Chapter 1 Introduction to Information Technology 27 Copyright Goodheart-Willcox Co., Inc. Completion Complete the following sentences with the correct word(s). 6. Collectively, Internet-based spaces used to store and retrieve data are called _____. 7. _____ have processing power that can handle complex jobs beyond the scope of other computer systems. 8. _____ memory is kept even when the computer is turned off, while _____ memory is erased when the power is off. 9. A(n) _____ uniquely identifi es a computer on a network. 10. The act of limiting access to information or removing information to prevent it from being seen is called _____. Matching Match the correct term with its defi nition. A. hard disk drive B. bandwidth C. phishing D. random-access memory (RAM) E. malware 11. Measure of the amount of data that can travel on a communication system. 12. Holds instructions that the processor can immediately use. 13. Sealed unit that contains a stack of individual disks, or platters, which are magnetic media that rotate at a very high speed. 14. Software that intentionally performs actions to disrupt the operation of a computer system, collect private infor- mation, or otherwise harm the computer or user. 15. Attempt to get sensitive information by appearing as a harmless request. Application and Extension of Knowledge 1. Write a one-page paper describing why you feel an information technology worker must keep his or her skills up to date. 2. Look at your home computer or a computer in the school’s computer lab. Make a list of all peripherals attached to the computer. Write one sentence for each device explaining why you think it is a peripheral. Be prepared to discuss this list with the rest of the class. 3. Conduct an audit of the hardware in your school’s computer lab. What items are common to all computers? What items are found on only some comput- ers? Explain why you think these dis- crepancies exist. 4. Go to the World Wide Web Consortium (W3C) website. Use the site’s search function, and search for a little history of the World Wide Web. In the search results, look for a similarly named article. Read the W3C article, and write a one-page summary of the key game- changing events. Be sure to cite the information source. 5. Conduct a search online for laws that re- late to Internet security. Note when they were created and what purpose they serve. Next, research laws regulating hacking and browser hijacking. Sum- marize what you learned about Internet security and ethical conduct in a two- page essay. Review and Assessment