Chapter 4 Quiz

25 July 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
The process by which a personal computer hosts several different operating systems is known as ________. PC virtualization cloud computing normalization parallel computing
answer
PC virtualization
question
Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? USB flash drive barcode scanner projector mouse
answer
USB flash drive
question
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________. cloud computing server virtualization desktop virtualization PC virtualization
answer
PC virtualization
question
Source code is computer code ________. that cannot be modified that is written by humans that is represented as bits and bytes that is not understandable by humans
answer
that is written by humans
question
________ applications are programs that are written to use a particular operating system. Native Thin-client Browser Web
answer
Native
question
Bits are used for computer data because they ________. are easy to represent physically can have more than two values at a time represent the orientation of a nonoptical media are represented exclusively as letters of the alphabet
answer
are easy to represent physically
question
Which of the following is an example of nonvolatile memory? cache memory optical disk main memory static random access memory (SRAM)
answer
optical disk
question
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. Application software Vertical-market software Firmware An operating system
answer
Firmware
question
A thin-client application is designed to run within a program such as ________. Microsoft Excel Internet Explorer Microsoft Word Adobe Photoshop
answer
Internet Explorer
question
The speed of a CPU is expressed in cycles called ________. knot hertz rev Mach
answer
hertz
question
Which of the following statements is true about self-driving cars? expensive and complex reduction in car insurance cost fewer car salesman increase in fuel consumption
answer
reduction in car insurance cost
question
Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. firmware operating systems vertical-market application software horizontal-market application software
answer
horizontal-market application software
question
Thin-client applications are developed using ________. C# Java Objective-C html5
answer
html5
question
Which of the following statements is true about operating systems? iOS is the most popular server operating system. The server operating system Linux is gradually being replaced by Unix. Android is a mobile operating system licensed by Apple. Nonmobile client operating systems are used on personal computers.
answer
Nonmobile client operating systems are used on personal computers.
question
________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data. A UX application MDM (mobile device management) software A key logger BYOD (bring your own device) manager
answer
MDM (mobile device management) software
question
Which of the following terms refers to a collection of servers? server farm server database firmware shareware
answer
server farm
question
Which of the following is a characteristic of smart devices? have less processing power have lower bandwidth require microprocessors and new protocols consumes less energy
answer
require microprocessors and new protocols
question
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices? Employees gain public access from any device, not just mobile devices. The organization can sniff employees' mobile traffic. The policy appears to be permissive without actually being so. Employees resist turning over the management of their own hardware to the organization.
answer
The organization can sniff employees' mobile traffic.
question
A ________ is equivalent to 1,024 bytes. gigabyte terabyte megabyte kilobyte
answer
kilobyte
question
________ is a version of Unix that was developed by an open source community. Symbian OS Mac OS Android Linux
answer
Linux
question
Which of the following statements is true about closed source projects? Programmers can alter a closed source code based on their interests and goals. Anyone can obtain the source code for a closed source project. Only trusted programmers are allowed to make changes to a closed source project. Only users and developers are allowed to alter the source code in closed source projects.
answer
Only trusted programmers are allowed to make changes to a closed source project.
question
Which of the following is a characteristic of volatile memory? processing of data is very slow processor heats up during the operation files are stored permanently contents are lost when power is off
answer
contents are lost when power is off
question
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage? Employees can gain public access from any device, not just mobile devices. The organization can sniff employees' mobile traffic. The policy appears to be permissive without actually being so. Employees will have to buy the hardware.
answer
The policy appears to be permissive without actually being so.
question
Java, C#, and VB.NET are examples of ________. thin-client applications structured queries object-oriented languages client operating systems
answer
object-oriented languages
question
Which of the following statements is true about native applications? The limits on native applications are usually technological, not budgetary. They can be developed by less skilled, lesser-paid employees. They only run on the operating system for which they are programmed. The cost of native applications is low.
answer
They only run on the operating system for which they are programmed.
question
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets? Unix ARM Mac OS ASCII
answer
ARM
question
A BYOD policy is a statement concerning employees permission and responsibilities when they use their own device for organizational business. True/False
answer
TRUE
question
A database is a self-Describing collection of integrated records. True/False
answer
TRUE
question
________ is the process of converting a poorly-structures table into two or more well-structured tables. Standardization Optimization Refactoring Normalization
answer
Normalization
question
When using the relational model to represent two tables one must _________. Have more than two primary keys in the model Use metadata instead of foreign keys add a foreign key to one of the tables establish only n-m relationships between the tables
answer
add a foreign key to one of the tables