ITM 3060 - Chapter 4

25 July 2022
4.7 (114 reviews)
80 test answers

Unlock all answers in this set

Unlock answers (76)
question
1) The ________ selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. A) central processing unit (CPU) B) random access memory (RAM) C) hard disk D) plotter
answer
Answer: A
question
2) A dual-processor computer has ________ CPUs. A) eight B) four C) two D) sixteen
answer
Answer: C
question
3) ________ computers have four central processing units (CPUs). A) Quad-processor B) Dual-processor C) Tri-processor D) Tetra-processor
answer
Answer: A
question
4) Which of the following statements is true of a server? A) It stores the results of computations in the main memory. B) It provides access only for one user at a time. C) It supports processing requests from remote computers. D) It creates a backup of all information within a system.
answer
Answer: C
question
5) A ________ is used to receive and process thousands of requests from a large number of users. A) cache memory B) stand-alone server C) server farm D) client computer
answer
Answer: C
question
6) Computers represent data using binary digits called ________. A) dots B) pixels C) tags D) bits
answer
Answer: D
question
7) Bits are grouped into 8-bit chunks called ________. A) bytes B) kilobytes C) terabytes D) megabytes
answer
Answer: A
question
8) One ________ is equivalent to 1,024 kilobytes. A) terabyte B) megabyte C) gigabyte D) bit
answer
Answer: B
question
9) One ________ is equivalent to 1,024 gigabytes. A) petabyte B) terabyte C) megabyte D) kilobyte
answer
Answer: B
question
10) A ________ is a collection of 1,024 bytes. A) kilobyte B) megabyte C) gigabyte D) terabyte
answer
Answer: A
question
11) The speed of a central processing unit (CPU) is expressed in cycles called ________. A) hertz B) bits C) bytes D) pixels
answer
Answer: A
question
12) A device's cache and main memory are ________. A) volatile B) nonvolatile C) stable D) nonperishable
answer
Answer: A
question
13) Which of the following is an example of nonvolatile memory? A) cache memory B) main memory C) magnetic disk D) RAM drive
answer
Answer: C
question
14) The memory of a device is said to be nonvolatile if ________ when the system is restarted. A) its contents are destroyed B) the memory becomes unusable C) a new memory is replicated D) its contents are retained
answer
Answer: D
question
15) If the contents of a device are lost when the power is turned off, the memory of the device is said to be ________. A) nonvolatile B) volatile C) random D) discrete
answer
Answer: B
question
16)(T/F) Computer hardware consists of electronic components that input, process, output, and store data.
answer
Answer: TRUE
question
17) (T/F) The central processing unit is referred to as the brain of a computer.
answer
Answer: TRUE
question
18) (T/F) High-end computers can have as many as 16 central processing units.
answer
Answer: TRUE
question
19) (T/F) The speed and costs of central processing units are the same across multiple hardware vendors.
answer
Answer: FALSE
question
20) (T/F) Some computers have two or more central processing units (CPUs).
answer
Answer: TRUE
question
21) (T/F) The central processing unit (CPU) of a computer reads data and instructions only from a read-only memory.
answer
Answer: FALSE
question
22) (T/F) Optical disks are non-portable storage devices
answer
Answer: FALSE
question
23) (T/F) USB flash drives are used to back up data and transfer it from one computer to another.
answer
Answer: TRUE
question
24) (T/F) Main memory is also called read-only memory.
answer
Answer: FALSE
question
25) (T/F) A hard drive is much faster than a solid-state storage device.
answer
Answer: FALSE
question
26) (T/F) A server farm can process only one service request per minute.
answer
Answer: FALSE
question
27) (T/F) A bit is either a zero or a one.
answer
Answer: TRUE
question
28) (T/F) A specification that a computing device has 100 million bytes of memory means that the device could hold up to 100 million characters.
answer
Answer: TRUE
question
29) (T/F) One gigabyte is equivalent to 1,024 terabytes.
answer
Answer: FALSE
question
30) (T/F) An exabyte is equivalent to 1,024 petabytes.
answer
Answer: TRUE
question
31) (T/F) A terabyte is a larger unit than a petabyte.
answer
Answer: FALSE
question
32) (T/F) A computer's performance depends on the speed of its central processing unit (CPU).
answer
Answer: TRUE
question
33) (T/F) Magnetic and optical disks are examples of nonvolatile memory.
answer
Answer: TRUE
question
34) (T/F) Saving one's work frequently is advised to tackle the issue of memory volatility.
answer
Answer: TRUE
question
35) Explain the basic constituents and the different types of computer hardware.
answer
Answer: Computer hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. All hardware today has more or less the same components, at least to the level that is important to us. The common types of computer hardware used are: a) Personal computers (PCs): PCs are classic computing devices that are used by individuals. b) Server: It is a computer that is designed to support processing requests from many remote computers and users. c) Clients: PCs, tablets, and smartphones that access servers are called clients. d) Server farm: It is a collection of, typically, thousands of servers.
question
36) Briefly describe the functions and working of a central processing unit (CPU).
answer
Answer: Every computer has a central processing unit (CPU), which is sometimes called "the brain" of the computer. The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. Some computers have two or more CPUs. A computer with two CPUs is called a dual-processor computer. Quad-processor computers have four CPUs. Some high-end computers have 16 or more CPUs. CPUs vary in speed, function, and cost. The CPU works in conjunction with main memory. The CPU reads data and instructions from memory, and then stores the results of computations in main memory. In addition to random access memory, RAM, and one or more CPUs, all computers also include storage hardware, which is used to save data and programs.
question
37) Differentiate between client and server computers.
answer
Answer: A server is a computer that is designed to support processing requests from many remote computers and users. Personal computers (PCs), tablets, and smartphones that access servers are called clients. A server is essentially a PC on steroids, and it differs from a PC principally because of what it does. The relationship between PCs and servers is similar to the relationship between clients and servers at a typical restaurant: In short, servers take requests from clients and then bring them things. In restaurants, these things are food, drinks, and silverware. Similarly, in computing environments, servers can send webpages, email, files, or data to PCs or other devices.
question
38) The ________ refers to the idea in which objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. A) Premium Internet B) Symbian C) Internet of Things D) server farm
answer
Answer: C
question
39) Which of the following is most likely to be an advantage of self-driving cars? A) Fewer cars will be shared by family members. B) More auto loans will be taken. C) More insurance policies will be taken. D) Fewer accidents will occur.
answer
Answer: D
question
40) Which of the following is most likely to be a disadvantage of self-driving cars? A) More accidents will occur. B) More parking lots will have to be built. C) More people will use cars and avoid planes or trains. D) More stress during commute.
answer
Answer: C
question
41) (T/F) Objects that are connected to the Internet are increasingly being embedded with hardware capable of sensing, processing, and transmitting data.
answer
Answer: TRUE
question
42) (T/F) Objects connected to a network can share data with any other application, device, or service.
answer
Answer: TRUE
question
43) How can the Internet of Things act as a disruptive force to change the way in which businesses function?
answer
Answer: The Internet of Things is the idea that objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. In other words, everyday objects are increasingly being embedded with hardware capable of sensing, processing, and transmitting data. These objects can then connect to a network and share data with any other application, service, or device. Over time, mobile phones became smartphones. by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to interconnect with other devices and applications. People thus began to use their mobile phones much differently than before. This shift also changed the way businesses operate. This shift away from "dumb" devices to interconnected smart devices is not lost on businesses. Consumers like smart devices and are willing to pay more for them. Accordingly, businesses want to improve the existing devices they manufacture into smart devices, and then sell them for twice as much.
question
44) A(n) ________ is a program that controls a computer's resources. A) cache B) operating system C) central processing unit D) data bus
answer
Answer: B
question
45) Which of the following statements is true of an operating system? A) It does a lot of application-specific work. B) It comes in particular versions that are written for particular types of hardware. C) It does only little or no memory management. D) It has to be the same across all computers in a network in order to process application programs.
answer
Answer: B
question
46) ________ are programs that are written to use a particular operating system. A) Web applications B) Thin-client applications C) Native applications D) Vertical-market applications
answer
Answer: C
question
47) Application programs that run within a browser, without the need to be preinstalled on client computers, are referred to as ________. A) thin-client applications B) native applications C) desktop programs D) thick-client applications
answer
Answer: A
question
48) Which of the following statements is true of thick-client applications? A) They are application programs that need not be preinstalled on the client computer. B) They mostly run on a single operating system. C) They do not need a server connection to run. D) They require nothing more than a browser to function.
answer
Answer: B
question
49) Which of the following is an open-source operating system? A) Unisys B) Windows C) Linux D) Mac OS
answer
Answer: C
question
50) Which of the following is the most widely used operating system in business? A) Linux B) Windows C) Unix D) Mac OS
answer
Answer: B
question
51) Host operating systems that run one or more operating systems as applications are referred to as ________. A) application programs B) server farms C) server operating systems D) virtual machines
answer
Answer: D
question
52) ________ is the process by which one physical computer hosts many different virtual computers within it. A) Machine coding B) Virtualization C) License sharing D) Cloud computing
answer
Answer: B
question
53) When individuals buy a computer program, they buy a license to ________. A) convert the program into open source software B) modify the features of the program C) use the program D) sell the program
answer
Answer: C
question
54) ________software provides capabilities that are common across all organizations and industries. A) Vertical-market application B) Custom-developed C) Horizontal-market application D) Off-the-shelf with alterations
answer
Answer: C
question
55) McCann Systems, a leading IT firm, develops a customized billing software to meet the needs of its individual customers. In this case, the software developed by the firm is referred to as a(n) ________. A) vertical-market application software B) horizontal-market application software C) open source software D) application simulation software
answer
Answer: A
question
56) Which of the following refers to software that is developed for a specific and unique need? A) simulation software B) horizontal-market application software C) one-of-a-kind application software D) open source software
answer
Answer: C
question
57) Which of the following is an advantage of custom-developed software? A) They are less expensive than off-the-shelf software. B) They can be tailored according to an organization's requirements. C) They are easier to develop than using horizontal applications. D) They need not be adapted to changing needs.
answer
Answer: B
question
58) ________ is a type of computer software that is installed into devices such as printers, print servers, and various types of communication devices. A) Firmware B) Freeware C) Slate D) Server farm
answer
Answer: A
question
59) (T/F) Although an operating system does a lot of application-specific work, it does little to make the computer usable.
answer
Answer: FALSE
question
60) (T/F) Both client and server computers must use the same operating system.
answer
Answer: FALSE
question
61) (T/F) Application programs can be processed by both clients and servers.
answer
Answer: TRUE
question
62) (T/F) Microsoft Access and Microsoft Word are examples of thin-client applications.
answer
Answer: FALSE
question
63) (T/F) Firefox, Chrome, Opera, and Internet Explorer are examples of thick-client applications.
answer
Answer: FALSE
question
64) (T/F) A virtual machine does not have a disk space.
answer
Answer: FALSE
question
65) (T/F) A host operating system controls the activities of the virtual machines it hosts.
answer
Answer: TRUE
question
66) (T/F) Modifying an existing firmware requires knowledge of special programs and techniques.
answer
Answer: TRUE
question
67) What is an operating system? How is it different from an application program?
answer
Answer: Every computer has an operating system, which is a program that controls that computer's resources. The functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices. Although the operating system makes the computer usable, it does little application-specific work. An application program is any program designed to perform a specific function for a user or for another application program. Both clients and servers can process application programs and the application's design determines whether the client, the server, or both, process it. If one wants to check the weather or access a database, he or she needs application programs such as an iPad weather application or Oracle's customer relationship management (CRM) software. Some application programs are general purpose, such as Microsoft Excel or Word. Other application programs provide specific functions.
question
68) What are the two important software constraints? Explain with suitable examples.
answer
Answer: First, remember that particular versions of an operating system are written for particular types of hardware. For example, Microsoft Windows works only on processors from Intel and from companies that make processors that conform to the Intel instruction set (i.e., the commands that a CPU can process). With other operating systems, such as Linux, many versions exist for many different instruction sets. Second, be aware that two types of application programs exist: native and Web. Native applications are programs that are written to use a particular operating system, while Web applications run within a computer browser and can therefore run on any type of computer.
question
69) Explain the four major nonmobile client operating systems and their functions.
answer
Answer: The four major nonmobile client operating systems are Windows, Mac OS, Unix, and Linux. 1. The most popular operating system is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world's desktops, and when considering just business users, the figure is more than 95 percent. The most recent client version of Windows is Windows 8, a major rewrite of prior versions. 2. Apple Computer, Inc. developed its own operating system for the Macintosh, Mac OS. The current version is Mac OS X Mavericks. Macintosh computers are used primarily by graphic artists and workers in the arts community. 3. Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. 4. Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but is by far most popular as a server OS.
question
70) What is unique about Linux as an operating system?
answer
Answer: Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but usually only when budget is of paramount concern. By far, Linux is most popular as a server OS. According to DistroWatch.com, the five most popular versions of Linux as of 2014 were Linux Mint, Ubuntu, Debian GNU/Linux, Mageia, and Fedora.
question
71) What is virtualization?
answer
Answer: Virtualization is the process by which one physical computer hosts many different virtual (not literal) computers within it. One operating system, called the host operating system, runs one or more operating systems as applications. Those hosted operating systems are called virtual machines (vm). Each virtual machine has disk space and other resources allocated to it. The host operating system controls the activities of the virtual machines it hosts to prevent them from interfering with one another. With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment. Three types of virtualization exist: β€’ PC virtualization β€’ Server virtualization β€’ Desktop virtualization
question
72) Explain how computer programs are licensed to individuals and organizations.
answer
Answer: When a person buys a computer program, it does not mean actually buying that program. Instead, he is buying a license, which is the right to use that program. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license, which is a flat fee payment for the right to install the product (operating system or application) on all of that company's computers or on all of the computers at a specific site.
question
73) What are the different categories of application programs?
answer
Answer: Application software consists of programs that perform a service or a function. Some application programs are general purpose. Other application programs provide specific functions. 1. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. 2. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients. Vertical applications usually can be altered or customized. 3. One-of-a-kind application software is developed for a specific, unique need. The U.S. Department of Defense develops such software, for example, because it has needs that no other organization has.
question
74) What are the drawbacks of developing custom application software for an organization?
answer
Answer: Custom development is difficult and risky. Staffing and managing teams of software developers is challenging. Managing software projects can be daunting. Many organizations have embarked on application development projects only to find that the projects take twice as long, or longer, to finish than planned. Cost overruns of 200 and 300 percent are not uncommon while developing custom application software.
question
75) What is firmware?
answer
Answer: Firmware is computer software that is installed into devices such as printers, print servers, and various types of communication devices. The computer software is coded just like other software, but it is installed into special, read-only memory in the printer or other device. In this way, the program becomes part of the device's memory; it is as if the program's logic is designed into the device's circuitry. Users do not need to load firmware into the device's memory. Firmware can be changed or upgraded, but this is normally a task for IS professionals. The task is easy, but it requires knowledge of special programs and techniques that most business users choose not to learn.
question
76) ________ is a computer code that is written by humans and understandable by humans. A) Bar code B) Machine code C) Source code D) Overhead code
answer
Answer: C
question
77) (T/F) Open source software is typically free, modifiable, and its source code is publicly available.
answer
Answer: TRUE
question
78) (T/F) Any programmer or student can access and alter the source code of a closed source project.
answer
Answer: FALSE
question
79) (T/F) Modifications to the source code of an open source project cannot be added to the project.
answer
Answer: FALSE
question
80) How do open source projects work? How is it different from closed source projects?
answer
Answer: The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and that is understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. In a closed source project, like Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is very well protected. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project's Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, programmers can incorporate open source code into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Open source succeeds because of collaboration. A programmer examines the source code and identifies a need or project that seems interesting. He or she then creates a new feature, redesigns or reprograms an existing feature, or fixes a known problem. That code is then sent to others in the open source project to evaluate the quality and merits of the work and to add it to the product, if appropriate.