IS 310 Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

array

A(n) _____ is a sequence of primitive data elements stored in sequential storage locations

string

A(n) _____ is an array of characters

index

A(n) _____ is an array of data items, each of which contains a key value and pointer to another data item

operating system

A(n) _____ is the most common type of system software

supercomputer

A(n) _____ typically uses the latest and most expensive technology

registers

A(n) _______ is a storage location implemented in the CPU

byte, bits

A(n) _____ contains 8 _____

flat memory model

In the ____, memory addresses consist of a single integer

general-purpose

A CPU is a(n) ______ processor capable of performing many different tasks simply by changing the program

logic instruction/condition

A problem-solving procedure that requires executing one or more comparison and branch instructions is called a(n)

formula

A program that solves a(n) ____ requires no branching instructions

index/linked list

A set of data items that can be accessed in a specified order by using pointers is called a(n)

program

A set of instructions that's executed to solve a specific problem is called a(n)

white paper

A technology brief found on a vendor or manufacturer Web site is often called a ____

instruction

A(n) ___ is a command to the CPU to perform one processing function on one or more data inputs

object

A(n) ___ is one instance or variable of a class

network

A(n) ____ consists of hardware and software components that enable multiple users and computers to share information, software, and hardware resources

server

A(n) ____ is a computer that manages shared resources and enables users other computers to access them over a network

record

A(n) ____ is a data structure composed of other data structures or primitive data elements, commonly used as a unit of input and output to and from files or databases

class

A(n) ____ is a data structure containing both static data and methods

grid

A(n) ____ is a group of dissimilar or identical computers, connected by a high-speed network, that cooperate to provide services or run a shared application

cluster

A(n) ____ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run an application

long integer

A(n) ____ is an integer stored in double the normal number of bit positions

pointer

A(n) ____ is the memory address of another data item or structure

singly linked

A(n) ____ list stores one pointer with each list element

boolean

A(n) _____ data item can contain only the values true or false

data structure

A(n) _____ is a data item composed of multiple primitive data items.

doubly linked list

An element in a(n) _____ contains pointers to both the next and previous list elements

hexadecimal

Assembly (machine) language programs for most computers use ____ notation to represent memory address values

design

Configuring hardware and system software is an activity of the UP ____ discipline

business modeling/requirements

During the ___ UP disciplines, the business, its environment , and user requirements and defined and modeled

AITP, ACM, IEEE

IS students and professionals should be familiar with professional societies, such as ___, ____, and _____

integer, floating point

In a CPU, _____ arithmetic generally is easier to implement than ______ arithmetic because of a simpler data coding scheme and data manipulation circuitry

radix point

In a positional numbering system, the ____ separates digits representing whole number quantities from digits representing fractional quantities

Extended Binary Coded Decimal Interchange Code (EBCDIC)

In older IBM mainframe computers, characters were encoded according to the _____ coding scheme

numeric range

Increasing a numeric representation format's size (number of bits) increases the ____ of values that can be represented

volatility

Key characteristics that distinguish primary and secondary storage include cost, capacity, speed, and _____

double-precision

Many computer implement ___ numeric data types to increase accuracy and prevent overflow and underflow

segmented memory model

Most intel CPU's use the _____, in which each memory address is represented by two integers

programming language

Most programs are written in a(n) _____, such as FORTRAN or Java, which is then translated into equivalent CPU instructions

architectural

Selecting hardware, network components, and system software is an activity of the UP ____ discipline

executes

The CPU _____ program instructions one at a time

ISO, Latin-1

The ____ has defined a character-coding table called ____, which combines the ASCII-7 coding table with an additional 128 Western European multinational characters

system bus

The _____ enables the CPU, primary storage, and secondary storage devices to communicate

low-order bit

The _____ is the bit of lowest magnitude in a byte or string

ALU, registers, control unit

The major components of a CPU are the _____, _____, and ____

collating sequence

The ordering of characters in a coding table is called a(n) ____

underflow, truncation

The result of adding, subtracting, or multiplying two integers might result in overflow but never ____ or ____

Secondary Storage

The term ___ describes the collection of storage devices that hold large quantities of data for long periods

Primary Storage

The term _____ refers to storage devices, not located in the CPU, that hold instructions and data of currently running programs

Mainframe, Supercomputer

Types or classes of larger servers include ____, which are generally optimized for data storage and I/O capabilities, and ___, which are generally optimized for computational capacity and speed

Unicode

Unlike ASCII and EBCDIC, ____ is a 16-bit or 32-bit character coding table

URL

WWW resources are identified and accessed by a(n)

virtualization

_____ is a technique that enables a single computer to host multiple virtual machines

floating point

_____ notation encodes a real number as a mantissa multiplied by a power (exponent) of 2

overflow

_____ occurs when the result of an arithmetic operation exceeds the number of bits available to store it

Grosch's Law

_____ says that larger computer classes are more cost-efficient than smaller ones- a statement that doesn't accurately describe modern computing hardware


Conjuntos de estudio relacionados

CJ Quiz 9 Review Box Notes 12-27

View Set

Live Virtual Machine Lab 3.1: Module 03 Internet Protocol Addressing Solutions

View Set

Mgmt & organizational behavior final

View Set

Ch 4 AA CONSOLIDATED FINANCIAL STATEMENTS AND OUTSIDE OWNERSHIP: Questions

View Set

Homework from Inspector Course Books

View Set

possible ch 4 quiz questions clinical psych

View Set

GI Exam 2 - Regulation of Food Intake

View Set

Chapter Quiz - Policy Provisions & Contract Law

View Set