Review and Review Re and AAssessmenttntemssessessmes n
Chapter 1 Introduction to Information Technology 27
Copyright Goodheart-Willcox Co., Inc.
5. Which of the following is not a major
computer threat?
A. hackers
B. scareware
C. malware
D. ARPANET
Completion
Complete the following sentences with the
correct word(s).
6. Collectively, Internet-based spaces used
to store and retrieve data are called _____.
7. _____ have processing power that can
handle complex jobs beyond the scope
of other computer systems.
8. _____ memory is kept even when the
computer is turned off, while _____
memory is erased when the power is off.
9. A(n) _____ uniquely identifies a fi
computer on a network.
10. The act of limiting access to information
or removing information to prevent it
from being seen is called _____.
Matching
Match the correct term with its defi nition. fi
A. hard disk drive
B. bandwidth
C. phishing
D. random-access memory (RAM)
E. malware
11. Measure of the amount of data that can
travel on a communication system.
12. Holds instructions that the processor
can immediately use.
13. Sealed unit that contains a stack of
individual disks, or platters, which are
magnetic media that rotate at a very
high speed.
14. Software that intentionally performs
actions to disrupt the operation of
a computer system, collect private
information, or otherwise harm the
computer or user.
15. Attempt to get sensitive information by
appearing as a harmless request.
Application and Extension
of Knowledge
1. Write a one-page paper describing why
you feel an information technology
worker must keep his or her skills up to
date.
2. Look at your home computer or a
computer in the school’s computer lab.
Make a list of all peripherals attached
to the computer. Write one sentence for
each device explaining why you think
it is a peripheral. Be prepared to discuss
this list with the rest of the class.
3. Conduct an audit of the hardware in
your school’s computer lab. What items
are common to all computers? What
items are found on only some comput-
ers? Explain why you think these dis-
crepancies exist.
4. Go to the World Wide Web Consortium
(W3C) website (www.w3.org). Use the
site’s search function, and search for a
little history of the World Wide Web. In
the search results, look for a similarly
named article. Read the W3C article,
and write a one-page summary of the
key game-changing events. Be sure to
cite the information source.
5. Conduct a search online for laws that re-
late to Internet security. Note when they
were created and what purpose they
serve. Next, research laws regulating
hacking and browser hijacking. Sum-
marize what you learned about Internet
security and ethical conduct in a two-
page essay.