0% found this document useful (0 votes)
12 views12 pages

Technology in Action

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views12 pages

Technology in Action

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CHƯƠNG 1:

Part 1:Technology in Society


Technology in a Global Society
Objective 1.1 Describe various technological tools being used to impact national and global issues.
• Technology can be the means by which you find your voice in the world and impact others in meaningful ways.
• Social media is impacting elections and other issues worldwide.
• Crisis-mapping tools are an example of technology helping in different kinds of global conflicts and disasters.
Objective 1.2 Describe various global social issues that are being affected by technology.
• Global health care issues, like the spread of disease, require international cooperation and technological
solutions.
• Environmental issues are global in nature and will require technology to address.
• The digital divide, an uneven distribution of access to computer technology, will make it difficult for us to solve
global problems.
Technology Connects Us with Others
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
• Web 2.0 is a set of features and functionality that allows Internet users to contribute content easily and to be
easily connected to each other.
• Cognitive surplus is the combination of leisure time and access to tools to work on problems and be creative.
• New collaborative tools available on the Internet allow us to work together on projects with much larger groups.
• Crowdfunding is a method of people connecting through the Internet to fund projects by donation.
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and
services.
• Marketing is changing .because most consumers now shop with Internet access on their phones and can
therefore check competing prices and online reviews.
• The idea of ownership is changing because technology is allowing subscription services for products like cars
and bikes to be available for sharing. Such collaborative consumption means that we are joining together as a
group to use specific products more efficiently.
The Importance of Computer Literacy
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
• If you’re computer literate, you understand the capabilities and limitations of computers and know how to use
them wisely.
• By understanding how a computer is constructed and how its various parts function, you’ll be able to get the
most out of your computer.
• You’ll be able to avoid hackers, viruses, and Internet headaches; protect your privacy; and separate the real
risks of privacy and security from things you don’t have to worry about.
• You’ll also be better able to maintain, upgrade, and troubleshoot your computer; make good purchasing
decisions; and incorporate the latest technologies into your existing equipment.
• Being computer literate also enables you to understand the many ethical, legal, and societal implications of
technology today

Part 2: Emerging Technologies and Ethical Computing


Artificial Intelligence
Objective 1.6 Describe artificial intelligence systems and explain their main goals.
• Artificial intelligence (AI) focuses on creating computer systems that have an ability to perform tasks
associated with human intelligence.

• Machines using AI do not necessarily mimic the human thought process.


• Current AI research is focused in the following areas: natural language processing, perception, knowledge
representation, planning, problem solving, and learning (both supervised and unsupervised).
• A Turing test can be used to determine whether a system is a computer AI or a human being.
Working with Artificial Intelligence and Other Information Technologies
Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many
careers.
• Artificial intelligence impacts the full range of careers, from retail and psychology to robotics and medicine.
• Understanding how to use software, how to use and maintain computer hardware, and how to take advantage
of Internet resources will help you be a more productive and valuable employee, no matter which profession you
choose.
Ethical Computing
Objective 1.8 Define ethics and describe various ethical systems.
• Ethics is the study of moral choices.
• There are several different ethical systems. There is no universal agreement on which system is best.
• Unethical behavior is not necessarily unlawful behavior.
• Amoral behavior is when a person has no sense of right and wrong.
Objective 1.9 Describe influences on the development of your personal ethics.
• Personal ethics are a set of formal or informal ethical principles you use to make decisions in your life.
• Your personal ethics develop from a number of sources: your family values, your religion, the values of the
larger culture, and your life experiences.
Objective 1.10 Present examples of how technology creates ethical challenges.
• Technology is posing new ethical challenges with regard to intellectual property, privacy, social justice, liability,
censorship, social activism, and automated robotic machinery, among others concerns.

1. The crisis-mapping tool Ushahidi


a. prevents two-way dialog between people.

b. is only available in the United States.


c. shows that a free software product can have great value.

d. relies on people using their desktop computing power to help others.


2. Sophisticated modeling software is helping international researchers
a. create more intricate screenplays and movie scripts.
b. analyze computer systems to gather potential legal evidence.
c. market new types of products to a wider audience.
d. increase the pace of research in finding and producing vaccines.
3. Which of the following would not impact the digital divide?
a. A decline in the price of internet access

b. Less sharing of the work we produce


c. Expansion of free wifi connectivity in major cities

d. Legislation allowing communications companies to charge per website for access


4. Crowdfunding sites include
a. Citi Bike and Zipcar. b. Bing and Google.
c. Kickstarter and GoFundMe. d. Amazon and Kiva.
5. Bike-sharing programs like Citi Bike are an example of
a. principled psychology. b. crowdfunding.
c. crowdsourcing. d. a subscription-style business model made possible by technology.
6. Being computer literate includes being able to
a. avoid spam, adware, and spyware. b. use the web effectively.
c. diagnose and fix hardware and software problems. d. all of the above.
7. All of the following are current focuses of AI research EXCEPT
a. natural language processing. b. perception.
c. cognitive surplus. d. knowledge representation.
8. Which of the following statements is FALSE?
a. Unethical behavior is always illegal.
b. Ethical decisions are usually influenced by personal ethics.

c. Individuals who have no sense of right or wrong exhibit amoral behavior.


d. Life experience affects an individual’s personal ethics.
9. Which of the following actions would NOT help toidentify your personal ethics?
a. Describe yourself.
b. Conduct a genetic study of your extended family.
c. Identify the influences of your work environment.
d. Prepare a list of values that are most important to you.
10. Intellectual property
a. is the result of someone’s creative work and design.
b. can be protected legally by the patent system.
c. can include works of music, film, or engineering design.
d. all of the above.

_____T_____ 1. Intellectual property can be legally protected even though it is not a physical object.
_____T_____ 2. The move toward access instead of ownership is a sign of cognitive surplus.
_____F_____ 3. Artificial intelligence systems think exactly like human beings do.
_____F_____ 4. Web-based databases cannot be used to help investigators solve criminal cases.
_____T_____ 5. Hacktivism is different from cyberterrorism.
CHƯƠNG 2:
Part 1: Understanding Digital Components
Understanding Your Computer
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and
information.
• The computer’s four major functions are: (1) input: gather data or allow users to enter data; (2) process:
manipulate, calculate, or organize that data; (3) output: display data and information in a form suitable for the
user; and (4) storage: save data and information for later use.
• Data is a representation of a fact or idea. The number 3 and the words televisions and Sony are pieces of data.
• Information is data that has been organized or presented in a meaningful fashion. An inventory list that
indicates that 3 Sony televisions are in stock is processed information. It allows a retail clerk to answer a
customer query about the availability of
merchandise. Information is more powerful than raw data.
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
• To process data into information, computers need to work in a language they understand. This language, called
binary language, consists of two numbers: 0 and 1. Each 0 and each 1 is a binary digit or bit. Eight bits comprise
one byte.
• In computers, each letter of the alphabet, each number, and each special character consists of a unique
combination of eight bits (one byte)—a string of eight 0s and 1s.
• For describing large amounts of storage capacity, the terms megabyte (approximately 1 million bytes),
gigabyte (approximately 1 billion bytes), terabyte (approximately 1 trillion bytes), and petabyte (1,000 terabytes)
are used.
Objective 2.3 List common types of computers, and discuss their main features.
• A tablet computer is a portable computer integrated into a flat multitouch-sensitive screen.
• A laptop or notebook computer is a portable computer that has a keyboard, monitor, and other devices
integrated into a single compact case.
• A 2-in-1 PC is a laptop computer that can convert into a tablet-like device.
• An ultrabook is a lightweight laptop computer featuring low-power processors and solid-state drives.
• Chromebook computers use the Google Chrome OS. Documents and apps are stored primarily in the cloud.
• Desktop computers consist of a separate case (called the system unit) that houses the main components of the
computer plus peripheral devices.
Input Devices
Objective 2.4 Identify the main types of keyboards and touch screens.
• You use physical or virtual keyboards to enter typed data and commands. Most keyboards use the QWERTY
layout.
• Touch screens are display screens that respond to commands initiated by a touch with a finger or a stylus.
• Wireless keyboards mainly use Bluetooth connectivity and provide alternatives to virtual keyboards on portable
computing devices.
Objective 2.5 Describe the main types of mice and pointing devices.
• Mice are used to enter user responses and commands.
• Optical mice use a laser to detect mouse movement.
• Some mice can be adjusted to provide better ergonomics for users.
• Laptops have integrated pointing devices called touch pads (trackpads)

Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
• Images are input into the computer with flatbed scanners, digital cameras, camcorders, and mobile device
cameras.
• Live video is captured with webcams and digital video recorders.
• Microphones capture sounds. There are many different types of microphones, including desktop, headset, and
clip-on models.
• Smartphones and tablets have a variety of sensors that detect or measure a variety of inputs (such as
acceleration that the device is experiencing).
Output Devices
Objective 2.7 Describe options for outputting images and audio from computing devices.
• Monitors display soft copies of text, graphics, and video.
• Liquid crystal display (LCD) and light-emitting diode (LED) screens are the most common types of computer
monitors.
• OLED displays use organic compounds to produce light and don’t require a backlight, which saves energy.
• Aspect ratio and screen resolution are key aspects to consider when choosing a monitor.
• Speakers, headphones, and earbuds are the output devices for sound.
• More sophisticated systems include subwoofers and surround sound.
Objective 2.8 Describe various types of printers, and explain when you would use them.
• Printers create hard copies of text and graphics.
• There are two primary categories of printers: inkjetand laser. Laser printers usually print faster and deliver
higher-quality output than inkjet printers. However, inkjet printers can be more economical for casual printing
needs.
• Specialty printers are also available, such as all-inone printers, large format printers, and 3D printers.
• When choosing a printer, you should be aware of factors such as speed, resolution, color output, and cost of
consumables.

Part 2: Processing, Storage, and Connectivity


Processing and Memory on the Motherboard
Objective 2.9 Describe the functions of the motherboard and RAM.
• The motherboard, the main circuit board of the system, contains a computer’s CPU, which coordinates the
functions of all other devices on the computer.
• The motherboard also houses slots for expansion cards, which have specific functions that augment the
computer’s basic functions. Typical expansion cards are sound and video cards. In portable devices, sound and
video are usually integrated directly into the motherboard.
• RAM, the computer’s volatile memory, is also located on the motherboard. RAM is where data and instructions
are held while the computer is running.
Objective 2.10 Explain the main functions of the CPU.
• The CPU controls all the functions performed by the computer’s other components. The CPU also processes all
commands issued to it by software instructions.

• The performance of a CPU is mainly affected by the speed of the processor (measured in GHz) and the number
of processing cores.

Storing Data and Information


Objective 2.11 Describe the various means of storing data and information with computing devices.
• The internal hard drive is your computer’s primary device for permanent storage of software and files. The hard
drive is a nonvolatile storage device, meaning it holds the data and instructions your computer needs
permanently, even after the computer is turned off.
• SSD drives have no moving parts so they are more energy efficient and less susceptible to damage.
• External hard drives are essentially internal hard drives that have been made portable by enclosing them in a
protective case and making them small and lightweight.
• Cloud storage refers to nonvolatile storage locations that are maintained on the Internet (in the “cloud”).
Examples are OneDrive, Google Drive, and Dropbox.
• Storing your data in the cloud allows you to access it from almost any computing device that is connected to
the Internet.
• Flash drives are another portable means of storing data. Flash drives plug into USB ports.
• Flash memory cards let you transfer digital data between your computer and devices such as digital cameras,
smartphones, video cameras, and printers.
Connecting Peripherals to the Computer
Objective 2.12 Describe common types of ports used today.
• The fastest type of port used to connect devices to a computer is the Thunderbolt port.
• The most common type of port used to connect devices to a computer is the USB port.
• Connectivity ports, such as Ethernet ports, give you access to networks and the Internet.
• HDMI ports are the most common multimedia port. They are used to connect monitors, TVs, and gaming
consoles to computing devices and handle both audio and video data.
• Audio ports are used to connect headphones, microphones, and speakers to computing devices.
Power Management and Ergonomics
Objective 2.13 Describe how to manage power consumption on computing devices.
• Turning off your computer when you won’t be using it for long periods of time saves energy. In Windows, you
can turn your computer off by accessing the Power option on the Start menu, then selecting Shut down.
• If you are not using your computer for short periods of time, selecting the Sleep option will help your computer
save energy but allows it to be quickly “awakened” for use.
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
• Ergonomics refers to how you arrange your computer and equipment to minimize your risk of injury or
discomfort.
• Achieving proper ergonomics includes positioning your monitor correctly, buying an adjustable chair, assuming
a proper position while typing, making sure the lighting is adequate, and not looking at the screen for long
periods. Other good practices include
taking frequent breaks and using specially designed equipment such as ergonomic keyboards.
• Ergonomics is also important to consider when using mobile devices.

1. Which of the following functions of a computer is mostly responsible for turning data into information?
a. output b. storage
c. input d. processing
2. In a computer, each __________ can represent either a 0 or a 1.
a. byte b. bit
c. integrated circuit d. megabyte
3. A(n) __________ is a laptop computer that can convert into a tablet-like device.
a. 2-in-1 PC b. Chromebook
c. ultraboo d. all-in-one PC
4. Touch-screen devices usually feature __________ keyboards.
a. physical b. laser-projection
c. virtual d. optical
5. Which of the following is a sensor found in certain smartphones?
a. RAM b. accelerometer
c. HDMI d. hygrometer
6. Ergonomics is an important consideration
a. for all computing devices. b. only for laptop computers.
c. only for laptop and desktop computers, but never for mobile devices. d. only for desktop computers.
7. The most common output device for hard output is a
a. printer. b. scanner.
c. speaker. d. display screen.
8. __________ printers work by spraying tiny drops of ink onto paper.
a. Inkjet b. Cloud-ready
c. Laser d. Large format
9. The most common computer port is the __________ port.
a. USB b. expansion
c. Thunderbolt d. Wi-Fi
10. Which component of a computing device drains the battery the fastest?
a. hard drive b. display screen
c. Wi-Fi adapter d. Bluetooth adapter

____T___1. Data and information are interchangeable terms.


____F___2. RAM is non-volatile storage.
____F___3. SSD drives are superior to conventional disk drives because they have no moving parts.
____F___4. A touch pad is a pointing device usually found in tablets.
____T___5. The “brain” of the computer is the CPU.

CHƯƠNG 3:
Part 1: Collaborating and Working on the Web
Objective 3.1 Describe how the Internet got its start.
• The Internet is the largest computer network in the world, connecting millions of computers.
• Government and military officials developed the early Internet as a reliable way to communicate in the event of
war. Eventually, scientists and educators used the Internet to exchange research.
• Today, we use the Internet and the web (which is a part of the Internet) to shop, research, communicate, and
entertain ourselves.
Objective 3.2 Explain how data travels on the Internet.
• A computer (or other device) connected to the Internet acts as either a client (a computer that asks for
information) or a server (a computer that receives the request and returns the information to the client).
• Data travels between clients and servers along a system of communication lines or pathways. The largest and
fastest of these pathways form the Internet backbone.
• To ensure that data is sent to the correct computer along the pathways, IP addresses (unique ID numbers) are
assigned to all computers connected to the Internet.
Collaborating and Communicating on the Web
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
• Collaboration on the web uses technologies broadly described as Web 2.0. Web 2.0 communication tools are
known as social media and include social networking, project collaboration and file sharing tools, blogs, podcasts,
webcasts, and media sharing.
• Social networking enables you to communicate and share information with friends as well as meet and connect
with others.
• File sharing tools, such as web-based document products, promote online collaboration. A wiki is a document
created collaboratively by multiple users, resulting in an emergent common output.
• Project management tools incorporate texting, tasks, and calendar features for individual team members as
well as for the project.
• Other useful web tools for group collaboration online are screen sharing and videoconferencing applications.
• Blogs are journal entries posted to the web that are generally organized by a topic or area of interest and are
publicly available.
• Video logs are personal journals that use video as the primary content in addition to text, images, and audio.
• Podcasts are audio or video content available over the Internet. Users subscribe to receive updates to podcasts.
• Webcasts are live broadcasts of audio or video content over the Internet.
• Media sharing platforms enable users to create, store, and share multimedia.
Objective 3.4 Summarize the technologies used to communicate over the web.
• E-mail allows users to communicate electronically without the parties involved being available at the same
time.
• Instant-messaging services are programs that enable you to communicate in real time with others who are
online.
Conducting Business on the Web
Objective 3.5 Describe how business is conducted using the Internet.
• E-commerce is the business of conducting business online.
• E-commerce includes transactions between businesses (B2B), between consumers (C2C), and between
businesses and consumers (B2C).
Objective 3.6 Summarize precautions you should take when doing business online.
• Precautions include using firewalls and up-to-date antivirus software and employing strong passwords for online
accounts.
• Check to see if the website is secure, shop at reputable websites, pay by credit card not debit card, check the
return policy and save a copy of the receipt, and avoid making online transactions on public computers

Part 2: Using the Web Effectively


Accessing and Moving Around the Web
Objective 3.7 Explain what web browsers are and describe their common features.
• Once you are connected to the Internet, in order to locate, navigate to, and view web pages, you need software
called a web browser.
• The most common web browsers are Google Chrome, Microsoft Edge, Firefox, and Safari.
Objective 3.8 Explain what a URL is and discuss its main parts.
• You gain access to a website by typing in its address, called a Uniform Resource Locator (URL).
• A URL is composed of several parts, including the protocol, the domain, the top-level domain, and paths (or
subdirectories).
Objective 3.9 Describe tools used to navigate the web.
• One unique aspect of the web is that you can jump from place to place by clicking on specially formatted
pieces of text or images called hyperlinks.
• You can also use the Back and Forward buttons, History lists, and breadcrumb trails to navigate the web.
• Favorites, live bookmarks, and social bookmarking help you return to specific web pages without having to type
in the URL and help you organize the web content that is most important to you.
Searching the Web Effectively
Objective 3.10 Describe the types of tools used to search the web and summarize strategies used to refine
search results.
• A search engine is a set of programs that searches the web using specific keywords you wish to query and then
returns a list of the websites on which those keywords are found.
• Search engines can be used to search for images, podcasts, and videos in addition to traditional textbased web
content.
• Metasearch engines search other search engines.
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
• To evaluate whether it is appropriate to use a website as a resource, determine whether the author of the site is
reputable, whether the site is intended for your particular needs, that the site content is not biased, that the
information on the site is current, and that all the links on the site are available and appropriate.
• Use reverse image search to check whether an image has been falsified through alterations or tampering.
Using the Web Ethically
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
• Digital activism describes the use of hashtags and posts to raise awareness and foster discussion about specific
issues and causes on social media.
• Digital activism can be useful to raise awareness and enable people to voice their opinions.
• Digital activist causes can become popular more often because of the immediate fervor rather than the
underlying cause.
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and
devices.
• Privacy is the right to be left alone, but it is often difficult to achieve with social media.
• Apps with geolocation technology garner much information about your location. Users should be aware of why
companies need to track a user’s location, and what the companies will do with that location data.

1. Which statement is not true about the web?


a. The web was based on a protocol developed by Tim Berners-Lee.
b. Special links are used to navigate from page to page on the web
c. The web is based on the WWW protocol
d. The web is a subset of the Internet
2. Which of the following describes an IP address?
a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet.
c. It identifies a website. d. all of the above
3. Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type
of Internet commerce?
a. B2B b. C2C
c. social commerce d. mobile commerce
4. What web browser feature would be particularly useful when using public computers?
a. pinned tabs b. privacy browsing
c. session restore d. all of the above
5. In the URL http://www.whitehouse.gov/blog, which part is considered the top-level domain name?
a. .gov b. www.whitehouse.gov
c. http d. /blog
6. Which of the following is not a component of a search engine?
a. spider b. indexer program
c. search assistant d. search engine software
7. Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time,
or Usage rights?
a. Search Tools b. Custom Search
c. Favorites d. History
8. Ensuring that website content is not slanted in its point of view is checking for:
a. Audience b. Authority
c. Bias d. Relevance
9. Which of the following is a good precaution to take when making online purchases?
a. use the same strong password for all online accounts
b. pay by debit card
c. make sure http: and an open padlock displays in the address bar
d. use a private browser when purchasing items from a public computer
10. You want to search the web for information on the movie Captain America: Civil War. What
would be the best way to enter the key terms to get the most specific results?
a. Captain America * b. “Captain America: Civil War”
c. * Civil War d. Captain America Civil War

__________1. Your location can be captured from your mobile device even if app location tracking is turned off.
__________2. Podcasts can only be created by professional organizations.
__________3.The “S” in HTTPS stands for secure and indicates that the secure sockets layer protocol has been
applied to the
website.
__________4. Catfishing is posting inflammatory remarks online to generate negative responses.
__________5. Google Docs is an example of a wiki.
CHƯƠNG 4:

Part 1: Accessing, Using, and Managing Software


Software Basics
Objective 4.1 Compare application software and system software.
• The term software refers to a set of instructions that tells the computer what to do.
• Application software is the software you use to do everyday tasks at home, school, and work. Microsoft Word
and the Edge browser are examples of application software.
• System software is the software that helps run the computer and coordinates instructions between application
software and the computer’s hardware devices. System software includes the operating system and utility
programs.
Objective 4.2 Explain the differences between commercial software and open source software and describe
models for software distribution.
• There are two basic types of software that you can install on your computer:
Ɔ Proprietary (or commercial) software is software you buy.
Ɔ Open source software is program code that is free and publicly available with few licensing and copyright
restrictions. The code can be copied, distributed, or changed without the stringent copyright protections of
software products you purchase
• Software is delivered in three main ways:
Ɔ Local installation means that software is installed on your computing device. These programs generally do
not require an Internet connection to function.
Ɔ SaaS (Software as a Service) is a model for delivery of software whereby the vendor hosts the software online
and you access and use the software over the Internet without having to install it on your computer’s hard drive.
Ɔ Subscription is a model whereby the user pays a fee to use the software. The software is downloaded and
installed locally but is routinely updated by connection to the manufacturer’s server.
Managing Your Software
Objective 4.3 Explain the different options for purchasing software.
• Although most software today is downloaded from the web, it can also be purchased at retail stores or directly
from software developers.
• Freeware is copyrighted software that you can use for free.
• Beta software comprises apps that are still under development but are released to the public to gather
feedback on design features and errors.
Objective 4.4 Describe how to install and uninstall software.
• When installing software, you’re often given the choice between a full (typical) or custom installation. Before
installing any software, it’s important that you back up your system as well as create a restore point.
• When uninstalling software, it’s best to use the uninstall feature that comes with the operating system. To
uninstall an app in Windows 10, on the Start menu, right-click the app and select Uninstall.
Objective 4.5 Explain the considerations around the decision to upgrade your software.
• Before installing software on your computer, ensure that your system setup meets the system requirements.
System requirements specify the minimum recommended standards for the operating system, processor,
primary memory (RAM), and hard drive capacity.
Objective 4.6 Explain how software licenses function.
• A software license, also known as an End User License Agreement (EULA), is an agreement between you, the
user, and the software company that owns the software.
• When you purchase software, you’re actually purchasing the license to use it and therefore must abide by the
terms of the licensing agreement you accept when installing the program.
• Software licenses permit installation on a specific number of devices.

Part 2: Application Software


Productivity and Business Software
Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses
and features.
• Productivity software programs include the following:
Ɔ Word processing: to create and edit written document
Ɔ Spreadsheet: to do calculations and numerical and what-if analyses easily
Ɔ Presentation: to create slide presentations
Ɔ Database: to store and organize data
Ɔ Note-taking: to take notes and easily organize and search them
Ɔ Personal information manager (PIM): to keep you organized by putting a calendar, address book, notepad,
and to-do lists within your computer
• Financial planning software helps you manage your daily finances. Examples include Quicken and Mint.
• Tax preparation software, such as Intuit TurboTax and H&R Block Tax Software, lets you prepare your state and
federal taxes on your own instead of hiring a .
Objective 4.8 Summarize the types of software that large and small businesses use.
• Accounting software helps small business owners manage their finances more efficiently by providing tools for
tracking accounts receivable and accounts payable.
• Desktop publishing (DTP) software is used to create newsletters, catalogs, annual reports, or other large,
complicated publications.
• Web authoring software allows even novices to design interesting and interactive web pages without knowing
any HTML code.
• There are also specialized programs for project management software, customer relationship management
(CRM), enterprise resource planning (ERP), e-commerce, marketing and sales, finance, point of sale, security,
networking, data management, and human resources, to name just a few.
Multimedia and Educational Software
Objective 4.9 Describe the uses and features of digital multimedia software.
• Image-editing desktop software includes tools for basic modifications to digital photos, such as removing red
eye; modifying contrast, sharpness, and color casts; or removing scratches or rips from scanned images of old
photos.
• Digital video-editing software is used to apply special effects, change the sequence of scenes, or combine
separate video clips into one movie.
• Drawing (or illustration) software facilitates the creation and editing of 2-D, line-based drawings. It is used for
the creation of technical diagrams and original non-photographic drawings.
Objective 4.10 Describe the uses and features of digital audio software.
• Digital audio workstation software (DAWs) lets you create individual tracks to build songs or soundtracks with
virtual instruments, voice recorders, synthesizers, and special audio effects, that will end up as uncompressed
MIDI files.
• Audio-editing software includes tools that make editing audio files as easy as editing text files.
Objective 4.11 Describe the features of app creation software.
• App creation software provides professionals and novices alike with the ability to create their own apps.
• Although used widely in game development, app creation software can be used to create many other types of
apps that have business applications.

Objective 4.12 Categorize education and reference software and explain their features.
• Test preparation software is designed to improve your performance on standardized tests.
• Simulation software allows you to experience or control the software as if it were an actual event. Often this
allows you to experience dangerous situations safely.
• Course management software creates a virtual learning experience for students and houses course materials,
tests, and discussion boards.

1. Software that is hosted by the vendor and accessed online is called


a. application software. b. productivity software.
c. Software as a Service (SaaS). d. open source software.
2. LibreOffice is an example of which type of software?
a. freeware b. open source software
c. beta software d. Software as a Service (SaaS)
3. Beta software is made available because
a. new programmers have been hired. b. wireless networking must be added.
c. a company is making an early release to test bugs. d. the company needs more profits.
4. When you install all the most commonly used files and programs to your computer’s hard drive,
you have completed which kind of software installation?
a. custom b. full
c. complete d. common
5. The minimum recommended standards for the operating system, processor, primary memory
(RAM), and storage capacity for certain software are called
a. redistributing standards. b. system requirements.
c. hardware. d. minimum standards
6. Ginny downloads and modifies an open source software program, then uploads the program with
a different name. Which type of software license is she most likely to be working under?
a. Copyleft b. GNU General Public License
c. Open Source License d. No licence is necessary
7. Calendars, tasks, and e-mail can be found in which application?
a. Excel b. Outlook
c. OneNote d. Access
8. Which of the following is an example of financial management software?
a. Lumosity b. AudioAcrobat
c. Photos d. Quicken
9. Image-editing software allows you to
a. compute complex formulas. b. remove red eye.
c. create drafting blueprints. d. conduct product simulations.
10. Digital audio software can be used to
a. compute complex formulas. b. compose songs or soundtracks with virtual instruments.
c. create drafting blueprints. d. perform mathematical simulations

____T_______1. Google Docs is an example of Software as a Service.


_____F______2. App creation software includes tools like Adobe Photoshop.
_____T______3. Course management software creates a virtual learning experience for students and houses
course materials, tests,
and discussion boards.
______F_____4. When you subscribe to software, no license is necessary.
______F_____5. A macro is a program released early to the public for testing and evaluation.

CHƯƠNG 5:
Part 1
Understanding System Software
Operating System Fundamentals
Objective 5.1 Discuss the functions of the operating system.
• System software is the set of software programs that helps run the computer and coordinates instructions
between application software and hardware devices. It consists of the operating system (OS) and utility
programs.
• The OS controls how your computer system functions. It manages the computer’s hardware, provides a means
for application software to work with the CPU, and is responsible for the management, scheduling, and
coordination of tasks.
• Utility programs perform general housekeeping tasks for the computer, such as system maintenance and file
compression.
• Modern operating systems allow for multitasking— performing more than one process at a time.
Objective 5.2 Explain the most popular operating systems for personal use.
• Microsoft Windows is the most popular OS. The most recent release is Windows 10. macOS is designed to work
on Apple computers, and Linux is an open source OS based on UNIX and designed primarily for use on personal
computers.
• Some operating systems allow interaction with touch-screen interfaces. All personal use operating systems
incorporate elements to share and store files on the Internet.
• An OS is designed to run on specific CPUs. Application software is OS dependent.
• Smartphones and tablets have their own specific mobile operating systems, which allow the user to multitask.
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
• Real-time operating systems (RTOSs) require no user intervention.
• A multiuser operating system (network operating system) provides access to a computer system by more than
one user at a time.
• UNIX is a multiuser, multitasking OS that is used as a network OS, though it can be used on PCs.
• Mainframes and supercomputers are specialty computers that require mainframe operating systems.
What the Operating System Does
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
• The OS provides a user interface that enables users to interact with the computer.
• Most OSs today use a graphical user interface (GUI). Common features of GUIs include windows, menus, and
icons.
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
storage, and peripheral devices.
• When the OS allows you to perform more than one task at a time, it is multitasking. To provide for seamless
multitasking, the OS controls the timing of the events on which the processor works.
• As the OS coordinates the activities of the processor, it uses RAM as a temporary storage area for instructions
and data the processor needs. The OS coordinates the space allocations in RAM to ensure that there is enough
space for the waiting instructions and data. If there isn’t sufficient space in RAM for all the data and instructions,
then the OS allocates the least necessary files to temporary storage on the hard drive, called virtual memory

• The OS manages storage by providing a file management system that keeps track of the names and locations
of files and programs.
• Programs called device drivers facilitate communication between devices attached to the computer and the
OS.
Objective 5.6 Explain how the operating system interacts with application software.
• All software applications need to interact with the CPU. For programs to work with the CPU, they must contain
code that the CPU recognizes.
• Rather than having the same blocks of code appear in each application, the OS includes the blocks of code to
which software applications refer. These blocks of code are called application programming interfaces (APIs).
Starting Your Computer
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the
boot process are handled.
• When you start your computer, it runs through a special process called the boot process.
• The boot process consists of four basic steps: (1) The basic input/output system (BIOS) is activated when the
user powers on the CPU. (2) In the POST check, the BIOS verifies that all attached devices are in place. (3) The
OS is loaded into RAM. (4) Configuration and customization settings are checked.
• An authentication process occurs at the end of the boot process to ensure an authorized user is entering the
system.
• Sometimes errors occur in the boot process. Try rebooting the computer or resetting the computer if the
problem persists.

Part 2
Using System Software
The Windows Interface
Objective 5.8 Describe the main features of the Windows interface.
• In Windows 10, the Start menu provides access to your computer’s apps, tools, and commonly used programs,
and the desktop is the main working area.
• You can customize the Start menu by pinning and resizing tiles and organizing tiles into groups.
• Virtual desktops are used to organize open programs into different working areas.
File Management
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files
and
folders.
• Files and folders are organized in a hierarchical directory structure composed of drives, libraries, folders,
subfolders, and files.
• The C: drive represents the hard drive and is where most programs and files are stored.
• File Explorer is the main tool for finding, viewing, and managing the contents of your computer.
• File Explorer helps you manage your files and folders by showing the location and contents of every drive,
folder, and file on your computer.
• There are specific rules to follow when naming files.
• The Recycle Bin is the temporary storage location for deleted files from the hard drive.
• File compression reduces the size of a file by temporarily storing components of a file, and then when the file is
extracted (uncompressed) the removed components are brought back into the file.
Utility Programs
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
• Task Manager is used to exit nonresponsive programs.
• Disk Cleanup removes unnecessary files from your hard drive. If not deleted periodically, these unnecessary
files can slow down your computer.
• Disk defragmentation utilities rearrange fragmented data so that related file pieces are unified. When a disk is
fragmented, it can slow down your computer.
• File History automatically creates a duplicate of your hard drive (or parts of your hard drive) and copies it to
another storage device, such as an external hard drive. You can use File History to recover deleted or corrupted
files.
• System Restore lets you roll your system settings back to a specific date (restore point) when everything was
working properly.
• Windows Ease of Access settings include tools that help adjust computer settings for those users with
disabilities.
1. Which of the following would you NOT see on a Windows 10 Start menu?
a. Task View b. Power
c. apps list d. tiles
2. When an OS processes tasks in a priority order, it is known as
a. preemptive interrupting. b. interruptive multitasking.
c. multitasking handling. d. preemptive multitasking.
3. An example of an open source OS is
a. Linux. b. macOS.
c. Windows. d. DOS.
4. Which of the following is not considered an accessibility utility?
a. Magnifier b. System Restore
c. Narrator d. Speech Recognition
5. Which of the following devices would use a real-time operating system?
a. iPhone b. Roomba Vacuum
c. Microsoft Surface tablet d. all of the above
6. Device drivers are
a. are no longer used because of Plug and Play. b. often bundled with the operating system.
c. always installed from a CD. d. mapping programs to generate driving instructions.
7. A GUI user interface is special because
a. it uses a very small set of commands. b. the menus are organized well.
c. there is a set of icons that represent the OS tasks. d. it uses voice commands to run tasks.
8. A feature in Windows 10 that is used to organize open windows into task-specific groups is called
a. Program Manager. b. Virtual View.
c. Snap Assist. d. Virtual Desktops.
9. When a printer receives a command, it generates a unique signal to the OS, which is called a(n)
a. interrupt. b. event.
c. slice. d. none of the above.
10. The C: drive on a Windows PC is like a large filing cabinet and is referred to as the
a. main directory. b. root directory.
c. library directory. d. main path.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy