Eset Smart Security 4.2.4..10

ESET NOD32 Antivirus System - Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint. NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers...

Prince of Persia (2010)

Prince of Persia: The Sands of Time 2010 Hollywood Movies Watch Online Informations : Director: Mike NewellRelease Date: 28 May 2010Genre: Action, Adventure, Fantasy, RomanceCast : Jake Gyllenhaal, Gemma Arterton, Ben Kingsley, Alfred Molina, Steve...

Windows XP Setup Simulator v1.0

Windows XP Setup Simulator is a program that teaches you how to install Windows XP, without having to worry you will mess up your hardware or software. It just simulates installing Windows XP as if it was the real setup. It reproduces every step exactly as it is in the real setup, and it does not restart your computer. This program can also be used as a guide for learning how to install Windows 2003, because the steps are very similar. The package also includes an e-book that explains every step of the Windows XP Setup and some other Windows XP Basics.

Internet Download Manager PreCracked

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance....

Driver Genius Pro Portable

Driver Genius Professional manage your PC to get 100% up to date Drivers and optimize PC performance. Driver Genius Professional is a powerful driver manager for Windows that can backup, restore ,search and update your drivers automatically in several mouse clicks! Driver Genius Professional is a software that backup and restore drivers.

Using Information Technology Chapter 4


Self test questions
1.       A(n)  kilobyte is about 1000 bytes; a(n)  megabyte is about 1 million bytes; a(n)  gigabyte is about 1 billion bytes.
2.       The CPU is the part of the microprocessor that tells the rest of the computer how to carry out a program’s instructions.
3.       The process of retrieving data from a storage device is referred to as read ; the process of copying data to a storage device is called write.
4.       To avoid losing data, users should always backup their files.
5.       Formatted disks have track and sector that the system software uses to reference data locations.
6.       The CPU is often referred to as the “brain” of a computer.
7.       The electrical data roadways though which bits are transmitted are called bus .
8.       A cable connected to a serial port sends bits one at a time, one after the other; a cable connected to a paralel port port sends 8 bits simultaneously.
9.       Part of the disk-drive mechanism, the transfers data between the computer and the stick.
10.    RAM Chips , also called main memory, are critical to computer performance.
11.    arithmetical Operations are the fundamental math operations ; addition , subtraction , multiplication , and division.logical Operations are comparisons such as “equal to” , “greater than” , or “less than”.
12.   A group of 8 bits is a byte.
13.   The extra bit attached to the end of a byte for error checking is a parity bit.
14.   A tiny electronic device acts as an on/off switch , switching between “on” and “off” millions of times per second, is called a transistor.
15.    Flash memory sticks is a form of flash memory media that plugs into a special port in a digital camera, camcorder, notebook , PC , or photo printer and holds up to 1 gigabyte of data.
Multiple-Choice Questions
1.       Which of the following is another term for primary storage?
a.       ROM
b.      ALU
c.       CPU
d. RAM
e.      CD-R
2.       Which of the following is not included on a computer’s motherboard?
a.       RAM chips
b.      ROM chips
c. Keyboard
d.      Microprocessor
e.      Expansion slots
3.       Which of the following is used to hold data and instructions that will be used shortly by the CPU?
a.       ROM chips
b.      Peripheral devices
c. RAM chips
d.      CD-R
e.      Hard disk
4.       Which of the following coding schemes is widely used on microcomputers?
a.       EBCDIC
b.      Unicode
d.      Microcode
e.      UNIX
5.       Which of the following is used to measure processing speed in microcomputers?
a.       MIPS
b.      Flops
c.       Piscoseconds
d. Megahertz
e.      Milihertz
6.       Which expansion bus specializes in graphics processing?
a.       PCI
b.      ROM
c.       CMOS
d. AGP
e.      AMR
7.       Which element is commonly used in the making of solid-state integrated circuits?
a.       Pentium
b.      Lithium
c.       Copper
d.      Iron
e. Silicon
8.       DVD-Rs allow
a.       Repeated rewriting
b. One-time recording by the user; they cannot be written on more than once
c.       No writing; they are read-only
True False Question
1.       A bus connects a computer’s control unit and ALU(F)
2.       The machine cycle comprises the instruction cycle and the execution cycle.(F)
3.       Magnetic tape is the most common secondary storage medium used with microcomputers.(F)
4.       Main memory is nonvolatile.(F)
5.       Pipelining is a method of speeding up processing.(T)
6.       Today’s laptop computers can perform more calculations per second than ENIAC , an enormous machine occupying more than 1800 square feet and weighing more than 30 tons.(T)
7.       USB can theoretically connect up to 127 peripheral devices.(T)
8.       A petabyte is approximately 1 quadrillion bytes.(T)
9.       Online secondary storage services test your computer’s RAM capacity.(F)
10.   Keychain memory is a pipelining device.(F)

Using information technology chapter 3 (continued)


Stage 1
Self Test Questions
15      Word processing software allows you to create and edit documents.
16      Scrolling is the activity of moving upward or downward through the next or other screen display.
17     Name four editing features offered by word processing programs : insert & delete , find and replace , cut/copy & paste, Spelling checker.
18     In a spreadsheet, the place where a row and a column intersect is called a cell .
19     The cursor is the moveable symbol on the display screen that shows you where you may next enter data or commands.
20     When you buy a software, you pay for a               software license , a contract by which you agree not to make copies of the software to give away or sell.
21     Records In database are sorted according to a key .
22      Desktop publishing involves mixing text and graphics to produce high quality output for commercial printing.
23     A spreadsheets allows users to create tables and do “what-if” financial analyses by entering data and formulas into rows and columns arranged as a grid on a display screen.
24      Word warp automatically continues text to the next line when you reach the right margin.
25     Settings that are automatically used by a program unless the user specifies otherwise are called Default-Settings .
26      Public-Domain software is not protected by copyright and may be copied to anyone.
27      Device drivers are specialized software programs that allow input and output devices to communicate with the rest of the computer system.
28     The Portable document format allows documents to be sent to almost any platform and be opened without losing any of their characteristics (text, colors, graphics, formatting)
Multiple Choice Questions
7         Which of the following is not an advantage of using database software ?
a.  Integrated data
b.  Improved data integrity
c.  Lack of structure
d.  Elimination of data redundancy
8         Which of the following is not a feature of word processing software?
a.  Spelling checker
b.  Cell address
c.  Formatting
d.  Cut and paste
e.  Find and replace
9         What is the common consumer computer interface used today?
a.  Command-drived interface
b.  Graphical user interface
c.  Menu-driven interface
d.  Electronic user interface
e.  Biometric user interface
10     Which type of software can you download and duplicate without any restrictions whatsoever and without a fear of legal prosecution?
a.  Commercial software
b.  Shareware
c.  Public-domain software
d.  Pirated software
e.  Rentalware
True/False Questions
8         Public-domain software is protected by copyright and so is offered for sale by license only.(F)
9         The records within the various tables in a database are linked by a key field.(T)
10     QuarkXPress and Adobe InDesign are professional desktop-publishing programs.(T)
11     The best known graphical user interface is the command driven one.(F)
12     Microsoft power point is an example of financial software.(F)
13     Drawing programs create vector images, and painting programs produce bit-mapped images.(T)
14     General computer users can design their own web pages using Adobe Dreamweaver, Adobe Flash, and Microsoft Front page.(T)
Stage 2
Short-Answer Questions
9         What is open-source software?
Open source software meaning any programmer can download it from the internet for free and modify it with suggested improvements.
10     What does defragmenting do?
Find all scattered files on hard disk and reorganize them as contiguous files.
11     What is an embedded system?
Any electronic system that uses CPU chip but that is not general workstation , desktop , or laptop computer . for example : automobiles , planes , trains , barcode scanners , fuel pumps.
12     What are the following types of application software used for?
  1. Project management software
A program used to plan an schedule people , costs , and resources required to complete a project on time.
  1. Desktop-publishing software
A program used to design and produce high quality output which include mixing text and graphics for commercial printing.
  1. Database software
A program that sets up and controls the structure of a database and access to the data.
  1. Spreadsheet software
A program that allow users to create tables and financial schedules by entering data and formulas into rows and columns arranged as a grid on a display screen.
  1. Word processing software
A program that allow you to use computers to create , edit . format , print , and score text material.
13     Which program is more sophisticated, analytical graphics or presentation graphics ?Why ?
Presentation graphics , because presentation graphics uses graphics , animation , sound , and data or information to make visual presentation while analytical graphics only convert numeric data into graph to make it easier to analyzed.
14     How are the following different from another? Pop up menu; pull-down menu; cascading menu.
A pop up menu is a list of command options that can “pop up” anywhere on the screen when you click the right  mouse button.
Pull-down menu also called drop down menu is a list of options that pulls down from the menu bar at the top of the screen .
Cascading menu is a menu that seem to fly back to the right or explode out to the right, wherever there is a space.
The difference between them is pop up menu didn’t connected to the menu bar , while pull down menu and cascading menu is connected to the menu bar .choosing one of the options in pulls down menu may produce cascading menu.
15     What is importing? Exporting ?
Importing is defined as getting data from another source and then converting it into a format compatible with the program in which you are currently working.
Exporting is defined as transforming data into a format that can be used in another program and then transmitting it.
16     Briefly compare drawing programs and painting programs.
Drawing program illustrate objects and products by creating vector images (images created from geometrical formulas) while painting image simulate painting on the screen. Painting images produce bit-mapped image , or raster image , made up of little dots.
17     Explain what computer-aided design(CAD)programs do.
CAD is a programs used for design products , structures , civil engineering drawings , and maps.
18     Discuss the various software licenses : site licenses, concurrent-use licenses, multiple-user licenses, single-user license.
Site license is a license that allow software to be used on all computers at a specific location.
Concurrent-use licenses allow a certain number of copies of the software to be used at the same time.
Multiple user license specifies the number of people who may use the software.
Single user license limits software use to one user at a time.

Using information technology chapter 3


Stage 1
Self – Test Questions
  1. System software enables the computer to perform essential operating tasks.
  2. Application software is a term for programs designed to perform specific tasks for the user.
  3. Multitasking is the activity in which a computer works on more than one process at a time.
  4. Fragmentation is the scattering of portions of files about the disk in nonadjacent areas, thus greatly slowing access to the file.
  5. Windows and Mac OS are generally used on personalcomputers.
  6. Booting is the process of loading an operating system into a computer’s main memory.
  7. A(n) defragger is a utility that will find all the scattered files on your hard disk and reorganize them as contiguous file.
  8. The Operating system is the component of system software that comprises the master system of programs that manage the basic operations of the computer.
  9. The user interface is the user controllable display screen that allows you to communicate, or interact, with your computer.
  10. Disk scanner and disk cleanup utilities detect and correct certain types of common problems on hard disks, such as removing unnecessary files called temp files that are created by windows only for short tasks and system restore after system problem.
  11. OSs allows users to control access to their computers via use of a username and a password.
  12. Software or hardware that is copyrighted means that it is privately owned and controlled by a company.
  13. Linux is open – source software-meaning any programmer can download it from the internet for free and modify it with suggested improvements.
  14. When you power up a computer by turning on the power “on” switch, this is called a cold boot.if your computer is already on and you restart it, this is called warm boot.
Multiple-Choice questions
  1. Which of the following are functions of the operating system?
a.  File management
b.  CPU management
c.  Task management
d.  Booting
e.  All of these
  1. Which of the following was the first major microcomputer OS?
a.  Mac OS
b.  Windows
c.  DOS
d.  Linux
e.  Unix
  1. Which of the following is a prominent network operating system?
a.  Linux
b.  Ubuntu
c.  Windows NT
d.  DOS
e.  Mac OS
  1. Which of the following is the newest Microsoft Windows operating system?
a.  Windows Vista
b.  Windows XP
c.  Windows 7
d.  Windows NT
e.  Windows CE
  1. Which of the following refers to the execution of two or more programs by one user almost at the same time on the same computer with one central processor?
a.  Multitasking
b.  Multiprocessing
c.  Time-sharing
d.  Multiprogramming
e.  Coprocessing
  1. Which of the following are specialized software programs that allow input and output devices to communicate with the rest of the computer system?
a.  Multitasking
b.  Boot-disks
c.  Utility programs
d.  Device drivers
e.  Service packs
True/False Questions
  1. The supervisor manages CPU(T)
  2. The first graphical user interface was provided by Microsoft windows.(F)
  3. All operating systems are mutually compatible.(F)
  4. Font refers to a preformatted document that provides basic tools for shaping the final document.(F)
  5. Unix crashes often and thus is not normally used for running important large systems.(F)
  6. Windows NT is the most recent Microsoft OS.(F)
  7. Spreadsheet software enables you to perform what-if calculations.(T)
Stage 2
Short-Answer Questions
  1. Briefly define booting.
Booting is the process of loading an operating system into a computer’s main memory.
  1. What is the difference between a command-driven interface and a graphical user interface(GUI)?
Command driven interface = typing the command / instruction , GUI : Use a mouse or keystrokes  to click the command / instruction.
  1. Why can’t you run your computer without system software?
Because system software is a software that control the computer hardware you are using, without system software , the hardware is nothing but a junk.
  1. Why is multitasking useful?
Because multitasking allows the computer to switch rapidly back and forth among different tasks. The user is generally unaware of the switching process and thus can work in more than one application at a time.
  1. What is a device driver?
Device drivers are specialized software programs that allow input and output devices to communicate with the rest of the computer system.
  1. What is utility program?
Utility programs also known as services programs, perform tasks that related to the control and allocation of computer resources.
  1. What is a platform?
Platform is the particular processor model and operating system on which a computer system is based.
  1. What are the three components of system software? What is the basic function of each?
  • Operating system
An operating system is the principal component of system software in any computing system
  • Device drivers
Device drivers help the computer control peripheral devices
  • Utility programs
Utility programs are generally used to support enhance, or expand existing programs in a computer system.
Stage 3
3.  What do you think is the future of Linux? Experts currently disagree about whether Linux will become a serious competitors to windows. Research Linux on the web. Which companies are creating application software to run on Linux? Which businesses are adopting Linux as an OS? What are the predictions about Linux use?
I think Linux will dominate the market, because it’s an open  source software.
4.  How do you think you will obtain software for your computer in the future? Explain your answer.
I will buy it online , or I will  create it myself, because I’m studying computer science major. Or maybe if I am working with some software development company ,  I can get it free.

Using information technology chapter 2


Stage 1
Self test questions
  1. Today’s data transmission speed’s are measured in Bps , Kbps , Mbps, and Gbps.
  2. A(n) cable modem ,connects a personal computer to a cable-TV system that offers an internet connection.
  3. A space station that transmits data as microwaves is a communications satellite.
  4. A company that connects you through your communications line to it’s server , which connects you to the internet, is a(n)ISP.
  5. A rectangular area on the computer screen that contains a document or displays an activity is called a(n) Window.
  6. Flaming is writing an online message that uses derogatory , obscene , or inappropriate language.
  7. A(n)Web browser is a software that enables users to view web pages and to jump from one page to another.
  8. A computer with a domain name is called a(n)server.
  9. HTTP comprises the communications rules that allow browsers to connect with web servers.
  10. A(n) plug in is aprogram that adds a specific feature to a browser, allowing it to play or view certain files.
  11. Unsolicited email in the form of advertising or chain letters known as Spam.
  12. The expression of how much data-text, voice,video,and so on – can be sent through communications channel in a given amount of time is known as bandwidth.
  13. A(n) URL is a string of characters that points to a specific piece of information somewhere in the web.
  14. Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called cookies.
  15. Using trusted institutional names to elicit confidential information is called Phising.
  16. The kind of spyware that can record each characters you type and transmit that information to someone else on the internet , making it possible to strangers to learn your passwords and other information, is called Key logger.

Multiple –Choice Questions
  1. Kbps means how many bits per second?
a.  1 billion
b.  1 thousand
c.  1 million
d.  1 hundred
e.  1 trillion
  1. A location on the internet is called a
a.  Network
b.  User ID
c.  Domain
d.  Browser
e.  Web
  1. In the email address, Kim_Lee is the
a.  Domain
b.  URL
c.  Site
d.  User ID
e.  Location
  1. Which of the following is not one of the four components of a URL?
a.  Web protocol
b.  Name of the web server
c.  Name of the browser
d.  Name of the directory on the web server
e.  Name of the file within the directory
  1. Which of the following is the fastest method of data transmission?
a.  ISDN
b.  DSL
c.  Modem
d.  TI line
e.  Cable modem
  1. Which of the following is not netiquette rule?
a.  Consults FAQ
b.  Flame only when necessary
c.  Don’t shout
d.  Avoid huge file attachment
e.  Avoid sloppiness and errors
  1. Which protocol is used to retrieve email messages from the server to your computer?
a.  HTTP
b.  SMTP
c.  POP3
d.  POP
  1. Who owns internet?
a.  Microsoft
b.  IBM
c.  Apple
d.  U.S.government
e.  No one owns the internet; the components that make up the internet are owned and     shared by thousands of public and private entities.
  1. Each time you connect to your ISP, it will assign your computer a new address called a(n)
a.  Domain
b.  IP address
c.  Plug – in
d.  POP
e.  URL
  1. ISPs that don’t run their own backbones connects to an internet backbones through a
a.  NAP
b.  Web portal
c.  Web browser
d.  URL
e.  TCP/IP
  1. Which of the following is not protocol?
a.  TCP/IP
b.  IE
c.  HTTP
d.  SMTP
  1. The sending of phony email that pretends to be from a credit card company or bank, luring you to website that attempts to obtain confidential information from you is called
a.  Spoofing
b.  Phishing
c.  Spamming
d.  Keylogging
e.  Cookies
True / false Questions
  1. POP3 is used for sending email, and SMTP is used for retrieving email. (T)
  2. A dial up modem is an ISP.(F)
  3. Replying to spam email messages with statement “remove” will always get spammers to stop sending you unsolicited email.(F)
  4. All computer communications use the same bandwidth(F)
  5. A TI line is the slowest but cheapest form of internet connection.(F)
  6. A dynamic IP address gives you faster internet access than a static IP address does(F)
  7. A bookmark lets you return to a favorite website quickly(T)
  8. Radio buttons are used for listening to radio stations on the internet(F)
  9. Spoofing means using fake email sender names(T)
  10. Hypertext refers to text presented with very large letters.(F)
Stage 2
Short answer Questions
  1. Name three metods of data transmission that are faster than a regular modem connection
T1 line , cable modem , satellite wireless connection
  1. What does log on mean?
To make a connection to a remote computer
  1. What is netiquette, and why is it important?
“Network etiquette” or appropriate online behavior. because internet is used world wide , you will need a good behavior to use internet
  1. Briefly define bandwidth.
An expression of how much data-text, voice , video ,or so on-can be sent through a communications channel in a given amount of time.
  1. Many web documents are “linked”.What does that mean?
Connected to the other documents or webages that contain related information.
  1. Compare and contrast a cable modem service to DSL service
  • DSL receive data at the rate 1.5-10 Mbps and can send data at only 128kbps-1.5mbps, you can download 6 minute music video in only 11 minutes. The advantage of DSL is that it is always on and its transmission rate is relatively consistent.
  • Cable modem send data at rate 1.4Mbps-30Mbps, you can download 6 minute music video in only 2 minutes. The disadvantage of cabel modem is that you and your cable TV viewing neighbours are sharing the system and consequently, during the peek load times , your service may be slowed to the speed of a regular dial-up modem. Also using an internet connection that is always on-and that  , in the case of cable, you share with other people-invites outside interference with your computer.
  1. Explain the basics of how the internet works
Dial up with your client computer’s modem connecting via a local phone call to your ISP.
  1. What expanded functions does IMAP have?
If your access provider and email software support IMAP , you can search through your email messages while they are still on the access provider’s server before you download them
  1. Briefly explain what TCP/IP does.
IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order.
  1. Why was ICANN established?
To regulate human friendly internet domain names-those addresses ending with .com , .org , .net and so on, that overlie IP addresses and identify the website type.
  1. What’s the difference between a dynamic IP address and a static IP address?
Dynamic ip address is an IP address that will change everytime you connect to internet ,Static IP address is an IP address that will remain the same everytime you connect to the internet.
  1. Explain what a blog is.
Short for web blog, an internet journal. Blogs are usually updated daily ;they reflect the personality and views of the blogger.
  1. State your answer to a person who asks you the question “Who owns the internet?”
Nobody owns internet , we the user of the internet owns it ourself.
  1. What is B2B commerce?
Electronic sale or exchange of goods and services directly between , cutting out traditional intermediaries
  1. List and briefly describe three kind of spyware
  • Adware
Is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up or other ads.
  • Browser hijackers
Change setting in your browser without your knowledge , often changing your browser’s home page and replacing it with another web page
  • Search hijackers
Intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run.
Stage 3
Knowledge in action
7.            Email and IM are ways of sending text messages back and forth to other people on the internet. They seem very similar : in both , you compose a message , and when it’s ready , you send it; and when someone else sends something to you, you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone, whereas email is more like corresponding by letter.
As you use email and IM during the course of the term, watch for differences between them. Which medium is more appropriate for which kinds of relationships and communications? Which medium is more stressful to use? Which takes more time? Which is more convenient for you? Which one is more useful for getting real work done? Which medium would you use if you knew that whatever you wrote was eventually going to be published in a book. If you were restricted to using only one of these communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think email is better for formal conditions and relationships such as from employers to employee.
I think email is stressful to use , because we need to write it in formal language, and it take more time to send an email rather than IM.
About which one is more convenient for me is depend on the conditions and to whom my message will be sent. If my message is for my friends , I may use IM ,but if it is for my boss, or my lecturer , I would rather use Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a book , and if I was restricted to using only one of these communications methods ,I would rather use email, because it s written in a formal language.
10. As we have discussed in this chapter, the internet is both goldmine and minefield. There are vast riches of information , entertainment, education, and communication to be found, but there are also snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should you do to avoid these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that everything in this world is not “FREE”. And to avoid spyware , adware , browser hijacker , and key logger is simple, be careful with “FREE download” , be sure to prepare your computer with antivirus , or antispyware before downloading.

Promote This Page!!

Website counter

Like This Page!