Professional Documents
Culture Documents
Instant Download PDF Technology Now Your Companion To SAM Computer Concepts 1st Edition Corinne Hoisington Test Bank Full Chapter
Instant Download PDF Technology Now Your Companion To SAM Computer Concepts 1st Edition Corinne Hoisington Test Bank Full Chapter
https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-1st-edition-corinne-hoisington-solutions-
manual/
https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-2nd-edition-corinne-hoisington-test-bank/
https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-2nd-edition-corinne-hoisington-solutions-
manual/
https://testbankfan.com/product/psychology-majors-companion-1st-
edition-dunn-test-bank/
Business Now 1st Edition Shah Test Bank
https://testbankfan.com/product/business-now-1st-edition-shah-
test-bank/
https://testbankfan.com/product/r-companion-to-political-
analysis-2nd-edition-pollock-iii-test-bank/
https://testbankfan.com/product/enhanced-computer-concepts-and-
microsoft-office-2013-illustrated-1st-edition-parsons-test-bank/
https://testbankfan.com/product/sexuality-now-canadian-1st-
edition-carroll-test-bank/
https://testbankfan.com/product/introduction-to-computer-
security-1st-edition-goodrich-solutions-manual/
Technology Now Chapter 6
Purchasing and Maintaining a Computer
TRUE/FALSE
1. Once you determine your budget, you can narrow your search to look for the best computer that fits
your budget.
3. If you have a restricted budget, buy a computer with a more powerful processor and less
memory—you can add more memory to it later.
4. If you need Microsoft Office or other installed programs, keep in mind that not all tablets can run
traditional programs.
6. Once you determine the form factor for your computer, the next decision you need to make is what
oeprating system you will use.
7. A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount
of space.
8. Advantages of the convertible form factor include that it is small and portable and often includes
phone and text capabilities.
9. Computers with the Intel i7 processors are best for gamers and heavy technical users.
10. The amount of RAM you need is independent of what programs you intend to run.
11. Many business people use scanning apps, turning their smartphones into portable scanners.
ANS: T PTS: 1 REF: 6-5
12. Heat is bad for electronics, but low temperatures are unlikely to damage a computer’s mechanical and
electronic components.
13. Hard drive storage uses magnetic technology to arrange particles on the disk.
15. Often, the data on a computer is worth more than the computer itself.
16. You can back up your files to remote servers over the Internet, called surge backup.
17. File History is the backup and restore feature on a Windows 8.x computer.
18. Use passwords that are at least five characters with a combination of upper- and lowercase letters,
numbers, and symbols.
19. You should shut down your computer or disconnect it from the Internet if you are not using it for
extended periods of time.
20. If you boot up your computer and it doesn’t get past the startup screen, the problem might be with the
hard drive.
MODIFIED TRUE/FALSE
1. Cloud storage technology uses light in the form of a low-power laser beam to record and read a disk.
_________________________
ANS: F, Optical
3. A disk degragmentation utility removes unused files from your hard drive so the computer doesn’t
search through unneeded files. _________________________
ANS: F, cleanup
4. Utility programs can help return your computer to better working condition by scanning for viruses
and spyware. _________________________
5. Adware poses a security risk because it can track and steal your personal information.
_________________________
ANS: F, Spyware
ANS: F
GB
gigabytes
gigabytes (GB)
GB (gigabytes)
8. Because wires can get tangled, many add-on devices can connect wirelessly using Bluetooth
technology. _________________________
9. To prevent power fluctuations from damaging electronic components, you should always use a(n)
power suppressor with your computer. _________________________
ANS: F, surge
10. You can use a cable lock to secure a computer to a table or desk. _________________________
3. The ____ coordinates the functions of various hardware components and determines the types and
brands of application software you can use.
a. virtual memory c. platform
b. device driver d. form factor
ANS: C PTS: 1 REF: 6-3
4. An advantage of a(n) ____ computer is that internal system components and electronics are integrated
into the back of the monitor.
a. desktop c. laptop
b. notebook d. all-in-one
ANS: D PTS: 1 REF: 6-4
5. Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality
than other types of computers.
a. tablet c. notebook
b. ultrabook d. desktop
ANS: A PTS: 1 REF: 6-4
6. A(n) ____ computer provides a detachable keyboard base that has extra ports or drives.
a. desktop c. ultrabook
b. convertible d. tablet
ANS: B PTS: 1 REF: 6-4
7. One of the main operating systems for desktop and laptop computers is ____.
a. Blackberry c. Windows
b. Apple iOS d. Android
ANS: C PTS: 1 REF: 6-4
9. ____ is temporary storage used to store data and operate programs while the computer is running.
a. Random Access Memory (RAM) c. Flash memory
b. Virtual memory d. Encrypting File System (EFS)
ANS: A PTS: 1 REF: 6-4
10. Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.
a. i3 c. i7
b. i5 d. i9
ANS: A PTS: 1 REF: 6-4
11. ____ devices store files permanently so you can retrieve them later.
a. Encrypting c. Firewall
b. Storage d. Platform
ANS: B PTS: 1 REF: 6-5
13. A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable
computers.
a. external c. real-time
b. magnetic d. solid state
ANS: D PTS: 1 REF: 6-5
14. ____ are useful is you are not familiar with computers, or if you feel your computer might need
replacement parts due to wear and tear.
a. Extended warranties c. Encrypting file systems
b. Surge suppressors d. Optical sotrage technologies
ANS: A PTS: 1 REF: 6-5
15. Hard drive storage uses ____ technology to arrange particles on the disk.
a. laser c. cloud
b. magnetic d. virtual memory
ANS: B PTS: 1 REF: 6-6
16. Power is supplied by either ____ current from a wall outlet or from a battery.
a. SSD c. AC
b. EFS d. DC
ANS: C PTS: 1 REF: 6-7
17. You can avoid data loss by installing a(n) ____ to prevent power loss to your computer.
a. solid state drive c. firewall
b. surge suppressor d. uninterruptible power supply
ANS: D PTS: 1 REF: 6-7
19. To prevent power fluctuations from damaging your computer, you should always use a(n) ____ with
your computer.
a. uninterruptible power supply c. solid state drive
b. virtual memory system d. surge suppressor
ANS: D PTS: 1 REF: 6-7
20. Using ____ technology and real-time location systems, you can install computer-tracking software on
your laptop.
a. global positioning system c. uninterruptible power supply
b. encrypting file system d. personal identification number
ANS: A PTS: 1 REF: 6-8
22. You can store your documents, pictures, videos, and music using cloud computing technologies such
as ____.
a. Bluetooth c. DropBox
b. CNET d. Chrome
ANS: C PTS: 1 REF: 6-8
23. Your best protection against data loss is to ____ your files to an external storage location.
a. convert c. process
b. extend d. back up
ANS: D PTS: 1 REF: 6-8
24. You can use a personal storage device such as ____ to back up your files.
a. DVDs c. firewalls
b. cloud drives d. tablets
ANS: A PTS: 1 REF: 6-8
25. ____ are short words or phrases kept secret by a person and used to gain access to a site or data.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: B PTS: 1 REF: 6-9
26. ____ are short number sequences, kept secret and frequently used by banks, used to access accounts.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: D PTS: 1 REF: 6-9
27. ____ are words determined by users to identify themselves in the digital world.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: A PTS: 1 REF: 6-9
28. A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited
data exchanges.
a. driver c. form factor
b. firewall d. platform
ANS: B PTS: 1 REF: 6-10
29. ____ “scrambles” or encodes data so that even if unauthorized users somehow gain access to your
files, they will not be able to read or understand what is in them.
a. Virtual memory c. Data encryption
b. Optical storage d. A firewall
ANS: C PTS: 1 REF: 6-10
31. ____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.
a. Magnetic c. Optical
b. Solid state d. Convertible
ANS: A PTS: 1 REF: 6-10
32. If the head touches the platter, or if dirt gets on the disk, you can have a ____.
a. power spike c. head flash
b. head crash d. peripheral crash
ANS: B PTS: 1 REF: 6-11
33. When a program needs more RAM than is currently available on the computer, it calls on the hard
drive to create ____ memory.
a. convertible c. virtual
b. backup d. flash
ANS: C PTS: 1 REF: 6-11
34. You can optimize the way files are stored by running a disk ____ utility.
a. processing c. service
b. encryption d. defragmentation
ANS: D PTS: 1 REF: 6-12
35. If two monitors connected to your computer are blank, you may have a damaged ____.
a. video card c. tablet
b. firewall d. internal hard drive
ANS: A PTS: 1 REF: 6-12
36. If you turn on your computer, and you don’t see a pointer on the screen, you might have problems with
your ____.
a. CPU c. flash drive
b. pointing device d. platform
ANS: B PTS: 1 REF: 6-12
37. A ____ drive is a small portable solid state storage device that plugs into a USB port.
a. convertible c. flash
b. soft d. virtual
ANS: C PTS: 1 REF: 6-14
38. When cleaning a computer screen, you can use a 50/50 solution of water and ____.
a. dish soap c. ammonia
b. baking soda d. alcohol
ANS: D PTS: 1 REF: 6-15
39. When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
a. antistatic c. conductive
b. silicon d. anti-glare
ANS: A PTS: 1 REF: 6-16
40. The Windows ____ utility can identify temporary Internet files and other others that can be safely
remvoed.
a. Disk Defragmentation c. Firewall
b. Disk Cleanup d. Defender
ANS: B PTS: 1 REF: 6-17
41. A ____ is software that helps peripheral devices communicate with a computer.
a. disk optimization utility c. device driver
b. virtual memory utility d. firewall
ANS: C PTS: 1 REF: 6-17
42. ____ programs show you unsolicited advertisements and banners or pop-up windows.
a. Firewall c. Spyware
b. Cloudware d. Adware
ANS: D PTS: 1 REF: 6-18
43. A computer ____ is malicious software that infects your computer without your knowledge or
permission.
a. virus c. firewall
b. cookie d. spike
ANS: A PTS: 1 REF: 6-18
44. The best way to avoid spyware and adware is to install and run ____ software.
a. disk optimization c. prevention
b. all-in-one d. cloud storage
ANS: C PTS: 1 REF: 6-18
45. Some people choose a platform based on its ____, or “look and feel”.
a. peripherals c. device driver
b. control panel d. user interface
ANS: D PTS: 1 REF: 6-4
Another random document with
no related content on Scribd:
other nations 5,800,767 tons. Between 1855 and 1860 over
1,300,000 American tons in excess of the country’s needs were
employed by foreigners in trades with which we had no legitimate
connection save as carriers. In 1851 our registered steamships had
grown from the 16,000 tons of 1848 to 63,920 tons—almost equal to
the 65,920 tons of England, and in 1855 this had increased to
115,000 tons and reached a maximum, for in 1862 we had 1,000 tons
less. In 1855 we built 388 vessels, in 1856 306 vessels and in 1880 26
vessels—all for the foreign trade. The total tonnage which entered
our ports in 1856 from abroad amounted to 4,464,038, of which
American built ships constituted 3,194,375 tons, and all others but
1,259,762 tons. In 1880 there entered from abroad 15,240,534 tons,
of which 3,128,374 tons were American and 12,112,000 were foreign
—that is, in a ratio of seventy-five to twenty-five, or actually 65,901
tons less than when we were twenty-four years younger as a nation.
The grain fleet sailing last year from the port of New York numbered
2,897 vessels, of which 1,822 were sailing vessels carrying
59,822,033 bushels, and 1,075 were steamers laden with 42,426,533
bushels, and among all these there were but seventy-four American
sailing vessels and not one American steamer.
“While this poison of decay has been eating into our vitals the
possibilities of the country in nearly every other industry have
reached a plane of development beyond the dreams of the most
enthusiastic theorizers. We have spread out in every direction and
the promise of the future beggars imaginations attuned even to the
key of our present and past development. We have a timber area of
560,000,000 acres, and across our Canadian border there are
900,000,000 more acres; in coal and iron production we are
approaching the Old World.
1842. 1879.
Coal— Tons. Tons.
Great Britain 35,000,000 135,000,000
United States 2,000,000 60,000,000
Iron—
Great Britain 2,250,000 6,300,000
United States 564,000 2,742,000
With a view to carry this work through the year 1882 and into part
of 1883, very plain reference should be made to the campaign of
1882, which in several important States was fully as disastrous to the
Republican party as any State elections since the advent of that party
to national supremacy and power. In 1863 and 1874 the Republican
reverses were almost if not quite as general, but in the more
important States the adverse majorities were not near so sweeping.
Political “tidal waves” had been freely talked of as descriptive of the
situation in the earlier years named, but the result of 1882 has been
pertinently described by Horatio Seymour as the “groundswell,” and
such it seemed, both to the active participants in, and lookers-on, at
the struggle.
Political discontent seems to be periodical under all governments,
and the periods are probably quite as frequent though less violent
under republican as other forms. Certain it is that no political party
in our history has long enjoyed uninterrupted success. The National
success of the Republicans cannot truthfully be said to have been
uninterrupted since the first election of Lincoln, as at times one or
the other of the two Houses of Congress have been in the hands of
the Democratic party, while since the second Grant administration
there has not been a safe working majority of Republicans in either
House. Combinations with Greenbackers, Readjusters, and
occasionally with dissenting Democrats have had to be employed to
preserve majorities in behalf of important measures, and these have
not always succeeded, though the general tendency of side-parties
has been to support the majority, for the very plain reason that
majorities can reward with power upon committees and with
patronage.
Efforts were made by the Democrats in the first session of the 47th
Congress to reduce existing tariffs, and to repeal the internal revenue
taxes. The Republicans met the first movement by establishing a
Tariff Commission, which was appointed by President Arthur, and
composed mainly of gentlemen favorable to protective duties. In the
year previous (1881) the income from internal taxes was
$135,264,385.51, and the cost of collecting $4,327,793.24, or 3.20
per cent. The customs revenues amounted to $198,159,676.02, the
cost of collecting the same $6,383,288.10, or 3.22 per cent. There
was no general complaint as to the cost of collecting these immense
revenues, for this cost was greatly less than in former years, but the
surplus on internal taxes (about $146,000,000) was so large that it
could not be profitably employed even in the payment of the public
debt, and as a natural result all interests called upon to pay the tax
(save where there was a monopoly in the product or the
manufacture) complained of the burden as wholly unnecessary, and
large interests and very many people demanded immediate and
absolute repeal. The Republicans sought to meet this demand half
way by a bill repealing all the taxes, save those on spirits and
tobacco, but the Democrats obstructed and defeated every attempt at
partial repeal. The Republicans thought that the moral sentiment of
the country would favor the retention of the internal taxes upon
spirits and tobacco (the latter having been previously reduced) but if
there was any such sentiment it did not manifest itself in the fall
elections. On the contrary, every form of discontent, encouraged by
these great causes, took shape. While the Tariff Commission, by
active and very intelligent work, held out continued hope to the more
confident industries, those which had been threatened or injured by
the failure of the crops in 1881, and by the assassination of President
Garfield, saw only prolonged injury in the probable work of the
Commission, for to meet the close Democratic sentiment and to
unite that which it was hoped would be generally friendly, moderate
tariff rates had to be fixed; notably upon iron, steel, and many classes
of manufactured goods. Manufacturers of the cheaper grades of
cotton goods were feeling the pressure of competition from the South
—where goods could be made from a natural product close at hand—
while those of the North found about the same time that the tastes of
their customers had improved, and hence their cheaper grades were
no longer in such general demand. There was over-production, as a
consequence grave depression, and not all in the business could at
once realize the cause of the trouble. Doubt and distrust prevailed,
and early in the summer of 1882, and indeed until late in the fall, the
country seemed upon the verge of a business panic. At the same time
the leading journals of the country seemed to have joined in a
crusade against all existing political methods, and against all
statutory and political abuses. The cry of “Down with Boss Rule!”
was heard in many States, and this rallied to the swelling ranks of
discontent all who are naturally fond of pulling down leaders—and
the United States Senatorial elections of 1883 quickly showed that
the blow was aimed at all leaders, whether they were alleged Bosses
or not. Then, too, the forms of discontent which could not take
practical shape in the great Presidential contest between Garfield
and Hancock, came to the front with cumulative force after the
assassination. There is little use in philosophizing and searching for
sufficient reasons leading to a fact, when the fact itself must be
confessed and when its force has been felt. It is a plain fact that many
votes in the fall of 1882 were determined by the nominating struggle
for the Presidency in 1880, by the quarrels which followed Garfield’s
inauguration, and by the assassination. Indeed, the nation had not
recovered from the shock, and many very good people looked with
very grave suspicion upon every act of President Arthur after he had
succeeded to the chair. The best informed, broadest and most liberal
political minds saw in his course an honest effort to heal existing
differences in the Republican party, but many acts of
recommendation and appointment directed to this end were
discounted by the few which could not thus be traced, and suspicion
and discontent swelled the chorus of other injuries. The result was
the great political changes of 1882. It began in Ohio, the only
important and debatable October State remaining at this time. The
causes enumerated above (save the assassination and the conflict
between the friends of Grant and Blaine) operated with less force in
Ohio than any other section—for here leaders had not been held up
as “Bosses;” civil service reform had many advocates among them;
the people were not by interest specially wedded to high tariff duties,
nor were they large payers of internal revenue taxes. But the liquor
issue had sprung up in the Legislature the previous winter, the
Republicans attempting to levy and collect a tax from all who sold,
and to prevent the sale on Sundays. These brief facts make strange
reading to the people of other States, where the sale of liquor has
generally been licensed, and forbidden on Sundays. Ohio had