IS 310 Final Review
A(n) ____________________ is an automated tool for testing executable programs.
symbolic debugger
Read/write circuitry uses ____ data to compensate for minor variations in rotation speed and other factors that might disturb the precise timing needed for reliable reading and writing
synchronization
Storage device speed is called ________
access time
____ is the time required to perform one complete read or write operation.
access time
A(n) ____________________ matrix display uses one or more transistors for every pixel.
active
The ____ is a digital circuit that generates timing pulses, or signals, and transmits the pulses to other devices in the computer.
system clock
The ____ software layer has utility programs used by end users and system administrators to manage and control computer resources.
system management
The ____ software layer has utility programs used by system management and application programs to perform common functions
system services
A(n) ____ is a program in which different sets of instructions are applied to different data input values.
algorithm
The term ____ describes the structure, interaction, and technology of computer system components.
systems architecture
A ____ performs activities in the design discipline and sometimes the deployment discipline.
systems designer
A sequence of records stored in main memory is normally called a ____.
table
____ represents bit values by varying amplitude while holding carrier wave frequency constant.
amplitude modulation
Amplitude modulation is sometimes called ____.
amplitude-shift keying
When actual hardware, network, and system software components are acquired and installed, they make up a(n) ____ infrastructure for one or more information systems.
technology architecture
The ____ discipline includes activities that verify correct functioning of infrastructure and application software components and ensure that they satisfy system requirements.
testing
A(n) ____________________ signal uses the full range of a carrier wave characteristic to encode continuous data values.
analog
The ____ layer includes communication protocols used by programs that make and respond to high-level requests for network services.
application
____ software describes programs used to develop other programs.
application development
A(n) ____ is a stored set of instructions for responding to a specific request, much as you might look up a recipe to prepare a particular dish.
application program
End users use ____ to perform specific tasks, such as processing customer orders or developing and formatting documents and financial analyses.
application software
The first set of design activities, called ____ design, selects and describes the exact configuration of all hardware, network, system software, and application development tools to support system development and operations.
architectural
A(n) ____ is an ordered list in which each element can be referenced by an index to its position.
array
A second-generation language (2GL) is more commonly known as a(n) ____________________ language.
assembly
A device that generates spoken messages based on text input is called a(n) ____________________.
audio response unit
____________________ is a group of wireless networking standards developed by the WiMAX Forum and codified in the IEEE 802.16 standard.
WiMAX
A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.
third-generation language
A(n) mouse that can detect motion with ____________________ dimensions uses an embedded gyroscope.
three
A(n) ____________________ is an LCD or LED display with additional TFT layers that detect the position of electrical field changes based on capacitance.
touchscreen
A(n) ____________________ is one concentric circle of a platter, or the surface area that passes under a read/write head when its position is fixed.
track
A disk drive's data ____________________ rate is a summary performance number combining the physical aspects of data access with the electronic aspects of data transfer to the disk controller or system.
transfer
A(n) ____ is an electrical switch with three electrical connections.
transistor
The communication path that transports signals is called a(n) ____________________.
transmission medium
10 Gigabit Ethernet is based on the 802.3ae (2002) and the 802.3ak (2004) standards.
true
A CPU is a complex system of interconnected electrical switches.
true
A complex chain of events occurs when the CPU executes a program.
true
A machine capable of addition can perform multiplication by executing the addition function multiple times.
true
A microprocessor that fails to perform reliably at a higher clock rate might still be usable and rated for sale at a lower clock rate.
true
A significant advantage of MIDI is its compact storage format.
true
A system bus connects computer system components, including the CPU, memory, storage, and I/O devices.
true
A typical computer system must have much more secondary storage capacity than primary storage capacity.
true
Allocating and accessing resources are complex when a user or program can request resources that aren't on the local computer and aren't managed by locally installed system software.
true
An IDL can represent image components as embedded fonts, vectors, curves and shapes, and embedded bitmaps.
true
An advantage of optical over mechanical mice is a lack of moving parts that can be contaminated with dust and dirt.
true
As currently envisioned, quantum computing offers no benefit compared with conventional electrical processors for problem types that don't require massively parallel computation.
true
Bar-code readers are typically used to track large numbers of inventory items, as in grocery store inventory and checkout, package tracking, warehouse inventory control, and zip code routing for postal mail.
true
Because plasma displays actively generate colored light near the display surface, they're brighter and have a wider viewing angle than LCDs.
true
Both multicore and multiple-processor architectures are examples of scaling up because they increase the power of a single computer system.
true
Consolidation in periodical publishers has created large corporate families of technology-related Web sites and publications.
true
Data inputs are accessed from storage or extracted directly from the operands and stored in one or more registers.
true
Data messages vary in format and content and can include any primitive CPU data types or more complex data types.
true
Data written to a cache during a write operation isn't automatically removed from the cache after it's written to the underlying storage device.
true
Developers of application software for technical areas, such as robotics, flight navigation, and scientific instrumentation, typically have degrees in computer science or some branch of engineering.
true
Devices with low data transfer demand can use a single PCI bus lane, and devices with higher requirements can increase their available data transfer rate by using additional lanes.
true
During a write operation, a cache acts similarly to a buffer.
true
Each iteration of the UP includes whatever activities are needed to produce testable models or working software.
true
Early Xeon processors filled an important niche in the small server market but weren't powerful enough to perform processing duties in many large-scale servers.
true
For video display, a pixel displays no light or light of a specific color and intensity.
true
Integrated circuits reduced manufacturing cost per circuit because many chips could be manufactured in a single sheet, or wafer.
true
LCD displays have less contrast than other flat panel displays because color filters reduce the total amount of light passing through the front of the panel.
true
Large computer systems and the software that runs on them use more complex technology than smaller ones do.
true
Linked lists are easier to expand or shrink than arrays are.
true
MP3 compresses the audio data stream by discarding information about masked sounds or representing them with fewer bits.
true
Manufacturer Web sites are mainly marketing and customer support tools.
true
Most portable data capture devices combine a keyboard, mark or bar-code scanner, and wireless connection to a wired base station, cash register, or computer system.
true
On paper, pixel size corresponds to the smallest drop of ink that can be placed accurately on the page
true
One action that occurs during the fetch cycle is increment ing a pointer to the location of the next instruction
true
Phonemes sound similar when voiced repetitively by the same person.
true
Programming languages, program translation tools, and debugging tools address only the implementation discipline of the Unified Process.
true
SSDs are much more tolerant to shock and other negative environmental factors commonly encountered with portable devices, such as multifunction cell phones, netbooks, and laptop computers.
true
Scientific and floating-point notation is far more complex than integer data formats.
true
Serial channels in buses are more reliable than parallel channels at very high speeds.
true
Shifting an 8-bit twos complement value to the right by seven positions is a simple way to extract and test the sign bit.
true
Some experimental computers have used quantum physics to perform data storage and computation.
true
Square waves are the preferred method of transmitting digital data over short distances, such as on a system bus
true
Star topologies now dominate physical network physical topology for wired networks.
true
System software has the intelligence needed to make and respond to external resource requests, and most operating systems include support for both functions.
true
The 80386 provided hardware support for running multiple programs simultaneously, simplified partitioning primary storage among programs, and provided mechanisms for preventing programs from interfering with one another.
true
The BRANCH command has one operand containing the memory address of the next instruction.
true
The Difference Engine computed logarithms by moving gears and other mechanical components.
true
The OS is the best source of file access information because it updates information dynamically as it services file access requests.
true
The advantage of using an index lies in the efficiency of record insertion, deletion, and retrieval.
true
The characteristics differentiating the physical topologies include the length and routing of network cable, type of node connections, data transfer performance, susceptibility of the network to failure, and cost.
true
The membership of the ACM represents a broad cross-section of the computer community, including hardware and software manufacturers, educators, researchers, IT professionals, and students.
true
The memory bus has a much higher data transfer rate than the system bus because of its shorter length, higher clock rate, and (in most computers) large number of parallel communication lines.
true
The most comprehensive CASE tools automate the process of deploying working systems from analysis and design models
true
The number and complexity of network functions and components have grown as network technology has matured and become more widespread.
true
The primary role of software is to translate users' needs and requests into CPU instructions that, when executed, produce a result that satisfies the need or request.
true
The write operation for recordable discs is destructive, so recordable disc formats can be written only one time.
true
To make an informed choice when purchasing a computer, you must know your preferences and requirements, such as the application software you plan to use and whether you plan to discard or upgrade the computer in a year or two.
true
The multiplier that describes the difference between one position and the next is the ____ of the numbering system.
base
Compilers and interpreters for high-level programming languages, such as C and Java, convert decimal numbers into ____________________ numbers automatically when generating CPU instructions and data values.
binary
In a ____, each digit can have only one of two possible values: 0 or 1.
binary number
As bit transmission speed is increased, the duration of each bit in the signal, known as the ____, decreases.
bit time
In a modern digital computer, data is represented by groups of ____.
bits
A ____ is a circuit board that contains most of a server.
blade
In synchronous transmissions, messages are transmitted in fixed-size byte groups called ____.
blocks
Traditional bus interfaces are too slow and power hungry to provide sufficient data transfer capacity between many processors or between processors and primary storage.
true
A(n) ____________________ can improve system performance when two devices have different data transfer rates, as when copying music files from a PC to an iPod via a USB 2.0 connection.
buffer
Type I error rates can be reduced by combining parity checking and block checking.
true
A(n) ____________________ is a small reserved area of main memory (usually DRAM or SRAM) that holds data in transit from one device to another and is required to resolve differences in data transfer unit size.
buffer
A ____ is a shared electrical or optical channel that connects two or more devices.
bus
When the CPU is the focus of all computer activity, it's also the ____.
bus master
In the UP, the business and its environment are defined and modeled within the ____________________ discipline
business modeling
Understanding data representation is key to understanding hardware and software technologies.
true
When dealing with publicly accessible information sources, be sure to use information from several unrelated sources to balance the biases of each source.
true
Whether implemented in system or application software, almost all data structures make extensive use of pointers and addresses.
true
Windows OSs tend toward an all-inclusive approach to system software, bundling most system software functions in the OS.
true
You can increase a storage format's numeric range by allocating more bits to the whole portion.
true
Zip files and archives are examples of lossless compression.
true
An end node is a device such as a workstation, server, or printer that can be the source or destination of a message.
true
Despite its complexities, packet switching is the dominant form of intercomputer communication.
true
Ethernet is a LAN technology, developed by Xerox in the early 1970s, that's closely related to the IEEE 802.3 standard.
true
In a physical delivery system using store-and-forward, the central nodes are transfer points located at or near the junction of major roadways or air routes.
true
Internet Protocol version 6 (IPv6) is an updated version of IPv4 defined in the late 1990s and first deployed in the mid-2000s.
true
The 802.1 and 802.2 standards correspond roughly to the OSI Data Link layer.
true
The process of designing and constructing software translates users' information-processing needs into CPU instructions that, when executed, address these needs.
true
In ____ notation, non negative integer values are represented as ordinary binary values.
twos complement
In the decimal or binary notations, the symbol used to represent a digit and the digit's position in a string determines its ____.
value
A ____ is a processor that guesses what data will be requested in the near future and loads this data from the storage device into the cache before it's actually requested.
cache controller
A(n) ____________________ instruction transfers control to the first instruction in a function.
call
A wave with encoded bits is called a(n) ____________________ wave because it transports bits from one place to another.
carrier
A(n) ____ is a data structure containing both traditional (static) data elements and programs that manipulate the data.
class
The frequency at which the system clock generates timing pulses is the system's ____.
clock rate
____________________ typically make use of both multicomputer configuration and virtualization.
clouds
A ____ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run a single application.
cluster
____________________ cable contains a single copper conductor surrounded by a thick plastic insulator, a metallic shield, and a tough plastic outer wrapping.
coaxial
Program instructions are sometimes called ____.
code
A(n) ____________________ is a set of rules and conventions for communication.
communication protocol
A(n) ____________________ is a file containing related executable functions and an index of the library contents.
compiler library
____ instructions represent combinations of primitive processing operations.
complex
A processor's efficiency depends on its _____________
complexity
A ____ is a mathematical compression technique implemented as a program.
compression algorithm
A ____ consists of hardware and software components that enable users and computer systems to share information, software, and hardware resources.
computer network
The Institute for Electrical and Electronics Engineers (IEEE) ____ is a subgroup of the IEEE that specializes in computer and data communication technologies.
computer society
The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.
computer-assisted software engineering
Substances that electrons can flow through are called ____.
conductors
IP is an example of a(n) ____________________ protocol, in which the sender doesn't attempt to verify a recipient's existence or ask its permission before sending data.
connectionless
Computer system components coordinate their activities by sending signals over the ____________________.
control bus
____ is noise added to the signal in the wire from EMI generated by adjacent wires.
crosstalk
Pointing devices can be used to enter drawings into a computer system or control the position of a(n) ____ on a display device.
cursor
A complete ____ of a sine wave follows its full range from zero to positive peak, back to zero, to its negative peak, and then back to zero again.
cycle
In most CPUs, the ____ is the time required to fetch and execute the simplest instruction in the instruction set.
cycle time
A _______ consists of all tracks at an equivalent distance from the edge or spindle on all platter surfaces
cylinder
A ____ defines the name and data type of program variables.
data declaration
The ____ layer is the interface between network software and hardware.
data link
A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.
data structure
The role of ____ requires both technical expertise and the ability to help the organization make optimal use of its data resources for tasks such as market research.
database administrator
In the decimal numbering system, the period or comma is called a ____.
decimal point
In the UP, installing and configuring hardware and software components are activities of the ____________________ discipline.
deployment
The ____ discipline is the set of activities for determining the structure of a specific information system that fulfills the system requirements.
design
____ specify detailed blueprints for software component construction and the interaction between software components and users.
design models
Storage and I/O devices are normally connected to the system bus or a subsidiary bus through a(n) ____________________
device controller
The most famous of the mechanical computation devices is the ____________________, built by Charles Babbage in 1821.
difference engine
Data is represented in the CPU as ____.
digital electrical signals
A(n) ____ is a microprocessor specialized for processing continuous streams of audio or graphical data.
digital signal processor
Current optical storage devices use a(n) ____________________ storage medium.
disc
In the UP, related activities are grouped into UP ____.
disciplines
The complexity of modern networks arises from the huge quantity of ____.
distributed resources
Silicon and germanium are basic elements with resistance characteristics that can be controlled or enhanced with chemicals called ____.
dopants
A ____ data format combines two adjacent fixed-length data items to hold a single value.
double-precision
____ stores each bit by using a single transistor and capacitor.
dynamic RAM
____________________ assist programmers in writing syntactically correct code by verifying syntax as the code is being typed and highlighting errors.
editors
The term ____ describes the maximum number of bits or bytes per second that the channel actually achieves with a specific communication protocol.
effective data transfer rate
____ is the flow of electrons from one place or device to another.
electrical current
Computer systems represent data electrically and process it with _____________
electrical switches
______ transistors are a bridge between electrical and optical computer components.
electro-optical
____________________ embeds all or part of a datagram in a physical network's message format.
encapsulation
Most application software is used by ____.
end users
____________________ code is stored in a file, such as an .exe file in Windows, and contains CPU instructions that are ready for an OS to load and execute.
executable
During the ____ cycle of the CPU, the transformation takes place and data output is stored.
execution
A(n) ____ is a placeholder for missing executable code.
external function call
A buffer for an I/O device is typically implemented on the sending computer.
false
A large set of complex instructions often goes hand in hand with fixed-length instruction formats.
false
A perfect conductor can be described as one having maximum resistance.
false
A personal digital assistant is a laptop computer that emphasizes small size, reduced weight, low cost, and wireless networking and is capable of performing only light-duty tasks, such as Web browsing, e-mailing, and word processing.
false
According to Moore's Law, the doubling of transistor density is achieved with a 50% increase in unit cost.
false
All computers are automated computing devices, and all automated computing devices are computers.
false
Architecture includes the processes analysis and construction.
false
Arithmetic SHIFT instructions are more complex when applied to twos complement values because the rightmost bit is a sign bit.
false
CRC has much higher Type I and Type II error rates than parity and block checking.
false
Color laser output uses four separate print generators.
false
Compared with RISC processors, CISC processors have some advantages for computationally intensive applications.
false
Computers are designed to process character data and can therefore represent characters directly.
false
Continuous speech is a series of nonstop interconnected phonemes.
false
Decimal and binary notations are alternative forms of a logical numbering system.
false
Double-precision integers are sometimes called large integers.
false
Efforts in each discipline of the UP are generally distributed across all of the iterations in the same way for each project.
false
For people and computers, a printed character must exactly match a specific pixel map to be recognizable.
false
Hardware and software manufacturers are in the business of providing unbiased information about products.
false
IBM introduced the first mass-market microcomputer in 1971.
false
IDLs are a simple form of compression.
false
In ASCII, NAK is sent to acknowledge correct receipt of data, and ERR is sent to indicate that an error has been detected.
false
In classical physics, a subatomic particle, such as a photon, can be in multiple places at one time.
false
In the binary32 format, the leading sign bit applies to the exponent, not the mantissa.
false
Java bytecode programs usually run 10 times faster than native applications.
false
Lossless compression ratios higher than 50:1 are difficult or impossible to achieve with audio and video data.
false
Low voltage circuits are less susceptible to damage from voltage surges and static electricity.
false
Magnetic and optical storage are currently direct competitors.
false
Magnetic tape and disk are considered volatile storage media.
false
Mechanical computation devices cannot perform complex calculations.
false
Mechanical computers were used during World War I to compute trajectory tables for naval guns and torpedoes.
false
Monetary amounts should be stored and manipulated as binary floating-point numbers.
false
Moving image quality improves as the number of frames per second (fps) decreases.
false
Multiple-core CPUs in Pentium processors resulted in major changes to CPU internals.
false
One computer can use the CPU or storage but not the I/O devices of another.
false
One way to limit wait states is to use an SDRAM cache between the CPU and SRAM primary storage.
false
Practical optical processors will probably appear first as full-fledged computer processors.
false
SRAM has higher density then DRAM.
false
Sender and receiver can use different methods of encoding, transmitting, and interpreting the bits of a message.
false
The ALU component of the CPU moves data and instructions between main memory and registers.
false
The CPU communicates with a peripheral device by moving data to or from an I/O port's dedicated bus.
false
The biggest impetus for the change to electronic computing devices came during World War I.
false
The complexity of data structures is limited only by the software.
false
The database administrator can be responsible for many tasks other than operating and maintaining the network, including installing and maintaining end-user software and assisting management in selecting and acquiring software and hardware.
false
The largest computational problems, such as those encountered in modeling three-dimensional physical phenomena, can be solved by a single computer as long as it has enough computing resources.
false
The need or idea that motivates a request for computer processing is stated at a specific level.
false
The operand of a CPU instruction cannot contain the location of a data item.
false
Today, a computer is considered useful even if it doesn't have the capability to interact with other computers.
false
Unbiased information exists on the Web, and it's generally easy to find.
false
Using contiguous storage locations, especially in secondary storage devices, simplifies the allocation of storage locations.
false
Wave characteristics, such as frequency and amplitude, are inherently discrete.
false
Guaranteeing service quality is a simple matter in most IP networks.
false
To limit skew errors, high-speed parallel communication channels must be short, typically less than two meters.
false
During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.
fetch
A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.
fifth-generation language
____ RAM is the most common non-volatile RAM used today.
flash
Real numbers are represented in computers by using ____.
floating-point notation
Each central node maintains a table of node addresses and transmission lines or connection ports, called a(n) ____________________ table, and uses this table to make forwarding decisions.
forwarding
A tool suite that primarily supports model development is sometimes called a ____ tool.
front-end CASE
Given the rapid pace of change in computer technology, a manager must have a broad understanding of current technology and _____.
future technology trends
A(n) ____________________ is a circuit that can perform a processing function on a single binary electrical signal, or bit.
gate
____________________ are nodes connecting two or more networks or network segments that might be implemented physically as workstations, servers, or routers.
gateways
____________________ touchscreen input interprets a sequence of touch information as a single command
gesture-based
____ mode uses a single shared channel, and each node takes turns using the transmission line to transmit and receive.
half-duplex
____ is typically the cheapest component of current information systems
hardware
A __________ is a central connection point for nodes in a LAN
hub
The ____ discipline of the UP includes all activities for building, acquiring, and integrating application software components.
implementation
The main goal of buffering and caching is to ____.
improve overall system performance
The address of an array element can be calculated with the starting address of the array and the element's ____.
index
Digitizing tablets and tablet PCs are examples of ____________________, a general class of input devices.
input pads
A(n) ____ is a whole number—a value that doesn't have a fractional part.
integer
Managers of _____ collections of information systems and supporting infrastructure must contend with a great deal of technical complexity.
integrated
Several transistors and their interconnections on a single chip form a(n) ____.
integrated circuit
A(n) ____ reads a single source code instruction, translates it into CPU instructions or a DLL call, and executes the instructions or DLL call immediately, before the next program statement is read.
interpreter
____ Web sites are oriented toward sales, but they usually contain detailed information on specific products or links to other Web sites.
vendor
A storage device or medium is ____ if it can't hold data reliably for long periods.
volatile
Each clock cycle the CPU spends waiting for a slower device is called a ____.
wait state
Long-distance telecommunication providers use FDM to multiplex single-mode optical fibers, an application commonly called ____.
wavelength-division multiplexing (WDM)
A(n) ____________________ is software accessed over the Internet using Web protocols, such as shipping cost calculator accessed by an online shopping application.
web server
A network for an entire campus is known as a(n) ____ and includes end nodes, LANs, zone networks, the campus backbone network, and central nodes.
wide area network
With unsigned integers, the lowest value that can be represented is always ____________________.
zero
A ____ connects all LAN central nodes in a group of buildings.
zone network
Data, address, and command bits are transmitted across PCI bus line subsets called "____."
lanes
Storing data optically involves using a(n) ____ and an optical disc's reflective coating.
laser
The ____ states that when multiple resources are required to produce something useful, adding more of a single resource produces fewer benefits.
law of diminishing returns
The rightmost digit in a bit string is the ____.
least significant digit
When three cache levels are in use, the cache closest to the CPU is called a ____ cache.
level one
A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.
linked list
A(n) ____ is a set of related data values.
list
Each network covering a floor or building is called a _____.
local area network
In the "layered approach," knowledge of the machine's physical details is embedded into system software and hidden from users and application programmers. This is commonly referred to as ____.
machine independence
A(n) ____ is a ribbon of plastic with a coercible (usually metallic oxide) coating.
magnetic tape
When discussing computer processing, _____________ refers to executing processor instructions, such as addition, subtraction, and equality comparisons, and "ease" refers to machine efficiency.
manipulation
____ Web sites have detailed information on their products and offer technical and customer support services.
manufacturer
Quantum physics describes subatomic behavior with ____.
mathematical rules
In a computation device, a(n) ____ is driven by a spring and pendulum, and each swing of the pendulum allows a gear to move one step under pressure from the spring.
mechanical clock
A(n) ____________________ topology is one in which every node pair is connected by a point-to-point link.
mesh
A ____ is a request to execute a specific method and return a response.
message
The programs in a class are called ____.
methods
A ____ is a computer system designed to meet a single user's information-processing needs.
microcomputer
A(n) ________ is a microchip containing all the circuits and connections that implement a CPU
microprocessor
Access time s for secondary storage devices are typically expressed in _____ or microseconds
milliseconds
____ has been the primary basis for CPU speed and clock rate improvement since the first electrical computer.
miniaturization
The leftmost digit in a bit string is called the ____.
most significant
The term ____ describes transmission situations involving multiple senders and receivers.
multicasting
____ cable can be constructed of glass or plastic.
multimode fiber optic
The upper 128 entries in Latin-1 are sometimes called ____.
multinational characters
____ describes any CPU architecture in which duplicate CPUs or processor stages can execute in parallel.
multiprocessing
A CPU with a 1 GHz clock rate needs a new instruction and supporting data every ____________________.
nanosecond
___ are those compiled and linked for a particular CPU and OS.
native application
With ____ parity, the sender sets the parity bit to 0 if the count of 1-valued data bits in the character is odd.
odd
Optical light pulses can be stored indirectly, such as
on the surface of a DVD
____ signals can carry more data than electrical signals.
optical
____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.
overflow
Packet switching, the most common type of TDM, divides messages from all users or applications into small pieces called ____________________.
packets
There are typically multiple storage and I/O devices connected to a computer, collectively referred to as ____.
peripheral devices
A ____ network is a complex combination of communication protocols, methods of data transmission, and network hardware devices.
physical
_____ is a method of organizing CPU circuitry so that multiple instructions can be in different stages of execution at the same time.
pipelining
To an observer, the quality of a printed or displayed image increases as ____________________ size increases.
pixel
A(n) plasma display pixel excites gas into a(n) ____________________ state to generate UV light.
plasma
____ displays use excited gas and phosphors to generate colored light.
plasma
Of all flat panel displays, ____________________ have the shortest operational lifetimes.
plasma displays
Magnetic disk media are flat, circular ____________________ with metallic coatings that are rotated beneath read/write heads.
platters
A ____ is a printer that generates line drawings on wide sheets or rolls of paper.
plotter
A(n) ____ is a data element containing the address of another data element.
pointer
Storage devices that hold currently executing programs are called _________
primary storage
A(n) __________ is a device that perform data manipulation and transformation functions including computation, comparison, and data movement
processor
A program's ____ version omits the symbol table and debugging checkpoints to reduce program size and increase execution speed.
production
A ____ is a program that translates instructions in a programming language into CPU instructions.
program translator
Typically, the first iteration or two of the UP produces documentation and a ____ system.
prototype
Data can be represented as ____ and stored directly, such as an image as a hologram.
pulses of light
Any matter that stores data in multiple simultaneous quantum states is called a ____.
qubit
Quantum computing, introduced in a Technology Focus in Chapter 2, uses quantum states to simultaneously encode two values per bit, called a ____.
qubit
The term ____ describes transmissions using frequencies between 50 Hz and 1 terahertz (THz).
radio frequency
The fractional portion of a real number is represented by digits to the right of the ____.
radix point
Average access time is computed under the assumption that two consecutive accesses are sent to __________ locations
random
In the early days of networks, the only important distributed resource was ____.
raw data
The stored charge held within a bit of magnetic storage must be above the ____________________ for a read operation to be successful.
read threshold
In a magnetic disk drive, a(n) ____________________ is mounted on the end of an access arm for each platter surface.
read/write head
A(n) ____ can contain both whole and fractional components.
real number
A(n) ____________________ is a data structure composed of other data structures or primitive data elements.
record
Each refresh operation in DRAM is called a(n) _________________
refresh cycle
The number of refresh cycles per second is normally stated in hertz and called the ____.
refresh rate
The CPU contains a few internal storage locations called ____, each capable of holding a single instruction or data item.
registers
Early mechanical computation devices were built to perform ____.
repetitive mathematical calculations
The loss of electrical power that occurs as electrons pass through a conductor is called ____.
resistance
In a single communication channel a ____ wire completes an electrical circuit between sending and receiving devices.
return
The process of converting analog sound waves to digital representation is called ____.
sampling
____ is an approach that partitions processing and other tasks among multiple computer systems.
scaling out
When keys are pressed, a keyboard controller generates output called a(n) ____________________.
scan code
Bar-code readers use ____that sweep a narrow beam back and forth across the bar code.
scanning lasers
A(n) ____ enables programmers to develop applications that do most of their work by calling other applications and system software.
scripting language
The term ____________________ describes the data transfer unit for magnetic disk and optical disc drives.
sector
____________________ transmission uses only a single transmission line and a return wire.
serial
A ____ storage device stores and retrieves data items in a linear, or sequential, order.
serial access
The term ____ can describe computers as small as microcomputers and as large as supercomputers.
server
The term _______ can describe computers as small as midrange computers and as large as supercomputers
server
A Java ____________________ runs in a Web server and performs functions such as calculations, database access, and creation of Web pages that are transmitted to a Web browser for display.
servlet
In ____ mode, messages flow in only one direction.
simplex
____ is the most expensive cable type.
single mode fiber optic
____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.
software programs
____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.
software programs
A ____ is a reserved area of main memory accessed on a last-in, first-out (LIFO) basis.
stack
A special-purpose register called the ____________________ always points to the next empty address in the stack and is incremented or decremented automatically each time the stack is pushed or popped.
stack pointer
A(n) ____________________ operation is a data transfer from a register into primary storage.
store
Lossy compression of audio and video can achieve compression ratios up to ____.
50:1
A single disk sector usually holds ____ or 4096 bytes
512
As buffer size increases above ____ bytes, CPU cycle consumption decreases at a linear rate.
8
In classical physics, a group of 3 bits can store only one of ____ possible values at a time.
8
The IEEE has drafted a number of network standards, collectively referred to as the IEEE ____________________ standards.
802
Large numeric values expressed in octal notation are one-third the length of corresponding ____ notation.
Binary
"____" is the concept that the per-unit cost of producing goods or providing services decreases as the organization size increases.
Economies of scale
A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations
MOVE
Nodes sharing a common transmission medium follow a(n) ____________________ protocol to determine how to share the medium efficiently.
Media Access Control (MAC)
A(n) ___ instruction transforms the Boolean value true (1) into false (0) and the value false into true.
NOT
The ____ position is one of the most demanding in breadth and depth of required skills and technical knowledge.
Network administrator
In CSMA/CA, a node that wants to transmit sends a(n) ____________________ signal.
RTS
Activities in the business modeling discipline and the ____ discipline are primarily concerned with building models of the organization that will own and operate the system, models of the system's environment, and models of system and user requirements.
Requirements
When developing an information system, IS professionals follow a series of steps called a ____.
SDLC
A(n) ____________________ instruction accepts two numeric inputs and produces their arithmetic sum.
ADD
The membership of the _____ consists mainly of IS managers and application developers.
AITP
The ____ section of the CPU performs all computation and comparison operations.
ALU
A(n) ____ instruction generates the result true if both of its data inputs are true.
AND
The standard ASCII version used for data transfer is sometimes called _______
ASCII-7
Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.
Boolean
The ____ data type has only two data values—true and false.
Boolean
Workstation hardware capabilities depend on the resources being shared and the number of simultaneous users.
False
The 32-bit addresses for an IP node are defined in Internet Protocol version 6 (IPv6).
False
The OSI model predates the TCP/IP model by almost a decade.
False
To connect four end nodes in a mesh technology, three transmission lines and six connections per node are required.
False
If the instruction format is ____, the amount by which the instruction pointer must be incremented after each fetch is a constant.
Fixed length
In a ____, any device can assume control of the bus or act as a bus master for transfers to any other device.
Peer-to-peer bus
____ improved memory access and raw CPU speeds and added features such as support for higher-speed system buses, pipelined instruction execution, and multimedia processing instructions.
Pentium processors
Unicode is widely supported in modern software, including most OSs and word-processing applications.
True
With bit strings, NOT treats each bit in the bit string as a separate Boolean value.
True
A(n) __________ identifies a specific web resource
URL
Decades ago, printers adopted 1/32 of an inch as a standard pixel size.
False
Devices such as printers and secondary storage arrays cannot be attached directly to the network.
False
Each element of a doubly linked list has two pointers: one pointing to the next element in the list and one pointing to the top element in the list.
False
Electricity travels through a trace at approximately 50% of the speed of light.
False
Electricity travels through a trace at approximately 70% of the speed of light
False
Intel microprocessors have been used in PCs since 1961.
False
MOVE tests the bit values in the source location and moves these values to the destination location.
False
Most people feel comfortable purchasing complex devices, such as cars, home theater systems, and computers.
False
Phosphors emit colored light in liquid crystal displays.
False
The control unit cannot execute instructions without assistance from the ALU.
False
The membership of the Association for Information Technology Professionals (AITP) represents a broad cross-section of the computer community including IS managers and application developers.
False
Today, a computer is considered useful even if it doesn't have the capability to interact with other computers.
False
Transistors and the tracks that interconnect them are the fundamental building blocks of all CPUs.
False
____ design activities are narrower in scope and constrained by the information architecture compared to the remaining design activities.
detailed
A ____ operation is a data transfer from main memory into a register.
load
A(n) ____ directs the CPU to route electrical signals representing data inputs through predefined processing circuits that implement the appropriate function.
instruction
A(n) ____ is the lowest-level command that software can direct a processor to perform.
instruction
When the control unit fetches an instruction from memory, it stores it in the ____.
instruction register
The collection of instructions that a CPU can process is called the CPU's ____________________.
instruction set
An ____ is a template that specifies the number of operands and the position and length of the op code and operands.
instructional format
The steps in the Unified Process are called
iterations
____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.
java
In a CD, flat areas in the reflective layer that represent bit values are called "______"
lands
With ____________________, programmers can reuse source and executable code, thus speeding up application development.
libraries
A(n) ____ searches an object code file for external function calls.
link editor
A(n) ____ is one instance, or variable, of a class.
object
The first group of bits in an instruction represents its unique binary number, commonly called the ____.
op code
The term ____________________ describes hardware that can generate multiple sound frequencies at the same time.
polyphonic
A(n) ____________________ is a TCP connection with a unique integer number.
port
The ____________________ distributes electrical power to directly attached devices or their device controllers.
power bus
In essence, system software plays two roles in each network resource access: ____.
request and response
Activities in the business modeling discipline and the ____ discipline are primarily concerned with building models of the organization that will own and operate the system, models of the system's environment, and models of system and user requirements.
requirements
A(n) ____________________ topology directly connects every node to two other nodes with a set of links forming a loop or ring.
ring
____ make forwarding decisions by using layer 3 addresses.
routers
In a single electrical communication channel, a(n) ____ wire carries data and the return wire completes the electrical circuit.
signal
A(n) ____________________ integer uses one bit to represent whether the value is positive or negative.
signed
Many ____ create application software for specific processing needs.
software developer
The term ____ describes instructions executed after the guess but before the final result is known with certainty.
speculative execution
_______ is the most important characteristic differentiating primary and secondary storage
speed
A ____ connects secondary storage devices to the system bus.
storage bus
A ____ is designed for one purpose—rapid mathematical computation.
supercomputer
A key function of ____________________ software is allocating resources to users and programs.
system
The accuracy, or precision, of data format representation increases with ____.
the number of data bits used
Expect to pay for unbiased information.
true
High quality and ____________________ information is the product of intensive research and something for which you should expect to pay.
unbiased
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.
underflow
Like ASCII, ____________________ is a coding table that assigns nonnegative integers to represent printable characters.
unicode
Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.
unsigned integer
Video display panels are connected to a ____ that's connected to a port on the system bus or a dedicated video bus.
video controller
A(n)____ instruction generates the value true if either (but not both) data input is true.
XOR
A ____ performs specific tasks that can be counted or measured.
benchmark program
If multiple nodes attempt to transmit across the same medium at the same time, their messages mix, producing noise or interference that's called a ____.
collision
More storage locations are required for a linked list than for an array with equivalent content because both data and pointers must be stored.
True
The earliest computers were constructed with ordinary copper wire and vacuum tube switches and were unreliable because of the heat the vacuum tubes generated.
True
The mix of activities in each iteration of the UP is tailored to each development project.
True
The number of bits in a floating-point string and the formats of the mantissa and exponent impose limits on the range of values that can be represented.
True
When the data needed isn't in the cache, the access is called a ____.
cache miss
A sequence of records on secondary storage is called a ____.
file
The ____ can extract a single bit from a bit string.
logical SHIFT
____ is a specific time point in a wave's cycle.
phase
The data types a CPU supports are sometimes called ____ data types.
primitive
____ is the most widely used error-detection method.
Cyclic redundancy checking
A ____ instruction causes the processor to depart from sequential instruction order.
BRANCH
is a philosophy of processor design that deliberately includes complex instructions.
CISC
Touch position sensing in a touch screen is usually based on ____.
Capacitance
_____ is the time required to read the second of two adjacent sectors on the same track and platter.
Sequential access time
____ is implemented entirely with transistors.
Static RAM
_____________ is a generic term for describing secondary storage data transfer units
block
In their written form, English and many other languages use alphabetic letters, numerals, punctuation marks, and a variety of other special-purpose symbols known as ____.
characters
Written Western languages are based on systems of symbols called ____.
characters
A ____ is a set of computing resources with front-end interfaces and back-end resources.
cloud
The assignment of numeric codes to characters follows a specific order called a(n) ____.
collating sequence
The term "____" describes the number of bits used to represent a numeric value.
compactness
The term ____ describes the ratio of data size in bits or bytes before and after compression.
compression ratio
Students of information systems generally focus on application software. Students of ______ generally focus on system software.
computer science
A(n) ____ instruction generates the value true if either or both data inputs are true.
inclusive OR
A(n) ___________ instruction generates the value true if either or both data inputs are true
inclusive OR
A modern large format printer is a _____ printer that can print on wider-than normal rolls of paper.
inkjet
The procedure for forwarding a message between two end nodes in the same LAN depends on the ____________________ network topology.
logical
With ____ compression, any data input that's compressed and then decompressed is exactly the same as the original input.
lossless
A(n) ____________________ is a unit of data or information transmitted from a sender to a recipient.
message
The ____ layer forwards messages to their correct destinations.
network
In a communication channel, ____ refers to unwanted signal components added to the data signal that might be interpreted incorrectly as data.
noise
A particle of light is called a ____.
photon
Electronic computers addressed most shortcomings of mechanical computation.
true
Messages can be loosely categorized into two types—data messages and command messages.
true
Primary storage extends the limited capacity of CPU registers.
true
The CPU alternates constantly between fetch and execution cycles.
true
The PC revolution wouldn't have been possible without standardized microprocessors.
true
The evolution of Microsoft OSs is a good example of how software development depends on hardware technology.
true
When multiple processors occupy a single motherboard, they share primary storage and a single system bus.
true
Numbers such as 1/3 are stored in floating-point format by ____.
truncation
Hexadecimal numbering uses ____ as its base or radix.
16
____ is a process that generates color approximations by placing small dots of different colors in an interlocking pattern.
Dithering
____ is a character-coding method developed by IBM in the 1960s and used in all IBM mainframes well into the 2000s.
EBCDIC
A computer system requires at least two hardware devices to connect to a network.
False
A full-featured 64-bit CPU, even one with multiple ALUs and pipelined processing, typically requires fewer than 50 million transistors.
False
Binary addition works with complex data types, such as floating-point and double-precision numbers.
False
By far, the most important of activity to keep your knowledge current is taking training courses from hardware and software vendors.
False
Compared with CISC processors, RISC processors are efficient at executing programs that do many of the functions complex instructions are designed for.
False
Under the UP, an information system is built in a series of 3- to 5-week repeated steps.
False
____ is the number of cycles occurring in one second and is measured in hertz (Hz).
Frequency
____ represents bit values by varying carrier wave frequency while holding amplitude constant.
Frequency modulation
Postscript is a(n) ____________________ designed mainly for printed documents, although it can also be used to generate video display outputs.
Image Description Language (IDL)
When manipulating single-precision floating-point numbers, CPU performance is measured in ____.
MFLOPS
Although not a formal UP discipline, systems evaluation and ____ is an important group of activities that accounts for much of the long-range system cost.
Maintenance
is a more traditional approach to multiprocessing that uses two or more processors on a single motherboard or set of interconnected motherboards.
Multiple-processor Architecture
____ is a standard for storing and transporting control information between computers and electronic musical instruments.
Musical Instrument Digital Interface (MIDI)
Optical light pulses can be stored indirectly, such as ____.
On the surface of a DVD
A(n) ____ is a communication pathway from the CPU to a peripheral device.
I/O port
If the CPU is idle while a device completes an access request, the CPU cycles that could have been (but weren't) devoted to instruction execution are called ____.
I/O wait states
Spectrum is a publication of the ____________________ professional society.
IEEE
Most compression algorithms have a corresponding ____________________ algorithm that restores compressed data to its original or nearly original state.
Decompression
____ are used only by the currently executing program.
General purpose registers
____ are typically implemented by installing software on each machine that accepts tasks from a central server and performs them when not busy doing other work.
Grids
A(n) ____ instruction suspends the normal flow of instruction execution in the current program.
HALT
A Java compiler or interpreter translates Java source code into machine instructions and service routine calls for a hypothetical computer and OS called the ____.
Java Virtual Machine
In a magneto-optical drive, the laser polarity shift used in reading is known as the "____________________ effect."
Kerr
____ devices combine optical-scanning technology with a special-purpose processor or software to interpret bitmap content.
Optical Character Recognition (OCR)
Modern ____ displays achieve high-quality color display with organic compounds.
LED
____ output is only able to generate one frequency (note) at a time.
Monophonic
____ is based on the observation that the rate of increase in transistor density on microchips had increased steadily, roughly doubling every 18 to 24 months.
Moore's Law
A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.
Move
Direct3D and ____________________ are widely-used video controller IDLs.
OpenGL
Subsequent groups of bits after the first group in an instruction hold its input values, called ____.
Operands
____ physics describes the behavior of matter at a subatomic level.
Quantum
In current computer hardware, main memory is implemented with silicon-based semiconductor devices commonly called ____.
RAM
The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can randomly access bytes, words, or larger data units.
RAM
____ states that the cost of fabrication facilities for the latest chip generation doubles every four years.
Rock's Law
____ develop system software, such as operating systems, compilers, database management systems, Web servers, and network security monitors.
Systems programmers
The ____ model was originally intended to unite disparate network standards in a way that enabled any node connected to any type of network to communicate with any other node.
TCP/IP
____ is targeted to general-purpose tasks that support many application programs and users.
System software
ASCII is a 7-bit format because most computers and peripheral devices transmit data in bytes and because parity checking was used widely in the 1960s to 1980s for detecting transmission errors.
True
An 8-bit op code provides 256 possible instructions numbered 0 through 255.
True
Automated data processing combines physics and mathematics.
True
Early Xeon processors filled an important niche in the small server market but weren't powerful enough to perform processing duties in many large-scale servers.
True
In a sequential file, records are stored in contiguous storage locations.
True
Light can be used as a basis for computation.
True
____ is a connectionless protocol that provides less reliable transport services.
User Datagram Protocol