Solution Manual for Fluency With Information Technology, 7th Edition
Solve textbook problems faster with Solution Manual for Fluency With Information Technology, 7th Edition, a must-have for every student.
John Wilson
Contributor
4.1
42
about 2 months ago
Preview (29 of 94)
Sign in to access the full document!
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Questions
Multiple Choice
1. In order for something to be
considered a computer it must have a
keyboard attached.
a. true
b. false
c. only certain computers
2. What was used to make analyzing
results faster for the 1890 census?
a. integrated circuits
b. processors
c. punch cards and punch card
readers
d. ENIAC
3. When using Google, Bing, Yahoo! or
DuckDuckGo, what keyword can be
used to provide you with a definition of
a certain term?
a. look-up
b. define
c. dictionary
d. definition
4. What word is interchangeable with
computer?
a. processor
b. desktop
c. personal
d. integrated circuit
5. What educational background is
required to write algorithms?
a. BS in Computer Science or
Computer Engineering
b. MS in Computer Science or
Computer Engineering
c. a high school diploma
d. no educational background is
required
6. An agent could be a
a. computer
b. human
c. program
d. all of the above
Answers
Multiple Choice
1. b
2. c
3. b
4. a
5. d
6. d
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Questions
Multiple Choice
1. In order for something to be
considered a computer it must have a
keyboard attached.
a. true
b. false
c. only certain computers
2. What was used to make analyzing
results faster for the 1890 census?
a. integrated circuits
b. processors
c. punch cards and punch card
readers
d. ENIAC
3. When using Google, Bing, Yahoo! or
DuckDuckGo, what keyword can be
used to provide you with a definition of
a certain term?
a. look-up
b. define
c. dictionary
d. definition
4. What word is interchangeable with
computer?
a. processor
b. desktop
c. personal
d. integrated circuit
5. What educational background is
required to write algorithms?
a. BS in Computer Science or
Computer Engineering
b. MS in Computer Science or
Computer Engineering
c. a high school diploma
d. no educational background is
required
6. An agent could be a
a. computer
b. human
c. program
d. all of the above
Answers
Multiple Choice
1. b
2. c
3. b
4. a
5. d
6. d
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Questions
Multiple Choice
1. In order for something to be
considered a computer it must have a
keyboard attached.
a. true
b. false
c. only certain computers
2. What was used to make analyzing
results faster for the 1890 census?
a. integrated circuits
b. processors
c. punch cards and punch card
readers
d. ENIAC
3. When using Google, Bing, Yahoo! or
DuckDuckGo, what keyword can be
used to provide you with a definition of
a certain term?
a. look-up
b. define
c. dictionary
d. definition
4. What word is interchangeable with
computer?
a. processor
b. desktop
c. personal
d. integrated circuit
5. What educational background is
required to write algorithms?
a. BS in Computer Science or
Computer Engineering
b. MS in Computer Science or
Computer Engineering
c. a high school diploma
d. no educational background is
required
6. An agent could be a
a. computer
b. human
c. program
d. all of the above
Answers
Multiple Choice
1. b
2. c
3. b
4. a
5. d
6. d
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Questions
Multiple Choice
1. In order for something to be
considered a computer it must have a
keyboard attached.
a. true
b. false
c. only certain computers
2. What was used to make analyzing
results faster for the 1890 census?
a. integrated circuits
b. processors
c. punch cards and punch card
readers
d. ENIAC
3. When using Google, Bing, Yahoo! or
DuckDuckGo, what keyword can be
used to provide you with a definition of
a certain term?
a. look-up
b. define
c. dictionary
d. definition
4. What word is interchangeable with
computer?
a. processor
b. desktop
c. personal
d. integrated circuit
5. What educational background is
required to write algorithms?
a. BS in Computer Science or
Computer Engineering
b. MS in Computer Science or
Computer Engineering
c. a high school diploma
d. no educational background is
required
6. An agent could be a
a. computer
b. human
c. program
d. all of the above
Answers
Multiple Choice
1. b
2. c
3. b
4. a
5. d
6. d
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Short Answer
1. _______ was the name of the first
electronic computer and it was located
in _______.
2. The instructions written in software
are followed or executed by _______.
3. _______ made computers more
affordable and allowed them to have
more complex CPUs.
4. _______, _______, and _______
were three technologies that
increased ones’ desire to own a
personal computer.
5. Complexity is _______ to
manufacture, though it remains
_______ to design.
6. Software is a collective term for
_______.
7. Abstracting requires that you to
separate information into two
categories: _______ and _______.
8. A program acts on _____ and results
in _____.
Exercises
1. How many computers do you have?
List them.
2. Explain in detail why the phrase
“software program” is redundant.
3. What is the difference between hard
and soft instructions?
4. Similar to video production, which is
now accessible to many
nonprofessionals, name two other
things that over time have been made
more accessible due to computer
software.
5. Explain why it is important to use the
right words when describing your
problem to tech support.
6. Explain in detail the difference
between booting and rebooting.
7. Write an algorithm that provides
someone with clear directions on how
to make your favorite snack.
Short Answer
1. ENIAC, Philadelphia
2. hardware
3. Transistors
4. email, games, word processing
5. cheap, expensive
6. programs
7. relevant, irrelevant
8. inputs, outputs
Exercises
1. Many possible answers. Should list
items like cell phones, game consoles,
etc.
2. Software is synonymous with
programs. No software exists that is
not a program or collection of
programs.
3. Hard instructions are executed by the
hardware, whereas the CPU runs soft
instructions.
4. Many possible answers. Could include
high fidelity audio reproduction,
academic research, real-time long
distance communication
5. The tech support staff knows the right
terms, and they will explain the
solution using the right terms, so you
need to know them to communicate
6. Booting is turning a computer on,
whereas rebooting is restarting a
computer that was already on.
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Short Answer
1. _______ was the name of the first
electronic computer and it was located
in _______.
2. The instructions written in software
are followed or executed by _______.
3. _______ made computers more
affordable and allowed them to have
more complex CPUs.
4. _______, _______, and _______
were three technologies that
increased ones’ desire to own a
personal computer.
5. Complexity is _______ to
manufacture, though it remains
_______ to design.
6. Software is a collective term for
_______.
7. Abstracting requires that you to
separate information into two
categories: _______ and _______.
8. A program acts on _____ and results
in _____.
Exercises
1. How many computers do you have?
List them.
2. Explain in detail why the phrase
“software program” is redundant.
3. What is the difference between hard
and soft instructions?
4. Similar to video production, which is
now accessible to many
nonprofessionals, name two other
things that over time have been made
more accessible due to computer
software.
5. Explain why it is important to use the
right words when describing your
problem to tech support.
6. Explain in detail the difference
between booting and rebooting.
7. Write an algorithm that provides
someone with clear directions on how
to make your favorite snack.
Short Answer
1. ENIAC, Philadelphia
2. hardware
3. Transistors
4. email, games, word processing
5. cheap, expensive
6. programs
7. relevant, irrelevant
8. inputs, outputs
Exercises
1. Many possible answers. Should list
items like cell phones, game consoles,
etc.
2. Software is synonymous with
programs. No software exists that is
not a program or collection of
programs.
3. Hard instructions are executed by the
hardware, whereas the CPU runs soft
instructions.
4. Many possible answers. Could include
high fidelity audio reproduction,
academic research, real-time long
distance communication
5. The tech support staff knows the right
terms, and they will explain the
solution using the right terms, so you
need to know them to communicate
6. Booting is turning a computer on,
whereas rebooting is restarting a
computer that was already on.
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Short Answer
1. _______ was the name of the first
electronic computer and it was located
in _______.
2. The instructions written in software
are followed or executed by _______.
3. _______ made computers more
affordable and allowed them to have
more complex CPUs.
4. _______, _______, and _______
were three technologies that
increased ones’ desire to own a
personal computer.
5. Complexity is _______ to
manufacture, though it remains
_______ to design.
6. Software is a collective term for
_______.
7. Abstracting requires that you to
separate information into two
categories: _______ and _______.
8. A program acts on _____ and results
in _____.
Exercises
1. How many computers do you have?
List them.
2. Explain in detail why the phrase
“software program” is redundant.
3. What is the difference between hard
and soft instructions?
4. Similar to video production, which is
now accessible to many
nonprofessionals, name two other
things that over time have been made
more accessible due to computer
software.
5. Explain why it is important to use the
right words when describing your
problem to tech support.
6. Explain in detail the difference
between booting and rebooting.
7. Write an algorithm that provides
someone with clear directions on how
to make your favorite snack.
Short Answer
1. ENIAC, Philadelphia
2. hardware
3. Transistors
4. email, games, word processing
5. cheap, expensive
6. programs
7. relevant, irrelevant
8. inputs, outputs
Exercises
1. Many possible answers. Should list
items like cell phones, game consoles,
etc.
2. Software is synonymous with
programs. No software exists that is
not a program or collection of
programs.
3. Hard instructions are executed by the
hardware, whereas the CPU runs soft
instructions.
4. Many possible answers. Could include
high fidelity audio reproduction,
academic research, real-time long
distance communication
5. The tech support staff knows the right
terms, and they will explain the
solution using the right terms, so you
need to know them to communicate
6. Booting is turning a computer on,
whereas rebooting is restarting a
computer that was already on.
Instructor Solutions Manual
Chapter 1: Defining Information Technology
Short Answer
1. _______ was the name of the first
electronic computer and it was located
in _______.
2. The instructions written in software
are followed or executed by _______.
3. _______ made computers more
affordable and allowed them to have
more complex CPUs.
4. _______, _______, and _______
were three technologies that
increased ones’ desire to own a
personal computer.
5. Complexity is _______ to
manufacture, though it remains
_______ to design.
6. Software is a collective term for
_______.
7. Abstracting requires that you to
separate information into two
categories: _______ and _______.
8. A program acts on _____ and results
in _____.
Exercises
1. How many computers do you have?
List them.
2. Explain in detail why the phrase
“software program” is redundant.
3. What is the difference between hard
and soft instructions?
4. Similar to video production, which is
now accessible to many
nonprofessionals, name two other
things that over time have been made
more accessible due to computer
software.
5. Explain why it is important to use the
right words when describing your
problem to tech support.
6. Explain in detail the difference
between booting and rebooting.
7. Write an algorithm that provides
someone with clear directions on how
to make your favorite snack.
Short Answer
1. ENIAC, Philadelphia
2. hardware
3. Transistors
4. email, games, word processing
5. cheap, expensive
6. programs
7. relevant, irrelevant
8. inputs, outputs
Exercises
1. Many possible answers. Should list
items like cell phones, game consoles,
etc.
2. Software is synonymous with
programs. No software exists that is
not a program or collection of
programs.
3. Hard instructions are executed by the
hardware, whereas the CPU runs soft
instructions.
4. Many possible answers. Could include
high fidelity audio reproduction,
academic research, real-time long
distance communication
5. The tech support staff knows the right
terms, and they will explain the
solution using the right terms, so you
need to know them to communicate
6. Booting is turning a computer on,
whereas rebooting is restarting a
computer that was already on.
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 1: Defining Information Technology
7. Many possible answers.
Instructor Solutions Manual
Chapter 1: Defining Information Technology
7. Many possible answers.
Loading page 4...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
Questions
Multiple Choice
1. What is a UI?
a. update identification
b. user identification
c. user interface
d. update interface
2. Which of the following is not a
common computer metaphor
a. buttons
b. door handles
c. menus
d. sliders
3. Which of the following is not an
instance?
a. image
b. song file
c. word processing document
d. menu
4. Computers do
a. exactly what you tell them to
do
b. only what other computers tell
them to do
c. instructions at random
d. everything
5. A good way to learn how to use a new
application or piece of software is to
a. read the entire manual
b. skim through the manual
c. call tech support
d. click around
6. Each time you paste, what is made of
that saved version?
a. file
b. copy
c. type
d. replace
7. What key sequence does ^C indicate
to the user?
a. Ctrl+C or Command+C
b. c
c. C
d. Caps Lock + C
8. When computers went mobile, this
Answers
Multiple Choice
1. c
2. b
3. d
4. a
5. d
6. b
7. a
8. d
9. b
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
Questions
Multiple Choice
1. What is a UI?
a. update identification
b. user identification
c. user interface
d. update interface
2. Which of the following is not a
common computer metaphor
a. buttons
b. door handles
c. menus
d. sliders
3. Which of the following is not an
instance?
a. image
b. song file
c. word processing document
d. menu
4. Computers do
a. exactly what you tell them to
do
b. only what other computers tell
them to do
c. instructions at random
d. everything
5. A good way to learn how to use a new
application or piece of software is to
a. read the entire manual
b. skim through the manual
c. call tech support
d. click around
6. Each time you paste, what is made of
that saved version?
a. file
b. copy
c. type
d. replace
7. What key sequence does ^C indicate
to the user?
a. Ctrl+C or Command+C
b. c
c. C
d. Caps Lock + C
8. When computers went mobile, this
Answers
Multiple Choice
1. c
2. b
3. d
4. a
5. d
6. b
7. a
8. d
9. b
Loading page 5...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
popular device was now a problem.
a. printer
b. keyboard
c. power cord
d. mouse
9. What company introduced the
mouse?
a. Microsoft
b. Apple
c. IBM
d. Xerox
Short Answer
1. Digital is better than analog encoding
of information because with digital it is
possible to have a(n) _______.
2. Software designers help users
understand their software through the
use of _______.
3. Open, New, Close, and Save can
usually be found in the _______
menu.
4. Perfect reproduction is a property of
_______ information.
5. In an application with menus, Undo,
Cut, Copy, and Paste can usually be
found in the _______ menu.
6. _______, _______, and _______ are
the three steps of the placeholder
technique.
7. _______ and _______ are important
to keep in mind when using a
placeholder.
8. _______ is any indication that the
computer is still processing a task or
has already completed it.
9. Overlapping windows were first used
in the user interface of the _______.
10. Usually applications from the same
vendor are _______.
Exercises
1. Explain the desktop metaphor.
2. Discuss the advantages of a
Short Answer
1. perfect reproduction
2. metaphors
3. File
4. digital
5. Edit
6. Hide, edit, restore
7. easy to type, not used anywhere else
8. feedback
9. Xerox Alto
10. consistent
Exercises
1. The desktop metaphor became the
way most people thought of using a
computer. The computer became a
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
popular device was now a problem.
a. printer
b. keyboard
c. power cord
d. mouse
9. What company introduced the
mouse?
a. Microsoft
b. Apple
c. IBM
d. Xerox
Short Answer
1. Digital is better than analog encoding
of information because with digital it is
possible to have a(n) _______.
2. Software designers help users
understand their software through the
use of _______.
3. Open, New, Close, and Save can
usually be found in the _______
menu.
4. Perfect reproduction is a property of
_______ information.
5. In an application with menus, Undo,
Cut, Copy, and Paste can usually be
found in the _______ menu.
6. _______, _______, and _______ are
the three steps of the placeholder
technique.
7. _______ and _______ are important
to keep in mind when using a
placeholder.
8. _______ is any indication that the
computer is still processing a task or
has already completed it.
9. Overlapping windows were first used
in the user interface of the _______.
10. Usually applications from the same
vendor are _______.
Exercises
1. Explain the desktop metaphor.
2. Discuss the advantages of a
Short Answer
1. perfect reproduction
2. metaphors
3. File
4. digital
5. Edit
6. Hide, edit, restore
7. easy to type, not used anywhere else
8. feedback
9. Xerox Alto
10. consistent
Exercises
1. The desktop metaphor became the
way most people thought of using a
computer. The computer became a
Loading page 6...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
consistent interface from both the
consumer’s and developer’s point of
view.
3. What is the purpose of computers
displaying progress bars when items
are loading?
4. Create a new document with the
following text: “*****”. Then find “**”
and replace with “*”. How many times
did it find and replace? Explain in
detail how the process worked.
5. Explain why feedback is important for
the user.
6. State the perfect reproduction
property of digital information and
explain its power.
7. Explain why both copy and paste are
considered copying information?
8. Angel decided to use the placeholder
“the” to stand for Theodore
Hertzsprung Englebert. Why was this
a bad placeholder for Angel to use?
Explain your answer in detail.
9. Explain the touch metaphor in detail,
and explain what changed about
computing.
10. Explain why the touch metaphor has
not replaced the desktop metaphor.
11. Why is it useful to “blaze away” when
using a new piece of software?
virtual desktop on which one could
store, view, and edit documents. Most
people were familiar with desks but
fewer understood command line
programs, so the metaphor made the
basic operations a computer could do
simpler for people to understand and
use.
2. Predictability helps both the user to
use the program and the developer to
build and maintain it. A program that
did different things at different times
for unclear or no reasons is virtually
useless and impossible to fix or
improve.
3. Inform the user that the computer is
still working, and giving an estimate of
how much work remains.
4. Two times: it found the first pair, and
then the second, didn’t match the final
star, and then performed the
replacement on both matches.
5. The user needs to know whether the
thing he asked a computer to do was
understood, whether it has completed,
and whether it was successful.
Otherwise, he will not know whether it
is safe or worthwhile to proceed. A
classic example is a progress bar
while waiting for a page to load: users
will quickly become impatient and
upset if they don’t know whether the
machine is working or if it has stalled.
The progress bar is a simple way to
reassure them.
6. With digital media, all copies are
identical since they are composed of
discrete parts (usually bits). It is
possible to quickly detect and correct
any flaw in the reproduction. This is
powerful because it means digital
information may be disseminated
broadly and easily.
7. ‘Copy’ makes a duplicate entry of the
selection in memory; ‘paste’
duplicates the contents of the memory
to the selection. Both are copies of
digital information.
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
consistent interface from both the
consumer’s and developer’s point of
view.
3. What is the purpose of computers
displaying progress bars when items
are loading?
4. Create a new document with the
following text: “*****”. Then find “**”
and replace with “*”. How many times
did it find and replace? Explain in
detail how the process worked.
5. Explain why feedback is important for
the user.
6. State the perfect reproduction
property of digital information and
explain its power.
7. Explain why both copy and paste are
considered copying information?
8. Angel decided to use the placeholder
“the” to stand for Theodore
Hertzsprung Englebert. Why was this
a bad placeholder for Angel to use?
Explain your answer in detail.
9. Explain the touch metaphor in detail,
and explain what changed about
computing.
10. Explain why the touch metaphor has
not replaced the desktop metaphor.
11. Why is it useful to “blaze away” when
using a new piece of software?
virtual desktop on which one could
store, view, and edit documents. Most
people were familiar with desks but
fewer understood command line
programs, so the metaphor made the
basic operations a computer could do
simpler for people to understand and
use.
2. Predictability helps both the user to
use the program and the developer to
build and maintain it. A program that
did different things at different times
for unclear or no reasons is virtually
useless and impossible to fix or
improve.
3. Inform the user that the computer is
still working, and giving an estimate of
how much work remains.
4. Two times: it found the first pair, and
then the second, didn’t match the final
star, and then performed the
replacement on both matches.
5. The user needs to know whether the
thing he asked a computer to do was
understood, whether it has completed,
and whether it was successful.
Otherwise, he will not know whether it
is safe or worthwhile to proceed. A
classic example is a progress bar
while waiting for a page to load: users
will quickly become impatient and
upset if they don’t know whether the
machine is working or if it has stalled.
The progress bar is a simple way to
reassure them.
6. With digital media, all copies are
identical since they are composed of
discrete parts (usually bits). It is
possible to quickly detect and correct
any flaw in the reproduction. This is
powerful because it means digital
information may be disseminated
broadly and easily.
7. ‘Copy’ makes a duplicate entry of the
selection in memory; ‘paste’
duplicates the contents of the memory
to the selection. Both are copies of
digital information.
Loading page 7...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
8. The temptation to replace the phrase
with the faster-to-type acronym for
now and use find and replace to
expand it later is high. But ‘the’ is a
common word in English, so there
would be many false positives that
would be replaced, wasting much
more time in later editing than was
saved by using the placeholder in the
first place.
9. The touch metaphor refers to an
illusion that the user is touching the
content of the display; the change was
required because it is inconvenient for
mobile devices to use a pointing
device like a mouse.
10. Desktop metaphor still has
advantages in certain situations.
11. Blazing away is a way to experiment
with the software and discover what it
does and how to use it.
Instructor Solutions Manual
Chapter 2: Exploring the Human-Computer Interface
8. The temptation to replace the phrase
with the faster-to-type acronym for
now and use find and replace to
expand it later is high. But ‘the’ is a
common word in English, so there
would be many false positives that
would be replaced, wasting much
more time in later editing than was
saved by using the placeholder in the
first place.
9. The touch metaphor refers to an
illusion that the user is touching the
content of the display; the change was
required because it is inconvenient for
mobile devices to use a pointing
device like a mouse.
10. Desktop metaphor still has
advantages in certain situations.
11. Blazing away is a way to experiment
with the software and discover what it
does and how to use it.
Loading page 8...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 3: The Basics of Networking
Questions
Multiple Choice
1. Saving information for possible reuse is called
a. caching
b. hopping
c. DNS lookup
d. serving
2. If the Internet consisted of four computers, there would
be six possible connections. If it consisted of five
computers, there would be ten possible connections.
How many connections are possible with ten
computers?
a. 10
b. 30
c. 45
d. infinite
3. What is the potential number of IPv4 addresses
available?
a. 65,536
b. 16,777,216
c. 4,294,967,296
d. infinite
4. Root name servers
a. maintain a list of all computer users
b. manage all emails sent
c. maintain the relationship between IP addresses
and symbolic computer names
d. maintain a list of all Web pages
5. This type of communication results in the sending and
receiving of information to occur at different times
a. synchronous
b. asynchronous
c. slow
d. DNS
6. The Internet is fast enough to mimic ________
communication.
a. synchronous
b. asynchronous
c. fast
d. LAN
7. The Internet and the World Wide Web are different
names for the same thing
a. true
b. it depends
c. The Internet is what we used to call the World
Wide Web
d. false
Answers
Multiple Choice
1. a
2. c
3. c
4. c
5. b
6. a
7. d
8. d
Instructor Solutions Manual
Chapter 3: The Basics of Networking
Questions
Multiple Choice
1. Saving information for possible reuse is called
a. caching
b. hopping
c. DNS lookup
d. serving
2. If the Internet consisted of four computers, there would
be six possible connections. If it consisted of five
computers, there would be ten possible connections.
How many connections are possible with ten
computers?
a. 10
b. 30
c. 45
d. infinite
3. What is the potential number of IPv4 addresses
available?
a. 65,536
b. 16,777,216
c. 4,294,967,296
d. infinite
4. Root name servers
a. maintain a list of all computer users
b. manage all emails sent
c. maintain the relationship between IP addresses
and symbolic computer names
d. maintain a list of all Web pages
5. This type of communication results in the sending and
receiving of information to occur at different times
a. synchronous
b. asynchronous
c. slow
d. DNS
6. The Internet is fast enough to mimic ________
communication.
a. synchronous
b. asynchronous
c. fast
d. LAN
7. The Internet and the World Wide Web are different
names for the same thing
a. true
b. it depends
c. The Internet is what we used to call the World
Wide Web
d. false
Answers
Multiple Choice
1. a
2. c
3. c
4. c
5. b
6. a
7. d
8. d
Loading page 9...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 3: The Basics of Networking
8. What can folders contain?
a. files
b. folders
c. neither files nor folders
d. both files and folders
Short Answer
1. All IP addresses of authoritative name servers for TLDs
are maintained and managed by 13 ________ servers.
2. A communication that goes out to many people within a
specific target audience is called a(n) ________.
3. A hierarchy of related computers on a network is called
a(n) _________.
4. Computers on an Ethernet network “tap” into a cable
called a(n) _________.
5. _________ is the main technology for local area
networks.
6. Local networks that support communications wholly
within an organization are called _________.
7. Special computers that send files to web browsers
elsewhere on the Internet are known as _________.
8. In a web address, http:// is the _________.
9. Files are often sent over the Internet via a process
known by the acronym _________.
10. The source file for a web page contains the _________
of the page, not the actual image of the page.
11. In the client/server structure, the customer’s computer is
the _________ and the business’ computer is the
_________.
12. When we get files from a server we are _________
them. When we put files on a server we are _________
them.
13. Instead of typing in the IP address, we use symbolic
names, which are also called ________.
14. In URLs, _________ are not case sensitive, but
_________ may be case sensitive.
15. When moving inside of a directory hierarchy, moving up
is the same as moving _________, and moving down is
the same as moving _________.
Exercises
1. Label the following with either an S to indicate
synchronous communication or an A to indicate
asynchronous communication
a. _________ movie
Short Answer
1. root name
2. multicast
3. domain
4. channel
5. Ethernet
6. intranets
7. web servers
8. protocol
9. FTP
10. description
11. client; server
12. downloading; uploading
13. domain names
14. domain names, pathnames
15. higher, lower
Instructor Solutions Manual
Chapter 3: The Basics of Networking
8. What can folders contain?
a. files
b. folders
c. neither files nor folders
d. both files and folders
Short Answer
1. All IP addresses of authoritative name servers for TLDs
are maintained and managed by 13 ________ servers.
2. A communication that goes out to many people within a
specific target audience is called a(n) ________.
3. A hierarchy of related computers on a network is called
a(n) _________.
4. Computers on an Ethernet network “tap” into a cable
called a(n) _________.
5. _________ is the main technology for local area
networks.
6. Local networks that support communications wholly
within an organization are called _________.
7. Special computers that send files to web browsers
elsewhere on the Internet are known as _________.
8. In a web address, http:// is the _________.
9. Files are often sent over the Internet via a process
known by the acronym _________.
10. The source file for a web page contains the _________
of the page, not the actual image of the page.
11. In the client/server structure, the customer’s computer is
the _________ and the business’ computer is the
_________.
12. When we get files from a server we are _________
them. When we put files on a server we are _________
them.
13. Instead of typing in the IP address, we use symbolic
names, which are also called ________.
14. In URLs, _________ are not case sensitive, but
_________ may be case sensitive.
15. When moving inside of a directory hierarchy, moving up
is the same as moving _________, and moving down is
the same as moving _________.
Exercises
1. Label the following with either an S to indicate
synchronous communication or an A to indicate
asynchronous communication
a. _________ movie
Short Answer
1. root name
2. multicast
3. domain
4. channel
5. Ethernet
6. intranets
7. web servers
8. protocol
9. FTP
10. description
11. client; server
12. downloading; uploading
13. domain names
14. domain names, pathnames
15. higher, lower
Loading page 10...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 3: The Basics of Networking
b. _________ chat session
c. _________ email
d. _________ video conference
e. _________ Web page
f. _________ book
g. _________ concert
h. _________ text messaging
i. _________ Web board
j. _________ blog
2. If you have previously visited a web page, the DNS
server usually knows the translation because it has
processed and saved it. Explain what happens if it does
not know the translation.
3. Go to http://internettrafficreport.com/namerica.htm and
check out the Internet traffic for North America. How
does the time of the day affect the traffic? How does the
time of the day affect overseas Internet traffic?
4. What is the file name of the web address above? Now,
try the web address above without the file name. What
do you get? Explain.
5. In this chapter, the author wrote: “The Internet is truly a
universal communications medium.” What is meant by
this? Explain your answer in detail.
6. What industries have prospered and which ones might
have suffered because of the growth of the Internet?
Why?
7. Are there more client computer or more server
computers on the Internet? Explain.
8. Explain how it is possible for the server to handle many
clients at a time.
9. Identify each part of the following URL:
http://airandspace.si.edu/exhibitions/gal100/pioneer.html
a. protocol ________
b. domain ________
c. top-level domain ________
d. pathname ________
e. web page ________
10. State what the following acronyms stand for, and briefly
explain each.
a. TCP/IP
b. LAN
c. WAN
d. DSL
e. WWW
f. URL
g. HTML
h. ISP
11. Explain in detail how telephone companies are now
Exercises
1. A,S,A,S,A,A,S,S,A,A
2. It then asks the authoritative name
server; which keeps the complete list
of the IP addresses with
corresponding domain names
3. Many possible answers
4. namerica.htm; the traffic report
navigation page. Without the
filename, students should get the
home page (and even though it
doesn't show in the URL, the page is
likely to be named index.html or
similar).
5. Many forms of communication.
Students will provide varying details.
6. Many possible answers, including
software companies that benefitted,
and newspapers that were harmed.
7. Client computers. One server can
serve many clients. Students will
provide varying details.
8. The client/server connection is brief,
so a server can move quickly from
one to another.
9. http://; airandspace.si.edu; .edu,
/exhibitions/gal100/pioneer.html;
pioneer.html
10. TCP/IP: Transmission Control
Protocol/Internet Protocol; LAN:
Local Area Network; WAN: Wide
Area Network; DSL: Digital
Subscriber Line; WWW: World Wide
Web; URL: Uniform Resource
Locator; HTML: Hypertext Markup
Language; ISP: Internet Service
Provider
11. They are sending conversations over
the Internet by digitizing speech and
putting it into IP packets at the
speaker’s end to send over the
Internet and then unpacked at the
listeners end and converted to the
Instructor Solutions Manual
Chapter 3: The Basics of Networking
b. _________ chat session
c. _________ email
d. _________ video conference
e. _________ Web page
f. _________ book
g. _________ concert
h. _________ text messaging
i. _________ Web board
j. _________ blog
2. If you have previously visited a web page, the DNS
server usually knows the translation because it has
processed and saved it. Explain what happens if it does
not know the translation.
3. Go to http://internettrafficreport.com/namerica.htm and
check out the Internet traffic for North America. How
does the time of the day affect the traffic? How does the
time of the day affect overseas Internet traffic?
4. What is the file name of the web address above? Now,
try the web address above without the file name. What
do you get? Explain.
5. In this chapter, the author wrote: “The Internet is truly a
universal communications medium.” What is meant by
this? Explain your answer in detail.
6. What industries have prospered and which ones might
have suffered because of the growth of the Internet?
Why?
7. Are there more client computer or more server
computers on the Internet? Explain.
8. Explain how it is possible for the server to handle many
clients at a time.
9. Identify each part of the following URL:
http://airandspace.si.edu/exhibitions/gal100/pioneer.html
a. protocol ________
b. domain ________
c. top-level domain ________
d. pathname ________
e. web page ________
10. State what the following acronyms stand for, and briefly
explain each.
a. TCP/IP
b. LAN
c. WAN
d. DSL
e. WWW
f. URL
g. HTML
h. ISP
11. Explain in detail how telephone companies are now
Exercises
1. A,S,A,S,A,A,S,S,A,A
2. It then asks the authoritative name
server; which keeps the complete list
of the IP addresses with
corresponding domain names
3. Many possible answers
4. namerica.htm; the traffic report
navigation page. Without the
filename, students should get the
home page (and even though it
doesn't show in the URL, the page is
likely to be named index.html or
similar).
5. Many forms of communication.
Students will provide varying details.
6. Many possible answers, including
software companies that benefitted,
and newspapers that were harmed.
7. Client computers. One server can
serve many clients. Students will
provide varying details.
8. The client/server connection is brief,
so a server can move quickly from
one to another.
9. http://; airandspace.si.edu; .edu,
/exhibitions/gal100/pioneer.html;
pioneer.html
10. TCP/IP: Transmission Control
Protocol/Internet Protocol; LAN:
Local Area Network; WAN: Wide
Area Network; DSL: Digital
Subscriber Line; WWW: World Wide
Web; URL: Uniform Resource
Locator; HTML: Hypertext Markup
Language; ISP: Internet Service
Provider
11. They are sending conversations over
the Internet by digitizing speech and
putting it into IP packets at the
speaker’s end to send over the
Internet and then unpacked at the
listeners end and converted to the
Loading page 11...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 3: The Basics of Networking
using the Internet.
12. What motivated engineers to make TCP/IP packets
more independent?
13. Why do webmasters sometimes register misspellings of
their domains?
analog form acceptable to a phone
12. Network reliability (broken links) and
congestion (busy links).
13. So when users type the incorrect
domain, they will be redirected to the
correct one
Instructor Solutions Manual
Chapter 3: The Basics of Networking
using the Internet.
12. What motivated engineers to make TCP/IP packets
more independent?
13. Why do webmasters sometimes register misspellings of
their domains?
analog form acceptable to a phone
12. Network reliability (broken links) and
congestion (busy links).
13. So when users type the incorrect
domain, they will be redirected to the
correct one
Loading page 12...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
Questions
Multiple Choice
1. HTML tags must be
a. uppercase
b. lowercase
c. case does not matter
d. either all uppercase or all lowercase
2. Space inserted to make a document more readable
is called
a. special space
b. white space
c. CSS space
d. HTML space
3. The <p> </p> tags indicate the beginning and end
of a
a. package
b. picture
c. paragraph
d. preformated text section
4. The attribute specifying a blue background is
a. bgcolor=#000000
b. background=”blue”
c. style=”background-color:blue”
d. bgcolor=blue
5. The ../ notation in a relative path of hypertext
reference means to
a. go down a folder
b. open the parent folder
c. search a folder
d. create a folder
6. To place an image on the right side of the window
with the text filling the area to the left of the image,
the tag would need to look like
a. <img src = “mountains.jpg” style=”float:right”
/>
b. <img src align = “mountains.jpg” “right” />
c. <img = “mountains.jpg” src slign = “right” />
d. <img = “mountains.jpg” align src =
“float:right” />
7. The dimensions for an image on a web page
a. are set using the x and y attributes
b. are set using the width and height attributes
c. must be set to the actual size of the image
d. are automatically adjusted by the browser to
fit in the space allotted
Answers
Multiple Choice
1. c
2. b
3. c
4. c
5. b
6. a
7. b
8. d
9. c
10. b
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
Questions
Multiple Choice
1. HTML tags must be
a. uppercase
b. lowercase
c. case does not matter
d. either all uppercase or all lowercase
2. Space inserted to make a document more readable
is called
a. special space
b. white space
c. CSS space
d. HTML space
3. The <p> </p> tags indicate the beginning and end
of a
a. package
b. picture
c. paragraph
d. preformated text section
4. The attribute specifying a blue background is
a. bgcolor=#000000
b. background=”blue”
c. style=”background-color:blue”
d. bgcolor=blue
5. The ../ notation in a relative path of hypertext
reference means to
a. go down a folder
b. open the parent folder
c. search a folder
d. create a folder
6. To place an image on the right side of the window
with the text filling the area to the left of the image,
the tag would need to look like
a. <img src = “mountains.jpg” style=”float:right”
/>
b. <img src align = “mountains.jpg” “right” />
c. <img = “mountains.jpg” src slign = “right” />
d. <img = “mountains.jpg” align src =
“float:right” />
7. The dimensions for an image on a web page
a. are set using the x and y attributes
b. are set using the width and height attributes
c. must be set to the actual size of the image
d. are automatically adjusted by the browser to
fit in the space allotted
Answers
Multiple Choice
1. c
2. b
3. c
4. c
5. b
6. a
7. b
8. d
9. c
10. b
Loading page 13...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
8. Betsy created some nested tags as displayed
below: <p><b><i>Rock On!</i></b></p>. Did she
nest the tags appropriatley?
a. No, italic tags must always come before
bold tags
b. No, paragraph tags need to be right before
the actual text.
c. The first part is right, but the second part
should be </p></b></i>
d. Yes, those tags are nested correctly.
9. What tags are required for an HTML page?
a. html, head
b. html, head, body, foot
c. html, head, body
d. no tags are required
10. If you want to display an image without any text
around it you should nest it inside of which tag(s)?
a. <p : img>
b. <p>
c. <pa>
d. <img><p>
Short Answer
1. The ________ tag is a way to get more than one
consecutive space in a line of a web page.
2. ________ tags are tags between other tags.
3. Specifications inside a tag are called ________.
4. The src in an image tag stands for ________.
5. To put the ten greatest inventions of all time, in
order, on a web page, you should use a(n)
________.
6. ________ is the main language that defines how a
web page should look.
7. ________ is the tag for the heading that is the
largest and the darkest.
8. HTML ________ whitespace.
9. ________ separates the content from the border.
Short Answer
1. <pre>
2. nested
3. attributes
4. source
5. ordered list <ol>
6. CSS
7. <h1>
8. ignores
9. padding
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
8. Betsy created some nested tags as displayed
below: <p><b><i>Rock On!</i></b></p>. Did she
nest the tags appropriatley?
a. No, italic tags must always come before
bold tags
b. No, paragraph tags need to be right before
the actual text.
c. The first part is right, but the second part
should be </p></b></i>
d. Yes, those tags are nested correctly.
9. What tags are required for an HTML page?
a. html, head
b. html, head, body, foot
c. html, head, body
d. no tags are required
10. If you want to display an image without any text
around it you should nest it inside of which tag(s)?
a. <p : img>
b. <p>
c. <pa>
d. <img><p>
Short Answer
1. The ________ tag is a way to get more than one
consecutive space in a line of a web page.
2. ________ tags are tags between other tags.
3. Specifications inside a tag are called ________.
4. The src in an image tag stands for ________.
5. To put the ten greatest inventions of all time, in
order, on a web page, you should use a(n)
________.
6. ________ is the main language that defines how a
web page should look.
7. ________ is the tag for the heading that is the
largest and the darkest.
8. HTML ________ whitespace.
9. ________ separates the content from the border.
Short Answer
1. <pre>
2. nested
3. attributes
4. source
5. ordered list <ol>
6. CSS
7. <h1>
8. ignores
9. padding
Loading page 14...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
Exercises
1. Explain why you should learn HTML if authoring
tools will do the work for you. Give other examples
of where you are expected to learn something
when there are tools available that will do the work.
2. How can you check if your HTML and CSS files
display correctly? How often should you check?
Why?
3. Indicate the hyperlink reference and the anchor text
in this anchor tag. Then break down the hyperlink
reference into the protocol, domain, path, and file
name.<a href="http://www.nasm.si.edu/museum/">
National Air and Space Museum</a>
4. Explain in detail what problems Cascading Style
Sheets (CSS) solve?
5. What does “the closest specification wins” mean?
Give a detailed example in your answer
6. Create a calendar for the current month using a
table. Put the name of the month in a caption at the
top. Change the color of the text for Sunday and
holidays. Make note of any special days during the
month. Add an appropriate graphic to one of the
blank cells at the end of the calendar.
7. Why is it a bad idea to write an entire HTML
document before loading it in a web browser?
8. View and then print the source for the author’s
homepage. It’s at
homes.cs.washington.edu/~snyder/index.html.
What is the title of the page? Indicate the heading
and the body for the page. Find the table. Find the
list. Find the email addresses, and say how they
are displayed so they are not found by a crawler.
Find the absolute hyperlinks and the relative
hyperlinks. How many graphics are on this page?
9. Create a link tag to your school’s website. Also
create a style section for the link tag. The link
should be yellow at the beginning, green after it has
been clicked on, and blue when someone is
hovering over it.
10. Open a new file in your text editor. Create your own
web page that has the following:
a. A title that is your name.
b. At least three paragraphs, two of them
displayed in different colors (find the colors
at
www.w3schools.com/colors/colors_names.a
sp).
Exercises
1. To learn how it is structured
for easy editing, for concept
understanding. Many
examples possible. Although
there are calculators, you
should earn basic arithmetic,
for example.
2. By loading the page in a
browser; very often (every
few new lines of code you
write); it is easier to find bugs
and mistakes as you go. If
you wait till the end to load
the page you will have to hunt
down many mistakes.
3. Hyperlink reference:
http://www.nasm.si.edu/muse
um/; anchor text: National Air
and Space Museum; protocol:
http:// domain:
www.nasm.si.edu; path:
/museum/; no file name given
(likely index.html)
4. No longer have to retype style
information, reusable, can
easily change the CSS for a
whole new design to a web
page without changing the
content
5. The style information closest
to the text will be used; the
style of a page overrides the
style of an external file.
6. Many possible answers
7. Large blocks of untested
coding usually contain many
errors that are hard to find.
8. Many possible answers.
9. Many possible answers.
10. Many possible answers.
11. Many possible answers.
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
Exercises
1. Explain why you should learn HTML if authoring
tools will do the work for you. Give other examples
of where you are expected to learn something
when there are tools available that will do the work.
2. How can you check if your HTML and CSS files
display correctly? How often should you check?
Why?
3. Indicate the hyperlink reference and the anchor text
in this anchor tag. Then break down the hyperlink
reference into the protocol, domain, path, and file
name.<a href="http://www.nasm.si.edu/museum/">
National Air and Space Museum</a>
4. Explain in detail what problems Cascading Style
Sheets (CSS) solve?
5. What does “the closest specification wins” mean?
Give a detailed example in your answer
6. Create a calendar for the current month using a
table. Put the name of the month in a caption at the
top. Change the color of the text for Sunday and
holidays. Make note of any special days during the
month. Add an appropriate graphic to one of the
blank cells at the end of the calendar.
7. Why is it a bad idea to write an entire HTML
document before loading it in a web browser?
8. View and then print the source for the author’s
homepage. It’s at
homes.cs.washington.edu/~snyder/index.html.
What is the title of the page? Indicate the heading
and the body for the page. Find the table. Find the
list. Find the email addresses, and say how they
are displayed so they are not found by a crawler.
Find the absolute hyperlinks and the relative
hyperlinks. How many graphics are on this page?
9. Create a link tag to your school’s website. Also
create a style section for the link tag. The link
should be yellow at the beginning, green after it has
been clicked on, and blue when someone is
hovering over it.
10. Open a new file in your text editor. Create your own
web page that has the following:
a. A title that is your name.
b. At least three paragraphs, two of them
displayed in different colors (find the colors
at
www.w3schools.com/colors/colors_names.a
sp).
Exercises
1. To learn how it is structured
for easy editing, for concept
understanding. Many
examples possible. Although
there are calculators, you
should earn basic arithmetic,
for example.
2. By loading the page in a
browser; very often (every
few new lines of code you
write); it is easier to find bugs
and mistakes as you go. If
you wait till the end to load
the page you will have to hunt
down many mistakes.
3. Hyperlink reference:
http://www.nasm.si.edu/muse
um/; anchor text: National Air
and Space Museum; protocol:
http:// domain:
www.nasm.si.edu; path:
/museum/; no file name given
(likely index.html)
4. No longer have to retype style
information, reusable, can
easily change the CSS for a
whole new design to a web
page without changing the
content
5. The style information closest
to the text will be used; the
style of a page overrides the
style of an external file.
6. Many possible answers
7. Large blocks of untested
coding usually contain many
errors that are hard to find.
8. Many possible answers.
9. Many possible answers.
10. Many possible answers.
11. Many possible answers.
Loading page 15...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
c. A link to a website you like.
d. At least three levels of headings.
e. A link to the page you made in Exercise 9.
f. At least one image or picture.
g. Save this file as YourInitialsWeb2.html.
11. Make a copy of the web page you made in
Exercise 8. (Yes, make a copy; if you edit the
original, you will lose it.) Then make the following
additions:
a. Add a paragraph that contains a list of four
of your favorite music groups. Before the
list, put in this level 2 heading: My favorite
musical groups.
b. Add a table at the bottom of the page that
has two rows and three columns. In the first
row, list three of your favorite restaurants; in
the second row, list your favorite food at
each of the restaurants in the first row.
c. Set the background color to an attractive
pastel color.
d. Add a link to a web page. For example, you
might want to link to your home page on a
social networking site if you have one, or a
website for one the restaurants you listed in
(b).
Instructor Solutions Manual
Chapter 4: A Hypertext Markup Language Primer
c. A link to a website you like.
d. At least three levels of headings.
e. A link to the page you made in Exercise 9.
f. At least one image or picture.
g. Save this file as YourInitialsWeb2.html.
11. Make a copy of the web page you made in
Exercise 8. (Yes, make a copy; if you edit the
original, you will lose it.) Then make the following
additions:
a. Add a paragraph that contains a list of four
of your favorite music groups. Before the
list, put in this level 2 heading: My favorite
musical groups.
b. Add a table at the bottom of the page that
has two rows and three columns. In the first
row, list three of your favorite restaurants; in
the second row, list your favorite food at
each of the restaurants in the first row.
c. Set the background color to an attractive
pastel color.
d. Add a link to a web page. For example, you
might want to link to your home page on a
social networking site if you have one, or a
website for one the restaurants you listed in
(b).
Loading page 16...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
Questions
Multiple Choice
1. Some web pages are “invisible.” That is, no
search engine will return them in a query. Why
do these pages exist?
a. no other web page links to them
b. they are synthetic
c. they are file types browsers don’t
understand
d. all of the above
2. The main responsibility of a crawler is to
a. find web pages with false or illegal
information
b. count the number of web pages
c. make sure lots of people visit certain
pages
d. build a list of tokens that are associated
with each page
3. When picking additional sources you should
choose
a. independent sources
b. sources created by the same author
c. sources with the same domain name
d. additional sources are never needed
4. Enclosing search terms in quotes asks for
pages with
a. the search terms in any order
b. the search terms in the exact order as
written
c. only the first word in the search terms
d. only some of the words in the search
terms
5. When searching on Google, this is the same as
using the AND keyword.
a. +
b. OR
c. blank space
d. -
6. A primary source is
a. something shared by a government
b. a person with direct knowledge
c. a teacher or librarian
d. the person who created the website
7. Who is in charge of the World Wide Web?
a. Vint Cerf
Answers
Multiple Choice
1. d
2. d
3. a
4. b
5. c
6. b
7. d
8. c
9. a
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
Questions
Multiple Choice
1. Some web pages are “invisible.” That is, no
search engine will return them in a query. Why
do these pages exist?
a. no other web page links to them
b. they are synthetic
c. they are file types browsers don’t
understand
d. all of the above
2. The main responsibility of a crawler is to
a. find web pages with false or illegal
information
b. count the number of web pages
c. make sure lots of people visit certain
pages
d. build a list of tokens that are associated
with each page
3. When picking additional sources you should
choose
a. independent sources
b. sources created by the same author
c. sources with the same domain name
d. additional sources are never needed
4. Enclosing search terms in quotes asks for
pages with
a. the search terms in any order
b. the search terms in the exact order as
written
c. only the first word in the search terms
d. only some of the words in the search
terms
5. When searching on Google, this is the same as
using the AND keyword.
a. +
b. OR
c. blank space
d. -
6. A primary source is
a. something shared by a government
b. a person with direct knowledge
c. a teacher or librarian
d. the person who created the website
7. Who is in charge of the World Wide Web?
a. Vint Cerf
Answers
Multiple Choice
1. d
2. d
3. a
4. b
5. c
6. b
7. d
8. c
9. a
Loading page 17...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
b. Larry Page and Sergey Brin
c. the United States government
d. no one
8. When should a researcher be skeptical of a
primary source?
a. never; primary sources are always
credible.
b. when the primary source is only one
person
c. always; the researcher should make
sure to verify the information from other
sources
d. about 50% of the time; it depends on
the situation
9. After finding the web page you want what is the
next question you should ask yourself?
a. Is the information authoritative?
b. When was the web page first
published?
c. Who owns this web page?
d. Could I find this same web page using a
different search engine?
Short Answer
1. The higher the ________ is, the closer to the
top of the list a web page will be in the returned
results of a search query.
2. ________ in Google search queries are
interpreted as AND.
3. The main work of the ________ is to build an
index.
4. If a web page meets all the authoritative rules
given in this chapter it can still contain
________ information.
5. _______ is the keyboard short cut for finding
certain words on a web page.
6. Treating query terms as independent is almost
________ what you actually want.
7. Wikipedia is validated by ________.
8. Wikipedia is not considered a ________
source.
9. Crawlers crawl less than ________ of the Web.
10. To find corroborating information on the Web
you should always ________with another
Short Answer
1. page rank
2. spaces
3. crawler
4. false
5. ^F: Ctrl+F or Command+F
6. always
7. no one
8. credible
9. half
10. cross-check
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
b. Larry Page and Sergey Brin
c. the United States government
d. no one
8. When should a researcher be skeptical of a
primary source?
a. never; primary sources are always
credible.
b. when the primary source is only one
person
c. always; the researcher should make
sure to verify the information from other
sources
d. about 50% of the time; it depends on
the situation
9. After finding the web page you want what is the
next question you should ask yourself?
a. Is the information authoritative?
b. When was the web page first
published?
c. Who owns this web page?
d. Could I find this same web page using a
different search engine?
Short Answer
1. The higher the ________ is, the closer to the
top of the list a web page will be in the returned
results of a search query.
2. ________ in Google search queries are
interpreted as AND.
3. The main work of the ________ is to build an
index.
4. If a web page meets all the authoritative rules
given in this chapter it can still contain
________ information.
5. _______ is the keyboard short cut for finding
certain words on a web page.
6. Treating query terms as independent is almost
________ what you actually want.
7. Wikipedia is validated by ________.
8. Wikipedia is not considered a ________
source.
9. Crawlers crawl less than ________ of the Web.
10. To find corroborating information on the Web
you should always ________with another
Short Answer
1. page rank
2. spaces
3. crawler
4. false
5. ^F: Ctrl+F or Command+F
6. always
7. no one
8. credible
9. half
10. cross-check
Loading page 18...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
independent web page.
Exercises
1. Why do we need search engines? What do
search engines do? Answer both of these
questions in great detail.
2. Explain what a crawler is and what it does.
3. Explain why in the past physical books were
trusted much more than web pages are trusted
today.
4. Is the information on
journalofpetitelapgiraffescience.weebly.com/sok
oblovsky-farms.html and
http://www.ovaprima.org/ true and accurate?
Explain how you know.
5. Explain the differences between the AND and
OR logical operators and when you should use
them in web searches.
6. What is an independent source, and why is it
important to use independent sources when
researching?
7. Give three examples of when you would want
to use quotes around your search query.
8. What is a cached page and how is it useful?
9. Provide at least two concrete examples of when
you would want to limit the domain of your web
search.
10. What are the pros and cons of using Wikipedia
to find information?
11. Use the search query “HTML quick reference”
in your prefered search engine. Then describe
each part of the first result found including Page
Title, Snippet, URL, Cached, and Site Links
12. What are the rules for Intersecting Alphabetized
Lists? How are they used to implement search
queries?
Exercises
1. Many possible answers that
touch on the fact that web
content is not organized and
search engines look around
and organize what they find.
2. A crawler searches the World
Wide Web for URLs and
tokens. The main work of
crawler is to build an index (a
list of tokens) that are
associated with the page. For
each token, the crawler
creates a list of the URLs
associated with that token.
3. Physical books went through
a detailed process involving
many experts. Anyone can
post any information (fake or
real) on a web page.
4. No. Many possible answers.
5. When using AND all terms
must be on the page, when
using OR one or more terms
can be on the page. Many
possible answers.
6. To verify the information. If
you use dependent
information then they can both
be wrong since the
information is coming from the
same source.
7. Many possible answers,
possibly including book titles,
quotations, music lyrics.
8. Cached pages are stored by
the search engine on their last
crawl of the web site. A
cached website can be useful
when the website is down,
has recently been changed
but not crawled, and to find
out the date the web page
was last crawled.
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
independent web page.
Exercises
1. Why do we need search engines? What do
search engines do? Answer both of these
questions in great detail.
2. Explain what a crawler is and what it does.
3. Explain why in the past physical books were
trusted much more than web pages are trusted
today.
4. Is the information on
journalofpetitelapgiraffescience.weebly.com/sok
oblovsky-farms.html and
http://www.ovaprima.org/ true and accurate?
Explain how you know.
5. Explain the differences between the AND and
OR logical operators and when you should use
them in web searches.
6. What is an independent source, and why is it
important to use independent sources when
researching?
7. Give three examples of when you would want
to use quotes around your search query.
8. What is a cached page and how is it useful?
9. Provide at least two concrete examples of when
you would want to limit the domain of your web
search.
10. What are the pros and cons of using Wikipedia
to find information?
11. Use the search query “HTML quick reference”
in your prefered search engine. Then describe
each part of the first result found including Page
Title, Snippet, URL, Cached, and Site Links
12. What are the rules for Intersecting Alphabetized
Lists? How are they used to implement search
queries?
Exercises
1. Many possible answers that
touch on the fact that web
content is not organized and
search engines look around
and organize what they find.
2. A crawler searches the World
Wide Web for URLs and
tokens. The main work of
crawler is to build an index (a
list of tokens) that are
associated with the page. For
each token, the crawler
creates a list of the URLs
associated with that token.
3. Physical books went through
a detailed process involving
many experts. Anyone can
post any information (fake or
real) on a web page.
4. No. Many possible answers.
5. When using AND all terms
must be on the page, when
using OR one or more terms
can be on the page. Many
possible answers.
6. To verify the information. If
you use dependent
information then they can both
be wrong since the
information is coming from the
same source.
7. Many possible answers,
possibly including book titles,
quotations, music lyrics.
8. Cached pages are stored by
the search engine on their last
crawl of the web site. A
cached website can be useful
when the website is down,
has recently been changed
but not crawled, and to find
out the date the web page
was last crawled.
Loading page 19...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
9. Many possible answers,
including the fact that yoy
know where to find the
information, or you know that
the institution is an academic
institution.
10. Many possible answers.
Should touch on the
community based approach,
and the fact that Wikipedia
states they are not a credible
source, not validated by
domain experts.
11. Many possible answers.
12. The rules for IALs are: Put a
marker at the start of each
token's list; if all markers point
to the same URL, save it;
move markers to the next
position; repeat until some
marker reaches the end of the
list, then quit. This is the
process search engines follow
when searching for multiple
tokens (locating pages with
multiple search terms).
Instructor Solutions Manual
Chapter 5: Locating Information on the WWW
9. Many possible answers,
including the fact that yoy
know where to find the
information, or you know that
the institution is an academic
institution.
10. Many possible answers.
Should touch on the
community based approach,
and the fact that Wikipedia
states they are not a credible
source, not validated by
domain experts.
11. Many possible answers.
12. The rules for IALs are: Put a
marker at the start of each
token's list; if all markers point
to the same URL, save it;
move markers to the next
position; repeat until some
marker reaches the end of the
list, then quit. This is the
process search engines follow
when searching for multiple
tokens (locating pages with
multiple search terms).
Loading page 20...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
Questions
Multiple Choice
1. The first step in the debugging process is to
a. check for obvious errors
b. reproduce the problem
c. isolate the problem
d. determine the exact problem
2. Computers do exactly the same thing every time when
given the same input. What is this property called?
a. fail-safe
b. correct
c. deterministic
d. reproducible
3. Most software
a. contains bugs
b. is bug free
c. contains no known bugs
d. works exactly as it should in every
circumstance
4. When using computers, what is the most common
source of problems?
a. hardware failures
b. human error
c. Internet outages
d. software failures
5. What does the ‘s’ stand for in https?
a. secure
b. site
c. safe
d. standard
6. When testing, it is never possible to establish the
________ of a program.
a. output
b. run time
c. correctness
d. author
7. Not only is the computer unable to ________ itself, we
can’t ________ it directly, either.
a. power
b. create
c. correct
d. debug
8. What built-in tool in most browsers can help you
debug a web page?
a. validator
Answers
Multiple Choice
1. b
2. c
3. a
4. b
5. a
6. c
7. d
8. b
9. d
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
Questions
Multiple Choice
1. The first step in the debugging process is to
a. check for obvious errors
b. reproduce the problem
c. isolate the problem
d. determine the exact problem
2. Computers do exactly the same thing every time when
given the same input. What is this property called?
a. fail-safe
b. correct
c. deterministic
d. reproducible
3. Most software
a. contains bugs
b. is bug free
c. contains no known bugs
d. works exactly as it should in every
circumstance
4. When using computers, what is the most common
source of problems?
a. hardware failures
b. human error
c. Internet outages
d. software failures
5. What does the ‘s’ stand for in https?
a. secure
b. site
c. safe
d. standard
6. When testing, it is never possible to establish the
________ of a program.
a. output
b. run time
c. correctness
d. author
7. Not only is the computer unable to ________ itself, we
can’t ________ it directly, either.
a. power
b. create
c. correct
d. debug
8. What built-in tool in most browsers can help you
debug a web page?
a. validator
Answers
Multiple Choice
1. b
2. c
3. a
4. b
5. a
6. c
7. d
8. b
9. d
Loading page 21...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
b. error console
c. error tracker
d. bookmark
9. How do we know the software running safety-critical
systems is perfect?
a. by using the debugging process
b. by using a special kind of software to test it
c. by letting users try out the software before it is
released
d. we can’t
Short Answer
1. You should expect ________ when interacting with
software.
2. An alternative approach to get around a problem is
called a(n) ________.
3. A(n) ________ program continues to operate when
there is a problem, although its efficiency may be
degraded.
4. A(n) ________ program shuts down to avoid causing
problems.
5. Computers don’t understand what we ________, only
what we ________.
6. Bugs in commercial software are usually fixed
________.
7. Computers are ________, which means that they will
do exactly the same thing every time if given the same
input.
8. ________ is the most obvious HTML error.
9. Errors in programs are generally not tough to
________, just tough to ________.
10. Program testing reveals only the ________ of bugs,
never their ________.
Exercises
1. Explain in detail why error messages produced by a
computer do not usually explain exactly what the
problem is.
2. Use debugging strategies that you have been using
since grade school to check the math on this problem
(* means multiplication)
Short Answer
1. feedback
2. workaround
3. fail-soft
4. fail-safe
5. mean, say
6. in an updated version
7. deterministic
8. forgetting an end tag
9. fix, locate
10. presence, absence
Exercises
1. Errors can be in any
layer of the software
implementing an app;
users are in the top
layer only.
2. Order of operations
3. Possible answers
should emphasize
getting this one
document printed.
4. Many possible
answers.
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
b. error console
c. error tracker
d. bookmark
9. How do we know the software running safety-critical
systems is perfect?
a. by using the debugging process
b. by using a special kind of software to test it
c. by letting users try out the software before it is
released
d. we can’t
Short Answer
1. You should expect ________ when interacting with
software.
2. An alternative approach to get around a problem is
called a(n) ________.
3. A(n) ________ program continues to operate when
there is a problem, although its efficiency may be
degraded.
4. A(n) ________ program shuts down to avoid causing
problems.
5. Computers don’t understand what we ________, only
what we ________.
6. Bugs in commercial software are usually fixed
________.
7. Computers are ________, which means that they will
do exactly the same thing every time if given the same
input.
8. ________ is the most obvious HTML error.
9. Errors in programs are generally not tough to
________, just tough to ________.
10. Program testing reveals only the ________ of bugs,
never their ________.
Exercises
1. Explain in detail why error messages produced by a
computer do not usually explain exactly what the
problem is.
2. Use debugging strategies that you have been using
since grade school to check the math on this problem
(* means multiplication)
Short Answer
1. feedback
2. workaround
3. fail-soft
4. fail-safe
5. mean, say
6. in an updated version
7. deterministic
8. forgetting an end tag
9. fix, locate
10. presence, absence
Exercises
1. Errors can be in any
layer of the software
implementing an app;
users are in the top
layer only.
2. Order of operations
3. Possible answers
should emphasize
getting this one
document printed.
4. Many possible
answers.
Loading page 22...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
3. Design several workarounds for the computer printing
error. Pretend it’s your term paper and it has to be
printed. How would you get around the problem that
the computer and the printer aren’t printing?
4. Describe a time when you “debugged” something in
your life (it does not need to relate to computers).
5. Suppose your friend’s personal music player (such as
an iPod) isn’t playing any songs. Explain the process
you would go through to debug the problem. List at
least eight questions you would ask, and explain how
each is an application of the debugging guidelines.
6. Explain the differences between fail-soft and fail-safe.
7. Why is debugging a better approach than aimlessly
“trying stuff”?
8. List five questions you should ask yourself while
debugging?
9. Why do programmers never say they are “down to the
very last bug”? Provide a concrete example that
illustrates this using HTML (your example should be
your own, not come directly from this book).
10. Explain in detail three things you can try if you have
followed the debugging process and are still unable to
fix the problem.
5. Possible answers
should say how to
apply the debugging
heuristics.
6. Fail-soft is when the
programming
continues to operate
but with possible loss
of functionality. Fail-
safe is when the
program stops
operating.
7. Debugging is
purposeful and goal-
directed, and so is
more likely to solve
the problem.
8. Many possible
answers. Three
possibilities: “Is there
a wrong
assumption?”, “Did I
misunderstand the
data?” “Did I make a
wrong deduction?”
9. Once that bug is fixed
it could result in more
bugs being revealed.
Many possible
answers.
10. Many possible
answers.
Instructor Solutions Manual
Chapter 6: An Introduction to Debugging
3. Design several workarounds for the computer printing
error. Pretend it’s your term paper and it has to be
printed. How would you get around the problem that
the computer and the printer aren’t printing?
4. Describe a time when you “debugged” something in
your life (it does not need to relate to computers).
5. Suppose your friend’s personal music player (such as
an iPod) isn’t playing any songs. Explain the process
you would go through to debug the problem. List at
least eight questions you would ask, and explain how
each is an application of the debugging guidelines.
6. Explain the differences between fail-soft and fail-safe.
7. Why is debugging a better approach than aimlessly
“trying stuff”?
8. List five questions you should ask yourself while
debugging?
9. Why do programmers never say they are “down to the
very last bug”? Provide a concrete example that
illustrates this using HTML (your example should be
your own, not come directly from this book).
10. Explain in detail three things you can try if you have
followed the debugging process and are still unable to
fix the problem.
5. Possible answers
should say how to
apply the debugging
heuristics.
6. Fail-soft is when the
programming
continues to operate
but with possible loss
of functionality. Fail-
safe is when the
program stops
operating.
7. Debugging is
purposeful and goal-
directed, and so is
more likely to solve
the problem.
8. Many possible
answers. Three
possibilities: “Is there
a wrong
assumption?”, “Did I
misunderstand the
data?” “Did I make a
wrong deduction?”
9. Once that bug is fixed
it could result in more
bugs being revealed.
Many possible
answers.
10. Many possible
answers.
Loading page 23...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
Questions
Multiple Choice
1. How many symbols can be represented by four
bits?
a. 12
b. 16
c. 36
d. 256
2. PandA representation is what kind of system?
a. decimal
b. binary
c. hexadecimal
d. byte
3. What was used to help structure the digitized
Oxford English Dictionary?
a. bytes
b. sets
c. ASCII
d. tags
4. This defines how characters relate to each other
when they are compared.
a. digitizing
b. binary sequence
c. collating sequence
d. information representation
5. When using physical phenomena to encode
information, name one potential solution if there
are more than two alternatives.
a. There is no solution
b. adopt them all as present
c. adopt one as present and all the other
alternatives as absent
d. adopt them all as absent
6. Information describing information is called
a. special information
b. metadata
c. special-data
d. formatting
7. K bits in a sequence yield how many symbols?
a.
b.
c.
d.
Answers
Multiple Choice
1. b
2. b
3. d
4. c
5. c
6. b
7. b
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
Questions
Multiple Choice
1. How many symbols can be represented by four
bits?
a. 12
b. 16
c. 36
d. 256
2. PandA representation is what kind of system?
a. decimal
b. binary
c. hexadecimal
d. byte
3. What was used to help structure the digitized
Oxford English Dictionary?
a. bytes
b. sets
c. ASCII
d. tags
4. This defines how characters relate to each other
when they are compared.
a. digitizing
b. binary sequence
c. collating sequence
d. information representation
5. When using physical phenomena to encode
information, name one potential solution if there
are more than two alternatives.
a. There is no solution
b. adopt them all as present
c. adopt one as present and all the other
alternatives as absent
d. adopt them all as absent
6. Information describing information is called
a. special information
b. metadata
c. special-data
d. formatting
7. K bits in a sequence yield how many symbols?
a.
b.
c.
d.
Answers
Multiple Choice
1. b
2. b
3. d
4. c
5. c
6. b
7. b
Loading page 24...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
Short Answer
1. PandA is short for ________.
2. ________ encode information on DVDs and
CDs.
3. Hexadecimal is base ________.
4. Grouping binary digits in groups of four names
makes converting to ________ easier.
5. ________ is the name we use for the two
fundamental patterns of digital information based
on the presence and absence of a phenomenon.
6. Information is said to be ________, or distinct;
there is no gray.
7. The number of digits is the ________ or the
________ of the numbering system.
8. The more symbols you want, the more
________ you need.
9. ________ is representing information with
symbols.
Exercises
1. Make a list of the numbers you use that are not
treated as numbers (e.g., phone numbers).
2. Create a list of ten different PandA encodings
that are different from those presented in this
chapter.
3. Encode (800) 555-0012 in ASCII, including
punctuation.
4. This chapter mentions that it does not matter
whether 0 represents present or absent. Explain
in detail why this is the case.
5. Translate the following hexadecimal into binary
and then into ASCII. 68 65 78 61 64 65 63 69 6D
61 6C
6. Encode the following ISBN number in ASCII:
978-3-16-148410-0
7. You have discovered the following string of
binary ASCII code; figure out what they mean
01010111 01100001 01111001 00100000
01110100 01101111 00100000 01100111
01101111 00100001
8. Explain the relationship between the number D
and
Short Answer
1. presence and absence
2. Bumps or pits
3. 16
4. hex
5. PandA
6. discrete
7. base, radix
8. bits
9. Digitizing
Exercises
1. Many possible answers
2. Many possible answers
3. 00101000 00111000
00110000 00110000
00101001 00110101
00110101 00110101
00101101 00110000
00110000 00110001
00110010
4. As long as the system is
consistent it is not important
what symbols represent
present and absent.
5. 01101000 01100101
01111000 01100001
01100100 01100101
01100011 01101001
01101101 01100001
01101100; hexadecimal
6. 00111001 00110111
00111000 00101101
00110011 00101101
00110001 00110110
00101101 00110001
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
Short Answer
1. PandA is short for ________.
2. ________ encode information on DVDs and
CDs.
3. Hexadecimal is base ________.
4. Grouping binary digits in groups of four names
makes converting to ________ easier.
5. ________ is the name we use for the two
fundamental patterns of digital information based
on the presence and absence of a phenomenon.
6. Information is said to be ________, or distinct;
there is no gray.
7. The number of digits is the ________ or the
________ of the numbering system.
8. The more symbols you want, the more
________ you need.
9. ________ is representing information with
symbols.
Exercises
1. Make a list of the numbers you use that are not
treated as numbers (e.g., phone numbers).
2. Create a list of ten different PandA encodings
that are different from those presented in this
chapter.
3. Encode (800) 555-0012 in ASCII, including
punctuation.
4. This chapter mentions that it does not matter
whether 0 represents present or absent. Explain
in detail why this is the case.
5. Translate the following hexadecimal into binary
and then into ASCII. 68 65 78 61 64 65 63 69 6D
61 6C
6. Encode the following ISBN number in ASCII:
978-3-16-148410-0
7. You have discovered the following string of
binary ASCII code; figure out what they mean
01010111 01100001 01111001 00100000
01110100 01101111 00100000 01100111
01101111 00100001
8. Explain the relationship between the number D
and
Short Answer
1. presence and absence
2. Bumps or pits
3. 16
4. hex
5. PandA
6. discrete
7. base, radix
8. bits
9. Digitizing
Exercises
1. Many possible answers
2. Many possible answers
3. 00101000 00111000
00110000 00110000
00101001 00110101
00110101 00110101
00101101 00110000
00110000 00110001
00110010
4. As long as the system is
consistent it is not important
what symbols represent
present and absent.
5. 01101000 01100101
01111000 01100001
01100100 01100101
01100011 01101001
01101101 01100001
01101100; hexadecimal
6. 00111001 00110111
00111000 00101101
00110011 00101101
00110001 00110110
00101101 00110001
Loading page 25...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
9.
10. Explain why radio broadcasters use longer
encoding to transmit information.
11. Explain why the NATO broadcast alphabet
represents digitization. Then explain why it was
designed to be minimal.
12. Explain how Buchholz created a error-detecting
name for the memory unit
13. Without metadata, why would it be hard to
search for “set” in a digitized dictionary?
00110100 00111000
00110100 00110001
00110000 00101101
00110000
7. Way to go!
8. They can both be
represented in binary as
0010
9. Improves the chances
letters will be recognized
when spoken under less-
than-ideal conditions
10. It has words that represent
letters, which creates the
digitization. It is designed to
not be minimal to ensure
that messages are heard
correctly.
11. “It seemed that after ‘bit’
comes ‘bite.’ But we
changed the ‘i’ to a ‘y’ so
that a typist couldn’t
accidentally change ‘byte’
into ‘bit’ by the single error
of dropping the ‘e’.
12. Searching for “set” would
return many occurrences
since it is used frequently in
definitions of other words
Instructor Solutions Manual
Chapter 7: Representing Information Digitally
9.
10. Explain why radio broadcasters use longer
encoding to transmit information.
11. Explain why the NATO broadcast alphabet
represents digitization. Then explain why it was
designed to be minimal.
12. Explain how Buchholz created a error-detecting
name for the memory unit
13. Without metadata, why would it be hard to
search for “set” in a digitized dictionary?
00110100 00111000
00110100 00110001
00110000 00101101
00110000
7. Way to go!
8. They can both be
represented in binary as
0010
9. Improves the chances
letters will be recognized
when spoken under less-
than-ideal conditions
10. It has words that represent
letters, which creates the
digitization. It is designed to
not be minimal to ensure
that messages are heard
correctly.
11. “It seemed that after ‘bit’
comes ‘bite.’ But we
changed the ‘i’ to a ‘y’ so
that a typist couldn’t
accidentally change ‘byte’
into ‘bit’ by the single error
of dropping the ‘e’.
12. Searching for “set” would
return many occurrences
since it is used frequently in
definitions of other words
Loading page 26...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
Questions
Multiple Choice
1. Put the following binary values representing the inten-
sity of green in order from least intense to most in-
tense:
a. 1111 1100, 1111 1111, 1100 0000, 1111 0000
b. 1111 1111, 1100 0000, 1111 0000, 1111 1100
c. 1111 1111, 1111 1100, 1111 0000, 1111 1100
d. 1100 0000, 1111 0000, 1111 1100, 1111 1111
2. The RGB setting for blue is (0 is off, 1 is on)
a. 0000 0000 0000 0000 0000 0000
b. 1111 1111 0000 0000 0000 0000
c. 0000 0000 1111 1111 0000 0000
d. 0000 0000 0000 0000 1111 1111
3. People tend to be sensitive to small changes in
_______, but not to small changes in _______.
a. brightness, color
b. color, brightness
c. brightness, contrast
d. color, contrast
4. Analog information is
a. discrete
b. continuous
c. random
d. digital
5. According to the Nyquist rule, the sampling rate of
sound should be roughly
a. half of what humans can hear
b. the same as what humans can hear
c. twice what humans can hear
d. three times what humans can hear
6. The accuracy of a digitized sound is determined by
a. the sampling rate
b. the precision of the sample
c. the size of the digitized file
d. all of the above
7. A digital-to-analog converter
a. changes digital information to analog waves
b. converts continuous sound to digital sound
c. converts sound to an electrical signal
d. sets approximated values
8. Do GIF files display horizontal or vertical bands of color
better?
a. vertical
b. horizontal
c. GIF files do not display vertical or horizontal
bands of color very well at all
Answers
Multiple Choice
1. d
2. d
3. b
4. b
5. c
6. a
7. a
8. b
9. d
10. b
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
Questions
Multiple Choice
1. Put the following binary values representing the inten-
sity of green in order from least intense to most in-
tense:
a. 1111 1100, 1111 1111, 1100 0000, 1111 0000
b. 1111 1111, 1100 0000, 1111 0000, 1111 1100
c. 1111 1111, 1111 1100, 1111 0000, 1111 1100
d. 1100 0000, 1111 0000, 1111 1100, 1111 1111
2. The RGB setting for blue is (0 is off, 1 is on)
a. 0000 0000 0000 0000 0000 0000
b. 1111 1111 0000 0000 0000 0000
c. 0000 0000 1111 1111 0000 0000
d. 0000 0000 0000 0000 1111 1111
3. People tend to be sensitive to small changes in
_______, but not to small changes in _______.
a. brightness, color
b. color, brightness
c. brightness, contrast
d. color, contrast
4. Analog information is
a. discrete
b. continuous
c. random
d. digital
5. According to the Nyquist rule, the sampling rate of
sound should be roughly
a. half of what humans can hear
b. the same as what humans can hear
c. twice what humans can hear
d. three times what humans can hear
6. The accuracy of a digitized sound is determined by
a. the sampling rate
b. the precision of the sample
c. the size of the digitized file
d. all of the above
7. A digital-to-analog converter
a. changes digital information to analog waves
b. converts continuous sound to digital sound
c. converts sound to an electrical signal
d. sets approximated values
8. Do GIF files display horizontal or vertical bands of color
better?
a. vertical
b. horizontal
c. GIF files do not display vertical or horizontal
bands of color very well at all
Answers
Multiple Choice
1. d
2. d
3. b
4. b
5. c
6. a
7. a
8. b
9. d
10. b
Loading page 27...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
d. GIF files, display both horizontal and vertical
bands of color very well.
9. Jessica Simpson’s “A Little Bit” is 3 minutes 47 sec-
onds long. How many bits is that?
a. 1,411,200
b. 40,042,800
c. 84,672,000
d. 320,342,400
10. Raymond Kurzweil is known as the inventor of
a. Computer Science
b. text-to-speech generation
c. image compression
d. virtual reality
Short Answer
1. RGB values are usually stored as three _______.
2. _______ is the limit that defines the maximum rate that
information can be transmitted.
3. All colors with equal intensities of RGB sub-pixels are
either _______, _______, or shades of gray.
4. _______ is the term used when digital values are con-
verted to create an analog sound.
5. _______ sound removes the highest and lowest sam-
plings as part of its compression algorithm.
6. Pixel color is determined solely by the _______ of the
color.
7. In OCR, each pixel is an estimate of how _______ the
corresponding area is.
8. On the computer, _______ means to store or transmit
information with fewer bits.
9. A process that allows the computer to “read” printed
characters is called _______.
10. To increase the _______ of a photo, you should in-
crease the difference between the light and dark parts.
11. When converting analog sound to digital sound, using
_______ bits yields a more accurate digitzation.
12. JPEG is to still images what _______ is to motion pic-
tures.
13. The _______ states that bits can represent all discrete
information even though the bits have no meaning of
their own.
14. GIF images are limited to _______ colors.
Exercises
1. Explain the phrases, “bits are it”, and “bits have no in-
Short Answer
1. bytes
2. speed of light
3. black, white
4. interpolation
5. MP3
6. intensity
7. dark
8. compression
9. Optical Character
Recognition
10. contrast
11. more
12. MPEG
13. Bias-Free Universal Me-
dium Principle
14. 256
Exercises
1. Bits can represent all dis-
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
d. GIF files, display both horizontal and vertical
bands of color very well.
9. Jessica Simpson’s “A Little Bit” is 3 minutes 47 sec-
onds long. How many bits is that?
a. 1,411,200
b. 40,042,800
c. 84,672,000
d. 320,342,400
10. Raymond Kurzweil is known as the inventor of
a. Computer Science
b. text-to-speech generation
c. image compression
d. virtual reality
Short Answer
1. RGB values are usually stored as three _______.
2. _______ is the limit that defines the maximum rate that
information can be transmitted.
3. All colors with equal intensities of RGB sub-pixels are
either _______, _______, or shades of gray.
4. _______ is the term used when digital values are con-
verted to create an analog sound.
5. _______ sound removes the highest and lowest sam-
plings as part of its compression algorithm.
6. Pixel color is determined solely by the _______ of the
color.
7. In OCR, each pixel is an estimate of how _______ the
corresponding area is.
8. On the computer, _______ means to store or transmit
information with fewer bits.
9. A process that allows the computer to “read” printed
characters is called _______.
10. To increase the _______ of a photo, you should in-
crease the difference between the light and dark parts.
11. When converting analog sound to digital sound, using
_______ bits yields a more accurate digitzation.
12. JPEG is to still images what _______ is to motion pic-
tures.
13. The _______ states that bits can represent all discrete
information even though the bits have no meaning of
their own.
14. GIF images are limited to _______ colors.
Exercises
1. Explain the phrases, “bits are it”, and “bits have no in-
Short Answer
1. bytes
2. speed of light
3. black, white
4. interpolation
5. MP3
6. intensity
7. dark
8. compression
9. Optical Character
Recognition
10. contrast
11. more
12. MPEG
13. Bias-Free Universal Me-
dium Principle
14. 256
Exercises
1. Bits can represent all dis-
Loading page 28...
Fluency with Information Technology: Skills, Concepts and Capabilities, 7th Edition
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
herent meaning”
2. In the decimal to binary algorithm presented in this
chapter, how do you determine what power of two to
start the “place values” row of the table with?
3. Convert 1492 and 1776 to binary and then compute
their addition, displaying the answer in binary. Show all
work.
4. In binary, add 1011, 1001, 110, and 1100.
5. Convert 168 and 123 to binary and then compute their
addition. How many bytes does it take to represent
each number? How many bytes are needed for the an-
swer?
6. What process could you use to remove the “red-eye”
from a photo? Explain your algorithm in great detail.
7. Explain how a picture at 300 pixels per inch could be
converted to a picture with 100 pixels per inch.
8. Give three applications of OCR systems.
9. For music sold on CD, explain how a singer’s voice in
the recording studio reaches the earphones on your
computer.
10. Why are JPEG, MPEG, and MP3 considered algo-
rithms?
11. What will the best latency be for 225 KB to be transmit-
ted with a bandwidth of 25 KB per second? Explain
your answer.
12. State five kinds of information that can be represented
with four bytes of information. Be creative, recall infor-
mation discussed in previous chapters, and explain
each kind in detail.
13. Explain how colored light and colored paint differ.
Make sure to provide concrete examples in your ex-
planation.
14. Provide three advantages of using digital sound over
analog sound. Are there any disadvantages? Explain
your answer in detail.
15. Assuming you had a small file of 0’s and 1’s as shown
below. Explain how you could use run-length encoding
to compress this file.
0000 0000 1100 0000
1111 1111 0011 1111
0011 1111 0000 0000
1100 0000 0000 0000
16. MP3 is a lossy compression which loses some pieces
of information. Why is it okay to lose this information?
17. Devise an algorithm that allows you to remove certain
letters from the sentence: “Ultimately, new technical
advances transform every facet of human life and so-
ciety” and it still be clearly understood by most humans
crete in-formation (e.g.,
numbers, colors, sounds,
etc); there is no way to de-
termine what a bit se-
quence represents without
more information
2. The closest power of two
that is less than or equal to
the number being convert-
ed.
3. 1492 = 10111010100; 1776
= 11011110000
10111010100 +
11011110000
=110011000100
4. 101000=40
5. 168 = 10101000; 123 =
1111011. 10101000 +
1111011= 100100011
Each number can be rep-
resented in a byte; their su
requires more than one
byte.
6. Many possible answers.
7. Many possible answers
(e.g., having 1 pixel repre-
sent the average of a 3x3
group of similar colored
pixels)
8. Many possible answers,
some include sorting mail,
and reading checks.
9. After the sounds from the
recording equipment are
digitized by an analog-to-
digital converter, they are
compressed to MP3 for-
mat; they are then read off
of the CD, decompresses,
and sent to the digital-to-
analog converter for the
earphones.
10. They are processes or al-
gorithms followed to com-
press file size
11. 9 seconds of latency; each
second transmits 25Kb,
and 225/25=9.
12. Many possible answers.
Instructor Solutions Manual
Chapter 8: Representing Multimedia Digitally
herent meaning”
2. In the decimal to binary algorithm presented in this
chapter, how do you determine what power of two to
start the “place values” row of the table with?
3. Convert 1492 and 1776 to binary and then compute
their addition, displaying the answer in binary. Show all
work.
4. In binary, add 1011, 1001, 110, and 1100.
5. Convert 168 and 123 to binary and then compute their
addition. How many bytes does it take to represent
each number? How many bytes are needed for the an-
swer?
6. What process could you use to remove the “red-eye”
from a photo? Explain your algorithm in great detail.
7. Explain how a picture at 300 pixels per inch could be
converted to a picture with 100 pixels per inch.
8. Give three applications of OCR systems.
9. For music sold on CD, explain how a singer’s voice in
the recording studio reaches the earphones on your
computer.
10. Why are JPEG, MPEG, and MP3 considered algo-
rithms?
11. What will the best latency be for 225 KB to be transmit-
ted with a bandwidth of 25 KB per second? Explain
your answer.
12. State five kinds of information that can be represented
with four bytes of information. Be creative, recall infor-
mation discussed in previous chapters, and explain
each kind in detail.
13. Explain how colored light and colored paint differ.
Make sure to provide concrete examples in your ex-
planation.
14. Provide three advantages of using digital sound over
analog sound. Are there any disadvantages? Explain
your answer in detail.
15. Assuming you had a small file of 0’s and 1’s as shown
below. Explain how you could use run-length encoding
to compress this file.
0000 0000 1100 0000
1111 1111 0011 1111
0011 1111 0000 0000
1100 0000 0000 0000
16. MP3 is a lossy compression which loses some pieces
of information. Why is it okay to lose this information?
17. Devise an algorithm that allows you to remove certain
letters from the sentence: “Ultimately, new technical
advances transform every facet of human life and so-
ciety” and it still be clearly understood by most humans
crete in-formation (e.g.,
numbers, colors, sounds,
etc); there is no way to de-
termine what a bit se-
quence represents without
more information
2. The closest power of two
that is less than or equal to
the number being convert-
ed.
3. 1492 = 10111010100; 1776
= 11011110000
10111010100 +
11011110000
=110011000100
4. 101000=40
5. 168 = 10101000; 123 =
1111011. 10101000 +
1111011= 100100011
Each number can be rep-
resented in a byte; their su
requires more than one
byte.
6. Many possible answers.
7. Many possible answers
(e.g., having 1 pixel repre-
sent the average of a 3x3
group of similar colored
pixels)
8. Many possible answers,
some include sorting mail,
and reading checks.
9. After the sounds from the
recording equipment are
digitized by an analog-to-
digital converter, they are
compressed to MP3 for-
mat; they are then read off
of the CD, decompresses,
and sent to the digital-to-
analog converter for the
earphones.
10. They are processes or al-
gorithms followed to com-
press file size
11. 9 seconds of latency; each
second transmits 25Kb,
and 225/25=9.
12. Many possible answers.
Loading page 29...
26 more pages available. Scroll down to load them.
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
AI Assistant
Document Details
Subject
Information Technology