Chapter 4 CISB 201

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ is installed in special, read-only memory in devices like printers, print servers, or various types of communication devices. A) Firmware B) Vertical-market software C) Application software D) Operating system

A) Firmware

Android applications are developed using ________. A) Java B) C# C) Objective-C D) VB.Net

A) Java

________ refers to data delivered to the user at the precise moment it is needed. A) Just-in-time data B) Source code C) Payload D) Asynchronous data

A) Just-in-time data

Which of the following is an example of a closed source project? A) Microsoft Office B) Firefox C) Ubuntu D) Android

A) Microsoft Office

With ________, a computer, such as a desktop or portable computer, hosts several different operating systems. A) PC virtualization B) normalization C) parallel computing D) cloud computing

A) PC virtualization

Which of the following statements is true of native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on these applications are usually technological, not budget.

A) They only run on the operating system for which they are programmed.

Which of the following statements is true of firmware? A) Users do not need to load firmware into the device's memory. B) Firmware cannot be changed or upgraded. C) Firmware is the same as cache memory. D) The software is coded differently from other software.

A) Users do not need to load firmware into the device's memory.

Which of the following refers to server virtualization? A) a server computer that hosts one, or more, other server computers B) a personal computer, such as a desktop or portable computer, that hosts several different operating systems C) a server that hosts many versions of desktop operating systems D) a storage area that loses its contents when the power is off

A) a server computer that hosts one, or more, other server computers

The CPU stores results of computations in the ________. A) main memory B) barcode scanner C) joystick D) printer

A) main memory

Virtualization is the process by which ________. A) one computer hosts the appearance of many computers B) a single operating system is licensed for multiple computers C) a single server is used to host the operations of a workstation D) many computers are used to control a server

A) one computer hosts the appearance of many computers

Linux is an example of a(n) ________. A) open source operating system software B) workstation client C) mobile operating system D) user community

A) open source operating system software

Main memory is also known as ________. A) random access memory B) cache memory C) optical memory D) read-only memory

A) random access memory

Which of the following refers to a small, portable storage device that can be used to back up data and to transfer it from one computer to another? A) thumb drive B) barcode scanner C) mouse D) projector

A) thumb drive

Individuals who edit large pictures, sound, or video files need a ________ processor to effectively use more than 4 GB of main memory. A) 16-bit B) 64-bit C) 8-bit D) 32-bit

B) 64-bit

Thin-client applications are developed using ________. A) C# B) HTML5 C) Objective-C D) Java

B) HTML5

Linux applications are developed using ________. A) VB.Net B) Java C) C# D) Objective-C

B) Java

________ is an example of storage hardware in computers. A) Overhead projector B) Magnetic disk C) Barcode scanner D) Keyboard

B) Magnetic disk

A thin-client application is designed to run within a program such as ________. A) Microsoft Access B) Microsoft Internet Explorer C) Microsoft Word D) Microsoft Excel

B) Microsoft Internet Explorer

Which of the following statements is true of an operating system? A) Android is a mobile operating system licensed by Apple. B) Nonmobile client operating systems are used on personal computers. C) The server operating system, Linux, is gradually being replaced by Unix. D) iOS is the most popular server operating system.

B) Nonmobile client operating systems are used on personal computers.

Which of the following statements is true of closed source projects? A) Anyone can obtain the source code for a closed source project. B) Only trusted programmers are allowed to make changes to a closed source project. C) Programmers can alter the closed source code based on their interests and goals. D) Only users and developers are allowed to alter the source code in closed source projects.

B) Only trusted programmers are allowed to make changes to a closed source project.

________ occurs when users move their activities, especially long-running transactions, across devices. A) Cloud computing B) Roaming C) Pharming D) Key logging

B) Roaming

Which of the following is an advantage to an organization if its BYOD policy offers wireless network to mobile devices? A) Employees gain public access from any device, not just mobile devices. B) The organization can sniff employees' mobile traffic. C) The policy appears to be permissive without actually being so. D) Employees resist turning over the management of their own hardware to the organization.

B) The organization can sniff employees' mobile traffic.

Which of the following is an example of an open-source desktop operating system? A) Apache B) Ubuntu C) MySQL D) Microsoft Windows

B) Ubuntu

Which of the following is an example of a mobile device? A) a mainframe B) a smartphone C) an Xbox D) a desktop computer

B) a smartphone

Server application programs are programs that ________. A) control the server computer's resources B) are processed on server computers C) control the client computer's resources D) are processed on client computers

B) are processed on server computers

Thin-client applications are typically limited by the capabilities of the ________. A) hardware B) browser C) programming language D) operating system

B) browser

Bits are grouped into 8-bit chunks called ________. A) switches B) bytes C) nibbles D) strings

B) bytes

Which of the following memory devices is volatile in nature? A) hard drive B) cache C) optical disk D) magnetic disk

B) cache

The ________ is sometimes called "the brain" of the computer. A) random access memory B) central processing unit C) thumb drive D) read-only memory

B) central processing unit

Which of the following terms refers to a collection of servers? A) firmware B) server farm C) server database D) shareware

B) server farm

10 TB is equivalent to ________ gigabytes. A) 1,024 B) 102.4 C) 10,240 D) 1,000

C) 10,240

________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data. A) BYOD manager B) A key logger C) MDM software D) A UX application

C) MDM software

Which of the following is the operating system designed by Apple? A) Unix B) Linux C) Mac OS D) Android

C) Mac OS

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage? A) Employees will buy the hardware. B) Employees can gain public access from any device, not just mobile devices. C) The policy appears to be permissive without actually being so. D) The organization can sniff employees' mobile traffic.

C) The policy appears to be permissive without actually being so.

A spreadsheet program is an example of ________. A) an operating system B) a firmware C) horizontal-market application software D) vertical-market application software

C) horizontal-market application software

Which of the following is an example of storage hardware in computers? A) plotter B) projector C) magnetic disk D) inkjet printer

C) magnetic disk

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. A) mainframe computer B) PC C) mobile device D) server

C) mobile device

Which of the following is a nonvolatile memory device? A) cache memory B) joystick C) optical disk D) main memory

C) optical disk

DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. This is an example of ________. A) horizontal-market application software B) firmware C) vertical-market application software D) adware

C) vertical-market application software

Which of the following is a characteristic of volatile memory? A) The files are stored permanently. B) The processor heats up during the operation. C) The processing of data is very slow. D) The contents are lost when power is off.

D) The contents are lost when power is off.

Programs that perform business functions, such as general ledger and accounting, are examples of ________. A) firmware B) system software C) operating systems D) application software

D) application software

Bits are used for computer data because they ________. A) are more complex than bytes B) are represented exclusively as alphabets C) can have more than two values at a time D) are easy to represent physically

D) are easy to represent physically

The term "open source" means that the source code of the program is ________. A) available exclusively through licensing B) available only to carefully vetted contractors C) less stable and platform dependent D) available to the public

D) available to the public

Machine code ________. A) cannot be processed by computers B) is understandable by humans C) is written by humans D) cannot be modified by humans

D) cannot be modified by humans

Which of the following is an example of vertical-market application software? A) tax preparation software that individuals use in their personal computers B) Microsoft PowerPoint used to create presentations C) Adobe suite used by graphic designers D) inventory tracking software for an automobile manufacturer

D) inventory tracking software for an automobile manufacturer

A ________ is equivalent to 1,024 bytes. A) gigabyte B) terabyte C) megabyte D) kilobyte

D) kilobyte

When an individual buys a program for his/her personal computer, he/she is actually buying a software ________. A) copyright B) trademark C) patent D) license

D) license

Java, C# and VB.Net are examples of ________. A) thin-client applications B) client operating systems C) structured queries D) object-oriented languages

D) object-oriented languages

Which of the following devices is an example of a storage hardware device? A) central processing unit B) random access memory C) universal serial bus D) optical disk

D) optical disk

Source code is computer code ________. A) that is not understandable by humans B) that cannot be modified C) that is represented as bits and bytes D) that is written by humans

D) that is written by humans

A client-server application that requires nothing more than a browser is called a(n) ________. A) native application B) firmware C) adware D) thin-client application

D) thin-client application

Which of the following is the presentation format of an application? A) process blueprints B) botnet C) cookie D) user interface

D) user interface

Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets? A) ARM B) Unix C) Mac OS D) ASCII

A) ARM

________ is a term that refers to the visual overhead in a computer display. A) Chrome B) Botnet C) Cookie D) Charms

A) Chrome

Which of the following is an open-source Web browser? A) Firefox B) Internet Explorer C) Apache D) Ubuntu

A) Firefox

Which of the following is a mobile operating system licensed by Google? A) Windows RT B) Symbian C) Blackberry OS D) Android

D) Android

________ is a version of Unix that was developed by an open source community. A) Symbian OS B) Mac OS C) Android D) Linux

D) Linux

Which of the following is an example of an application program? A) Unix B) Linux C) Windows D) Microsoft Word

D) Microsoft Word

Mac OS and iOS applications are constructed using ________. A) C# B) Java C) VB.Net D) Objective-C

D) Objective-C

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________. A) cloud computing B) desktop virtualization C) server virtualization D) PC virtualization

D) PC virtualization


Ensembles d'études connexes

EverFi: Repaying Loans Responsibly

View Set

Lewis Chapter 59 Chronic Neurologic Problems Questions ( Test 6)

View Set

Unit 2 Quiz 7 - Blood Vessels of the Upper Limb

View Set

Reproduction & Development FINISH AND Switch to NOTION

View Set

Question 8, Question 15, Question 16

View Set

chapter 1 intro to global business mangement

View Set

Iggy Chapter 62: Care of Patients With Pituitary and Adrenal Gland Problems

View Set

Thomas Jefferson (3rd President)

View Set