At least half the questions must have a
reference from the reading material using correct APA format. When using a reference the paraphrased
answer must be twice as long as the reference used. For example a one sentence
reference requires a two sentence follow-up answer. Thank
you "The
Advent of Commercial Computing, 1945 - 1956" from Ceruzzi,
Paul E. (2003). History o
...[Show More]
At least half the questions must have a
reference from the reading material using correct APA format.
When using a reference the paraphrased
answer must be twice as long as the reference used. For example a one sentence
reference requires a two sentence follow-up answer.
Thank
you
"The
Advent of Commercial Computing, 1945 - 1956" from Ceruzzi,
Paul E. (2003). History of Modern Computing (2nd Edition) pp. 1 - 45
Understanding
Computers" from Hogan, L., & Rutledge, A. (2013). Practical Computing
(3rd ed., pp. 1-35). Upper Saddle River, NJ: Prentice Hall. .
This chapter focuses on the fundamentals of computers including
hardware, software, processing, and storage (Chapter 1, pp. 1-35).
"What Are Algorithms and Why Should We care?" by
Cormen, Thomas H. (2013). Algorithms Unlocked (Chapter 1 - pp. 1 -
9). MIT Press.
This chapter discusses the basics of Algorithms, what is it and
how does it relate to our digital elements.
Computing fundamentals : Digital literacy edition. by Wempen, F. (2014). Chapter 1:
Computer Basics - pages 11 - 28; Chapter 2: The System
Unit - pages 9 - 48 .
This chapter discusses the inside of a computer and how it relates the rest of
the system elements.
"Introduction: The Organization and Finance of Innovation in
American History" and "Chapter 1: Financing Invention during the
Second Industrial Revolution: Cleveland, Ohio, 1870 - 1920"
from Lamoreaux,
Sokoloff (2007). Financing Innovation in the United States, 1870 to the
Present (pp. 1 - 84). Cambridge, MA: MIT Press.
Vining,
M. (April 2012). Grace Hopper and the Invention of the Information Age. Technology
and Culture, 53(2), 516-517.
Understanding the Internet" from Preston, J., Preston, S.,
& Ferrett, R. (2010). Computer Literacy for IC3, Unit 3: Living Online.
(pp. 9-37). Upper Saddle River, NJ: Prentice Hall.
Computer Security and Risks" from Beekman, G. & Beekman,
B. (2012). Digital Planet: Tomorrow's Technology and You (10th ed., pp. 358-392).
Upper Saddle River, NJ: Prentice Hall.
Navigating the Internet" from Hogan, L., & Rutledge, A.
(2013). Practical Computing (3rd ed., pp. 91-133). Upper Saddle River, NJ:
Prentice Hall.
"The History of Computers" from Reed, D. (2011). A
Balanced Introduction to Computer Science (3rd ed., pp. 100-115). Upper
Saddle River, NJ: Prentice Hall.
This chapter focuses on the history and progression of computers from 1945 to
the present. / (Chapter 6, pp. 100-115)
1.Three early British computer innovator were
Charles Babbage, Alan Turing, and Ada Lovelace. Who were they and what did they
contribute to the field of computers?
2.What is a tablet? Compare a tablet form and
function to a laptop.
3.
Define social networking and describe the use of three of the
most popular social networking sites: Facebook, Twitter, and Linkedin, in the
world of computers and personal use devices.
4. What are the roles of a database administrator and an IT
project manager?
5. What is the distinguishing factor that makes ENIAC an
ancestor of the smart phone that you carry today? Briefly describe your
reasoning.
Question 6
How can an administrator control
what other users do on a computer? Provide examples and briefly explain
the implementation processes.
Question 7
Name each of the 6 computer
generations and the innovation associated with each generation. Briefly
describe the innovation and what advantage it provided over the previous
generation.
Question 8
What is an algorithm?
Question 9
What do the terms kilobyte and
gigabyte mean?
Question 10
Identify the primary
disadvantages of vacuum tubes in early computers and the impact that they had
on the design of the machines.
Question 11
What Computer Generation was the
mouse introduced?
Question 12
What are computer worms? Describe
their purpose,how it affects the device, and how it spreads.
Q13
Describe the difference between a
smartphone and a cell phone.
Question 14
What advancement in computer
architecture did John von Neumann make by recognizing that programming via
switches and cables was tedious and error prone?
Question 15
What measures can you take to
protect your privacy while you use the Internet? Identify and describe at least
2.
Question 16
Identify the features of the
ENIAC computer from the options.
Select one or more:
a. Designed by Alan Turing
b. Designed by Mauchly and Eckert
c. Generation 1 computer
d. Generation 2 computer
e. Programs stored in computer.
f. Programs not stored in
computer.
Question 17
J. Presper Eckert and John
Mauchly are credited with the first commercial computer produced in the United
States. What was the name of that computer? Include the acronym and of what
contraction of words that acronym was.
Question 18
Define the term domain name
server and explain its purpose.
Question 19
Describe the following three
computer data security features and their purpose: Computer data encryption,
digital certification, and computer firewall. You may add additional data
security features.
Question 20
Question text
What innovations did the Apple
Lisa borrow from the Xerox PARC Alto?
Question 21
Example: USAis#1. Evaluate this
example password based on the recommendations for a strong password. Describe
the strength of this password based on the criteria that determine password
strength.
Question 22
Define the acronym ICANN and
explain its purpose.
Question 23
Explain the term
"cyberstalking". How is it different that regular stalking?
Question 24
Describe two innovations
introduced by Apple Computer in the late 1970s and early 1980s.
Question 25
Briefly describe the ARPANET
Project and what it accomplished.
[Show Less]