DISCOVERING COMPUTERS: TECHNOLOGY IN A WORLD
OF COMPUTERS, MOBILE DEVICES, AND THE INTERNET
CHAPTER ONE: DIGITAL LITERACY
END OF CHAPTER SOLUTIONS
Study Guide
Answers to Study Guide questions are below. Information related to digital-only content is in italics.
1. Digital literacy involved having a current knowledge and understanding of computers, mobile
devices, the Internet, and related technologies.
2. A computer is an electronic device, operating under the control of instructions stored in its own
memory, that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use. A user is anyone who interacts
with a computer or mobile device, or utilizes the information it generates.
3. A desktop is a personal computer designed to be in a stationary location, where all of its
components fit on or under a desk or table. A laptop is a thin, lightweight mobile computer with
a screen in its lid and a keyboard in its base. Laptops are also called notebook computers.
4. A tablet is a thin, lighter-weight mobile computer that has a touch screen.
5. You usually can interact with a touch screen using gestures. A gesture is a motion you make on a
touch screen with the tip of one or more fingers on your hand. Links to additional content about
gestures are available as digital content.
6. A server is a computer dedicated to providing one or more services to other computers or
devices on a network. Services provided by servers include storing content and controlling
access to hardware, software, and other resources on a network.
7. A mobile device is a computer because it operates under the control of instructions stored in its
own memory, can accept data, process the data according to specified rules, produce or display
information, and store the information for future use.
8. A smartphone is an Internet-capable phone that also includes a calendar, an appointment book,
an address book, a calculator, a notepad, games, and several other apps.
9. Text messages are short notes, typically fewer than 300 characters, sent to or from a
smartphone or other mobile device. A picture message is a photo or other image, sometimes
along with sound and text, sent to or from a smartphone or other mobile device. A video
, message is a short video clip, usually about 30 seconds, sent to or from a smartphone or other
mobile device.
10. A digital camera allows you to take photos and store the photographed images digitally. A
portable media player allows you to store organize, and play or view digital media. An e-book
reader is used primarily for reading e-books. A game console is designed for single-player or
multiplayer video games.
11. Convergence, described as the trend of computers and devices with technologies that overlap,
means that consumers may need fewer devices for the functionality that they require. Mobile
devices often include cameras and enable you to play media or read e-books without
purchasing separate devices for each function.
12. The ESRB provides guidelines for the gaming industry. The ESRB provides ratings that indicate
appropriate ages for games. The ratings range from Early Childhood to Adults Only (18 and up).
13. Data (text, numbers, audio, and more) is a collection of unprocessed items. Information
(reports, results of calculations, and more) conveys meaning to users.
14. Input means to enter data. Output is the results of the data once it is process. Examples of input
devices include keyboards, pointing devices, voice and video input, scanners, and more.
Examples of output devices include printers, displays, and speakers.
15. A pointing device allows the user to control a small symbol on a screen, called the pointer. A
mouse and a touchpad are both examples of pointing devices.
16. To enter voice and video, you can use a microphone, a headset, or a webcam.
17. Memory consists of electronic components that store instructions waiting to be executed and
the data needed by those instructions. Storage holds data, instructions, and information for
future use.
18. A computer keeps data, instructions, and information on storage media. Examples of storage
media include hard disks, solid-state drives, USB flash drives, memory cards, and optical discs.
19. Cloud storage is an Internet service that provides storage to computer users. Some cloud
storage providers provide storage for specific types of media, such as photos, whereas others
store any content and provide backup services.
20. Components of a backup plan include using a backup program, copying files to a storage
medium, subscribing to a cloud storage provider, and scheduling your files to be backed up
regularly.
21. The Internet is a worldwide collection of computer networks that connects millions of
businesses, government agencies, educational institutions, and individuals. People use the
Internet to search for information, conduct research, communicate with and meet other people,
share information with others, access information, participate in online training, shop, play
games, download or listen to music, watch videos, and download or read books.
22. The web consists of a worldwide collection of electronic documents. Each electronic document
is called a web page.
23. The web is a service of the Internet.
,24. A search engine is software that finds websites, webpages, images, videos, news, maps, and
other information related to a specific topic. Ask, Aol Search, Bing, Dogpile, Google, and Yahoo!
Search are examples of search engines.
25. Online social network is a website that encourages members in its online community to share
their interests, ideas, stories, photos, music, and videos with other registered users. A Tweet is a
short post that Tweeters broadcast for all their followers.
26. Facebook is an online social network started by Mark Zuckerberg with 1 billion active users.
Twitter is a social media site where its 500 million registered users post messages, photos, videos,
news stories and more in 140-character tweets.
27. A company might look at a potential employee’s social networking site to see if you have posted
information about unethical, illegal, or unsavory activities. A company or organization might
follow an employee’s activity on social networking site to make sure the employee is not
posting information that violates company policies or privacy standards.
28. Malware is software that acts without a user’s knowledge and deliberately alters the computer’s
and mobile device’s operations. To protect yourself from malware, use virus protection
software and a firewall, be suspicious of unsolicited email attachments, disconnect your
computer from the Internet, download software with caution, close spyware windows, scan
removable media for malware before use, keep software current, and back up regularly.
29. To create a strong password, avoid using personal information, use at least eight characters and
a variety of upper- and lowercase numbers and punctuation, change the password frequently,
do not use the same password for all accounts, use a passphrase, avoid common sequences, and
test password strength. Popular tools for testing password strength include How Secure is My
Password, Microsoft, Passfault, SensePost, Strength Test – Rumkin, The Password Meter, The
Password Security Checker -- Estastis
30. Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, neck, and back. Two behavioral health risks are technology addiction and
technology overload.
31. Green computing involves reducing the electricity consumed and environmental waste
generated when using a computer. Strategies that support green computing include recycling,
using energy efficient hardware and energy saving features, regulating manufacturing
processes, extending the life of computers, and immediately donating or properly disposing of
replaced computers.
32. Software consists of a series of related instructions, organizes for a common purpose, that tells
the computer what tasks to perform and how to perform them. Software also is called a(n)
program.
33. System software consists of the programs that control or maintain the operations of the
computer and its devices. An operating system is a set of programs that coordinates all the
activities among computer or mobile device hardware. Popular operating systems include
Microsoft Windows, Apple’s Mac OS and iOS, and Google’s Android.
, 34. Steve Jobs helped build the first desktop personal computer, marketed an innovative operating
system, and cofounded the Apple Computer Corporation. He also revolutionized music distribution
by guiding the evolution of the iTunes store. Jobs also cofounded Pixar Animation Studios. Bill
Gates developed the BASIC programming language for the MITS Altair, one of the first
microcomputers. He founded Microsoft in 1975 with Paul Allen, and five years later they licensed
the first operating system, called PC-DOS, to IBM company’s chairman and advisor.
35. To install an application, first locate the application, download and/or install the application
from physical media such as a CD or DVD, or from a website or online store. Once the download
is complete, if the installation does not start automatically, locate and double-tap or double-
click the downloaded file to begin the installation.
36. To determine if a program will run on your computer, read the box, manufacturer’s website, or
order summary to view the computer’s specifications and minimum requirements for memory,
speed, or more.
37. A communications device is hardware capable of transferring items from computers and
devices to media and vice versa. Examples of wireless communications technologies include Wi-
Fi, Bluetooth, and cellular radio.
38. A hot spot is a wireless network that provides Internet connections to mobile computers and
devices.
39. To use a public Wi-Fi hotspot safely, avoid typing passwords and financial information, sign out
of websites, disable your wireless connection when done, do not leave the computer
unattended, and beware of over-the-shoulder snoopers.
40. Homes use networks to connect to the Internet at the same time, share a single high-speed
Internet connection, access content on computers and devices throughout the house, share
devices, play multiplayer games, connect game consoles to the Internet, and use VoIP. Business
networks use networks to facilitate communications, share hardware, and share data,
information and software.
41. When you synchronize computers and mobile devices, you match the files in two or more
locations with each other.
42. Digital divide illustrates the gap between those with and without access to technology. In
education, it refers to the fact that some school districts provide students and teachers and
equip classrooms with technology such as tablets and electronic whiteboards, and other school
districts cannot. Similarly, within districts, a wide gap exists between some students with
regards to their access to technology.
43. A blog is an informal website. Blog posts contain text, photos links and more. Wikis are
collaborative websites that allow users to create, add to, modify, or delete content. Podcasts are
recorded media such as lectures, political messages, radio shows, and commentaries.
44. A home user is a person who spends time using technology at home, such as a parent, or a
couple. Small/home office users include those who work for companies with fewer than 50
employees. A mobile user is anyone who works with computers or mobile devices while away
from a main office, home, or school. A power user is a user who requires the capabilities of a
OF COMPUTERS, MOBILE DEVICES, AND THE INTERNET
CHAPTER ONE: DIGITAL LITERACY
END OF CHAPTER SOLUTIONS
Study Guide
Answers to Study Guide questions are below. Information related to digital-only content is in italics.
1. Digital literacy involved having a current knowledge and understanding of computers, mobile
devices, the Internet, and related technologies.
2. A computer is an electronic device, operating under the control of instructions stored in its own
memory, that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use. A user is anyone who interacts
with a computer or mobile device, or utilizes the information it generates.
3. A desktop is a personal computer designed to be in a stationary location, where all of its
components fit on or under a desk or table. A laptop is a thin, lightweight mobile computer with
a screen in its lid and a keyboard in its base. Laptops are also called notebook computers.
4. A tablet is a thin, lighter-weight mobile computer that has a touch screen.
5. You usually can interact with a touch screen using gestures. A gesture is a motion you make on a
touch screen with the tip of one or more fingers on your hand. Links to additional content about
gestures are available as digital content.
6. A server is a computer dedicated to providing one or more services to other computers or
devices on a network. Services provided by servers include storing content and controlling
access to hardware, software, and other resources on a network.
7. A mobile device is a computer because it operates under the control of instructions stored in its
own memory, can accept data, process the data according to specified rules, produce or display
information, and store the information for future use.
8. A smartphone is an Internet-capable phone that also includes a calendar, an appointment book,
an address book, a calculator, a notepad, games, and several other apps.
9. Text messages are short notes, typically fewer than 300 characters, sent to or from a
smartphone or other mobile device. A picture message is a photo or other image, sometimes
along with sound and text, sent to or from a smartphone or other mobile device. A video
, message is a short video clip, usually about 30 seconds, sent to or from a smartphone or other
mobile device.
10. A digital camera allows you to take photos and store the photographed images digitally. A
portable media player allows you to store organize, and play or view digital media. An e-book
reader is used primarily for reading e-books. A game console is designed for single-player or
multiplayer video games.
11. Convergence, described as the trend of computers and devices with technologies that overlap,
means that consumers may need fewer devices for the functionality that they require. Mobile
devices often include cameras and enable you to play media or read e-books without
purchasing separate devices for each function.
12. The ESRB provides guidelines for the gaming industry. The ESRB provides ratings that indicate
appropriate ages for games. The ratings range from Early Childhood to Adults Only (18 and up).
13. Data (text, numbers, audio, and more) is a collection of unprocessed items. Information
(reports, results of calculations, and more) conveys meaning to users.
14. Input means to enter data. Output is the results of the data once it is process. Examples of input
devices include keyboards, pointing devices, voice and video input, scanners, and more.
Examples of output devices include printers, displays, and speakers.
15. A pointing device allows the user to control a small symbol on a screen, called the pointer. A
mouse and a touchpad are both examples of pointing devices.
16. To enter voice and video, you can use a microphone, a headset, or a webcam.
17. Memory consists of electronic components that store instructions waiting to be executed and
the data needed by those instructions. Storage holds data, instructions, and information for
future use.
18. A computer keeps data, instructions, and information on storage media. Examples of storage
media include hard disks, solid-state drives, USB flash drives, memory cards, and optical discs.
19. Cloud storage is an Internet service that provides storage to computer users. Some cloud
storage providers provide storage for specific types of media, such as photos, whereas others
store any content and provide backup services.
20. Components of a backup plan include using a backup program, copying files to a storage
medium, subscribing to a cloud storage provider, and scheduling your files to be backed up
regularly.
21. The Internet is a worldwide collection of computer networks that connects millions of
businesses, government agencies, educational institutions, and individuals. People use the
Internet to search for information, conduct research, communicate with and meet other people,
share information with others, access information, participate in online training, shop, play
games, download or listen to music, watch videos, and download or read books.
22. The web consists of a worldwide collection of electronic documents. Each electronic document
is called a web page.
23. The web is a service of the Internet.
,24. A search engine is software that finds websites, webpages, images, videos, news, maps, and
other information related to a specific topic. Ask, Aol Search, Bing, Dogpile, Google, and Yahoo!
Search are examples of search engines.
25. Online social network is a website that encourages members in its online community to share
their interests, ideas, stories, photos, music, and videos with other registered users. A Tweet is a
short post that Tweeters broadcast for all their followers.
26. Facebook is an online social network started by Mark Zuckerberg with 1 billion active users.
Twitter is a social media site where its 500 million registered users post messages, photos, videos,
news stories and more in 140-character tweets.
27. A company might look at a potential employee’s social networking site to see if you have posted
information about unethical, illegal, or unsavory activities. A company or organization might
follow an employee’s activity on social networking site to make sure the employee is not
posting information that violates company policies or privacy standards.
28. Malware is software that acts without a user’s knowledge and deliberately alters the computer’s
and mobile device’s operations. To protect yourself from malware, use virus protection
software and a firewall, be suspicious of unsolicited email attachments, disconnect your
computer from the Internet, download software with caution, close spyware windows, scan
removable media for malware before use, keep software current, and back up regularly.
29. To create a strong password, avoid using personal information, use at least eight characters and
a variety of upper- and lowercase numbers and punctuation, change the password frequently,
do not use the same password for all accounts, use a passphrase, avoid common sequences, and
test password strength. Popular tools for testing password strength include How Secure is My
Password, Microsoft, Passfault, SensePost, Strength Test – Rumkin, The Password Meter, The
Password Security Checker -- Estastis
30. Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, neck, and back. Two behavioral health risks are technology addiction and
technology overload.
31. Green computing involves reducing the electricity consumed and environmental waste
generated when using a computer. Strategies that support green computing include recycling,
using energy efficient hardware and energy saving features, regulating manufacturing
processes, extending the life of computers, and immediately donating or properly disposing of
replaced computers.
32. Software consists of a series of related instructions, organizes for a common purpose, that tells
the computer what tasks to perform and how to perform them. Software also is called a(n)
program.
33. System software consists of the programs that control or maintain the operations of the
computer and its devices. An operating system is a set of programs that coordinates all the
activities among computer or mobile device hardware. Popular operating systems include
Microsoft Windows, Apple’s Mac OS and iOS, and Google’s Android.
, 34. Steve Jobs helped build the first desktop personal computer, marketed an innovative operating
system, and cofounded the Apple Computer Corporation. He also revolutionized music distribution
by guiding the evolution of the iTunes store. Jobs also cofounded Pixar Animation Studios. Bill
Gates developed the BASIC programming language for the MITS Altair, one of the first
microcomputers. He founded Microsoft in 1975 with Paul Allen, and five years later they licensed
the first operating system, called PC-DOS, to IBM company’s chairman and advisor.
35. To install an application, first locate the application, download and/or install the application
from physical media such as a CD or DVD, or from a website or online store. Once the download
is complete, if the installation does not start automatically, locate and double-tap or double-
click the downloaded file to begin the installation.
36. To determine if a program will run on your computer, read the box, manufacturer’s website, or
order summary to view the computer’s specifications and minimum requirements for memory,
speed, or more.
37. A communications device is hardware capable of transferring items from computers and
devices to media and vice versa. Examples of wireless communications technologies include Wi-
Fi, Bluetooth, and cellular radio.
38. A hot spot is a wireless network that provides Internet connections to mobile computers and
devices.
39. To use a public Wi-Fi hotspot safely, avoid typing passwords and financial information, sign out
of websites, disable your wireless connection when done, do not leave the computer
unattended, and beware of over-the-shoulder snoopers.
40. Homes use networks to connect to the Internet at the same time, share a single high-speed
Internet connection, access content on computers and devices throughout the house, share
devices, play multiplayer games, connect game consoles to the Internet, and use VoIP. Business
networks use networks to facilitate communications, share hardware, and share data,
information and software.
41. When you synchronize computers and mobile devices, you match the files in two or more
locations with each other.
42. Digital divide illustrates the gap between those with and without access to technology. In
education, it refers to the fact that some school districts provide students and teachers and
equip classrooms with technology such as tablets and electronic whiteboards, and other school
districts cannot. Similarly, within districts, a wide gap exists between some students with
regards to their access to technology.
43. A blog is an informal website. Blog posts contain text, photos links and more. Wikis are
collaborative websites that allow users to create, add to, modify, or delete content. Podcasts are
recorded media such as lectures, political messages, radio shows, and commentaries.
44. A home user is a person who spends time using technology at home, such as a parent, or a
couple. Small/home office users include those who work for companies with fewer than 50
employees. A mobile user is anyone who works with computers or mobile devices while away
from a main office, home, or school. A power user is a user who requires the capabilities of a