True/False
1. T
2. T
3. F
4. F
5. F
6. T
7. F
8. F
9. T
10.T
11.F
Multiple Choice
1. A) Extreme Project Management
2. B) PERT Chart
3. C) Project Request
4. A) Mandated by Management Or Some Other Governing Body
5. C) Decision Table
6. D) System Proposal
7. A) Computer-Aided Software Engineering (CASE)
8. D) Acceptance
Matching
1. H
2. E
3. A
4. B
5. I
6. G
7. F
8. J
9. C
10.D
Short Answer
1. (620) Set of activities used to build an information system.
-> Planning
@ Review project requests
@ Prioritize project requests
@ Allocate resources
@ Form project development team
-> Analysis
@ Conduct preliminary investigation
@ Perform detailed analysis activities;
* Study current system
* Determine user requirements
* Determine solution
-> Design
@ Acquire hardware and software, if necessary
@ Develop details of system
-> Implementation
@ Develop programs, if necessary
@ Install and test new system
@ Train users
@ Convert to new system
-> Operation, Support, and Security
@ Perform maintenance activities
@ Monitor system performance
@ Assess system security
2. (624) -> Operational Feasibility
-> Schedule Feasibility
-> Technical Feasibility
-> Economic Feasibility
@ Review Documentation
@ Observe
@ Survey
@ Interview
@ JAD Sessions
@ Research
3. UML is a graphical tool that enables analysts to document a system. It consist of many irrelevant diagrams.
-> Case diagram graphically shows how user interact with the information system.
-> Class diagram graphically show classes and subclasses in a system.
4.(645) -> Perform maintenance activities
-> Monitor system performance
-> Assess system security
@ Corrective Maintenance
Process of diagnosing and correcting errors in an information system.
@ Adaptive Maintenance
Process of including new features or capability in an information system. To perform adaptive maintenance, the analyst returns tot he planning phase.
@ Perfective Maintenance
Make the information system more reliable and efficient if the system is determined to be inefficient or unstable at any point.
5. Computer security plan is writing all of the safeguards that are in place to protect an organization's information assets.
@ Identify all information assets of an organization including hardware, software, documentation, procedures, people, data, facilities, and supplies.
@ Identify all security risks that may cause an information asset loss.
@ For each risk, identify the safeguard that exist to detect, prevent, and recover from a loss.
2013-01-10
Answer to Chapter 11
True/False
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. T
10.T
11.T
12.F
Multiple Choice
1. B) Rootkit
2. D) All of The Above
3. A) Denial of Service Attack
4. C) Digital Forensics
5. C) Hardware Theft
6. D) Encryption Key
7. D) Power Usage Effectiveness (PUE)
8. C) Social Engineering
Matching
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10.F
Short Answer
1. Antivirus scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.
-> Virus hoax is an email message that warns users of nonexistent virus or other malware.
2. Encourages manufacturers to create energy-efficient devices that required little power when they are not in use.
-> Do not store it, recycle and refurbish it.
3. The right of individuals and companies to deny or restrict the collection and use of information about them.
-> Fill in only necessary information on rebate, warranty and registration forms.
-> Have an unlisted or unpublished telephone number.
-> Do not write your telephone number on charge or credit receipts.
-> Avoid shopping club and buyer cards.
-> Purchase goods with cash, rather then credit or checks.
4. -> Dont click web site link in an e-mail message; instead, retype the web address in your browser.
-> Install phishing filter.
Click-jacking tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages
5. Many businesses use content filtering to limit employees' web access.
ICRA created a content description system which allowed webmasters and digital content creators to self-label their content in categories such as nudity, sex, language (vulgar terms etc.), violence, other potentially undesired material and online interactivity such as social networking and chat. There are context variables such as art, medicine and news—for example, a piece of content or site can be described as having depictions of nudes, but they are in an artistic context. A key point is that ICRA does not rate internet content, nor do they make value judgements about sites – the content providers self-label, and then parents and other concerned adults make a decision as to what is or is not appropriate for themselves or their children.
The labelling was done using a web-based questionnaire. The content creators checked which of the elements in the questionnaire are present or absent from their Web sites, and a small file is automatically generated using the RDF format, which is then linked to the content on one or more domains. Formerly, the system was based on PICS.
Users, especially parents of young children, could then use content filtering software to allow or disallow various types of content. One such application, ICRAplus, was maintained by ICRA itself. ICRA also had a validator which tested all versions of ICRA and old RSACi labels.
The descriptive vocabulary was drawn up by an international panel and designed to be as neutral and objective as possible. It was revised in 2005 to enable easier application to a wide range of digital content, not just websites.
The ICRA also intended to launch a service to verify the accuracy of ICRA labels and to provide this information to third-party tools and services, such as search engines.
Alternative labelling projects include Quatro, an EU-funded project which integrates content labels with quality and trust marks, and its successor, QuatroPlus.
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. T
10.T
11.T
12.F
Multiple Choice
1. B) Rootkit
2. D) All of The Above
3. A) Denial of Service Attack
4. C) Digital Forensics
5. C) Hardware Theft
6. D) Encryption Key
7. D) Power Usage Effectiveness (PUE)
8. C) Social Engineering
Matching
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10.F
Short Answer
1. Antivirus scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.
-> Virus hoax is an email message that warns users of nonexistent virus or other malware.
2. Encourages manufacturers to create energy-efficient devices that required little power when they are not in use.
-> Do not store it, recycle and refurbish it.
3. The right of individuals and companies to deny or restrict the collection and use of information about them.
-> Fill in only necessary information on rebate, warranty and registration forms.
-> Have an unlisted or unpublished telephone number.
-> Do not write your telephone number on charge or credit receipts.
-> Avoid shopping club and buyer cards.
-> Purchase goods with cash, rather then credit or checks.
4. -> Dont click web site link in an e-mail message; instead, retype the web address in your browser.
-> Install phishing filter.
Click-jacking tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages
5. Many businesses use content filtering to limit employees' web access.
ICRA created a content description system which allowed webmasters and digital content creators to self-label their content in categories such as nudity, sex, language (vulgar terms etc.), violence, other potentially undesired material and online interactivity such as social networking and chat. There are context variables such as art, medicine and news—for example, a piece of content or site can be described as having depictions of nudes, but they are in an artistic context. A key point is that ICRA does not rate internet content, nor do they make value judgements about sites – the content providers self-label, and then parents and other concerned adults make a decision as to what is or is not appropriate for themselves or their children.
The labelling was done using a web-based questionnaire. The content creators checked which of the elements in the questionnaire are present or absent from their Web sites, and a small file is automatically generated using the RDF format, which is then linked to the content on one or more domains. Formerly, the system was based on PICS.
Users, especially parents of young children, could then use content filtering software to allow or disallow various types of content. One such application, ICRAplus, was maintained by ICRA itself. ICRA also had a validator which tested all versions of ICRA and old RSACi labels.
The descriptive vocabulary was drawn up by an international panel and designed to be as neutral and objective as possible. It was revised in 2005 to enable easier application to a wide range of digital content, not just websites.
The ICRA also intended to launch a service to verify the accuracy of ICRA labels and to provide this information to third-party tools and services, such as search engines.
Alternative labelling projects include Quatro, an EU-funded project which integrates content labels with quality and trust marks, and its successor, QuatroPlus.
2013-01-09
Answer to Chapter 10
True/False
1. T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10.T
Multiple Choice
1. B) Timely
2. A) Composite Key
3. D) File Maintenance
4. B) Determines Whether A Number Is Within A Specified Range
5. A) Less Complexity
6. B) Data Dictionary
7. B) Principle of Highest Access
8. A) Decides on The Proper Placement of Fields
Matching
1. E
2. G
3. C
4. B
5. J
6. A
7. I
8. D
9. H
10.F
Short Answer
1. The process of checking that a software system meets specifications and that it fulfills its intended purpose.
-> ALpha/Numeric Check
-> Range Check
-> Consistency Check
-> Completeness Check
-> Check Digit
2. It cause same fields to be stored in multiple files, which is a waste of storage space and people's time, and also increase the chance of errors.
-> Difficult to be accessed.
3. Approach whereby a pool of related data is shared by multiple application programs; offers significant advantages over traditional file-based approach.
(page 525-526)
-> Reduce Data Redundancy
-> Improve Data Integrity
-> Shared Data
-> Easier Access
-> Reduce Development Time
4. Guide for user to creating a query step by step.
-> Database query language for relational database.
5. Store more type of data, access this data faster, allow programmers to reuse objects, stores unstructured data more efficiently than a relational database.
-> Multimedia database
Stored image, audio clips, and/or video clips.
-> Groupware database
Stores document such as schedules, calendars, manuals, memos, and reports.
-> Computer-aided design (CAD)
Stores data abour engineering, architectural, and scientific designs.
-> Hypertect database
Contains links to other types of documents
1. T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10.T
Multiple Choice
1. B) Timely
2. A) Composite Key
3. D) File Maintenance
4. B) Determines Whether A Number Is Within A Specified Range
5. A) Less Complexity
6. B) Data Dictionary
7. B) Principle of Highest Access
8. A) Decides on The Proper Placement of Fields
Matching
1. E
2. G
3. C
4. B
5. J
6. A
7. I
8. D
9. H
10.F
Short Answer
1. The process of checking that a software system meets specifications and that it fulfills its intended purpose.
-> ALpha/Numeric Check
-> Range Check
-> Consistency Check
-> Completeness Check
-> Check Digit
2. It cause same fields to be stored in multiple files, which is a waste of storage space and people's time, and also increase the chance of errors.
-> Difficult to be accessed.
3. Approach whereby a pool of related data is shared by multiple application programs; offers significant advantages over traditional file-based approach.
(page 525-526)
-> Reduce Data Redundancy
-> Improve Data Integrity
-> Shared Data
-> Easier Access
-> Reduce Development Time
4. Guide for user to creating a query step by step.
-> Database query language for relational database.
5. Store more type of data, access this data faster, allow programmers to reuse objects, stores unstructured data more efficiently than a relational database.
-> Multimedia database
Stored image, audio clips, and/or video clips.
-> Groupware database
Stores document such as schedules, calendars, manuals, memos, and reports.
-> Computer-aided design (CAD)
Stores data abour engineering, architectural, and scientific designs.
-> Hypertect database
Contains links to other types of documents
Answer to Chapter 9
Chapter 9
True/False
1. T
2. F
3. T
4. F
5. T
6. T
7. F
8. F
9. F
10.T
11.T
Multiple Choice
1. C) Visual Voice Mail
2. C) A Web Conference
3. C) Provides for storage and management of a company's documents
4. D) Mashup
5. B) Hubs and switches
6. A) RFID
7. D) Coaxial Cable
8. B) Mobile TV
Matching
1. E
2. J
3. H
4. D
5. F
6. A
7. G
8. B
9. C
10.I
Short Answer
1. The capability that allows users to send and receive short text messages, typically fewer than 300 characters on phone or another mobile devices or computer.
->Mobile to mobile : send a message from your mobile device to another mobile device.
->Mobile to email: send a message from your mobile device to an email address anywhere in the world
->Web to mobile: send a message from a text messaging website to a mobile device, or request that a web site alert a mobile device with messages of breaking news and other updates, such as sports scores, and weather forecast.
->Mobile to provider: send a message by entering common short code (CSC) which is a four or five digits number assigned to a specific content or, wireless service provider followed by the message, such as a vote for television program contestant or entry for sweepstakes.
2. Accepting and analyzing signals sent by satellites in order to determine the receiver’s geographical location.
-> The data obtained from GPS then users apply it such as: creating a map, ascertaining the best route between two points, locating a lost person or stolen object, determining altitude and calculating speeds.
3. Different area of coverage.
->LAN = network that connects computers and device in limited geographical area such as a home, and office building.
->MAN = high speed network that connects local area networks in the metropolitan area such as a city or town.
->WAN = network that covers a large geographical area such as a country or the world.
Wireless LAN is a LAN that uses no physical wires. To access wireless LAN computer must have built-in wireless capability or the appropriate wireless network card, USB network adapter, or flash card.
4. Layout of the computers and device in communications network
->ISDN lines, DSL, FTTP, T-carrier lines and ATM
5. ISDN modem, DSL modem and cable modem
-> ISDN modem: send digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line
-> DSL modem: send digital data and information from a computer to a DSL line and receive digital data and information from DSL line
-> Cable modem: called a broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network
True/False
1. T
2. F
3. T
4. F
5. T
6. T
7. F
8. F
9. F
10.T
11.T
Multiple Choice
1. C) Visual Voice Mail
2. C) A Web Conference
3. C) Provides for storage and management of a company's documents
4. D) Mashup
5. B) Hubs and switches
6. A) RFID
7. D) Coaxial Cable
8. B) Mobile TV
Matching
1. E
2. J
3. H
4. D
5. F
6. A
7. G
8. B
9. C
10.I
Short Answer
1. The capability that allows users to send and receive short text messages, typically fewer than 300 characters on phone or another mobile devices or computer.
->Mobile to mobile : send a message from your mobile device to another mobile device.
->Mobile to email: send a message from your mobile device to an email address anywhere in the world
->Web to mobile: send a message from a text messaging website to a mobile device, or request that a web site alert a mobile device with messages of breaking news and other updates, such as sports scores, and weather forecast.
->Mobile to provider: send a message by entering common short code (CSC) which is a four or five digits number assigned to a specific content or, wireless service provider followed by the message, such as a vote for television program contestant or entry for sweepstakes.
2. Accepting and analyzing signals sent by satellites in order to determine the receiver’s geographical location.
-> The data obtained from GPS then users apply it such as: creating a map, ascertaining the best route between two points, locating a lost person or stolen object, determining altitude and calculating speeds.
3. Different area of coverage.
->LAN = network that connects computers and device in limited geographical area such as a home, and office building.
->MAN = high speed network that connects local area networks in the metropolitan area such as a city or town.
->WAN = network that covers a large geographical area such as a country or the world.
Wireless LAN is a LAN that uses no physical wires. To access wireless LAN computer must have built-in wireless capability or the appropriate wireless network card, USB network adapter, or flash card.
4. Layout of the computers and device in communications network
->ISDN lines, DSL, FTTP, T-carrier lines and ATM
5. ISDN modem, DSL modem and cable modem
-> ISDN modem: send digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line
-> DSL modem: send digital data and information from a computer to a DSL line and receive digital data and information from DSL line
-> Cable modem: called a broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network
Answer to Chapter 8
True/False
1. F
2. F
3. T
4. T
5. F
6. T
7. T
8. F
9. F
10.T
Multiple Choice
1. B) CMOS
2. B) Windows ReadyBoost
3. C) Gadget
4. A) Index
5. C) Contiguous sectors, which speeds
6. D) Windows Firewall
7. C) Adware
8. A) Phising Filter
Matching
1. F
2. C
3. G
4. D
5. E
6. H
7. A
8. B
9. I
10.J
Short Answer
1. ->Cold boot is when turning on a computer that has been power off completely, where as warm boot is the process of using the operating system to restart computer. Warm boot properly closes any running processes and programs, however it does not save any unsaved work
->Memory resident means it remains in memory while the computer is running. Non resident memory is instructions remain on a storage medium until they are needed.
2. ->User interface is control how you enter data and instructions and how information is displayed on the screen.
->graphical user interface ; user interact with menus and visual images such as button and other graphical objects to issue commands.
Command Line Interface; users types command or presses special keys on the keyboard (such as function keys or key combination) to enter data and instructions.
3. ->The purpose is to provide updates to the programs include fixes to programs bugs ,or error, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games and even updates to applications soft ware on the computer such as a web browser or an email programs.
-> After users who have registered and or to activated their software.
4. ->During the backup process, the utility monitors progress and alerts you if it needs additional media, such as another disc. Many backup programs compress, or shrink the size of, file during the backup process.
-> Restore utility reserves the process and return backed files to their original form.
5. ->Windows Embedded CE is a scaled down windows operating system designed for use on communications, entertainment and computing devices with limited functionally.
->Windows mobile is an operating system based on windows embedded CE, includes functionality, programs and a user interface designed for specific types of smart phones and PDAs.
->Blackberry operating system runs on handheld devices supplied by RIM (Research In Motion).
->Google Android is an operating system designed by google for mobile devices.
=>Windows embedded CE use for VoIP telephones, industrial control devices, digital cameras, point of sale terminals, automated teller machine , digital photo frames. Besides that windows embedded CE support color, sounds multitasking, multimedia, email, internet access and web browsing.
=> Windows mobile operating system users have access to all the basic PIM (Personal Information Manager) functions such as contact list, schedules, task, calendars, and notes. Also provides numerous additional features that allows users to check email, browse the web, listen to music, take picture and etc.
=>Blackberry operating system uses to managing schedule, contacts and appointment as well as phone capabilities and provide wireless functionality
=>Google android allows programmers to design programs specifically for devices supporting this operating system.
1. F
2. F
3. T
4. T
5. F
6. T
7. T
8. F
9. F
10.T
Multiple Choice
1. B) CMOS
2. B) Windows ReadyBoost
3. C) Gadget
4. A) Index
5. C) Contiguous sectors, which speeds
6. D) Windows Firewall
7. C) Adware
8. A) Phising Filter
Matching
1. F
2. C
3. G
4. D
5. E
6. H
7. A
8. B
9. I
10.J
Short Answer
1. ->Cold boot is when turning on a computer that has been power off completely, where as warm boot is the process of using the operating system to restart computer. Warm boot properly closes any running processes and programs, however it does not save any unsaved work
->Memory resident means it remains in memory while the computer is running. Non resident memory is instructions remain on a storage medium until they are needed.
2. ->User interface is control how you enter data and instructions and how information is displayed on the screen.
->graphical user interface ; user interact with menus and visual images such as button and other graphical objects to issue commands.
Command Line Interface; users types command or presses special keys on the keyboard (such as function keys or key combination) to enter data and instructions.
3. ->The purpose is to provide updates to the programs include fixes to programs bugs ,or error, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games and even updates to applications soft ware on the computer such as a web browser or an email programs.
-> After users who have registered and or to activated their software.
4. ->During the backup process, the utility monitors progress and alerts you if it needs additional media, such as another disc. Many backup programs compress, or shrink the size of, file during the backup process.
-> Restore utility reserves the process and return backed files to their original form.
5. ->Windows Embedded CE is a scaled down windows operating system designed for use on communications, entertainment and computing devices with limited functionally.
->Windows mobile is an operating system based on windows embedded CE, includes functionality, programs and a user interface designed for specific types of smart phones and PDAs.
->Blackberry operating system runs on handheld devices supplied by RIM (Research In Motion).
->Google Android is an operating system designed by google for mobile devices.
=>Windows embedded CE use for VoIP telephones, industrial control devices, digital cameras, point of sale terminals, automated teller machine , digital photo frames. Besides that windows embedded CE support color, sounds multitasking, multimedia, email, internet access and web browsing.
=> Windows mobile operating system users have access to all the basic PIM (Personal Information Manager) functions such as contact list, schedules, task, calendars, and notes. Also provides numerous additional features that allows users to check email, browse the web, listen to music, take picture and etc.
=>Blackberry operating system uses to managing schedule, contacts and appointment as well as phone capabilities and provide wireless functionality
=>Google android allows programmers to design programs specifically for devices supporting this operating system.
2012-11-07
Answer to Chapter 7
True/False
1. T
2. F
3. T
4. F
5. F
6. T
7. T
8. T
9. F
10. T
11. F
12. T
Multiple Choice
1. B) Transfer rate
2. C) Longitudinal recording
3. D) RAID
4. D) All of the above
5. A) Optical disk
6. C) LightScribe
7. B) Tape library
8. B) Magnetic stripe
Matching
1. H
2. C
3. A
4. E
5. F
6. J
7. D
8. B
9. I
10.G
Short Answer
1. file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. 320 GB
2. it has backward compatibility with SCSI and interoperability with Serial ATA (SATA).
6 m passive copper cable
20 m active copper cable
100 m optical cable[1]
255 device port expanders (>65k total devices)
SAS-to-SATA compatibility
3. Singgle session disk can only cotiniously written one data. Multi session can written data to the first part of the disk, and then later more information can be appended to it in the unused space left after the first session. saving data.
4. easily transported.
CompactFlash (CF)
Invented by SanDisk Corporation in 1994, CompactFlash cards can support 3.3V and 5V operation and can switch between the two, in contrast to other small-form factor flash memory cards that can operate only at one voltage. The card was designed based on the PCMCIA PC Card standard and can fit into a PCMCIA slot with an adapter. There are two types of CompactFlash cards to accommodate different capacities:
Type I cards are 42.8mm x 36.4mm x 3.3 mm thick
Type II cards are 42.8mm x 36.4mm x 5.5 mm thick.
Secure Digital Card (SD card)
SD cards are used in many small portable devices such as digital video camcorders, digital cameras, handheld computers, audio players and mobile phones. In use since 1999, SD Memory Cards are now available in capacities between 16 Megabytes and 1 Gigabyte, and still growing. An SD card typically measures 32 mm x 24 mm x 2.1 mm and weighs approximately 2grams.
MiniSD Card
After the success of the SD Card (Secure Digital Card), the miniSD Memory Card was developed to meet the demands of the mobile phone market. The MiniSD Card provides the same benefits as the SD Card, but is smaller than the original SD Card. MiniSD Cards are typically found in many newer mobile phones with features such as built-in digital cameras, downloading and games, basically the mobile phones where the miniSD can meet the requirements for increased data storage. MiniSD cards are 21.5 mm x 20 mm x 1.4 mm and generally provide 16MB to 256MB of storage.
MicroSD
Mainly used in mobile phones and other small handheld devices the MicroSD format is currently available in capacities up to 4GB, and it roughly 1/4th the size of the SD card at 15mm W 11mm W 0.7mm. The MicroSD card is also the smallest memory card available.
Card adapters can be purchased that enable backwards compatibility — this would allow MicroSD cards to work in SD and MiniSD slots, and also for MicroSD cards to work in SD card slots.
MultiMediaCard (MMC)
The MultiMediaCard (MMC) standard was introduced by SanDisk and Siemens in 1997. The card itself is 32 mm x 24 mm x 1.4mm and is often used in place of the SD card. Transfer speeds of a MMC is around 2.5MB/s and they can often be used in SD Card readers.
5. Microfilm is essentially 35mm photographic film that was used to take images of the pages of a book, a periodical volume or a newspaper. The reel of film is then duplicated and sold to libraries. Microfiche are flat sheets of photographic film about 4×6 inches in size. Used to keep newspapers and other bulky publications in a compact, stable form.
1. T
2. F
3. T
4. F
5. F
6. T
7. T
8. T
9. F
10. T
11. F
12. T
Multiple Choice
1. B) Transfer rate
2. C) Longitudinal recording
3. D) RAID
4. D) All of the above
5. A) Optical disk
6. C) LightScribe
7. B) Tape library
8. B) Magnetic stripe
Matching
1. H
2. C
3. A
4. E
5. F
6. J
7. D
8. B
9. I
10.G
Short Answer
1. file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. 320 GB
2. it has backward compatibility with SCSI and interoperability with Serial ATA (SATA).
6 m passive copper cable
20 m active copper cable
100 m optical cable[1]
255 device port expanders (>65k total devices)
SAS-to-SATA compatibility
3. Singgle session disk can only cotiniously written one data. Multi session can written data to the first part of the disk, and then later more information can be appended to it in the unused space left after the first session. saving data.
4. easily transported.
CompactFlash (CF)
Invented by SanDisk Corporation in 1994, CompactFlash cards can support 3.3V and 5V operation and can switch between the two, in contrast to other small-form factor flash memory cards that can operate only at one voltage. The card was designed based on the PCMCIA PC Card standard and can fit into a PCMCIA slot with an adapter. There are two types of CompactFlash cards to accommodate different capacities:
Type I cards are 42.8mm x 36.4mm x 3.3 mm thick
Type II cards are 42.8mm x 36.4mm x 5.5 mm thick.
Secure Digital Card (SD card)
SD cards are used in many small portable devices such as digital video camcorders, digital cameras, handheld computers, audio players and mobile phones. In use since 1999, SD Memory Cards are now available in capacities between 16 Megabytes and 1 Gigabyte, and still growing. An SD card typically measures 32 mm x 24 mm x 2.1 mm and weighs approximately 2grams.
MiniSD Card
After the success of the SD Card (Secure Digital Card), the miniSD Memory Card was developed to meet the demands of the mobile phone market. The MiniSD Card provides the same benefits as the SD Card, but is smaller than the original SD Card. MiniSD Cards are typically found in many newer mobile phones with features such as built-in digital cameras, downloading and games, basically the mobile phones where the miniSD can meet the requirements for increased data storage. MiniSD cards are 21.5 mm x 20 mm x 1.4 mm and generally provide 16MB to 256MB of storage.
MicroSD
Mainly used in mobile phones and other small handheld devices the MicroSD format is currently available in capacities up to 4GB, and it roughly 1/4th the size of the SD card at 15mm W 11mm W 0.7mm. The MicroSD card is also the smallest memory card available.
Card adapters can be purchased that enable backwards compatibility — this would allow MicroSD cards to work in SD and MiniSD slots, and also for MicroSD cards to work in SD card slots.
MultiMediaCard (MMC)
The MultiMediaCard (MMC) standard was introduced by SanDisk and Siemens in 1997. The card itself is 32 mm x 24 mm x 1.4mm and is often used in place of the SD card. Transfer speeds of a MMC is around 2.5MB/s and they can often be used in SD Card readers.
5. Microfilm is essentially 35mm photographic film that was used to take images of the pages of a book, a periodical volume or a newspaper. The reel of film is then duplicated and sold to libraries. Microfiche are flat sheets of photographic film about 4×6 inches in size. Used to keep newspapers and other bulky publications in a compact, stable form.
2012-11-01
Answer to Chapter 6
True/False
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. F
9. F
10. T
11. F
12. F
13. T
Multiple Choice
1. D) Letters, reports, and e-mail massages
2. C) LCD
3. A) DisplayPort
4. A) Horizontal
5. D) Dots per inch (dpi)
6. B) If the multifuction peripheral breaks down, all the function are lost
7. C) Interactive whiteboard
8. D) Force feedback
Matching
1. D
2. J
3. G
4. H
5. F
6. C
7. A
8. E
9. B
10. I
Short Answer
1. The higher the resolution, the better the quality of graphic is usually proportionalized.
2. working with digital broadcast signals, transmitting digital sound, supporting wide screens, and providing resolution up to 1920 x 1080 pixels. plug one end of the cable on the console and another one on the video port on the tv.
3. bluetooth printing , infrared printing. Bluetooth use radio wave, infrared use infrared light waves.
4. spraying tiny drops of liquid ink into the paper. professional's printer have a higher dpi compare to small business users.
5. satelite speakers. audio resolutin is the number of bytes that represent sound in a given time, example is 8-bit, 16-bit 24-bit.
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. F
9. F
10. T
11. F
12. F
13. T
Multiple Choice
1. D) Letters, reports, and e-mail massages
2. C) LCD
3. A) DisplayPort
4. A) Horizontal
5. D) Dots per inch (dpi)
6. B) If the multifuction peripheral breaks down, all the function are lost
7. C) Interactive whiteboard
8. D) Force feedback
Matching
1. D
2. J
3. G
4. H
5. F
6. C
7. A
8. E
9. B
10. I
Short Answer
1. The higher the resolution, the better the quality of graphic is usually proportionalized.
2. working with digital broadcast signals, transmitting digital sound, supporting wide screens, and providing resolution up to 1920 x 1080 pixels. plug one end of the cable on the console and another one on the video port on the tv.
3. bluetooth printing , infrared printing. Bluetooth use radio wave, infrared use infrared light waves.
4. spraying tiny drops of liquid ink into the paper. professional's printer have a higher dpi compare to small business users.
5. satelite speakers. audio resolutin is the number of bytes that represent sound in a given time, example is 8-bit, 16-bit 24-bit.
Langganan:
Postingan (Atom)