MIS Ch 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

10 TB is equivalent to ________ gigabytes.

10,240

Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets? ASCII Mac OS ARM Unix

Arm

Machine code ________.

Cannot be modified by humans

An operating system is a hardware device used to input data into a computer. T/F

False

Linux is high-priced and closed source software developed by Google. T/F

False

Mobile devices lack wireless connectivity features. T/F

False

Programmers are not allowed to alter or add to an open source code. T/F

False

The cache and main memory are nonvolatile, meaning their contents survive when power is off. T/F

False

The term "open source" means that the source code of the program is not available to the public. T/F

False

Windows XP is a version of Windows designed for use on ARM devices. T/F

False?

Which of the following is an open-source Web browser? Ubuntu Apache Internet Explorer Firefox

Firefox

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? Self-driving cars Internet of things (IoT) 3D printing Automated guided vehicles

Internet of things

Android applications are developed using ________ programming language.

Java

Linux applications are developed using ________ programming language.

Java

________ is a version of Unix that was developed by an open source community.

Linux

The CPU stores the results of computations in ________.

Main memory

Which of the following is an example of an open-source desktop operating system? Microsoft Windows MySQL Ubuntu Apache

Microsoft Windows

Which of the following statements is true about closed source projects? Only trusted programmers are allowed to make changes to a closed source project. Anyone can obtain the source code for a closed source project. Programmers can alter a closed source code based on their interests and goals. Only users and developers are allowed to alter the source code in closed source projects.

Only trusted programmers are allowed to make changes to a closed source project.

Which of the following devices is an example of a storage hardware device? random access memory optical disk central processing unit barcode scanner

Optical disk

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices? Employees resist turning over the management of their own hardware to the organization. Employees gain public access from any device, not just mobile devices. The organization can sniff employees' mobile traffic. The policy appears to be permissive without actually being so.

The policy appears to be permissive without actually being so.

A 3D home printer would create more stable structures, use less material, and reduce workplace injuries. T/F

True

A Web, or thin-client, application is designed to run within computer browsers such as Firefox and Internet Explorer. T/F

True

Internet of Things (IoT) is one of the disruptive forces that change the power of business, allowing objects to connect to the Internet so they can interact with other devices, applications, or services. T/F

True

Magnetic and optical disks are nonvolatile. T/F

True

Mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed. T/F

True

Native applications are also known as thick-client applications. T/F

True

Virtualization is the process by which one physical computer hosts many different virtual computers within it. T/F

True

Which of the following statements refers to server virtualization? a personal computer, such as a desktop or portable computer, that hosts several different operating systems a storage area that loses its contents when the power is off a server computer that hosts one or more other server computers a server that hosts many versions of desktop operating systems

a server computer that hosts one or more other server computers

Which of the following memory devices is volatile in nature? cache memory erasable programmable read only memory (EPROM) optical disk magnetic disk

cache memory erasable programmable read only memory (EPROM)

A ________ is also called "the brain" of the computer.

central processing unit

Individuals who edit large pictures, sound, or video files need a(n) ________ processor computer with the minimum speed of 3.5 gigahertz.

dual

An operating system is required by both client and server computers. T/F

false

Which of the following statements is true about self-driving cars? expensive and complex increase in fuel consumption reduction in car insurance cost fewer accidents take place

fewer accidents?

The speed of a CPU is expressed in cycles called ________.

hertz

Thin-client applications are developed using ________.

html5

Which of the following is an example of vertical-market application software? Microsoft PowerPoint used to create presentations Adobe suite used by graphic designers inventory tracking software for an automobile manufacturer Tally software that is used to maintain business and personal accounts

inventory tracking software for an automobile manufacturer

Which of the following is an example of storage hardware in computers? projector plotter inkjet printer magnetic disk

magnetic disk

Java, C#, and VB.NET are examples of ________. structured queries client operating systems thin-client applications object-oriented languages

object-oriented languages

Virtualization is the process by which ________.

one physical computer hosts many different virtual computers within it

Linux is an example of a(n) ________. workstation client mobile operating system open source operating system user community

open source operating system

Main memory is also known as ________.

random access memory

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage? The policy appears to be permissive without actually being so. Employees will have to buy the hardware. The organization can sniff employees' mobile traffic. Employees can gain public access from any device, not just mobile devices.

the policy ?

An operating system is a program that controls a computer's resources. T/F

true

In a closed source project, such as Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. T/F

true


Conjuntos de estudio relacionados