D)adapter
سؤال
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A)two months
B)four years
C)two and a half years
D)six years
سؤال
Two of the most common types of communications hardware are ____ and network adapters.

A)ports
B)slide rules
C)monitors
D)modems
سؤال
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A)calculations
B)communications
C)sorting
D)programming
سؤال
A personal computer (PC)or ____ is a small computer system designed to be used by one person at a time.

A)processor
B)microcomputer
C)microchip
D)small processor
سؤال
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A)computer bank
B)database
C)data bank
D)computer network
سؤال
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A)Computer addresses
B)Machine IDs
C)Domain IDs
D)Internet addresses
سؤال
____ occurs when data is entered into the computer.

A)Output
B)Processing
C)Input
D)Storage
سؤال
Common input devices include the keyboard and ____.

A)printer
B)mouse
C)speaker
D)monitor
سؤال
Ultraportables conforming to Intel's standards can be marketed as ____.

A)IntelBooks
B)Ultrabooks
C)hybrids
D)smallframe computers
سؤال
A(n)____ is a medium-sized computer used to host programs and data for a small network.

A)mainframe computer
B)super server
C)midrange server
D)Internet server
سؤال
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A)all-in-one case B)tower case C)desktop case D)sub case <div style=padding-top: 35px>
The accompanying figure corresponds to the ____ style for desktop PCs.

A)all-in-one case
B)tower case
C)desktop case
D)sub case
سؤال
Because of ____________________ many devices today include computing or Internet capabilities.
سؤال
To contact people using the Internet, you most often use their ____.

A)domain names
B)e-mail addresses
C)usernames
D)passwords
سؤال
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A)Spamming
B)Phishing
C)Calling
D)Shouting
سؤال
There are independent Web sites (such as the ____ Web site)that report on the validity of current online rumors and stories.

A)Spammer
B)Snopes
C)Phisher
D)Identifier
سؤال
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A)Address bar
B)Domain bar
C)Address button
D)Name button
سؤال
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
سؤال
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. What type of computer-related job would Jamie probably enjoy the most?

A)hardware designer
B)computer operations personnel
C)graphic designer
D)end user
سؤال
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

A)systems analysis
B)history of computing
C)computer literacy
D)Java
سؤال
____________________ are regular appliances with some type of built-in computer technology.
سؤال
____ is typically free and provided by virtually all ISPs used with personal computers.

A)Short Message mail
B)Web-based e-mail
C)Web-com
D)Program-based e-mail
سؤال
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A)search sites
B)domain identifications
C)domain sites
D)Internet repositories
سؤال
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
سؤال
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
سؤال
____ refers to guidelines for online behavior.

A)Net rules
B)Web etiquette
C)Internet Rules
D)Netiquette
سؤال
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

A)midrange server
B)embedded
C)notebook
D)docking station
سؤال
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A)universal resource identifier (URI)
B)Web ID (WID)
C)uniform resource locator (URL)
D)Web resource identifier (WRI)
سؤال
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A)Spams
B)Phishes
C)Emoticons
D)Trojan horses
سؤال
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A)identity duplication
B)domain theft
C)identity theft
D)phishing
سؤال
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

A)data projector
B)firewire port
C)scanner
D)USB flash drive
سؤال
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?

A)Python
B)COBOL
C)XHTML
D)BASIC
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to the World of Computers
1
Systems analysts design computer systems to be used within their companies.
True
2
Satellite communication (more commonly called s-com)is the process of exchanging electronic messages between computers over a network-usually the Internet.
False
3
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
True
4
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
  The accompanying figure shows a notebook computer. The accompanying figure shows a notebook computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
There are application programs that help users write their own programs using a programming language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Notebook computers (also called laptops)are fully functioning computers that open to reveal a screen and keyboard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
The external hardware components are located inside the main box or system unit of the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
The slide rule is considered by many to be the earliest recorded calculating device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
Small office networks enable workers to access company records stored on a network server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
Computer literacy is knowing about and understanding computers and their uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
A computer does not always do whatever the instructions, or program, tell it to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
Fifty years ago, computers were used primarily by researchers and ____.

A)musicians
B)scientists
C)writers
D)designers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ISP is the largest and most well-known computer network in the world. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A)hotspots
B)hotpoints
C)com spots
D)com points
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
In piracy , identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
Abbreviations or acronyms, such as BTW for " between the words ," are commonly used to save time in all types of communications today. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A)bar codes B)virtual reality glasses C)collaboration systems D)authentication systems As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A)bar codes
B)virtual reality glasses
C)collaboration systems
D)authentication systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n)display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
A user inputs data into a computer, and then the computer processes it. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A)design appliances
B)smart computers
C)home computers
D)smart appliances
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
In cloud worlds, online users can explore anonymously. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors , which are used to connect a computer to a computer network. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
An e-mail address consists of a(n)username , followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
In the early 1980s, ____ were invented and computer use increased dramatically.

A)Printers
B)Networks
C)Microcomputers
D)Computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Wireless networking allows the use of computers in virtually any location. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
Computer programmers are the people who use a computer to obtain information. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A)second-generation computers
B)third-generation computers
C)fourth-generation computers
D)fifth-generation computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A)Cloud storage
B)HTML
C)Java Script
D)Application software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
Programming languages come in many varieties-for example, BASIC, Visual Basic, Pascal, COBOL, C++, and ____.

A)TCP/IP
B)Rextore
C)PDF
D)Java
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A)desktop computers
B)laptop computers
C)super computers
D)processor computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A)mainframe computer
B)midrange server
C)mobile device
D)personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Hybrid notebook-tablet computers are also called ____.

A)convertible tablets
B)netbooks
C)laptops
D)PDAs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A)command B)toolbox C)general menu D)desktop The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A)command
B)toolbox
C)general menu
D)desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
When data is processed into a meaningful form, it becomes ____.

A)information
B)code
C)a program
D)a database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A)hardware
B)port
C)software
D)adapter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A)two months
B)four years
C)two and a half years
D)six years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
Two of the most common types of communications hardware are ____ and network adapters.

A)ports
B)slide rules
C)monitors
D)modems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A)calculations
B)communications
C)sorting
D)programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
A personal computer (PC)or ____ is a small computer system designed to be used by one person at a time.

A)processor
B)microcomputer
C)microchip
D)small processor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A)computer bank
B)database
C)data bank
D)computer network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A)Computer addresses
B)Machine IDs
C)Domain IDs
D)Internet addresses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ occurs when data is entered into the computer.

A)Output
B)Processing
C)Input
D)Storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
Common input devices include the keyboard and ____.

A)printer
B)mouse
C)speaker
D)monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
Ultraportables conforming to Intel's standards can be marketed as ____.

A)IntelBooks
B)Ultrabooks
C)hybrids
D)smallframe computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
A(n)____ is a medium-sized computer used to host programs and data for a small network.

A)mainframe computer
B)super server
C)midrange server
D)Internet server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A)all-in-one case B)tower case C)desktop case D)sub case
The accompanying figure corresponds to the ____ style for desktop PCs.

A)all-in-one case
B)tower case
C)desktop case
D)sub case
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
Because of ____________________ many devices today include computing or Internet capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
To contact people using the Internet, you most often use their ____.

A)domain names
B)e-mail addresses
C)usernames
D)passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A)Spamming
B)Phishing
C)Calling
D)Shouting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
There are independent Web sites (such as the ____ Web site)that report on the validity of current online rumors and stories.

A)Spammer
B)Snopes
C)Phisher
D)Identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A)Address bar
B)Domain bar
C)Address button
D)Name button
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. What type of computer-related job would Jamie probably enjoy the most?

A)hardware designer
B)computer operations personnel
C)graphic designer
D)end user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

A)systems analysis
B)history of computing
C)computer literacy
D)Java
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
____________________ are regular appliances with some type of built-in computer technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
____ is typically free and provided by virtually all ISPs used with personal computers.

A)Short Message mail
B)Web-based e-mail
C)Web-com
D)Program-based e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A)search sites
B)domain identifications
C)domain sites
D)Internet repositories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
____ refers to guidelines for online behavior.

A)Net rules
B)Web etiquette
C)Internet Rules
D)Netiquette
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

A)midrange server
B)embedded
C)notebook
D)docking station
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A)universal resource identifier (URI)
B)Web ID (WID)
C)uniform resource locator (URL)
D)Web resource identifier (WRI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A)Spams
B)Phishes
C)Emoticons
D)Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A)identity duplication
B)domain theft
C)identity theft
D)phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

A)data projector
B)firewire port
C)scanner
D)USB flash drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?

A)Python
B)COBOL
C)XHTML
D)BASIC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.