Document 7241200

Download Report

Transcript Document 7241200

Technology In Action
Midterm Exam Study Guide
 The Exam
 Sample Exam Questions
 Review




Lab Exercises 3 and 4
Technology in Focuses 3 and 4
Sound-bytes 6 to 10
Chapters 6 to 10
The Midterm Exam






When
 Thursday, April 3, 2008
 5:30 – 6:45pm
 MSB 115
15 % of your final grade
Covers
 Chapters 6 to 10
 Sound-bytes 6 to 10
 Technology in Focus 3 and 4
 Lab exercises 3 and 4
This is an open-notes exam. All in-class hand-outs are allowed.
Writing on your notes is ok!
You may not use a textbook, a computer, or any electronic
device.
Sample Exam Questions 1
Multiple-choice Question
 ____________ storage refers to
storage that loses its data when the
power is turned off.
A. Permanent
B. Volatile
C. Virtual
D. Nonvolatile
Answer: B
Reference: Chapter 6 - Evaluating RAM
Sample Exam Questions 2
True/false Question
Laptop computers are also
known as tablet computers


Answer: False (notebook computers)
Reference: Chapter 8 - Notebooks
Sample Exam Questions 3
Matching Question
 Match the following acronyms to their descriptions :
A. SATA
B. ALU
C. VRAM
D. IrDA
E. DIMM
1.
2.
3.
4.
5.
_____
_____
_____
_____
_____
type of memory module
memory generally used for graphics display
port for wireless data transmission
type of hard disk drive interface
CPU component that performs mathematical operations
 Answer: E, C, D, A, B
 Reference: Chapter 6
Lab Exercises
 Lab exercise 3
1. Creating a basic web page
2. Investigating HTML
3. Terms related to the Internet and HTML
 Lab exercise 4
1. Using a word processing software (Microsoft
Word)
2. Investigating how file compression works
3. Terms related to mass storage devices and
memory
Technology in Focuses
 Technology in Focus 3: Computing
Alternatives
 Open-source software
 Application software alternatives –
OpenOffice
 Operating alternatives – Linux
 Hardware alternatives – MAC, DIY
Technology in Focuses
 Technology in Focus 4: Protecting
Your Computer and Backing up Your
Data
 Physically protecting your computer
 Keeping cell phones and PDAs safe
 Protecting your computer from
unauthorized access
 Access privileges and password protection
 Updating your software
 Backing up your data
Sound-bytes





Hard Disk Anatomy Interactive
Installing a Home Network
Tablet and Notebook Tour
Memory Hierarchy Interactive
Programming for End Users: Macros
Technology In Action
Chapter 6
Evaluating Your System:
Understanding and Assessing Hardware
Chapter Topics
 To buy or upgrade?
 Evaluating your system:






CPU
RAM
Storage devices
Video output
Sound systems
Computer ports
 System reliability
Chapter 6 Summary Questions

How can I determine whether I should upgrade my existing
computer or buy a new one?

You need to conduct a system evaluation by look at
computer’s subsystems







CPU
Memory
The storage subsystem
The video subsystem
The audio subsystem
Your computer’s ports
Then, determine if it’s economically practical to upgrade or buy a new
one
Chapter 6 Summary Questions
 What does the CPU do and how can I evaluate its
performance?
 Processes instructions, performs calculations,
manages the flow of information through a computer
system
 To evaluate its performance
 Look at the clock speed
 The ability to process multimedia instructions and
handle audio and video processing commands
 The power consumption
 Mulitcore capability option
 Usually a newer generation CPU have a lot of
improvement over the previous generation
Chapter 6 Summary Questions
 How does memory work and how can I
evaluate how much memory I need?
 Random access memory (RAM) is your
computer’s temporary storage space
 A short-term memory--it remembers everything
that the computer needs to process the data
into information, such as inputted data and
software instructions, but only while the
computer is on
 To determine how much RAM is needed you
must look at the memory requirements of each
program you’ll run and add them up
Chapter 6 Summary Questions
 What are the computer’s main
storage devices and how can I
evaluate whether they match my
needs?
 Hard disks (nonvolatile storage) are
devices for permanent storage of
instructions and data when the computer
is powered off
 The hard disk should have enough space
for all installed programs ,data, and
virtual memory
Chapter 6 Summary Questions
 What components affect the output of
video and how can I evaluate whether
they are meeting my needs?
 How video is displayed depends on two
components
 Video card and monitor
 A more powerful card is required if you plan to
use your computer for graphics-intense games
and multimedia.
 The monitor size, resolution, refresh rate, and
color reproduction are all affect how well the
monitor performs.
Chapter 6 Summary Questions
 What components affect the quality of
sound and how can I evaluate
whether they are meeting my needs?
 Your computer’s sound depends on your
speakers and a sound card
 An upgrade sound card enables the
computer to produce 3-D or surround
sound and additional ports for audio
equipments
Chapter 6 Summary Questions
 What are the ports available on
desktop computers and how can I
determine what ports I need?
 A port is an interface through which
peripheral devices are connected to
your computer
 There are many kinds of ports available
such as serial, parallel, USB, Firewire,
Ethernet, S-Video, DVI, Bluetooth,
IrDA, MIDI, HDMI, and eSATA
Chapter 6 Summary Questions
 How can I ensure the reliability of my
system?

There are several procedures you can follow to ensure your
system performs reliably
 Clean out your Startup folder

Make sure you delete only programs you know for sure are
unnecessary
 Clear out unnecessary files to free-up hard drive space
 Run an antispyware/antivirus program as well as an
anti-adware program
 Run the Disk Defragmenter utility once in a while to
compact your hard drive
Technology In Action
Chapter 7
Networking and Security:
Connecting Computers and Keeping
Them Safe from Hackers and Viruses
Chapter Topics







Networking fundamentals
Network architecture
Network components
Peer-to-peer networks
Computer threats
Computer safeguards
Computer viruses
Chapter 7 Summary Questions
 What is a network and what are the
advantages of setting one up?
 A computer network is simply two or more
computers connected together via software and
hardware so they can communicate
 The main functions for most networks
 to facilitate information sharing
 allow users to share peripherals and Internet
connectivity
Chapter 7 Summary Questions
 What is the difference between a
client/server network and a peer-to-peer
network?
 Network architectures are classified according to the
way in which they are controlled and the distance
between their nodes
 There are two main ways a network can be controlled
 A peer-to-peer network is the most common example
of a locally controlled network
 The most common type of centrally controlled network
is a client/server network
Chapter 7 Summary Questions
 What are the main components of every
network?
 In order to move data from one computer to
another, four components are required
 Transmission media
 Network adapters that translate the computer’s
signal to a network message
 Navigation devices that decide how data traffic
comes and goes
 Network software that allows the software to
run
Chapter 7 Summary Questions
 What are the most common home
networks?
 Ethernet and wireless network
 The major difference in these networks is
the transmission media by which the
nodes are connected
Chapter 7 Summary Questions
 What are power-line networks?
 Power-line networks use the existing
electrical wiring in your home to connect the
nodes in the network
 Any electrical outlet provides a network
connection
 The original power line networks had a
maximum data transfer rate of 14 Mbps
 New standards provide for data transfer rates
approaching 200 Mbps
Chapter 7 Summary Questions
 What are phoneline networks?
 Phoneline networks move data
through the network using conventional
phone lines rather than power lines
 Any phone jack in a house provides a
network connection
 Phoneline networks have a maximum
data transfer rate of 10 Mbps
Chapter 7 Summary Questions
 What are Ethernet networks?
 Ethernet networks use the Ethernet protocol
as the means by which the nodes on the
network communicate
 Requires that you install an adapter to each
computer or peripheral you want to connect to
the network
 Most computers come with Ethernet adapters
preinstalled as network interface cards (NICs)
Chapter 7 Summary Questions
 What are wireless networks?
 A wireless network uses radio waves
instead of wires or cables as its
transmission media
 Each node on a wireless network
requires a wireless network adapter
 These adapters are either built-in or
inserted an added-on card into an
expansion slot or an open USB port
Chapter 7 Summary Questions
 How can hackers attack a network and
what harm can they cause?
 A hacker is defined as anyone who breaks into
a computer system (whether an individual
computer or a network) unlawfully
 A hacker can use software to break into a
computer connected to the Internet
 Once gaining access to the computer, the hacker
can steal, damage or destroy information, or use
the computer to attack other computers
Chapter 7 Summary Questions
 How are home wireless networks
vulnerable?
 Wireless network range doesn’t stop at
the property line
 A hacker can intercept and decode
information from your transmissions that may
allow him to bypass your firewall
 Others may steal your bandwidth and crimes
can be committed through your network
Chapter 7 Summary Questions
 What is a firewall and how does it keep my
computer safe from hackers?
 Firewalls are software programs or hardware
devices designed to keep computers safe from
hackers
 By using a firewall, you can close off open
logical ports to invaders and potentially make
your computer invisible to other computers on
the Internet
Chapter 7 Summary Questions

From which types of viruses do I need to
protect my computer?
 Boot-sector viruses
 Logic bombs
 Time bombs
 Worms
 Script viruses
 Macro viruses
 E-mail viruses
 Encryption viruses
 Trojan Horses
Chapter 7 Summary Questions
 What can I do to protect my
computer from viruses?
 Use your common sense
 Install antivirus software
Technology In Action
Chapter 8
Mobile Computing:
Keeping Your Data on Hand
Topics
 Advantages and limitations of mobile
computing
 Mobile computing devices
 Pagers, cell phones, PDAs, and portable media
players
 Synchronizing mobile devices with
computers
 Tablet PCs
 Notebooks
Chapter 8 Summary Questions
 What are the advantages and limitations of
mobile computing?
 Advantages
 Convenience
 Boost productivity
 Communicate with others anywhere
 Access to electronic information
 Limitations
 Expensive
 Short battery life
 Small screen display
 Slow Internet speed
Chapter 8 Summary Questions
What are the various mobile
computing devices?






Paging devices
Cell phones
MP3 players
Personal digital assistants (PDAs)
Tablet PCs
Laptops
Chapter 8 Summary Questions
 What can pagers do?
 A paging device (pager) is a small wireless
device that allows you to receive and
sometimes send numeric (and sometimes text)
messages on a small display screen
Chapter 8 Summary Questions
 How do cell phone components resemble a
traditional computer and how do cell
phones work?
 Cell phones have the same components as a
computer: a processor, memory, and input and output
devices
 When you speak to the phone
 Sound enters as a sound wave
 Analog sound waves, then, are converted to
digital signals
 The compressed digital signals are transmitted
to the cellular network then to the phone
Chapter 8 Summary Questions
 What can I carry in a portable media
player and how does it store data?
 Portable media players (PMPs) are
small portable devices (such as an iPod)
that enable playing of MP3 files
anywhere
 Some devices can play video files
 Some MP3 players allow you to add additional
removable flash memory cards
Chapter 8 Summary Questions
 For what can I use a PDA and what internal
components and features does it have?
 A personal digital assistant (PDA) is a small device
that allows you to carry digital information
 Often called palm computers or handhelds
 PDAs are about the size of your hand
 Most PDAs come with a standard collection of software
such as a to-do list, contacts manager, calendar, and
software applications
Chapter 8 Summary Questions
 How can I synchronize my mobile
devices with my desktop computer?
 PDA files can be transferred to a
desktop using
 Flash card readers
 Cradles
 Wireless transfers:
 IrDA
 Bluetooth
Chapter 8 Summary Questions
 What is a tablet PC?
 A tablet PC is a portable computer that is lightweight,
features advanced handwriting recognition, and can be
rotated into a clipboard style
 Its monitor can be used either in a traditional laptop
mode or in “tablet mode,” much like an electronic
clipboard
 Tablet PCs also can be connected to a full-size
keyboard and monitor
Chapter 8 Summary Questions
 How powerful are notebooks and how
do they compare to desktop
computers?
 The most powerful mobile computing solution
is a notebook computer
 Comparing to desktop computers, notebooks
are usually less powerful than the desktops
Technology in Action
Chapter 9
Behind the Scenes:
A Closer Look at System Hardware
Chapter Topics







Computer switches
Binary number system
Inside the CPU
Cache memory
Types of RAM
Computer buses
Creating faster CPUs
Chapter 9 Summary Questions
 What is a switch and how does it work in a
computer?
 Electronic switches are devices inside the
computer that can be flipped between these two
states: 1 or 0, on or off
 Modern computers understand only two states of
existence: on and off
 Computers represent these two possibilities (or
states) using the digits 1 and 0
Chapter 9 Summary Questions
 What is the binary number system and
what role does it play in computer system?
 Computers describe a number as powers of 2
because each switch can be in one of two
positions: on or off
 This numbering system is referred to as the
binary number system
 To process data into information, computers
need to work in binary language
Chapter 9 Summary Questions
 What is inside the CPU and how do these
components operate?
 The entire CPU fits on a tiny chip, called the
microprocessor, which contains all of the hardware
responsible for processing information, including
millions of transistors
 The control unit of the CPU manages the
switches inside the CPU
 The arithmetic logic unit (ALU) is the part of
the CPU designed to perform mathematical and
comparison operations
 Cache memory consists of small blocks of
memory located directly on and next to the CPU
chip
Chapter 9 Summary Questions
 How does a CPU process data and instructions?
 Any program you run on your computer is actually a
long series of binary code, 1s and 0s, describing a
specific set of commands the CPU must perform
 To perform its tasks, CPUs must perform a series of
similar general steps or machine cycle (or
processing cycle




Fetch
Decode
Execute
Store
Chapter 9 Summary Questions
 What is cache memory?
 Cache memory consists of small blocks of
memory located directly on and next to the CPU
chip
 These memory blocks are holding places for
recently or frequently used instructions or data
that the CPU needs the most
 When these instructions or data are stored in
cache memory, the CPU can more quickly
retrieve them than if it had to access the
instructions or data in RAM
Chapter 9 Summary Questions
 What types of RAM are there?
 A variety of types of DRAM are on the market, each
with different performance levels and prices
 Synchronous DRAM (SDRAM) is much faster than
traditional DRAM
 The current standard of DRAM in home systems is
double data rate synchronous DRAM (DDR SDRAM)
 DDR SDRAM is faster than regular SDRAM but not as
fast as DDR2 SDRAM or DDR3 SDRAM, which is the
most recent entry on the market
 Each of these types of DRAM increases the speed
with which the CPU can access data, but also
increases the cost of the memory modules
Chapter 9 Summary Questions
 What is a bus and how does it function in a computer
system?
 A bus is an electrical wire in the computer’s circuitry—the
highway that data (or bits) travels on between the computer’s
various components
 Computers have two different kinds of buses
 Local buses are on the motherboard and run between the CPU
and the main system memory
 Expansion bus allows a range of different expansion cards
(such as video cards and sound cards) to communicate with the
motherboard
Chapter 9 Summary Questions
 How do manufacturers make CPUs so
that they run faster?
 These are some method to make faster
CPUs
 One method found to speed up a CPU is
called pipelining
 Use dual/quad processors
 Increase clock speed or cache size
Technology in Action
Chapter 10
Behind the Scenes: Software
Programming
Chapter Topics










System development life cycle
Life cycle of a program
Problem statement
Algorithms
Moving from algorithm to code
Moving from code to machine language
Testing programs
Completing a program
Selecting the right programming language
Most popular programming languages
Chapter 10 Summary Questions
 What is a system development life cycle and what are
the phases in the cycle?
 System development life cycle (SDLC)
 An organized process (or set of steps) used to develop
systems in an orderly fashion
 There are six steps in the SDLC






Problem/Opportunity Identification
Analysis
Design
Development and Documentation
Testing
Maintenance and Evaluation
Chapter 10 Summary Questions
 What is the life cycle of a program?
 Programming is the process of translating a task into
a series of commands a computer will use to perform
that task
 It involves



Identifying which parts of a task a computer can perform
Describing those tasks in a very specific and complete manner
Translating this description into the language spoken by the
computer’s CPU.
 There are five steps in the PDLC.





Describing the Problem
Developing an Algorithm
Coding
Debugging
Finishing the Project
Chapter 10 Summary Questions
 What role does a problem statement play in
programming?
 The problem statement is the starting point of
programming work
 It is a very clear description of what tasks the computer
program must accomplish and how the program will
execute these tasks and respond to unusual situations
 Programmers develop problem statements so that they
can better understand the goals of their programming
efforts
Chapter 10 Summary Questions
 How do programmers create algorithms?
 They begin developing a detailed algorithm or a set
of specific, sequential steps that describe in natural
language exactly what the computer program must
do to complete its task
 Complex algorithms include decision
points/control structure at which the program
must choose from different actions based on the
value of its current inputs
 Yes/No (binary)
 Loop (iterative)
Chapter 10 Summary Questions
 How do programmers move from algorithm
to code?
 Select the best programming language for the
problem
 Translate or code the algorithm into that
language
 Computer programming languages use special
words and strict rules to enable programmers to
control the CPU without having to know all of its
hardware details
Chapter 10 Summary Questions
 How does a programmer move from
programming code to the 1s and 0s
that the CPU can understand?
 Compilation is the process by which
code is converted into machine language
 Compiler
 Interpreter
Chapter 10 Summary Questions
 How is a program tested?
 The process of running the program over
and over to find errors and to make sure
the program behaves in the way it
should is debugging
Chapter 10 Summary Questions
 What steps are involved in completing
the program?
 At this point, technical writers are
responsible for creating documentation
for the program, including user manuals
and user training
Chapter 10 Summary Questions
 How do programmers select the right
programming language for a specific
task?
•
•
•
•
Space available
Speed required
Resources available
Target application