Free Essay

Introduction to Computer

In:

Submitted By karatefeet
Words 2580
Pages 11
1)
A computer is unique compared to any other machine because of its ability to ________.

process large amounts of information simultaneously

process complex math functions

change its programming

use many different types of software

Score: 1

2)
Bits are used to measure ________.

storage capacity

data transfer and Internet connection rates

the size of files

the amount of time a user is connected to the Internet

Score: 1

3)
The smallest, most lightweight, and inexpensive computer is the ________.

notebook

laptop

netbook

client

Score: 0

4)
Distributed computing distributes ________.

the processing of tasks across a group of computers

power ability across all users

Internet usage across the entire network

disk storage for all computer users

Score: 1

5)
Smartphones use ________ technology, allowing users to perform several functions with one device.

embedded design

invisible computing

convergence

grid computing

Score: 1

6)
The intersection of a row and a column in a spreadsheet is called a ________.

field

text

cell

record

Score: 1

7)
Shaynia has been working with her colleagues on a Word document. Each of the parties may want to edit the document and view any alterations that have been made to the document as well. Which feature will Shaynia and her colleagues be working with in Microsoft Word?

Mail merge

Graphics

Track changes

Formatting

Score: 1

8)
When you purchase software in a box, reading the ________ is important to know if the software will function properly.

shareware requirements

EULA

system requirements

SaaS

Score: 1

9)
The term "cloud" in cloud computing means ________.

free financial software

websites for creating documents

the Internet

extra storage files located on the computer

Score: 1

10)
Which of the following best describes where cloud service providers build large datacenters?

In very populated areas so as to recruit the most specialized employees

In major metropolitan areas near the heart of the city

Remote, inexpensive locations near green power utilities

Offshore in foreign countries

Score: 1

11)
The sequence of folders to a file or a folder is known as its ________.

library

organization

public folder

path

Score: 1

12)
Sharon has a document that she wants to share with all the people at work. Where can Sharon place the document so everyone can view it from their own office computers?

Desktop folder

Shared folder

Private folder

Department folder

Score: 1

13)
Shelly wants to save a document file on her PC. She wants to use the colon (:) in her file name, but her computer teacher informs her that she cannot. Which of the following describes the reason why the colon cannot be used in a file name?

The colon is used exclusively for deleting folders and cannot be used in a file name.

The colon is strictly used for moving files from one folder to another.

The colon is exclusively used to indicate a drive on the computer. An example is C: drive.

Colons are symbols that represent programs accessed on the start menu.

Score: 1

14)
A(n) ________ is a procedure that you would use to solve a problem.

attribute

parameter

algorithm

property

Score: 1

15)
Default programs are connected with which of the following?

Devices

File types

File folders

Paths

Score: 1

16)
The ________ is the brain of the computer.

CPU

BIOS

RAM

ALU

Score: 1

17)
________ uses multiple processors, or multi-core processors, to share processing tasks.

Massive processing

Distributed processing

Pipelining

Parallel processing

Score: 1

18)
The ________ houses the power supply, memory, and drive bays of the computer.

CPU

ALU

system unit

control unit

Score: 1

19)
Which of the following is non-volatile?

CMOS

ROM

RAM

cache memory

Score: 1

20)
A wired NIC is sometimes call a(n) ________ card.

modulator-demodulator

Ethernet

PictBridge

Wi-Fi

Score: 1

21)
________ provides the user with an interface to communicate with the computer's hardware.

Utility software

The operating system

Application software

Open source software

Score: 1

22)
The ________ software makes the computer run.

system

application

coding

programming

Score: 1

23)
The programs that make up Control Panel are sometimes referred to as control panel________.

applications

ops

applets

apps

Score: 1

24)
One advantage of Windows Embedded OS is that it ________.

has a familiar user interface

is a large program

is installed on Windows PCs

has been around since the 1980s

Score: 1

25)
A ________ network does NOT require a NOS.

client-server

peer-to-peer

bus

ring

Score: 1

26)
Businesses should use a ________ network in order to share resources.

peer-to-peer

hybrid

ring

client-server

Score: 1

27)
Files saved to a hard disk are stored in ________.

clusters

areas

platters

partitions

Score: 1

28)
The Windows ________ utility rearranges fragmented files on a hard drive in order to improve efficiency.

Optimize Drives

Error Checking

Disk Cleanup

Check Disk

Score: 1

29)
All of the following are examples of malware, EXCEPT ________.

worms

spyware

viruses

spam

Score: 1

30)
Windows ________ helps to protect a computer form viruses and spyware.

Protector

Check Disk

Defender

Disk Cleanup

Score: 1

31)
________ software blocks unauthorized access to your computer.

Firewall

Gateway

Anti-spam

Antivirus

Score: 1

32)
To project your computer from adware, you would purchase ________ software.

antispyware

firewall

antivirus

anti-spam

Score: 1

33)
Which of the following is NOT typically one of the important features when selecting a digital camera?

Weight

Lenses

Storage type

Resolution

Score: 1

34)
When you evaluate a camera's picture quality, the resolution is expressed in ________.

macropixels

micropixels

megapixels

gigapixels

Score: 1

35)
________ counteracts camera shake and allows you to take sharper images.

burst mode

fixed-focus

image stabilization

shutter lag

Score: 1

36)
The time between a person pressing the button and the camera taking the picture is called ________.

shutter delay

shutter lag

tag time

latency

Score: 1

37)
Compact system cameras are also called ________.

DSLRs

autofocus cameras

superzooms

point-and-shoot cameras

Score: 1

38)
Which camera would be the best choice for a professional photographer who prefers to manually adjust the focus and exposure for each image?

CSC

Advanced point-and-shoot

DSLR

Point-and-shoot

Score: 1

39)
________ allows you to sync your photos between your iPhone and your Mac.

Picasa

Photobucket

Flickr

iCloud

Score: 1

40)
________ printers produce lab-quality prints of your photos.

Laser

Dye-sublimation

Dot matrix

Ink jet

Score: 1

41)
Which of the following is an industry standard that enables a camera to connect directly to a printer?

Flickr

Shutterfly

Geotagging

PictBridge

Score: 1

42)
MP3 stands for ________.

Mega-audio 3

MPEG-1 Audio Layer 3

MPEG-3

Megapixel Audio3

Score: 1

43)
When you transfer music from a CD to your computer, you ________ the CD.

copy

rip

tag

burn

Score: 1

44)
One disadvantage to using speech recognition software is that it ________.

is complicated to use

takes time to learn your speech patterns

is expensive

is not readily available for use

Score: 1

45)
________ provide the ability to carry on two-way communication with people in different states.

Webcams

PictBridges

Podcasts

Weblogs

Score: 1

46)
Portable media players use ________ to store music.

hard drives

flash memory

ROM

RAM

Score: 1

47)
The iPad runs ________.

iOS

Android

OS X

OS Mavericks

Score: 1

48)
One disadvantage to e-ink technology used with some e-readers is that it ________.

has a short battery life

causes eye strain

requires an external light for night reading

cannot be read in bright light

Score: 1

49)
The Internet was originally created as a communication system for the ________.

Department of Defense

Department of Education

U.S. Congress

University System

Score: 1

50)
The original Internet ________.

had only two nodes

came into existence in 1990

was invented by Tim Berners-Lee

was called ARPANET

Score: 1

51)
The first point-and-click graphical web browser was ________, which later became Netscape.

Mosaic

Chrome

Safari

Internet Explorer

Score: 1

52)
For which of the following uses was the Internet2 NOT designed?

Business

Education

Collaboration

Research

Score: 1

53)
Which of the following could become a member of the Internet2?

Facebook

Library of Congress

CNN

Amazon

Score: 1

54)
Which of the following statements about cable Internet access is TRUE?

It is universally available.

It is slower than dial-up.

You share the bandwidth with your neighbors.

Speeds range from 1 Kbps to 100 Kbps.

Score: 1

55)
If you use satellite Internet access, you can expect the speed to be comparable to those of a ________ connection.

cable Internet access

dial-up

DSL

FTTH

Score: 1

56)
In the URL https://www.irs.gov, http is the ________.

TLD

domain name

protocol

subdomain

Score: 1

57)
In the URL https://www.irs.gov, irs is the ________.

domain name

TLD

subdomain

protocol

Score: 1

58)
Google's free online storage is called Google ________.

Drive

Earth

Play

Chrome

Score: 1

59)
Which of the following is NOT a Boolean operator that can be used to search the web?

NOT

AND

OR

BUT

Score: 1

60)
Which of the following is the search term to find information about Chevrolet vehicles excluding the Corvette model?

chevrolet BUT corvette

chevrolet OR corvette

chevrolet NOT corvette

chevrolet AND corvette

Score: 1

61)
Which of the following is a method of synchronous online communication?

Forum

Email

Newsgroup

Instant Messaging

Score: 1

62)
A moderated chat room ensures that ________.

no one under the age of 18 is online

parental controls are in effect

all content is screened

only subscribers participate

Score: 1

63)
________ is a service that allows Apple users to place video phone calls to other users.

FaceTime

Google Voice

iChat

iMessage

Score: 1

64)
________ communication allows you to send a message to someone who is not online at the same time.

Synchronous

Static

Dynamic

Asynchronous

Score: 1

65)
Email sends electronic messages using ________ technology.

push-and-pull

store-and-forward

forward-and-push

get-and-put

Score: 1

66)
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.

password

signature

verification

captcha

Score: 1

67)
The tools that enable users to create user-generated content, connect, network, and share are called social ________.

media

connections

methods

channels

Score: 1

68)
In a virtual community, you can communicate with other people by using a(n) ________.

alias

profile

captcha

avatar

Score: 1

69)
All of the information that someone can find out about you by searching the web is called your ________.

tagged information

avatar

digital footprint

folksonomy

Score: 1

70)
Podcasts allow time ________, which means that you can listen on your own schedule.

warping

shifting

lagging

delay

Score: 1

71)
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.

crowdsourcing

crowdsampling

crowdresourcing

crowdreferencing

Score: 1

72)
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.

B2C

B2B

C2A

A2C

Score: 1

73)
________ e-commerce allows anyone to sell or trade your items online.

C2B

B2B

C2C

B2C

Score: 1

74)
One of the most popular C2C websites is ________.

Amazon

PayPal

eBay

Google Checkout

Score: 1

75)
You would most likely find a P2P network in a(n) ________.

home

university

library

corporation

Score: 1

76)
A corporation would want to utilize a ________ network.

client-server

peer-to-peer

workgroup

homegroup

Score: 1

77)
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________.

PAN

MAN

LAN

WAN

Score: 1

78)
One of the most important reasons for Ethernet standards is they ________.

prevent overburdening your computer

assure equipment from different manufacturers is compatible

can prevent unauthorized users from accessing the Internet

allow the government to keep tabs on what you are doing

Score: 0

79)
Which of the following is NOT a common LAN topology?

Hierarchical

Ring

Bus

Star

Score: 1

80)
Network speeds are measured in ________ per second.

nanos

hertz

bytes

bits

Score: 1

81)
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

terminator

switch

repeater

Score: 1

82)
A ________ can be set by an employer to prevent you from accessing eBay.

switch

wireless access point

firewall

router

Score: 1

83)
A ________ is a network composed of a group of clients and servers under the control of one central security database.

protocol

homegroup

domain

workgroup

Score: 1

84)
Which of the following is contained within the security database?

Your network protocol

Your network topology

Your IP address

Your user name and password

Score: 1

85)
The rules for communication between devices are called ________.

queues

packets

stacks

protocols

Score: 1

86)
Which of the following cybercrimes is considered to be a form of harassment?

Phishing

Clickjacking

Cyber-stalking

Pharming

Score: 1

87)
Cyber-harassment is ________.

harassment of one adult by another, using a computer

watching someone else's computer remotely

having an argument in an online forum

receiving a message claiming that a friend needs your help and money

Score: 1

88)
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

cyberbullying

phishing

pharming

cyber-stalking

Score: 1

89)
An email claiming that you have won a lottery might be an example of ________.

cyberbullying

cyber-harassment

computer fraud

cyber-stalking

Score: 1

90)
________ attacks have political or social agendas.

Cyber-stalking

Cyber-terrorism

Cybercrime

Computer fraud

Score: 1

91)
Hacking for the purpose of making a political statement is called ________.

cracking

sneaking

hacktivism

politicking

Score: 1

92)
Not all ________ is bad since it can give you the opportunity to try a program without buying it.

spyware

spam

malware

adware

Score: 1

93)
An email containing a virus hoax is dangerous because it ________.

can send copies of itself through the email program

contains a virus

causes people to search for and delete important files

sends your password to a criminal

Score: 1

94)
If your computer has a ________, someone else can gain access to it, but the fact that it is compromised is well hidden.

zombie

rootkit

logic bomb

botnet

Score: 1

95)
To secure your wireless network at home you should ________.

back up the computers on the network

use wireless encryption with a difficult passphrase

password-protect important document files

set the SSID to CLOSED

Score: 1

96)
You should use a(n) ________ account for everyday computing on a computer running Windows.

administrator

visitor

guest

standard

Score: 1

97)
When you need to make changes, install hardware, or configure settings, you will need to use the ________ account on your computer.

master

guest

administrator

client

Score: 1

98)
Which of the following would be the strongest password?

p@ssw*rd

p22w0r6

customer

p@55W0?d

Score: 1

99)
When you enter your credit card information in a website, you can ensure that the website is encrypted by looking for ________ in the address bar.

https

shttp

http

ssl

Score: 1

100)
The ________ was created in an effort to make it easier for victims to report cybercrimes.

Computer Fraud and Abuse Act

Homeland Security Act

USA PATRIOT Act

Internet Crime Complaint Center

Score: 1

Similar Documents

Premium Essay

Introduction of Computer

...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open...

Words: 26839 - Pages: 108

Premium Essay

Introductions Into Computers

...In the world of technology and computers, there has always been a way to make programs applications more advanced more simplistic and better than ever before with updates. When everything also is made into the way of life of computers, there’s always one thing to provide out the details and the simplistic trails of operating systems. Without the limitations of these operating systems, many would wonder as a society what could have happened if the operating system was never invented. Without operating systems and computers, things could and would have proceeded into the complications of today and things might not have changed if it wasn’t for the internet and different frustrations of doing many things by hand, but in the ways of introducing technology now is very simplistic. Using computers now in the present have been used as a daily important part of our lives to stay communicated to the world and to the rest of the others in real time. Running on computers have been of choice running operating systems to stay on top of programs and applications to get and take care of the other particles of tasks needed to be done or just for leisure and entertainment. Using operating systems known in short terms for “OS” is all on the society’s choice running what they think is the best for what they can get for the computer. There is all but one OS out of the major ones that is running for free without price, and that would be Linux. In today’s society, there’s a lot that Linux can do...

Words: 309 - Pages: 2

Free Essay

Introduction to Computers

...Introduction to Computers and the Internet 2 1) Basic browser buttons: The same picture is blown up twice below, so that the labels are easier to read. 2) Favorites: A favorite (or a bookmark, depending on your browser) is a link to a page that you store in your web browser. This makes it easier to pull up that page because you do not have to remember its full address, search for it, or click through links on a page to get to it. If there is a page you want to remember or like to go to a lot, you may want to add it to your favorites. Here you can see the pages that are currently saved on your computer or add a new one. 3) Home Page(s): The home page is the page or pages that the browser pulls up when you first open it. You can set it to open more than one, and you can choose what it opens first. To do this, you will want to use the “home” icon. [pic] Clicking on the icon will make the browser pull up the home page, but by clicking on the arrow immediately to the left of it, you can set a new home page. Here you can see the current home page highlighted and the options to change or remove home pages. If you choose to add or change, you will see this: You can either make the page you are currently on the home page, or tell the browser to bring it up in addition to the page(s) it is already opening. If you find that you have too many home pages, you may want to remove some, like this: 4)...

Words: 355 - Pages: 2

Premium Essay

Introduction to Computer

...GRAPHICS Road  safety Everyday many people are involved in road accidents. Some are killed. Many more are injured or maimed. So it is important for us to learn to use the roads properly and safely. No sane person would like to be involved in an accident. As the roads are very busy nowadays, we should be very careful when crossing one. It is safer to use a pedestrian crossing or an overhead bridge whenever one is available. Never cross a road by dashing across it. That is inviting trouble. If there are no crossings, then we must look carefully right and left and cross only when it is safe to do so. Some of us take the bus to school. It is important that we do not try to get on or off a bus while it is still moving. I tried to get on a moving bus once. It dragged me a short distance and nearly ran over me. I was lucky to escape with only some scratches on my legs. Also we must not fool around while in the bus. A suddenly lurch can send us knocking our heads against something hard. Using a bicycle can be dangerous too. We must pay attention on the road and never cycle too far out to the middle of the road. We must obey all traffic rules. Also we must make sure our bicycles are in good condition with working brakes, lights etc. These are some things we can do to avoid accidents. However there is no guarantee that we will never be involved in one. The important thing is to stay alert at all times while using the roads. We must know what is happening around us. In that way we can...

Words: 636 - Pages: 3

Premium Essay

Introduction to Computer

...Topics: Chapter 1 – Working Together Computers are everywhere. Watching television, driving a car, using a charge card, ordering fast food, and the more obvious activity of typing a term paper on a personal computer, all involve interaction with computers. For one day, have each member of your team make a list of every computer he or she encounters (be careful not to limit yourselves just to the computers you see). Meet with the members of your team and combine your lists. Consider how each computer is used. How were the tasks the computers perform done before computers? Use PowerPoint to create a group presentation and share your findings with the class. Chapter 2 – Working Together This chapter lists 12 types of Web sites: portal, news, informational, business/marketing, educational, entertainment, advocacy, blog, wiki, online social network, content aggregator, and personal. Working as a team, use the Internet to find at least two examples of each type of Web site. For each Web site, identify the Web address, the multimedia elements used, the purpose of the Web site, and type of Web site. Explain why you classified each site as you did. Then, keeping in mind the purpose of each Web site, rank the sites in terms of their effectiveness. Share your findings in a report and/or a PowerPoint presentation with the class. Chapter 3 – Working Together In any software application, each program is not exactly the same. Different spreadsheet programs, for example...

Words: 539 - Pages: 3

Free Essay

Computer Introduction

...MANUALE MATLAB http://www.ciaburro.it info@ciaburro.it Indice 1 Introduzione 1.1 Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Per iniziare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Fondamenti di Matlab 2.1 Capacit` di Matlab . . . . . . . . . . . . . a 2.2 Operazioni . . . . . . . . . . . . . . . . . 2.3 Espressioni . . . . . . . . . . . . . . . . . 2.4 Lavorare con le matrici . . . . . . . . . . . 2.5 Operazioni sui file . . . . . . . . . . . . . 2.6 Grafici . . . . . . . . . . . . . . . . . . . . 2.7 Operazioni sui grafici . . . . . . . . . . . . 2.8 Dati immaginari e complessi . . . . . . . . 2.9 Assi . . . . . . . . . . . . . . . . . . . . . 2.10 Alfabeto greco e caratteri speciali . . . . . 2.11 Immagini . . . . . . . . . . . . . . . . . . 2.12 Grafici di matrici . . . . . . . . . . . . . . 2.13 Help e Documentazione Online . . . . . . 2.14 L’Ambiente di MATLAB . . . . . . . . . 2.15 Ulteriori informazioni su Matrici ed Array 2.16 Strutture di controllo del flusso . . . . . . 2.17 Scripts e Funzioni . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 9607 - Pages: 39

Premium Essay

Introduction to Computers

...Choosing and Using Credit Cards Chances are you've recieved your share of "pre-approved" credit card offers in the mail, some with low introductory rates and other perks. Many of these solicitations urge you to accept "before the offer expires." Before you accept, shop around to get the best deal. Credit Card Terms A credit card is a form of borrowing that often involves charges. Credit terms and conditions affect your overall cost. So its wise to compare terms and fees before you agree to open a credit or charge card account. The following are some important terms to consider that generally must be disclosed in credit card applications or in solicitations that require know application. You also may want to ask about these terms when you're shopping for a card. Annual Percentage Rate. The APR is a measure of the cost of credit, expressed as a yearly rate. It also must be disclosed before you become obligated on the account and on your account statements. The card issuer also must disclose the "periodic rate" - the rate applied to your outstanding balance to figure the finance charge for each billing period. Some credit card plans allow the issuer to change your APR when interest rates or other economic indicators - called indexes - change. Because the rate change is linked to the index's performance, these plans are called "variable rate" programs. Rate changes raise or lower the finance charge on your account. If you're considering a variable rate card, the issuer must also...

Words: 1898 - Pages: 8

Premium Essay

Introduction to Computers

...Windows 7 Presentation APTECH COMPUTER EDUCATION What is an OS ? • Operating systems provide a software platform on top of which other programs, called application programs, can run. History of Microsoft Windows • 1980-MS-DOS • 1982–1985: Introducing Windows 1.0 • 1987–1992: Windows 2.0–2.11—More windows, more speed • 1990–1994: Windows 3.0–Windows NT—Getting the graphics • Windows NT • 1995–2001: Windows 95—the PC comes of age (and don't forget the Internet) • 1998–2000: Windows 98, Windows 2000, Windows Me Continue… • Windows 2000 Professional • 2001–2005: Windows XP—Stable, usable, and fast • 2006–2008: Windows Vista—Smart on security • 2009–Today: Windows 7(The version of Kernel is 7.0 or above 6.0) • Expecting Windows 8 Hardware Requirements Flavors of Windows 7 • • • • • • Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate Editions of Windows 7 Windows 7 Ultimate Windows 7 Home Premium Windows 7 Enterprise Windows 7 • Standard Professional consumer edition Consumers Windows 7 Home • Does not include Premium Windows 7 Home Basic Windows 7 Starter business features Windows 7 Targeted for value PCs enthusiasts for want all all for accessing for edition in targeted markets, in environments, • Business-focused edition,emergingwhomanagedWindows 7 small factor PCs full Windows The Professional editioncustomer. and lowermeant markets7 standardtechnicalfor forWindows...

Words: 2139 - Pages: 9

Premium Essay

Introduction to Computer

...Advantages and disadvantages of internal rate of return are important to understand before applying this technique to the projects. Most projects are well analyzed and interpreted by this well-known technique of evaluation and selection of investment projects. This technique has certain limitations in analyzing certain special kinds of projects like mutually exclusive projects, an unconventional set of cash flows, different project lives etc. ADVANTAGES OF INTERNAL RATE OF RETURN: The various advantages of internal rate of return method of evaluating investment projects are as follows: Time Value of Money: The first and the most important thing is that it considers the time value of money in evaluating a project which is a big lacking in accounting rate of return. Simplicity: The most attractive thing about this method is that it is very simple to interpret after the IRR is calculated. It is very easy to visualize for managers and that is why this is preferred till the time they come across certain occasional situations such as mutually exclusive projects etc. Hurdle Rate / Required Rate of Return has Not Required: The hurdle rate is a difficult and subjective thing to decide. In IRR, the hurdle rate or the required rate of return is not required for finding out IRR. It is not dependent on the hurdle rate and hence the risk of a wrong determination of hurdle rate is mitigated. Required Rate of Return is a Rough Estimate: A required rate of return is a rough estimate being made...

Words: 1163 - Pages: 5

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security requirements information...

Words: 1194 - Pages: 5

Free Essay

Introduction Computer Addiction

...Introduction It is undeniable that the computer has become an essential gadget for daily lives of every human being. The Internet is an absolute necessity for both adults and children. It is impossible to believe to do anything without the Internet, especially from the youth’s perspective. Youths today spend too much time on the computer, surfing the Internet for hours. Some have become much too addicted and don’t realize that they actually suffer from Internet Addiction Disorder (IAD). Let’s have a look at how computers directly have effects upon youths nowadays. One of the main consequences of spending too much time on the computer that youths are likely to disregard is personal neglect. When one is too obsessed with surfing the Internet, they tend to pay no attention to their standard of living apart from the computer which they are using. Some may not take bath, clean their room, or eat well as they are much too focused on what they are doing virtually. Because of the long hours spent engaged with a computer, youths often have eating irregularities, such as skipping meals or overeating. This indirectly leads to health disorders, for instance, malnutrition of the youth’s body. Isolation, avoidance and no family bonding at all is another outcome which happens in a youth’s life when they get excessively addicted with the Internet. Because of spending too much time on the computer, youths have a propensity to reduce socializing with others. They tend to feel that computer...

Words: 522 - Pages: 3

Free Essay

Introduction to Computer Security

...CSS150-1302B-04 Introduction to Computer Security Phase 3: Discussion Board 3 Networks, Cryptography, and Malicious Activity Professor: Shawn Murray June 5, 2013 In this paper I will discuss a malicious computer worm that spread rather quickly and affected thousands of people and targeted a company in Utah. I will discuss how the worm spread in detail. Lastly, I will discuss how to prevent / defend against such worms. On January 26, 2004 MyDoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi was a computer worm that affected Microsoft Windows (wildammo.com, 2010). MyDoom in 2004 had set the record for spreading the fastest through email. It was said to be started by e-mail spammers through junk mail being sent. That was one way the worm was sent. MyDoom was also sent out as failure sent messages. One of the messages that MyDoom had sent out was “Andy; I’m just doing my job, nothing personal, sorry.” (wildammo.com, 2010). With messages such as that and sent failure / system error messages, one whom was not knowledgeable of such worms would foolishly open it. These messages including but not limited to the one mentioned above brought suspicion to a lot of people and it was believed that the maker of the worm was paid. To date, the author of MyDoom is not known. It is thought though that MyDoom was created in Russia by a programmer (wildammo.com, 2010). In the result of MyDoom globally internet access had slowed down...

Words: 622 - Pages: 3

Premium Essay

Essential Introduction Computer

...Essential Introduction to Computers 1. Define the term computer and discuss the four basic computer operations: input, processing, output, and storage 2. Define data and information 3. Explain the principle components of the computer and their use 4. Describe the use and handling of floppy disks and hard disks 5. Discuss computer software and explain the difference between system software and application software 6. Identify several types of personal computer application software 7. Discuss computer communications channels and equipment and the Internet and World Wide Web 8. Explain how to purchase, install, and maintain a personal computer, a notebook computer, and a handheld computer 9. Define e-commerce 1. Computer: Input, Processing, Output, and Storage In today's world, computers are used for almost every task imaginable. Routine activities such as paying bills, buying groceries, or communicating with a friend can be done with a computer. That is why it is important not only to know how to use a computer, but also to understand the components of a computer and what they do. Recent studies report that almost 40% of homes surveyed have personal computers, and this number is growing. Given the widespread use of computers, computer literacy - a knowledge and understanding of computers and computer uses - has become an essential ingredient in the recipe for success in today's world. Florida was the first state to demand computer literacy...

Words: 2855 - Pages: 12

Free Essay

Introduction to Computer Addiction

...Since my freshman year of high school, I have used a computer for at least an hour (a conservative minimum) virtually every single day. At one point I would return from soccer practice at 6pm, shower, eat dinner, and then play about three hours of computer games before beginning my homework. My friends and I would plan computer game matches during 4 th period calculus rather than pay attention. My vision has declined since then from 20/20 to 20/25. I can easily spend hours on the computer, but I often tell myself that I do not have time to go running. The first thing I do when I return to my apartment is check my email. When I experience “writer's block” while using Microsoft Word, I have an overpowering urge to sign onto AOL Instant Messenger. Once “online,” I find it extremely difficult to sign off. Help me, Dr. Phil. The inspiration of this project is based on the following assumptions: A significant amount of college students share my experience of computer abuse. They find themselves staying on their computers longer than expected and sacrificing their daily objectives as a consequence. Because time is a scarce resource, computer use must be replacing other activities. Also, as the technology sector grows, jobs are becoming less physically demanding. Many employees sit down for hours, whether they are secretaries, programmers, researchers, administrative officials, etc, concentrating on small characters on their computer monitors. Not only is this substituting more active...

Words: 361 - Pages: 2

Premium Essay

Introduction to Computer Viruses

...The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened. The next thing usually the person whose computer might be infected with virus, panics. The person might think that all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick? They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site. There was a time when people were able to be sure that some sites...

Words: 366 - Pages: 2