CIS 230 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

A Java compiler or interpreter translates Java source code into machine instructions and service routine calls for a hypothetical computer and OS called the ____.

Java Virtual Machine

The most common example of multiple RAID levels layered to combine their best features is ____.

RAID 10

The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer's information system.

SaaS

The command layer, sometime called the ____ is the user interface to the OS.

Shell

____ scheduling chooses the next thread to be dispatched based on the expected amount of CPU time needed to complete the process.

Shortest time remain

____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.

Simple object access protocol

____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.

Software as a service (SaaS)

____ models provide the detail needed to develop a system that meets users' needs.

System requirements

A blocked thread is waiting for an event to occur, such as allocation of a requested resource or correction of an error condition.

T

A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.

T

A hypervisor can make the sum of physical resources allocated to all virtual machines appear greater than the underlying physical resources.

T

A key distinction between SAN devices and NAS servers is the type of storage access requests that are serviced.

T

According to our class discussion, accountants still consider that computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.

T

According to our class discussion, one compromise concerning the classification of the computing/technology budget would be to consider IT costs as a utility expenditure.

T

An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices.

T

An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.

T

Application firewalls improve security by shielding internal servers and resources from direct access by outside users.

T

Corporate Infrastructure Management (which includes some areas of IT) tends to concentrate on providing operational services (as opposed to long-term strategic services) at minimal cost.

T

Disk mirroring provides a high degree of protection against data loss with no performance penalty if it's implemented in hardware.

T

HTML extends XML to describe the structure, format, and content of documents.

T

If the logical record size is less than the physical record size, a single physical record might contain multiple logical records.

T

LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).

T

Most FMSs include direct support for only a few file types but enable additional types to be defined and associated with installed apps.

T

Noncontiguous memory allocation is more flexible than contiguous memory allocation, but flexibility comes at a price.

T

Operating systems are organized internally into layers.

T

Software has surpassed hardware to become the most costly component of most information systems.

T

The most comprehensive CASE tools automate the process of deploying working systems from analysis and design models.

T

The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.

T

Three-layer architecture simplifies distributing or replicating application software across a network.

T

With scripting languages, programmers can assemble application software rapidly by "gluing" together the capabilities of many other programs.

T

____ is the process of determining or verifying the identity of a user or process owner.

Authentication

____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

Authorization

____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

Viruses

A(n) ____ describes rights granted or denied to users, groups, and computers for accessing resources in Active Directory.

access control list

A CPU's or computer's ____ is the highest numbered storage byte that can be represented.

addressable memory

The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

application software

Blocking is described by a numeric ratio of logical records to physical records called the ____.

blocking factor

A ____ is a temporary holding area for extracting logical records from physical records.

buffer

A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.

component

A(n) ____ is a placeholder for missing executable code.

external function call

A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.

fifth-generation language

Binary CPU instructions, called ____, are the earliest programming languages.

first-generation language

A tool suite that primarily supports model development is sometimes called a ____ tool.

front-end CASE

When a(n) ____ is performed, the FMS copies all files and directories for an entire storage volume.

full backup

In a ____, folders can contain other folders, but a folder can't be contained in more than one parent.

hierarchal folder structure

The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.

instruction explosion

A(n) ____ is a collection of automated support tools to speed development and testing.

integrated development environment (IDE)

A(n) ____ reads a single source code instruction, translates it into CPU instructions or a DLL call, and executes the instructions or DLL call immediately, before the next program statement is read.

interpreter

The ____ is the OS portion that manages resources and interacts directly with computer hardware.

kernel

The OS maintains a ____ and updates it each time a partition is allocated or freed.

memory partition table

The term ____ describes any architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers.

network-attached storage (NAS)

In virtual memory management, a ____ is a small fixed-size portion of a program, normally between 1 and 4 KB.

page

Each memory page in virtual memory management is called a ____.

page frame

The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

performance requirements

A ____ is the unit of storage transferred between the device controller and memory in a single operation.

physical record

A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.

pipe

In ____, a thread can be removed involuntarily from the running state.

preemptive scheduling

As it is commonly used today and discussed in class, the term RFP includes aspects of an RFI and RFQ, but a _____ statement still composes the majority of an RFP.

purpose

The primary disadvantages of implementing applications via the Internet are security, performance, and _____.

reliability

A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.

request for proposal

A(n) ____ enables programmers to develop applications that do most of their work by calling other applications and system software.

scripting language

Antivirus software uses data files, sometimes called "____," containing information about known viruses.

signature files

A(n) ____ tracks the progress of complex client/server interactions.

stateful firewall

A ____ is a data structure that records which allocation units are free and which belong to files.

storage allocation table

The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.

strategic competitiveness

A secondary storage region, called the ____, is reserved for the task of storing pages not held in memory.

swap space

The resources consumed by resource allocation procedures are sometimes referred to as ____.

system overhead

____ is a fault-tolerance technique in which all disk write operations are made simultaneously or concurrently to two storage devices.

Disk mirroring

____ linking is performed during program loading or execution.

Dynamic

Today, the term ____ is often used to describe a mnemonic representing a data item's memory address.

variable

In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.

view

As allocated by the OS, the resources that are apparent to a program or user are called ____.

virtual resources

If five disks are used in a RAID 5 array, ____% of the available disk space stores redundant parity information.

20

In general, the humidity level of a room containing computer equipment should be near ____%.

50

As discussed in class, the BEST type of backup for the purpose of disaster recovery of the OS, programs and data, is an image backup.

F

Contiguous program loading, coupled with fixed-size memory partitions, usually results in efficient use of memory space.

F

Every network attached to the Internet has at least one of its own servers designated as a DNS server.

F

File migration moves files from cloud storage to local secondary storage devices as they become older and more out-of-date.

F

In most FMSs, files are immediately removed from secondary storage when they're deleted.

F

Java bytecode programs usually run 10 times faster than native applications.

F

SMTP and MIME are protocols that enable a user on one Internet host to interact with the OS command layer of another Internet host.

F

System requirements models specify detailed blueprints for software component construction.

F

The benefits of advanced memory addressing and allocation schemes (virtual and protected memory management) implemented by the OS are offset by reduced performance when they're implemented in hardware (CPU).

F

The main advantage of compilation over interpretation is that it offers the flexibility to incorporate new or updated code into an application program.

F

Vendor lock-in is a recent phenomenon with the advent of SaaS.

F

When considered as a byte sequence, the rightmost byte is called the most significant byte.

F

Under ____, e-mail messages are held on the server temporarily, downloaded to the client when a connection is established, and deleted from the server as soon as the download is finished.

POP3

____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.

PaaS (Platform as a Service)

Web resources are identified by a unique ____.

URL


Conjuntos de estudio relacionados

Chapter 2 MIS Quizlet (incomplete)

View Set

Chapter 14: Natural Selection & Adaptation

View Set