CIS 205 Mid Term - Chapter 2
Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial.
False
Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.
False
RAM stands for random access memory, a form of memory that holds its contents even if the current is turned off or disrupted.
False
Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.
False
Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips.
False
Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement.
False
The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers.
False
Thin client computers are a type of portable single-user computers.
False
The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire enterprise to solve problems and perform specific tasks.
True
The use of virtual servers is growing rapidly because virtualization can save millions of dollars per year in capital and operating expenses.
True
Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.
True
Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress data files.
True
Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations.
True
When dealing with large multinational or global organizations, vendors often sell their software programs to the organizations but then outsource the technical support to local, third-party distributors.
True
You have lots of images on your hard drive totaling 500 million bytes. A 2 Gigabyte storage device will be adequate to store those photos.
True
Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.
True
New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.
b. an embedded system
_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
b. grid computing
One of the disadvantages of proprietary software is that _____
b. it can take a long time and significant resources to develop the required software features
A type of memory who contents are not lost if the power is turned off or interrupted is said to be _____
b. nonvolatile
CPU clock speed is the _____ at a predetermined rate.
b. number of electronic pulses created
3D printing is _____
b. used to make solid products
An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal
b. workgroup
All of the following are examples of someone using personal producdtivity software EXCEPT _____
c. Callie entering a customer's order into a restaurant's ordering system
_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations.
c. Spreadsheet
A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.
c. data center
The _____ is the heart of the operating system and controls its most critical processes.
c. kernel
_____ is a storage technology that is primarily used only for backups.
c. magnetic tape
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?
c. nettops
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
c. service-oriented architecture
One of the advantages of off-the-shelf software is that _____
c. the initial cost is lower because the software firm can spread the development costs over many customers
A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.
c. thin client
_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.
c. workstations
_____ are the most powerful computers with the fastest processing speed and highest performance.
d. Supercomputers
Which of the following is NOT an example of a common use of a point-of-sale (POS) device?
d. a teller in a bank uses a POS to withdraw money for a customer
All of the following are examples of activities performed by an operating system EXCEPT _____
d. allowing a user to do word processing
A global positioning (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.
d. embedded system
A(n) _____ device provides data and instructions to the computer and receives results from it.
d. input/output
An operating system with _____ capabilities allows a user to run more than one program concurrently.
d. multitasking
Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
d. natural user interface
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________. a. smartphone b. e-book c. desktop d. nettop
d. nettop
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?
d. presentation graphics
One advantage of proprietary software versus off-the-shelf software is that _____
d. the software provides a company a competitive advantage by solving problems in a unique manner
_____ is an open-source operating system who source code is freely available to everyone.
a. Linux
Which of the following statements is NOT true about a mainframe computer?
a. a single computer with a single user is typical of a mainframe computer.
_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
a. green computing
Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?
a. magnetic strip
The component of a computer that provides the CPU with a working storage for program instructions and data is called the _____
a. main memory
_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.
b. Optical mark recognition (OMR) systems
Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical.
False
Each programming language has a set of rules, called the program code of the language.
False
If 10 users can run programs at the same time on the same computer, it is known as multi-tasking.
False
If a large organization wants software that will benefit the entire organization -- what's known as enterprise application software -- the organization must develop it specifically for the business in order to get the functionality required.
False
A command-based user interface employs icons and menus that people use to send commands to the computer system.
False
A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images.
False
The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.
True
The operating system converts a basic user request into the set of detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware.
True
A single computer can be used by a single user or by multiple, simultaneous users.
True
A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.
True
An embedded system is a computer system that is implanted in and dedicated to the control of another device.
True
An example of a common hardware function performed by the operating system is presenting information on a monitor or printer.
True
An operating system is a set of programs that controls the computer hardware and acts as an interface with applications.
True
As the difference among computer manufacturers in the areas of price and performance narrows, support for green computing is emerging as a new business strategy for these companies to distinguish themselves from the competition.
True
Corporate executives often object to the use of open-source software because it lacks formal technical support, even though information and solutions regarding the software are usually readily available online.
True
Depending on the brand of tablet you purchase, you may be able to enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone.
True
Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.
True
In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory.
True
Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time.
True
Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.
True
Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory.
True
Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.
True
Software can be divided into two types: operating software and application software.
True
Software that allows an individualto create a to-do list, take notes, and organize tasks in a database would be classified as having a personal sphere of influence.
True
Some smartphones allow you to take notes to "write" emails or text messages by speaking into the phone. These are examples of speech-recognition technology.
True
The need for additional data storage capacity is one of the factors driving the growth in data centers.
True
