MIS Ch 4
10 TB is equivalent to ________ gigabytes.
10,240
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets? ASCII Mac OS ARM Unix
Arm
Machine code ________.
Cannot be modified by humans
An operating system is a hardware device used to input data into a computer. T/F
False
Linux is high-priced and closed source software developed by Google. T/F
False
Mobile devices lack wireless connectivity features. T/F
False
Programmers are not allowed to alter or add to an open source code. T/F
False
The cache and main memory are nonvolatile, meaning their contents survive when power is off. T/F
False
The term "open source" means that the source code of the program is not available to the public. T/F
False
Windows XP is a version of Windows designed for use on ARM devices. T/F
False?
Which of the following is an open-source Web browser? Ubuntu Apache Internet Explorer Firefox
Firefox
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? Self-driving cars Internet of things (IoT) 3D printing Automated guided vehicles
Internet of things
Android applications are developed using ________ programming language.
Java
Linux applications are developed using ________ programming language.
Java
________ is a version of Unix that was developed by an open source community.
Linux
The CPU stores the results of computations in ________.
Main memory
Which of the following is an example of an open-source desktop operating system? Microsoft Windows MySQL Ubuntu Apache
Microsoft Windows
Which of the following statements is true about closed source projects? Only trusted programmers are allowed to make changes to a closed source project. Anyone can obtain the source code for a closed source project. Programmers can alter a closed source code based on their interests and goals. Only users and developers are allowed to alter the source code in closed source projects.
Only trusted programmers are allowed to make changes to a closed source project.
Which of the following devices is an example of a storage hardware device? random access memory optical disk central processing unit barcode scanner
Optical disk
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices? Employees resist turning over the management of their own hardware to the organization. Employees gain public access from any device, not just mobile devices. The organization can sniff employees' mobile traffic. The policy appears to be permissive without actually being so.
The policy appears to be permissive without actually being so.
A 3D home printer would create more stable structures, use less material, and reduce workplace injuries. T/F
True
A Web, or thin-client, application is designed to run within computer browsers such as Firefox and Internet Explorer. T/F
True
Internet of Things (IoT) is one of the disruptive forces that change the power of business, allowing objects to connect to the Internet so they can interact with other devices, applications, or services. T/F
True
Magnetic and optical disks are nonvolatile. T/F
True
Mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed. T/F
True
Native applications are also known as thick-client applications. T/F
True
Virtualization is the process by which one physical computer hosts many different virtual computers within it. T/F
True
Which of the following statements refers to server virtualization? a personal computer, such as a desktop or portable computer, that hosts several different operating systems a storage area that loses its contents when the power is off a server computer that hosts one or more other server computers a server that hosts many versions of desktop operating systems
a server computer that hosts one or more other server computers
Which of the following memory devices is volatile in nature? cache memory erasable programmable read only memory (EPROM) optical disk magnetic disk
cache memory erasable programmable read only memory (EPROM)
A ________ is also called "the brain" of the computer.
central processing unit
Individuals who edit large pictures, sound, or video files need a(n) ________ processor computer with the minimum speed of 3.5 gigahertz.
dual
An operating system is required by both client and server computers. T/F
false
Which of the following statements is true about self-driving cars? expensive and complex increase in fuel consumption reduction in car insurance cost fewer accidents take place
fewer accidents?
The speed of a CPU is expressed in cycles called ________.
hertz
Thin-client applications are developed using ________.
html5
Which of the following is an example of vertical-market application software? Microsoft PowerPoint used to create presentations Adobe suite used by graphic designers inventory tracking software for an automobile manufacturer Tally software that is used to maintain business and personal accounts
inventory tracking software for an automobile manufacturer
Which of the following is an example of storage hardware in computers? projector plotter inkjet printer magnetic disk
magnetic disk
Java, C#, and VB.NET are examples of ________. structured queries client operating systems thin-client applications object-oriented languages
object-oriented languages
Virtualization is the process by which ________.
one physical computer hosts many different virtual computers within it
Linux is an example of a(n) ________. workstation client mobile operating system open source operating system user community
open source operating system
Main memory is also known as ________.
random access memory
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage? The policy appears to be permissive without actually being so. Employees will have to buy the hardware. The organization can sniff employees' mobile traffic. Employees can gain public access from any device, not just mobile devices.
the policy ?
An operating system is a program that controls a computer's resources. T/F
true
In a closed source project, such as Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. T/F
true