Chapter 1 Information Can Conveyed Using Text

subject Type Homework Help
subject Pages 9
subject Words 225
subject Authors Laura DeNardis, Pelin Aksoy

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 1: Introduction to Information Technology Key
1. YouTube did not exist in 2000.
2. eBay was founded in 1980.
3. Google had not yet been founded in 1995.
4. Instant messaging conversations count as information, as do downloaded music files, e-mail, and interactive
video games.
5. Programming skills are not part of a software development career.
6. All institutions must address network security.
7. Fiber optics is easier and cheaper for corporations to set up than wireless connectivity.
8. Mathematical compression algorithms exploit characteristics of digital information, such as redundancy and
repetition, to decrease file sizes by 50% or more.
page-pf2
9. Ubiquitous computing is the ability to engage in information exchange from anywhere at anytime.
10. Obsolescence is a term that refers to cutting edge, new technologies.
11. Nanotechnologies are devices so large theyre measured in meters.
12. Mobility has been an increasingly important trend in IT that provides users with the capability of roaming
around and being unplugged.
13. Media-free information is a term used to describe the storage of information across computer networks that
can be accessed online from anywhere in the world.
14. The term interoperability refers to a situation in which heterogeneous equipment and software made by
different manufacturers can not work together.
15. Information technologies are systems of hardware and software that use magnetic energy only.
16. Combinations of bits can be used to represent any form of information, numbers, text, images and sound.
17. Bits are based on two symbols: 1 and 2 to represent information.
page-pf3
18. Convergence is term that refers to the integration of voice, music, video, images, and data on a single
electronic platform.
19. Cell phones only support voice applications.
20. The telephone and phonograph were introduced in the same year.
21. Before the phonograph, listening to music required attendance at live performances.
22. Not all information can be represented in binary code.
23. The use of hard media such as CDs, DVDs, and floppy disks is increasing.
24. Skills in a programming language such as C++ or Java are necessary for a career in game programming or
other types of programming.
25. The speed of information is faster than ever, with transmission rates of millions or billions of bits per second
becoming the norm.
26. Unsolicited, unwanted e-mails that flood Internet mailboxes are called ____________________.
page-pf4
27. One of the first forms of information that humans systematically employed to represent information was
____________________.
28. Information technology workers who extract computer evidence for detecting, preventing, and prosecuting
crime are in the field of ____________________.
29. Installed but unused fiber is sometimes called ____________________ fiber.
30. ____________________technologies reduce file sizes dramatically without significantly degrading the
quality of images, video, or sound.
31. As defined in the textbook, ____________________ is widely accepted to be a fact or series of facts that
carry meaning
32. Web sites normally combine text, images (including video), numbers, and ____________________ to
convey information.
33. Before the advent of written languages, writing tools, and recording media such as parchment, historical
events and important facts were transmitted ____________________.
34. The telephone and phonograph were introduced in the year ____________________.
page-pf5
35. The term alphanumeric refers to information represented through ____________________ and/or
numbers.
36. Information technologies are systems of hardware and/or software that capture, process, exchange,
____________________, and/or present information, using electrical, magnetic, and/or electromagnetic
37. Any form of information can be represented as a series of ones and zeros, which are called
____________________.
38. HTML stands for ____________________.
39. The most cutting-edge and most controversial authentication systems use ____________________
identification, which can include retinal eye scans, fingerprint scanners, facial recognition, or even DNA
authentication.
40. Software that anyone can access, view, and modify is called ____________________ source code.
41. IT software and hardware concerned with the protection of computing resources from hackers, viruses,
worms, spam, protocol vulnerabilities, terrorism, natural disasters, and other potential threats is called
____________________ technology.
42. Multimedia is a term used to describe the integration of information in the form of text, numbers,
____________________, images, and video.
page-pf6
43. People used to download a presentation onto a CD or floppy disk, but now use ____________________,
which act as mobile, miniature hard drives.
44. An example of popular open source software is ____________________, an operating system developed by
Linus Torvalds in 1991.
45. The common use of the term ____________________ simply means transmission rate, measured in bits per
second.
46. Information security professionals implement and test ______________________________ (IDS),
configure firewalls, implement encryption technologies, and perform security audits.
47. The IT job of ____________________ configures and operates computer networks on a company-wide,
division-wide, or local department basis, and often provides direct end-user support.
48. ____________________ is the phenomenon of businesses moving IT jobs to other countries to save
money.
49. IEEE stands for an organization called the __________________________________________________.
50. Systems that contain large amounts of information that can be organized, classified, searched, and retrieved
in various ways are called ____________________ management systems (DBMS).
page-pf7
51. Information can be conveyed using ____.
A. Text
B. Numbers
52. An example of an early alphanumeric technology milestone in history is:
D. Radio broadcasts
E. MP3
53. An example of a sound technology milestone in history is:
D. Text messaging
E. Email
54. An example of an image technology milestone in history is:
D. Phonograph
E. Telegraph
55. Which of the following is a cutting edge trend in IT?
A. Dark fiber
page-pf8
56. One type of law enforcement job in IT is called:
A. IT sales
B. Database management
57. Which of the following technologies is designed to reduce file sizes?
D. Mobile telephony
E. Multimedia
58. Alphanumeric technologies represent information through:
A. Images and video
59. Which of the following jobs involves work as part of a team on limited-term engagements for large
corporations, governments, and other institutions?
D. Database management
E. None of the above
60. Give examples of how quickly information technology advancements occur.
page-pf9
61. Describe some of the things that affect information technology job prospects.
62. Explain why network security technologies are a critical IT trend.
63. Describe some of the modern information technologies that address the recording and conveying of imaging
information in society.
page-pfa
64. Explain why information technology is vital to national economies.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.