Happy Computer Science Education Week !

Happy Computer Science Education Week !

Wednesday, Dec11, 2013 (found on online classroom)

Happy Computer Science Education Week !

Go do your hour of code this week at ‘hourofcode.org’

Learning Target: I can correctly format a research paper using MLA format.

Agenda:

  • Bellwork8 –What is the command for ‘Move Forward’ in JavaScript as used in the Angry Birds Exercise?
  • Submitfirst research paper: “Can You See Me Now?” Post to online classroom
  • Complete ‘In the Lab 1’ – “From One Controller to Another” – See back of Chapter in SAM or online classroom folder for instructions
  • Study for FINAL – see below
  • NEWComplete In the Lab 2 – Preparing a Research Paper with a Footnote – “Farming on a Whole New Level”
  • 100 Point Bonus for second 9 weeks: “MS Word Advanced Training Cert Prep”
  • Eagle Tech Leader Projects – Winter Virtual Due before Christmas Break
  • Extra Credit Option - Design and create a birthday card for Grace Hopper
  • Eagle Tech Leader Project Ideas – Please review the Eagle Tech Leader handbook from online classroom and sign up for a project that interests you. Idea for a project: See
  • Early Finish:
  • Complete any work for which you are behind. Put a note in the basket if you turn something in late and let me know where you submitted the late work.
  • Work through LESSONS in GREEN box in middle and set to 35 WPM
  • ACT Question of the Day:
  • Free ACT Test Prep:
  • Khan Academy – topic of choice

moveForward();

Tutorials:

Testbank Questions
1. Introduction to Computers and the Internet
Question / ID / Correct Answer
1.MC:____ software is rights-protection software used to control the use of a work.
A . DRM
B . ISP
C . RSI
D . Copyright-Trademark / 341152 /
A . DRM

2.T/F:A copyright is a word, phrase, symbol, or design that identifies one product or service from another. / 341108 /
False

3.MC:A desktop computer may contain ____.
A .arsenic
B . lead
C . mercury
D . all of the above / 341158 /
D . all of the above

4.Mod. T/F:A(n)personalcomputer is a stationary computer designed to fit on or next to a desk. ______/ 341112 /
desktop

5.Mod. T/F:A(n)tabletcomputer is designed to be used with a digital pen or stylus. ______/ 341113 /
True

6.Mod. T/F:Accessing information in a shared company database is an example of a(n)communicationsfunction performed by today’s computers. ______/ 341109 /
True

7.T/F:An IP address uniquely identifies a specific Web page. / 341107 /
False

10.MC:Copyrights remain in effect until ____ after the creator’s death.
A .a year and a day
B . 10 years
C .a century
D . 70 years / 341151 /
D . 70 years

12.MC:Gmail is a(n) ____.
A .email program
B . Web mail service
C .knowledge base
D . search site / 341147 /
B . Web mail service

13.T/F:Information is processed into data. / 341100 /
False

14.MC:Intellectual property is ____.
A .any device or appliance containing a computer chip
B . original creative work
C . both a and b
D . neither a nor b / 341150 /
B . original creative work

15.T/F:Most of today’s modern computers are fifth-generation machines. / 341103 /
False

16.T/F:One of the most significant appeals of server virtualization today is increased efficiency. / 341104 /
True

17.Mod. T/F:Performance, cost, and security are threeadvantagesof cloud computing. ______/ 341111 /
disadvantages

18.MC:Presenting someone else’s work as your own is ____.
A .libel
B . trademark infringement
C . plagiarism
D . unethical but not illegal / 341153 /
C . plagiarism

19.T/F:Smartphones are a type of mobile device. / 341102 /
True

21.Mod. T/F:The current fastest computer in the world is technically a(n)supercomputing cluster. ______/ 341114 /
True

22.T/F:The Internet is the largest computer network in the world. / 341106 /
True

23.MC:The majority of discarded computer equipment ends up ____.
A .being reused in new computer components
B . being safely separated and recycled within the United States
C . in landfills or foreign nations with lax environmental standards
D . being ground into the underlayment used in highways / 341157 /
C . in landfills or foreign nations with lax environmental standards

24.T/F:The most powerful and most expensive type of computer available is the ultracomputer. / 341105 /
False

25.T/F:The physical parts of a computer are called hardware. / 341101 /
True

26.MC:The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices.
A . Gold Star
B . ENERGY STAR
C . LEED
D .GreenWare / 341156 /
B . ENERGY STAR

27.MC:To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____.
A . .exe
B . .jpg
C . .com
D . .vbs / 341149 /
B . .jpg

28.MC:Using a Web browser to view Web pages is called ____ the Web.
A .surfing
B . scanning
C . spinning
D . skating / 341148 /
A . surfing

Chapter 1: Introducing Hardware
Question / ID / Correct Answer
30.MC:_____ is the process of transferring data from memory to a storage medium.
A . Busing
B . Reading
C . Copying
D . Writing / 12764 /
D . Writing

35.SA:A 1 or 0 in the binary system is called a(n) ______. / 12822 /
bit

36.T/F:A binary number system is used by computers to express the positive state as the number 0. / 12771 /
False

37.T/F:A bus is an electric channel that transfers bits internally within the circuitry of a computer. / 12802 /
True

38.T/F:A CD-ROM drive uses a laser beam to read data. / 12811 /
True

39.MC:A central processing unit also is known as a _____.
A .computer case
B . microprocessor
C . personal computer
D . program / 12748 /
B . microprocessor

40.MC:A CMOS RAM chip contains _____.
A .volatile memory
B . a small amount of memory
C . a large amount of memory
D . a DIP switch / 12754 /
B . a small amount of memory

42.SA:A computer requires both ______to work. / 12820 /
hardware and software
harware & software

43.SA:A CPU uses ______to hold data and instructions temporarily while it is processing them / 12838 /
primary storage
memory

44.T/F:A CPU uses primary storage to retain data permanently. / 12787 /
False

45.T/F:A data bus transfers actual data. / 12803 /
True

46.T/F:A device is useless without software to control it. / 12772 /
True

47.T/F:A DIP switch consists of a pair of prongs that function as electrical contact points in the motherboard. / 12800 /
False

48.T/F:A DVD-ROM is the same size as a CD-ROM. / 12812 /
True

49.MC:A gigabyte is _____.
A .one million bytes
B . one thousand bytes
C . one billion bytes
D . none of the above / 12763 /
C . one billion bytes

50.T/F:A ground mat also is known as a static shielding bag. / 12814 /
False

51.T/F:A jumper acts as a switch that closes or opens electrical circuits. / 12799 /
True

52.SA:A key characteristic of a storage medium is its ______, or the number of bytes it can hold. / 12853 /
capacity

53.T/F:A microchip is an insulated circuit board. / 12783 /
False

54.SA:A monitor’s resolution is a function of the number of ______used for display on the screen. / 12831 /
pixels
dots

55.T/F:A monitor’s resolution is a function of the number of lines displayed on the screen. / 12781 /
False

56.T/F:A network card provides a port designed to fit a cable that connects a PC to a network. / 12809 /
True

57.MC:A pair of prongs that serves as electrical contact points in a motherboard is known as a _____.
A . CMOS setup chip
B .semiconductor
C . single inline memory module
D . jumper / 12755 /
D . jumper

58.T/F:A parallel port most often is used by a printer. / 12788 /
True

59.MC:A peripheral device is a device _____.
A .found on the motherboard
B . a port
C . not located on the motherboard
D . a device on the back of the computer case / 12749 /
C . not located on the motherboard

60.SA:A personal computer processes data that is ______. / 12821 /
digital

61.T/F:A port also is known as a peripheral device. / 12776 /
False

62.T/F:A serial port also is known as a USB port. / 12786 /
False

63.MC:A system clock is a(n) _____.
A .pulsating electrical signal
B . important trace on the system bus
C . dedicated line on the motherboard
D . all of the above / 12760 /
A . pulsating electrical signal

64.T/F:A UPS conditions the line for both brownouts and spikes. / 12819 /
True

65.MC:A(n) _____ provides a row of power outlets to protect equipment from overvoltages.
A . EMI device
B . ESD strip
C .surge suppressor
D . ground bracelet / 12769 /
C . surge suppressor

66.SA:A(n) ______can connect to many different input and output devices such as printers, scanners, keyboards, and mice. / 12840 /
USB port
universal serial bus port

67.SA:A(n) ______is a device that is not located directly on the motherboard but communicates with the CPU. / 12826 /
peripheral device

68.SA:A(n) ______is a group of microchips on the motherboard that control the flow of data and instructions to and from the CPU, providing careful timing of activities. / 12843 /
chip set

69.SA:A(n) ______is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card. / 12850 /
jumper

70.SA:A(n) ______is a physical connector that allows a cable from a peripheral device to be attached to the computer. / 12825 /
port

71.SA:A(n) ______is a pointing input device used to move a pointer on the screen and to make selections. / 12828 /
mouse

72.SA:A(n) ______is a small piece of silicon that contains millions of electronic components. / 12834 /
microchip
chip
integrated circuit

73.SA:A(n) ______is similar to a light switch, and is on or off depending on the direction in which the small switch is set. / 12851 /
DIP switch
dual inline package switch

74.SA:A(n) ______is used for high-speed multimedia devices such as digital camcorders. / 12841 /
FireWire port

75.SA:A(n) ______most often is used by a printer. / 12839 /
parallel port

76.SA:A(n) ______provides an interface for devices such as headphones and speakers. / 12842 /
sound port

77.T/F:All computer cases are the same. / 12775 /
False

78.SA:All letters and characters entered into a computer are converted to a(n) ______form before being stored in the computer. / 12823 /
binary

79.SA:An important line on the system bus is used by the ______, which helps the CPU control the timing of all computer operations. / 12852 /
system clock

80.T/F:An integrated circuit is a small piece of silicon. / 12782 /
True

81.T/F:Clock speed is measured in hertz (Hz). / 12806 /
True

82.T/F:EMI can lead to data loss. / 12816 /
True

83.T/F:Enhanced keyboards have 104 keys. / 12779 /
True

84.MC:ESD also is known as _____.
A .static electricity
B . electrical charge
C . a hazard for the motherboard
D . insulating surface / 12768 /
A . static electricity

85.T/F:Every device must have a method to communicate with the CPU. / 12774 /
True

86.SA:Expansion cards are installed in long narrow ______on the motherboard. / 12836 /
expansion slots

87.T/F:Expansion slots are a type of circuit board. / 12785 /
False

88.T/F:Expansion slots are used to hold expansion cards. / 12807 /
True

89.MC:Hardware consists of _____.
A .data processed by humans
B . continuous up-and-down wave patterns of light and sound
C . a computer’s physical components
D . a set of instructions / 12745 /
C . a computer’s physical components

90.T/F:Humans process data that is analog. / 12770 /
True

91.T/F:If a computer has just come from the cold, the potential for static electricity is very low. / 12815 /
False

92.SA:In a(n) ______, data is transferred serially. / 12837 /
serial port

93.T/F:Let-through voltage is the minimum voltage a surge suppressor allows to reach the equipment to which it is connected. / 12818 /
False

94.SA:Most motherboards today use boards called ______. / 12845 /
DIMMs
dual inline memory modules

95.T/F:Motherboards do not require jumpers if they have a DIP switch. / 12798 /
False

96.T/F:On new motherboards, the ROM BIOS and the CMOS RAM are kept separate. / 12796 /
False

97.T/F:Peripheral devices cannot be connected via a port. / 12778 /
False

98.T/F:Primary storage is provided by RAM chips. / 12791 /
True

99.T/F:Program instructions embedded into hardware are known as firmware. / 12795 /
True

100.SA:Program instructions embedded into hardware, such as a ROM chip, often are referred to as ______. / 12849 /
firmware

101.MC:RAM chips are _____.
A .considered to be volatile
B . capable of holding data permanently
C . manufactured by Rambus, Inc.
D . special circuit boards / 12751 /
A . considered to be volatile

102.T/F:RAM is used to speed up memory access. / 12793 /
False

103.MC:ROM chips that can be reprogrammed are known as _____.
A .firmware
B . flash ROM
C . BIOS
D . DIMMs / 12753 /
B . flash ROM

104.SA:ROM holds its data permanently and is considered to be ______. / 12846 /
nonvolatile

105.T/F:ROM is considered to be volatile. / 12792 /
False

106.T/F:Secondary storage media cannot hold data permanently. / 12810 /
False

107.T/F:Some computers have ports on the front. / 12777 /
True

108.T/F:Some surge processors provide telephone jacks. / 12817 /
True

109.SA:The ______are among the most visible devices when one looks inside a computer case. / 12833 /
circuit boards

110.SA:The ______contains the CPU, the component which performs most processing inside the PC. / 12835 /
motherboard
main board
system board

111.SA:The ______reads and writes data and instructions to and from storage devices and performs calculations. / 12824 /
CPU
central processing unit
microprocessor
processor

112.SA:The ______visually displays the output of the computer. / 12830 /
monitor

113.T/F:The AGP slot is used for an audio card. / 12808 /
False

114.SA:The BIOS typically is stored on a(n) ______on the motherboard. / 12847 /
ROM chip
ROM BIOS chip

115.SA:The BIOS used to manage simple devices is called ______. / 12848 /
system BIOS

116.T/F:The bottom of a mouse houses an optical sensor or rotating ball. / 12780 /
True

117.T/F:The chip set controls the flow of data and instructions to and from the CPU. / 12789 /
True

118.T/F:The CMOS BIOS is used to start the computer. / 12794 /
False

119.SA:The CPU uses ______to hold data and instructions temporarily while processing them. / 12844 /
primary storage
memory
temporary storage

120.MC:The function of a bus is to _____.
A .create a set of rules and standards for two entities communicating with each other
B . allow a computer’s devices to communicate with each other
C . act as a set of electrical contact points in a computer’s motherboard
D . retain setup or installation information / 12757 /
B . allow a computer’s devices to communicate with each other

121.MC:The function of the power supply in a computer’s electrical system is to _____.
A .power the CMOS RAM chip
B . generate electricity for the computer
C . convert power received from a standard power outlet
D . all of the above / 12767 /
C . convert power received from a standard power outlet

122.SA:The keyboards that are standard today are called a(n) ______and have 104 keys. / 12829 /
enhanced keyboard

123.MC:The main bus on the motherboard is called a _____.
A .system bus
B . memory bus
C . front side bus
D . all of the above / 12759 /
D . all of the above

124.MC:The most important circuit board in a computer is known as a(n) _____.
A .integrated circuit
B . insulated board
C . CPU
D . motherboard / 12750 /
D . motherboard

125.T/F:The most important circuit board in the computer is the motherboard. / 12784 /
True

126.T/F:The most important component inside a computer case is the microprocessor. / 12773 /
True

127.MC:The number of lines, or width, of a data bus is known as _____.
A .a trace
B . a DIP
C . the data path size
D . a system bus / 12758 /
C . the data path size

128.SA:The output produced on paper by a printer often is called ______. / 12832 /
hard copy

129.T/F:The system clock is the main bus on the motherboard. / 12805 /
False

130.T/F:The system clock keeps communications in sync. / 12790 /
True

131.T/F:The width of a data bus is called the data path size. / 12804 /
True

132.T/F:Traces are sets of rules and standards that any two entities use for communication. / 12801 /
False

133.T/F:Unlike EMI, ESD cannot cause the failure of an electronic component. / 12813 /
False

Chapter 1: Introduction to Internet Explorer
Question / ID / Correct Answer
134.MC:____ are connected with high-, medium-, and low-speed data lines that allow data to move from one computer to another.
A . Wireless systems
B . Firewalls
C . Portals
D . Networks / 354527 /
D . Networks

135.MC:____ randomly displays advertisements and other messages while you use your computer.
A . Spyware
B . Adware
C . Phishing data
D . A computer virus / 354531 /
B . Adware

136.MC:A ____, which runs Web server software, provides resources such as text, images, files, and links to other computers on the Internet.
A . Web server
B . Web browser
C . Web connector
D . Web administrator / 354529 /
A . Web server

137.MC:All of the resources and links found throughout the Internet create an interconnected network called ____.
A .the World Wide Web
B . the Web
C . WWW
D . all of the above / 354530 /
D . all of the above

138.MC:Each Web page has a unique address, called a(n) ____, which distinguishes it from all other pages on the Internet.
A . URL
B . FTP
C .browse tag
D . page title / 354534 /
A . URL

139.MC:Internet Explorer 9 includes a ____ Filter designed to identify malicious and fraudulent Web sites, and will inform you by displaying an appropriate warning.
A .SmartBrowser
B .SmartSecure
C .SmartWeb
D .SmartScreen / 354532 /
D .SmartScreen

140.MC:The ____ is a worldwide collection of networks, each of which is composed of a collection of smaller networks.
A . Government portal
B . Internet
C . NASA portal
D . Domain aggregator / 354526 /
B . Internet

141.MC:To combat security vulnerabilities that are present in programs installed on your computer, software manufactures may release updates, also known as ____.
A .patches
B . service packs
C . either a or b
D . neither a nor b / 354533 /
C . either a or b

142.MC:You access hypermedia by clicking a ____, which points to the location of the computer on which the hypermedia is stored and to the hypermedia itself.
A .navlink
B . hyper bar
C . hyperlink
D . navigation bar / 354528
Testbank Questions
Chapter 1: Introduction to Internet Explorer
Question / ID / Correct Answer
1.MC:____ are connected with high-, medium-, and low-speed data lines that allow data to move from one computer to another.
A . Wireless systems
B . Firewalls
C . Portals
D . Networks / 354527 /
D . Networks

2.MC:____ Browsing is a feature in Internet Explorer 9 that allows you to visit Web pages without the Web browser recording any information.
A .InPrivate
B . Secret
C . Discrete
D . Safe / 354559 /
A .InPrivate

3.MC:____ is a word-processing program that is supplied with Microsoft Windows.
A .TextPad
B . WordPad
C .ProcessPad
D .NoteTaker / 354565 /
B . WordPad

4.MC:____ randomly displays advertisements and other messages while you use your computer.
A . Spyware
B . Adware
C . Phishing data
D . A computer virus / 354531 /
B . Adware

5.SA:______displays the top-level domain in a black font, while the remainder of the Web address is displayed in a gray font. / 354603 /
Domain highlighting

6.SA:______is a program that tracks the actions you take on your computer, such as which Web sites you visit, what products you purchase online, and your credit card information, and sends them to a third party. / 354601 /
Spyware

7.SA:______is text that displays in place of the image if a user configures his or her Web browser not to display images. / 354609 /
Alternate text

8.SA:______is the combination of text, images, audio, video, and interactivity, delivered over the Internet. / 354598 /
Hypermedia

9.MC:A ____ is a set of rules.
A .behavior
B . protocol
C . command
D . menu / 354535 /
B . protocol

10.MC:A ____, which runs Web server software, provides resources such as text, images, files, and links to other computers on the Internet.
A . Web server
B . Web browser
C . Web connector
D . Web administrator / 354529 /
A . Web server

11.Mod. T/F:Aphishingscam works by falsifying one’s identity in an attempt to convince an unsuspecting victim into disclosing information such as credit card numbers, bank account information, and Social Security numbers.______/ 354617 /
True

12.SA:A change in the shape of the ______identifies an element as a link. / 354607 /
mouse pointer

13.SA:A collection of related Web pages make up a(n) ______. / 354600 /
Web site

14.T/F:A favoriteconsists of the title of the Web page and the Web address of that page. / 354592 /
True

15.T/F:A markup language contains text as well as information about the text. / 354577 /
True

16.MC:A method of saving information, called the ____ method, allows you to copy an entire Web page, or portions of a page, and insert the information into any Windows document.
A .copy and paste
B . copy
C . paste
D . duplicate / 354563 /
A . copy and paste