bis Ch 3: Hardware, Software, and Mobile Systems
14) Which of the following is an example of nonvolatile memory? A) optical disk B) main memory C) cache memory D) static random access memory (SRAM) E) the system bus
a
25) Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A) Internet of things (IoT) B) 3D printing C) self-driving cars D) automated guided vehicles E) visual mapping
a
26) Which of the following is a characteristic of smart devices? A) require microprocessors and new protocols B) have lower bandwidth C) consume less energy D) have less processing power E) lack Internet connectivity
a
3) Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? A) USB flash drive B) projector C) mouse D) barcode scanner E) Bluetooth speaker
a
37) Which of the following is an example of an application program? A) Microsoft Word B) Unix C) Linux D) Windows E) Dell
a
41) Linux is an example of a(n) ________. A) open source operating system B) mobile operating system C) user community D) workstation client E) third-party encryption software
a
44) The process by which a personal computer hosts several different operating systems is known as ________. A) PC virtualization B) parallel computing C) cloud computing D) normalization E) multiplexing
a
45) Ronald runs both Windows 10 and Linux on his desktop computer. This process is called ________. A) PC virtualization B) server virtualization C) cloud computing D) application virtualization E) BIOS
a
50) Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A) application software B) system software C) firmware D) operating system E) network connection
a
52) Which of the following is an example of vertical-market application software? A) inventory tracking software for an automobile manufacturer B) Tally software that is used to maintain business and personal accounts C) Adobe suite, used by graphic designers D) Microsoft PowerPoint, used to create presentations E) YouTube
a
70) Source code is computer code ________. A) that is written by humans B) that is not understandable by humans C) that is represented as bits and bytes D) that cannot be modified E) that cannot be sold publicly
a
79) Mac OS and iOS applications are constructed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) HTML
a
84) Which of the following statements is TRUE about native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on native applications are usually technological, not budgetary. E) They are run exclusively through a Web browser.
a
85) Reed Technologies has hired certified programmers to create an application for its Web site. The application would run inside a browser and support graphics and animation. Which of the following will the programmers use to develop this application? A) HTML5 B) Java C) Objective-C D) C# E) C++
a
93) Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A) mobile system B) nonmobile system C) client operating system D) native application E) virtual private network
a
94) Which of the following is an example of a mobile device? A) a smartphone B) an Xbox C) a desktop computer D) a mainframe E) VoIP phone
a
98) Which of the following is an advantage to an organization if its bring your own device (BYOD) policy offers wireless network to mobile devices? A) The organization can sniff employees' mobile traffic. B) Employees gain public access from any device, not just mobile devices. C) The policy appears to be permissive without actually being so. D) Employees independently manage their own devices. E) The internal network will be inherently more secure.
a
1) The CPU stores the results of computations in ________. A) floppy disks B) main memory C) secondary memory D) network cards E) SSD storage
b
15) Which of the following memory devices is volatile in nature? A) magnetic disk B) cache memory C) erasable programmable read only memory (EPROM) D) optical disk E) SSD
b
2) Which of the following is an example of storage hardware in computers? A) plotter B) magnetic disk C) projector D) inkjet printer E) Web camera
b
27) ________ is the altering of reality by overlaying digital information on real-world objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence
b
46) Which of the following statements refers to server virtualization? A) a personal computer, such as a desktop or portable computer, that hosts several different operating systems B) a server computer that hosts one or more other server computers C) a storage area that loses its contents when the power is off D) a server that hosts many versions of desktop operating systems E) a server can connect to multiple networks at the same time
b
53) DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________. A) horizontal-market application software B) vertical-market application software C) firmware D) adware E) Web application
b
55) Which of the following statements is TRUE about firmware? A) The software is not coded like other software. B) Users do not need to load firmware into a device's memory. C) Firmware is the same as cache memory. D) Firmware cannot be changed or upgraded. E) Firmware is another name for Linux.
b
6) Main memory is also known as ________. A) cache memory B) random access memory C) read-only memory D) optical memory E) the system bus
b
69) Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is TRUE of the source code for Carter's program? A) It is less stable and platform dependent. B) It is available to the public. C) It is highly protected and obtained only by having a license. D) It is available only to carefully vetted contractors. E) It cannot be compiled.
b
71) Machine code ________. A) is understandable by humans B) cannot be modified by humans C) is written by humans D) cannot be processed by computers E) is never greater than 256 KB per application
b
8) Which of the following terms refers to a collection of servers? A) server database B) server farm C) firmware D) shareware E) parallel nodes
b
86) Web applications are typically limited by the capabilities of the ________. A) programming language B) browser C) hardware D) operating system E) motherboard
b
9) Bits are used for computer data because they ________. A) are represented exclusively as letters of the alphabet B) are easy to represent physically C) represent the orientation of a nonoptical media D) can have more than two values at a time E) they have an infinite number of states
b
10) Bits are grouped into 8-bit chunks called ________. A) switches B) strings C) bytes D) kilobytes E) nibbles
c
28) ________ is the combination of the real physical world with interactive virtual images or objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence
c
30) Which of the following statements is TRUE about self-driving cars? A) increased fuel consumption B) expensive and complex C) reduced car insurance cost D) cause more accidents E) will increase the number of DUIs
c
36) ________ applications are programs that are written to use a particular operating system. A) Web B) Thin-client C) Native D) Browser E) Enterprise
c
38) Which of the following statements is TRUE about operating systems? A) The server operating system Linux is gradually being replaced by Unix. B) Android is a mobile operating system licensed by Apple. C) Nonmobile client operating systems are used on personal computers. D) iOS is the most popular server operating system. E) Unix is the most popular client operating system.
c
40) ________ is a version of Unix that was developed by an open source community. A) Symbian OS B) Android C) Linux D) Mac OS E) SPX
c
42) Which of the following mobile operating systems is licensed by Google? A) Blackberry OS B) Symbian C) Android D) Windows 10 E) PCLinuxOS
c
43) Virtualization is the process by which ________. A) a single server is used to host the operations of a workstation B) many computers are used to control a server C) one physical computer hosts many different virtual computers within it D) a single operating system is licensed for multiple computers E) a single operating system is shared by multiple users
c
47) In ________ process, a server hosts many versions of desktop operating systems. A) PC virtualization B) server virtualization C) desktop virtualization D) application virtualization E) VLAN
c
48) Which of the following operating systems is used by Apple? A) Windows OS B) Symbian C) iOS D) Android E) AIX
c
5) A(n)________ is an example of storage hardware in computers. A) overhead projector B) keyboard C) magnetic disk D) barcode scanner E) wireless mouse
c
54) ________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. A) Vertical-market software B) Application software C) Firmware D) Spyware E) AIX kernel
c
67) Clark's microbiology report is due the next day. Being short on time, he collects most of the information for his report from an open-source Web browser. In this case, which of the following has Clark used to complete his report? A) Edge B) Ubuntu C) Firefox D) Apache E) IIS
c
7) Which of the following devices is an example of a storage hardware device? A) barcode scanner B) central processing unit C) optical disk D) random access memory E) the system bus
c
72) Rebecca is one of the few reliable programmers of her organization who is authorized to work on a closed source project. The project will be especially useful to track the progress of outsourced activities. Which of the following statements is most likely to be TRUE of Rebecca's project? A) Only users and developers will be allowed to alter the source code of the project. B) Anyone could obtain the source code for the project. C) Only trusted programmers will be allowed to make changes to the project. D) Programmers could alter the source code based on their interests and goals. E) The source code will eventually be made open source.
c
73) Which of the following is an example of a closed source project? A) Native Client B) Android C) Microsoft Office D) Ubuntu E) Apache
c
80) Linux applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) Swift
c
81) Android applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) Swift
c
13) Which of the following is a characteristic of volatile memory? A) Processor heats up during the operation. B) Files are stored permanently. C) Processing of data is very slow. D) Contents are lost when power is off. E) It should be purged at least once a year.
d
29) ________ is a completely computer-generated virtual world with interactive digital objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence
d
39) Which of the following operating systems was designed by Apple? A) Android B) Unix C) Linux D) Mac OS E) Ubuntu
d
4) A ________ is also called "the brain" of the computer. A) network card B) motherboard C) thumb drive D) central processing unit E) CMOS
d
49) Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A) copyright B) trademark C) patent D) license E) code
d
51) Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. A) vertical-market application software B) operating systems C) firmware D) horizontal-market application software E) drivers
d
68) Which of the following is an example of an open-source desktop operating system? A) Microsoft Windows B) Apache C) MySQL D) Ubuntu E) IIS
d
82) Java, C#, and VB.NET are examples of ________. A) thin-client applications B) client operating systems C) structured queries D) object-oriented languages E) hyper-text languages
d
83) A client-server application that requires nothing more than a browser is called ________. A) a native application B) adware C) firmware D) web application E) RTP application
d
92) A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity. A) PC B) mainframe computer C) server D) mobile device E) server cluster
d