Exam Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.

Component

​The ____ section of the CPU performs all computation and comparison operations.

ALU

A(n) ____ instruction generates the result true if both of its data inputs are true.

AND

A wireless ________ connects a wireless network to a wired network.

Access point

Storage device speed is called ____.

Access time

​Windows Server has a directory service & security system built into the software call Microsoft ________.

Active Directory

The process of determining the physical memory address that corresponds to a memory reference is called ____.

Address mapping

This is the highest numbered storage byte that can be represented in a computer or Central Processing Unit.

Addressable memory

A(n) ____ is a program in which different sets of instructions are applied to different data input values.

Algorithm

With this type of number each digit can have only one of two possible values: 0 or 1.

Binary

In a modern digital computer, data is represented by groups of ____.

Bits

A ____ is a circuit board that contains most of a server.

Blade

____ is a generic term for describing secondary storage data transfer units.

Block

Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.

Boolean

This is a longer-term power sag that is usually initialized by the power provider and occurs when the demand for electricity exceeds the provider's generation and transmission capabilities during peak demand periods, such as hot summer days.

Brownout

During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.

Fetch

A sequence of records on secondary storage is called a ____.

File

____ type does many things including determining physical organization, allowable operations, and naming restrictions.

File

The relationship between file types and the programs or OS utilities that manipulate them is called ____.

File association

The ____ layer is the bridge between logical and physical views of secondary storage.

File control

​The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.

File management system

Software stored in NVM is called ____.

Firmware

Binary CPU instructions, called ______, are the earliest programming languages.

First-generation languages

Real numbers are represented in computers by using ____.

Floating-point notation

With ______ parity, the sender sets the parity bit to 0 if the count of 1-valued data bits in the character is odd.

Odd

Subsequent groups of bits after the first group in an instruction hold its input values, called ____.

Operands

Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.

Operating expenditures

____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.

Overflow

The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.

Packet-filtering

________ transmission uses a separate transmission line for each bit position.

Parallel

​In ____ architecture, the roles of client and server are combined into a single application or group of related applications.

Peer-to-peer

System administrators can use the ____ utility to monitor hardware and software resource use in real time.

Performance Monitor

The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

Performance requirements

_______ is a specific time point in a wave's cycle.

Phase

Optical computation harnesses the energy of moving ____ to perform computational work.

Photons

A ____ is the unit of storage transferred between the device controller and memory in a single operation.

Physical record

​A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.

Pipe

In a CD, concave dents in the reflective layer that are used to represent bit values are called "____."

Pits

​____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.

Platform as a service

​A(n) ____ is a data element containing the address of another data element.

Pointer

This normally occurs when a device that requires a large amount of power is started.

Power spikes

In ____, a thread can be removed involuntarily from the running state.

Preemptive sheduling

The ______ layer ensures that data transmitted by one network node is interpreted correctly by the other network node.

Presentation

Storage devices that hold currently executing programs are called ____

Primary storage

The data types a CPU supports are sometimes called ____ data types.

Primitive

A ____ describes the resource or service utilization of an application program during execution.

Program profiler

The register that holds bit values (flags) that describe comparison operation results, control conditional BRANCH execution, or indicate actual or potential error conditions ____.

Program status word

​Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.

Protocol stack

A(n) ____ is a server that handles service requests from external users of applications.

Proxy server

In current computer hardware, main memory is implemented with silicon-based semiconductor devices commonly called ____.

RAM

The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can randomly access bytes, words, or larger data units.

RAM

​____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.

Software as a service

A program normally embedded in operating system service routines that senses and reports processing requests and/or activities.

Software monitor

A ____ is a storage device that mimics the behavior of a magnetic disk drive but uses flash RAM or other NVM devices as the storage medium and read/write mechanism.

Solid-state drive

____ is the most important characteristic differentiating primary and secondary storage.

Speed

A sequence of records stored in main memory is normally called a ____.

Table

Numbers such as 1/3 are stored in floating-point format by ____.

Truncation

​The most common wired transmission media for LANs is ____ cable.

Twisted-pair cable

In ____ notation, nonnegative integer values are represented as ordinary binary values.

Twos complement

​A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.

DNS

The ______ layer is the interface between network software and hardware.

Data Link

A _______ defines the name and data type of program variables.

Data declaration

A ________ is any instruction, such as assignment statement or a computation that updates or computes a data value.

Data operation

____ breaks a unit of data into smaller segments and stores these segments on multiple disks.

Data striping

A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.

Data structure

____ design activities are narrower in scope and constrained by the information architecture compared to the remaining design activities.

Detailed

A ____ is a CPU cycle spent waiting for access to an instruction or data.

Wait state

A ____ is a unit of data containing a fixed number of bytes or bits and can be loosely defined as the amount of data a CPU processes at one time.

Word

This is usually sent via an electronic-mail attachment and is stored in a stand alone executable software program, and is executed/runs instantly when the attachment is opened.

Worm

Hexadecimal numbering uses ____ as its base or radix.

16

In a ____, folders can contain other folders, but a folder can't be contained in more than one parent.

Hierarchical folder structure

The leftmost digit in a bit string is called the ____.

Most significant digit

This term _______ describes transmission situations involving multiple senders and receivers.

Multicasting

____ describes any CPU architecture in which duplicate CPUs or processor stages can execute in parallel.

Multiprocessing

​Because the Simple Mail Transfer Protocol (SMTP) could not handle nontext files in email messages this protocol extended its features to allow for this.

Multipurpose Internet Mail Extensions

The term ______ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.

Network topology

The term ____ describes any architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers.

Network-attached storage

In a communication channel, _______ refers to unwanted signal components added to the data signal that might be interpreted incorrectly as data.

Noise

The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

Application demand model

The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

Application software

The first set of design activities, called ____ design, selects and describes the exact configuration of all hardware, network, system software, and application development tools to support system development and operations.

Architectural

A(n) ____ is an ordered list in which each element can be referenced by an index to its position.

Array

In accounting this term defines the act of going through accounts to decide whether GAAP were applied correctly in preparing financial documents. In computer security, this same term usually refers only to creating and managing records of resource access and/or user activity.

Auditing

____ is the process of determining or verifying the identity of a user or process owner.

Authentication

____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

Authorization

A ____ instruction causes the processor to depart from sequential instruction order.

BRANCH

This is a measurement of the performance of a computer system while executing processing task(s)?

Benchmark

Expenses/costs that are used in funding an organization can be categorized into two groups:

Capital expenditures and operating expenditures

Examples of these types of assets would be a copiers, data storage centers, mainframe computers and many computer equipment categories that are not expensed in the year you buy them, but expensed over a period of years.

Capital resources

This is a group of identical/like computers that are connected by high-speed networks working together to run a single application and/or provide services.

Cluster

Programs instructions are sometimes called _____.

Code

​If multiple nodes attempt to transmit across the same medium at the same time, their messages mix, producing noise or interference that's called a ____.

Collision

The written format of 128-bit IP addresses is called ______ notation.

Colon hexadecimal

A ______ message contains instructions that control some aspect of the communication process.

Command

Through this layer a user/system administrator can manage system resources (such as files, folders, and Input/Output devices) and run Operating System and application utility software programs.

Command

This is the name given to a set of syntax & command requirements.

Command language

​A simple definition of a computer is a device that can accept numeric inputs, perform computational functions, and ____.

Communicate results

The term "____" describes the number of bits used to represent a numeric value.

Compactness

This term defines the way a company uses resources to give it a benefit over other companies doing business in the same area they do business in.

Competitive advantage

Substances that electrons can flow through are called ____.

Conductors

When memory allocation is this it means all parts/portions of the Operating System and program are loaded sequentially into memory addresses.

Contiguous

________ is noise added to the signal in the wire from EMI generated by adjacent wires.

Crosstalk

In most CPUs, the ____ is the time required to fetch and execute the simplest instruction in the instruction set.

Cycle time

______ is the most widely used error-detection method.

Cyclic redundancy checking

A ____ consists of all tracks at an equivalent distance from the edge or spindle on all platter surfaces.

Cylinder

Data is represented in the CPU as ____.

Digital electrical signals

​The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.

Directory services

A number of measures for this type of planning include the following: -Periodic data backup and storage of backups at alternate sites -Backup and storage of critical software at alternate sites -Duplicate or supplementary equipment installed at alternate sites -Arrangements for leasing existing equipment at alternate sites, such as another company or a service bureau

Disaster Recovery

In the Unified Process (UP), an information system is built in a series of 4-to-6-week related steps called iterations. Each iteration includes whatever activities are needed to produce testable models or working software and related activities are grouped into UP ____.

Disciplines

A ____ reorganizes disk content so that a file's contents are stored in sequential sectors, tracks, and platters.

Disk defragmentation utility

____ is a fault-tolerance technique in which all disk write operations are made simultaneously or concurrently to two storage devices.

Disk mirroring

____ linking is performed during program loading or execution.

Dynamic

"____" is the concept that the per-unit cost of producing goods or providing services decreases as the organization size increases.

Economics of scale

The term _______ describes the maximum number of bits or bytes per second that the channel actually achieves with a specific communication protocol.

Effective data transfer rate

____ is the flow of electrons from one place or device to another.

Electrical current

____ notation always uses a fixed number of bits, with the leftmost bit representing the sign.

Excess

A(n)____ instruction generates the value true if either (but not both) data input is true.

Exclusive OR

____ occurs when memory partitions allocated to a single process or purpose are scattered throughout physical memory.

Fragmentation

A disk with many program and data files scattered on it is said to be ____.

Fragmented

_______ is the number of cycles occurring in one second and is measured in hertz (Hz).

Frequency

_______ represents bit values by varying carrier wave frequency while holding amplitude constant.

Frequency modulation

In ______ mode, the receiver can communicate with the sender at any time over the second transmission line, even while data is still being transmitted on the first line.

Full-duplex

____ hold frequently used data items such as loop counters and array indexes.

General-purpose registers

____ are typically implemented by installing software on each machine that accepts tasks from a central server and performs them when not busy doing other work.

Grids

______ routes signals between two locations through a physical connection, such as copper wire or optical fiber.

Guided transmission

A(n) ____ instruction suspends the normal flow of instruction execution in the current program.

HALT

A(n) ____ archives only files that have been modified since the previous incremental or full backup.

Incremental backup

The address of an array element can be calculated with the starting address of the array and the element's ____.

Index

A(n) ____ directs the CPU to route electrical signals representing data inputs through predefined processing circuits that implement the appropriate function.

Instruction

A(n) ____ is the lowest-level command that software can direct a processor to perform.

Instruction

The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ________.

Instruction explosion

Several transistors and their interconnections on a single chip form a(n) ____.

Integrated circuit

A(n) ____ is a collection of automated support tools to speed development and testing.

Integrated development environment

Memory devices comprised of semiconductors and other forms of RAM with long-term or permanent data retention are generically known as ____.

Nonvolatile memory

The ____ is the Operating System piece that handles resources and works directly with the computer's hardware.

Kernel

In _________, the VoIP user perceives periods of silence before the other participant's speech is heard.

Latency

The rightmost digit in a bit string is the ____.

Least significant digit

A(n) ______ searches an object code file for external function calls.

Link editor

This data structure is defined as a set of related data values.

List

A ____ operation is a data transfer from main memory into a register.

Load

The ____ can extract a single bit from a bit string.

Logic SHIFT

_______ topology is the path messages traverse as they travel between end and central nodes.

Logical

This is the name for a group of fields and/or data items that an application software program accesses as one single unit.

Logical record

A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.

MOVE

A(n) ____ is a ribbon of plastic with a coercible (usually metallic oxide) coating.

Magnetic tape

This is not a formal Unified Process (UP) discipline but, systems evaluation and ____ is a key group of activities that make-up a lot of the long-range system cost.

Maintenance

____ are programs or hardware devices that detect and report processing or I/O activity.

Monitors

A ____ device isn't restricted to any specific order when accessing data.

Random access

This term _____ describes the maximum number of bits or bytes per second that the channel can carry.

Raw data transfer rate

Threads in the ____ are idle, pending availability of a CPU.

Ready state

The CPU contains a few internal storage locations called ____, each capable of holding a single instruction or data item.

Registers

This is a formal document sent to sellers/vendors that lists system infrastructure requirements and asks for proposals to meet the stated requirements. Vendors/sellers could submit multiples of these documents per different ways to meet these requirements.

Request for proposal

Activities in the these 2 Unified Process (UP) disciplines, the business modeling discipline and the ____ discipline, are mainly concerned with building: 1. Models of the organization that will own and operate the system 2. Models of the system's environment 3. Models of system and user requirements.

Requirements

This makes up the most part of a Request For Proposal?

Requirements statement

​A ____ intelligently forwards messages between two or more networks.

Router

A(n) ________ enables programmers to develop applications that do most of their work by calling other applications and system software.

Scripting language

Storage devices that hold data not needed by currently running programs are called ____

Secondary storage

​____ is an enhanced version of the protocol Telnet that encrypts data flowing among client-server/server-client to deal with a key security problem in Telnet.

Secure Shell

Modern computers use memory implemented with ____.

Semiconductors

A ____ storage device stores and retrieves data items in a linear, or sequential, order.

Serial access

The ____ of the Operating System contains 1000s of reusable pieces/components that supply a wide variety of functions r from file/folder manipulation to accessing Input/Output devices, starting/stopping programs, and creating/moving/resizing GUI windows.

Service layer

____ scheduling chooses the next thread to be dispatched based on the expected amount of CPU time needed to complete the process.

Shortest time remaining

Antivirus software uses data files, sometimes called "____," containing information about known viruses.

Signature files

​In ____ mode, messages flow in only one direction

Simplex

______ programming languages guarantee program portability between other OSs and application programs.

Standard

​A ____ topology directly connects every node to a shared hub, switch, or router.

Star

This is a firewall that traces the movement of complex client-server communications.

Stateful firewall

​In order to create this, a user/system administrator must know the server & resource names before contacting/accessing the remote server.

Static connection

The ____ is the part of the kernel that accesses storage locations and manages data movement between storage devices and memory.

Storage I/O control layer

This is the name given to a data structure which records what allocation units belong to files and what allocation units are free.

Storage allocation table

​The ____ is the device or substance that actually holds data.

Storage medium

A secondary storage region, called the ____, is reserved for the task of storing pages not held in memory.

Swap space

In general this term describes the overall process of: -Acquiring new IS resources -Maintaining existing IS resources -Developing and implementing an IS security policy

System Administration

​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.

System administration

____ models provide the detail needed to develop a system that meets users' needs.

System requirements

​A progression of steps Information System professionals follow when creating an information system is called a ____.

Systems development life cycle

_______ is the glue that binds private networks together to form the Internet and the World Wide Web.

TCP/IP

The accuracy, or precision, of data format representation increases with ____.

The number of data bits used

____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.

Underflow

​Web resources are identified by a unique ____.

Uniform Resource Locator

This is a device that you attach physical computer equipment to (such as switches, routers etc) that delivers power to this equipment in the event of external power failure and these devices vary in their power delivery capacity, switching time, and battery life. Surge protection is normally a function of these too.

Uninterruptible power supply

Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.

Unsigned integer

​____ is a connectionless protocol that provides less reliable transport services.

User Datagram Protocol

​In a 3-layer architecture, this layer accepts user input and then formats & displays processing results.

View

As allocated by the OS, the resources that are apparent to a program or user are called ____.

Virtual resources

In computers, this is a program or program fragment that infects a computer by: -installing itself permanently, usually in a hard-to-find location -performs malicious acts on the infected computer -replicates and spreads itself by using services on the infected computer

Virus

____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

Viruses

_______ is a family of technologies and standards for carrying voice messages and data over a single packet-switched network.

Voice over IP

A storage device or medium is ____ if it can't hold data reliably for long periods.

Volatile

Modern Solid State Drives use a technique called "____" to spread write operations around the storage medium, thus evening out the impact of destructive writes and extending the storage device's useful life.

Wear leveling


Conjuntos de estudio relacionados

Functional Area 13: Risk Management

View Set

Real Estate: Transfer Of Property

View Set

Chapter 1: The Nurse's Role in a Changing Maternal-Child Health Care Environment

View Set

Preeclampsia - HESI Case Study - NRSG376

View Set

Blood Bank Book Questions - Unit 2

View Set