IS 310 Final Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A(n) ____________________ is an automated tool for testing executable programs.

symbolic debugger

Read/write circuitry uses ____ data to compensate for minor variations in rotation speed and other factors that might disturb the precise timing needed for reliable reading and writing

synchronization

Storage device speed is called ________

access time

____ is the time required to perform one complete read or write operation.

access time

A(n) ____________________ matrix display uses one or more transistors for every pixel.

active

The ____ is a digital circuit that generates timing pulses, or signals, and transmits the pulses to other devices in the computer.

system clock

The ____ software layer has utility programs used by end users and system administrators to manage and control computer resources.

system management

The ____ software layer has utility programs used by system management and application programs to perform common functions

system services

A(n) ____ is a program in which different sets of instructions are applied to different data input values.

algorithm

The term ____ describes the structure, interaction, and technology of computer system components.

systems architecture

A ____ performs activities in the design discipline and sometimes the deployment discipline.

systems designer

A sequence of records stored in main memory is normally called a ____.

table

____ represents bit values by varying amplitude while holding carrier wave frequency constant.

amplitude modulation

Amplitude modulation is sometimes called ____.

amplitude-shift keying

When actual hardware, network, and system software components are acquired and installed, they make up a(n) ____ infrastructure for one or more information systems.

technology architecture

The ____ discipline includes activities that verify correct functioning of infrastructure and application software components and ensure that they satisfy system requirements.

testing

A(n) ____________________ signal uses the full range of a carrier wave characteristic to encode continuous data values.

analog

The ____ layer includes communication protocols used by programs that make and respond to high-level requests for network services.

application

____ software describes programs used to develop other programs.

application development

A(n) ____ is a stored set of instructions for responding to a specific request, much as you might look up a recipe to prepare a particular dish.

application program

End users use ____ to perform specific tasks, such as processing customer orders or developing and formatting documents and financial analyses.

application software

The first set of design activities, called ____ design, selects and describes the exact configuration of all hardware, network, system software, and application development tools to support system development and operations.

architectural

A(n) ____ is an ordered list in which each element can be referenced by an index to its position.

array

A second-generation language (2GL) is more commonly known as a(n) ____________________ language.

assembly

A device that generates spoken messages based on text input is called a(n) ____________________.

audio response unit

____________________ is a group of wireless networking standards developed by the WiMAX Forum and codified in the IEEE 802.16 standard.

WiMAX

A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.

third-generation language

A(n) mouse that can detect motion with ____________________ dimensions uses an embedded gyroscope.

three

A(n) ____________________ is an LCD or LED display with additional TFT layers that detect the position of electrical field changes based on capacitance.

touchscreen

A(n) ____________________ is one concentric circle of a platter, or the surface area that passes under a read/write head when its position is fixed.

track

A disk drive's data ____________________ rate is a summary performance number combining the physical aspects of data access with the electronic aspects of data transfer to the disk controller or system.

transfer

A(n) ____ is an electrical switch with three electrical connections.

transistor

The communication path that transports signals is called a(n) ____________________.

transmission medium

10 Gigabit Ethernet is based on the 802.3ae (2002) and the 802.3ak (2004) standards.

true

A CPU is a complex system of interconnected electrical switches.

true

A complex chain of events occurs when the CPU executes a program.

true

A machine capable of addition can perform multiplication by executing the addition function multiple times.

true

A microprocessor that fails to perform reliably at a higher clock rate might still be usable and rated for sale at a lower clock rate.

true

A significant advantage of MIDI is its compact storage format.

true

A system bus connects computer system components, including the CPU, memory, storage, and I/O devices.

true

A typical computer system must have much more secondary storage capacity than primary storage capacity.

true

Allocating and accessing resources are complex when a user or program can request resources that aren't on the local computer and aren't managed by locally installed system software.

true

An IDL can represent image components as embedded fonts, vectors, curves and shapes, and embedded bitmaps.

true

An advantage of optical over mechanical mice is a lack of moving parts that can be contaminated with dust and dirt.

true

As currently envisioned, quantum computing offers no benefit compared with conventional electrical processors for problem types that don't require massively parallel computation.

true

Bar-code readers are typically used to track large numbers of inventory items, as in grocery store inventory and checkout, package tracking, warehouse inventory control, and zip code routing for postal mail.

true

Because plasma displays actively generate colored light near the display surface, they're brighter and have a wider viewing angle than LCDs.

true

Both multicore and multiple-processor architectures are examples of scaling up because they increase the power of a single computer system.

true

Consolidation in periodical publishers has created large corporate families of technology-related Web sites and publications.

true

Data inputs are accessed from storage or extracted directly from the operands and stored in one or more registers.

true

Data messages vary in format and content and can include any primitive CPU data types or more complex data types.​

true

Data written to a cache during a write operation isn't automatically removed from the cache after it's written to the underlying storage device.

true

Developers of application software for technical areas, such as robotics, flight navigation, and scientific instrumentation, typically have degrees in computer science or some branch of engineering.

true

Devices with low data transfer demand can use a single PCI bus lane, and devices with higher requirements can increase their available data transfer rate by using additional lanes.

true

During a write operation, a cache acts similarly to a buffer.

true

Each iteration of the UP includes whatever activities are needed to produce testable models or working software.

true

Early Xeon processors filled an important niche in the small server market but weren't powerful enough to perform processing duties in many large-scale servers.

true

For video display, a pixel displays no light or light of a specific color and intensity.

true

Integrated circuits reduced manufacturing cost per circuit because many chips could be manufactured in a single sheet, or wafer.

true

LCD displays have less contrast than other flat panel displays because color filters reduce the total amount of light passing through the front of the panel.

true

Large computer systems and the software that runs on them use more complex technology than smaller ones do.

true

Linked lists are easier to expand or shrink than arrays are.

true

MP3 compresses the audio data stream by discarding information about masked sounds or representing them with fewer bits.

true

Manufacturer Web sites are mainly marketing and customer support tools.

true

Most portable data capture devices combine a keyboard, mark or bar-code scanner, and wireless connection to a wired base station, cash register, or computer system.

true

On paper, pixel size corresponds to the smallest drop of ink that can be placed accurately on the page

true

One action that occurs during the fetch cycle is increment ing a pointer to the location of the next instruction

true

Phonemes sound similar when voiced repetitively by the same person.

true

Programming languages, program translation tools, and debugging tools address only the implementation discipline of the Unified Process.

true

SSDs are much more tolerant to shock and other negative environmental factors commonly encountered with portable devices, such as multifunction cell phones, netbooks, and laptop computers.

true

Scientific and floating-point notation is far more complex than integer data formats.

true

Serial channels in buses are more reliable than parallel channels at very high speeds.

true

Shifting an 8-bit twos complement value to the right by seven positions is a simple way to extract and test the sign bit.

true

Some experimental computers have used quantum physics to perform data storage and computation.

true

Square waves are the preferred method of transmitting digital data over short distances, such as on a system bus

true

Star topologies now dominate physical network physical topology for wired networks.

true

System software has the intelligence needed to make and respond to external resource requests, and most operating systems include support for both functions.

true

The 80386 provided hardware support for running multiple programs simultaneously, simplified partitioning primary storage among programs, and provided mechanisms for preventing programs from interfering with one another.

true

The BRANCH command has one operand containing the memory address of the next instruction.

true

The Difference Engine computed logarithms by moving gears and other mechanical components.

true

The OS is the best source of file access information because it updates information dynamically as it services file access requests.

true

The advantage of using an index lies in the efficiency of record insertion, deletion, and retrieval.

true

The characteristics differentiating the physical topologies include the length and routing of network cable, type of node connections, data transfer performance, susceptibility of the network to failure, and cost.

true

The membership of the ACM represents a broad cross-section of the computer community, including hardware and software manufacturers, educators, researchers, IT professionals, and students.

true

The memory bus has a much higher data transfer rate than the system bus because of its shorter length, higher clock rate, and (in most computers) large number of parallel communication lines.

true

The most comprehensive CASE tools automate the process of deploying working systems from analysis and design models

true

The number and complexity of network functions and components have grown as network technology has matured and become more widespread.

true

The primary role of software is to translate users' needs and requests into CPU instructions that, when executed, produce a result that satisfies the need or request.

true

The write operation for recordable discs is destructive, so recordable disc formats can be written only one time.

true

To make an informed choice when purchasing a computer, you must know your preferences and requirements, such as the application software you plan to use and whether you plan to discard or upgrade the computer in a year or two.

true

The multiplier that describes the difference between one position and the next is the ____ of the numbering system.

base

Compilers and interpreters for high-level programming languages, such as C and Java, convert decimal numbers into ____________________ numbers automatically when generating CPU instructions and data values.

binary

In a ____, each digit can have only one of two possible values: 0 or 1.

binary number

​As bit transmission speed is increased, the duration of each bit in the signal, known as the ____, decreases.

bit time

In a modern digital computer, data is represented by groups of ____.

bits

A ____ is a circuit board that contains most of a server.

blade

​In synchronous transmissions, messages are transmitted in fixed-size byte groups called ____.

blocks

Traditional bus interfaces are too slow and power hungry to provide sufficient data transfer capacity between many processors or between processors and primary storage.

true

A(n) ____________________ can improve system performance when two devices have different data transfer rates, as when copying music files from a PC to an iPod via a USB 2.0 connection.

buffer

Type I error rates can be reduced by combining parity checking and block checking.

true

A(n) ____________________ is a small reserved area of main memory (usually DRAM or SRAM) that holds data in transit from one device to another and is required to resolve differences in data transfer unit size.

buffer

​A ____ is a shared electrical or optical channel that connects two or more devices.

bus

When the CPU is the focus of all computer activity, it's also the ____.

bus master

In the UP, the business and its environment are defined and modeled within the ____________________ discipline

business modeling

Understanding data representation is key to understanding hardware and software technologies.

true

When dealing with publicly accessible information sources, be sure to use information from several unrelated sources to balance the biases of each source.

true

Whether implemented in system or application software, almost all data structures make extensive use of pointers and addresses.

true

Windows OSs tend toward an all-inclusive approach to system software, bundling most system software functions in the OS.

true

You can increase a storage format's numeric range by allocating more bits to the whole portion.

true

Zip files and archives are examples of lossless compression.

true

​An end node is a device such as a workstation, server, or printer that can be the source or destination of a message.

true

​Despite its complexities, packet switching is the dominant form of intercomputer communication.

true

​Ethernet is a LAN technology, developed by Xerox in the early 1970s, that's closely related to the IEEE 802.3 standard.

true

​In a physical delivery system using store-and-forward, the central nodes are transfer points located at or near the junction of major roadways or air routes.

true

​Internet Protocol version 6 (IPv6) is an updated version of IPv4 defined in the late 1990s and first deployed in the mid-2000s.

true

​The 802.1 and 802.2 standards correspond roughly to the OSI Data Link layer.

true

​The process of designing and constructing software translates users' information-processing needs into CPU instructions that, when executed, address these needs.

true

In ____ notation, non negative integer values are represented as ordinary binary values.

twos complement

In the decimal or binary notations, the symbol used to represent a digit and the digit's position in a string determines its ____.

value

A ____ is a processor that guesses what data will be requested in the near future and loads this data from the storage device into the cache before it's actually requested.

cache controller

A(n) ____________________ instruction transfers control to the first instruction in a function.

call

A wave with encoded bits is called a(n) ____________________ wave because it transports bits from one place to another.

carrier

A(n) ____ is a data structure containing both traditional (static) data elements and programs that manipulate the data.

class

The frequency at which the system clock generates timing pulses is the system's ____.

clock rate

____________________ typically make use of both multicomputer configuration and virtualization.

clouds

A ____ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run a single application.

cluster

____________________ cable contains a single copper conductor surrounded by a thick plastic insulator, a metallic shield, and a tough plastic outer wrapping.

coaxial

Program instructions are sometimes called ____.

code

A(n) ____________________ is a set of rules and conventions for communication.

communication protocol

A(n) ____________________ is a file containing related executable functions and an index of the library contents.

compiler library

____ instructions represent combinations of primitive processing operations.

complex

A processor's efficiency depends on its _____________

complexity

A ____ is a mathematical compression technique implemented as a program.

compression algorithm

A ____ consists of hardware and software components that enable users and computer systems to share information, software, and hardware resources.

computer network

The Institute for Electrical and Electronics Engineers (IEEE) ____ is a subgroup of the IEEE that specializes in computer and data communication technologies.

computer society

The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.

computer-assisted software engineering

Substances that electrons can flow through are called ____.

conductors

IP is an example of a(n) ____________________ protocol, in which the sender doesn't attempt to verify a recipient's existence or ask its permission before sending data.

connectionless

Computer system components coordinate their activities by sending signals over the ____________________.

control bus

____ is noise added to the signal in the wire from EMI generated by adjacent wires.

crosstalk

Pointing devices can be used to enter drawings into a computer system or control the position of a(n) ____ on a display device.

cursor

​A complete ____ of a sine wave follows its full range from zero to positive peak, back to zero, to its negative peak, and then back to zero again.

cycle

In most CPUs, the ____ is the time required to fetch and execute the simplest instruction in the instruction set.

cycle time

A _______ consists of all tracks at an equivalent distance from the edge or spindle on all platter surfaces

cylinder

A ____ defines the name and data type of program variables.

data declaration

The ____ layer is the interface between network software and hardware.

data link

A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.

data structure

The role of ____ requires both technical expertise and the ability to help the organization make optimal use of its data resources for tasks such as market research.

database administrator

In the decimal numbering system, the period or comma is called a ____.

decimal point

In the UP, installing and configuring hardware and software components are activities of the ____________________ discipline.

deployment

The ____ discipline is the set of activities for determining the structure of a specific information system that fulfills the system requirements.

design

____ specify detailed blueprints for software component construction and the interaction between software components and users.

design models

Storage and I/O devices are normally connected to the system bus or a subsidiary bus through a(n) ____________________

device controller

The most famous of the mechanical computation devices is the ____________________, built by Charles Babbage in 1821.

difference engine

Data is represented in the CPU as ____.

digital electrical signals

A(n) ____ is a microprocessor specialized for processing continuous streams of audio or graphical data.

digital signal processor

Current optical storage devices use a(n) ____________________ storage medium.

disc

In the UP, related activities are grouped into UP ____.

disciplines

The complexity of modern networks arises from the huge quantity of ____.

distributed resources

Silicon and germanium are basic elements with resistance characteristics that can be controlled or enhanced with chemicals called ____.

dopants

A ____ data format combines two adjacent fixed-length data items to hold a single value.

double-precision

____ stores each bit by using a single transistor and capacitor.

dynamic RAM

____________________ assist programmers in writing syntactically correct code by verifying syntax as the code is being typed and highlighting errors.

editors

The term ____ describes the maximum number of bits or bytes per second that the channel actually achieves with a specific communication protocol.

effective data transfer rate

____ is the flow of electrons from one place or device to another.

electrical current

Computer systems represent data electrically and process it with _____________

electrical switches

______ transistors are a bridge between electrical and optical computer components.

electro-optical

____________________ embeds all or part of a datagram in a physical network's message format.

encapsulation

Most application software is used by ____.

end users

____________________ code is stored in a file, such as an .exe file in Windows, and contains CPU instructions that are ready for an OS to load and execute.

executable

During the ____ cycle of the CPU, the transformation takes place and data output is stored.

execution

A(n) ____ is a placeholder for missing executable code.

external function call

A buffer for an I/O device is typically implemented on the sending computer.

false

A large set of complex instructions often goes hand in hand with fixed-length instruction formats.

false

A perfect conductor can be described as one having maximum resistance.

false

A personal digital assistant is a laptop computer that emphasizes small size, reduced weight, low cost, and wireless networking and is capable of performing only light-duty tasks, such as Web browsing, e-mailing, and word processing.

false

According to Moore's Law, the doubling of transistor density is achieved with a 50% increase in unit cost.

false

All computers are automated computing devices, and all automated computing devices are computers.

false

Architecture includes the processes analysis and construction.

false

Arithmetic SHIFT instructions are more complex when applied to twos complement values because the rightmost bit is a sign bit.

false

CRC has much higher Type I and Type II error rates than parity and block checking.

false

Color laser output uses four separate print generators.

false

Compared with RISC processors, CISC processors have some advantages for computationally intensive applications.

false

Computers are designed to process character data and can therefore represent characters directly.

false

Continuous speech is a series of nonstop interconnected phonemes.

false

Decimal and binary notations are alternative forms of a logical numbering system.

false

Double-precision integers are sometimes called large integers.

false

Efforts in each discipline of the UP are generally distributed across all of the iterations in the same way for each project.

false

For people and computers, a printed character must exactly match a specific pixel map to be recognizable.

false

Hardware and software manufacturers are in the business of providing unbiased information about products.

false

IBM introduced the first mass-market microcomputer in 1971.

false

IDLs are a simple form of compression.

false

In ASCII, NAK is sent to acknowledge correct receipt of data, and ERR is sent to indicate that an error has been detected.

false

In classical physics, a subatomic particle, such as a photon, can be in multiple places at one time.

false

In the binary32 format, the leading sign bit applies to the exponent, not the mantissa.

false

Java bytecode programs usually run 10 times faster than native applications.

false

Lossless compression ratios higher than 50:1 are difficult or impossible to achieve with audio and video data.

false

Low voltage circuits are less susceptible to damage from voltage surges and static electricity.

false

Magnetic and optical storage are currently direct competitors.

false

Magnetic tape and disk are considered volatile storage media.

false

Mechanical computation devices cannot perform complex calculations.

false

Mechanical computers were used during World War I to compute trajectory tables for naval guns and torpedoes.

false

Monetary amounts should be stored and manipulated as binary floating-point numbers.

false

Moving image quality improves as the number of frames per second (fps) decreases.

false

Multiple-core CPUs in Pentium processors resulted in major changes to CPU internals.

false

One computer can use the CPU or storage but not the I/O devices of another.

false

One way to limit wait states is to use an SDRAM cache between the CPU and SRAM primary storage.

false

Practical optical processors will probably appear first as full-fledged computer processors.

false

SRAM has higher density then DRAM.

false

Sender and receiver can use different methods of encoding, transmitting, and interpreting the bits of a message.

false

The ALU component of the CPU moves data and instructions between main memory and registers.

false

The CPU communicates with a peripheral device by moving data to or from an I/O port's dedicated bus.

false

The biggest impetus for the change to electronic computing devices came during World War I.

false

The complexity of data structures is limited only by the software.

false

The database administrator can be responsible for many tasks other than operating and maintaining the network, including installing and maintaining end-user software and assisting management in selecting and acquiring software and hardware.

false

The largest computational problems, such as those encountered in modeling three-dimensional physical phenomena, can be solved by a single computer as long as it has enough computing resources.

false

The need or idea that motivates a request for computer processing is stated at a specific level.

false

The operand of a CPU instruction cannot contain the location of a data item.

false

Today, a computer is considered useful even if it doesn't have the capability to interact with other computers.

false

Unbiased information exists on the Web, and it's generally easy to find.

false

Using contiguous storage locations, especially in secondary storage devices, simplifies the allocation of storage locations.

false

Wave characteristics, such as frequency and amplitude, are inherently discrete.

false

​Guaranteeing service quality is a simple matter in most IP networks.

false

​To limit skew errors, high-speed parallel communication channels must be short, typically less than two meters.

false

During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.

fetch

A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.

fifth-generation language

____ RAM is the most common non-volatile RAM used today.

flash

Real numbers are represented in computers by using ____.

floating-point notation

Each central node maintains a table of node addresses and transmission lines or connection ports, called a(n) ____________________ table, and uses this table to make forwarding decisions.

forwarding

A tool suite that primarily supports model development is sometimes called a ____ tool.

front-end CASE

Given the rapid pace of change in computer technology, a manager must have a broad understanding of current technology and _____.

future technology trends

A(n) ____________________ is a circuit that can perform a processing function on a single binary electrical signal, or bit.

gate

____________________ are nodes connecting two or more networks or network segments that might be implemented physically as workstations, servers, or routers.

gateways

____________________ touchscreen input interprets a sequence of touch information as a single command

gesture-based

____ mode uses a single shared channel, and each node takes turns using the transmission line to transmit and receive.

half-duplex

____ is typically the cheapest component of current information systems

hardware

A __________ is a central connection point for nodes in a LAN

hub

The ____ discipline of the UP includes all activities for building, acquiring, and integrating application software components.

implementation

The main goal of buffering and caching is to ____.

improve overall system performance

The address of an array element can be calculated with the starting address of the array and the element's ____.

index

Digitizing tablets and tablet PCs are examples of ____________________, a general class of input devices.

input pads

A(n) ____ is a whole number—a value that doesn't have a fractional part.

integer

Managers of _____ collections of information systems and supporting infrastructure must contend with a great deal of technical complexity.

integrated

Several transistors and their interconnections on a single chip form a(n) ____.

integrated circuit

A(n) ____ reads a single source code instruction, translates it into CPU instructions or a DLL call, and executes the instructions or DLL call immediately, before the next program statement is read.

interpreter

____ Web sites are oriented toward sales, but they usually contain detailed information on specific products or links to other Web sites.

vendor

A storage device or medium is ____ if it can't hold data reliably for long periods.

volatile

Each clock cycle the CPU spends waiting for a slower device is called a ____.

wait state

​Long-distance telecommunication providers use FDM to multiplex single-mode optical fibers, an application commonly called ____.

wavelength-division multiplexing (WDM)

A(n) ____________________ is software accessed over the Internet using Web protocols, such as shipping cost calculator accessed by an online shopping application.

web server

A network for an entire campus is known as a(n) ____ and includes end nodes, LANs, zone networks, the campus backbone network, and central nodes.

wide area network

With unsigned integers, the lowest value that can be represented is always ____________________.

zero

A ____ connects all LAN central nodes in a group of buildings.

zone network

Data, address, and command bits are transmitted across PCI bus line subsets called "____."

lanes

Storing data optically involves using a(n) ____ and an optical disc's reflective coating.

laser

The ____ states that when multiple resources are required to produce something useful, adding more of a single resource produces fewer benefits.

law of diminishing returns

The rightmost digit in a bit string is the ____.

least significant digit

When three cache levels are in use, the cache closest to the CPU is called a ____ cache.

level one

A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.

linked list

A(n) ____ is a set of related data values.

list

Each network covering a floor or building is called a _____.

local area network

In the "layered approach," knowledge of the machine's physical details is embedded into system software and hidden from users and application programmers. This is commonly referred to as ____.

machine independence

A(n) ____ is a ribbon of plastic with a coercible (usually metallic oxide) coating.

magnetic tape

When discussing computer processing, _____________ refers to executing processor instructions, such as addition, subtraction, and equality comparisons, and "ease" refers to machine efficiency.

manipulation

____ Web sites have detailed information on their products and offer technical and customer support services.

manufacturer

Quantum physics describes subatomic behavior with ____.

mathematical rules

In a computation device, a(n) ____ is driven by a spring and pendulum, and each swing of the pendulum allows a gear to move one step under pressure from the spring.

mechanical clock

A(n) ____________________ topology is one in which every node pair is connected by a point-to-point link.

mesh

A ____ is a request to execute a specific method and return a response.

message

The programs in a class are called ____.

methods

A ____ is a computer system designed to meet a single user's information-processing needs.

microcomputer

A(n) ________ is a microchip containing all the circuits and connections that implement a CPU

microprocessor

Access time s for secondary storage devices are typically expressed in _____ or microseconds

milliseconds

____ has been the primary basis for CPU speed and clock rate improvement since the first electrical computer.

miniaturization

The leftmost digit in a bit string is called the ____.

most significant

The term ____ describes transmission situations involving multiple senders and receivers.

multicasting

​____ cable can be constructed of glass or plastic.

multimode fiber optic

The upper 128 entries in Latin-1 are sometimes called ____.

multinational characters

____ describes any CPU architecture in which duplicate CPUs or processor stages can execute in parallel.

multiprocessing

A CPU with a 1 GHz clock rate needs a new instruction and supporting data every ____________________.

nanosecond

___ are those compiled and linked for a particular CPU and OS.

native application

With ____ parity, the sender sets the parity bit to 0 if the count of 1-valued data bits in the character is odd.

odd

Optical light pulses can be stored indirectly, such as

on the surface of a DVD

____ signals can carry more data than electrical signals.

optical

____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.

overflow

​Packet switching, the most common type of TDM, divides messages from all users or applications into small pieces called ____________________.

packets

There are typically multiple storage and I/O devices connected to a computer, collectively referred to as ____.

peripheral devices

A ____ network is a complex combination of communication protocols, methods of data transmission, and network hardware devices.

physical

_____ is a method of organizing CPU circuitry so that multiple instructions can be in different stages of execution at the same time.

pipelining

To an observer, the quality of a printed or displayed image increases as ____________________ size increases.

pixel

A(n) plasma display pixel excites gas into a(n) ____________________ state to generate UV light.

plasma

____ displays use excited gas and phosphors to generate colored light.

plasma

Of all flat panel displays, ____________________ have the shortest operational lifetimes.

plasma displays

Magnetic disk media are flat, circular ____________________ with metallic coatings that are rotated beneath read/write heads.

platters

A ____ is a printer that generates line drawings on wide sheets or rolls of paper.

plotter

A(n) ____ is a data element containing the address of another data element.

pointer

Storage devices that hold currently executing programs are called _________

primary storage

A(n) __________ is a device that perform data manipulation and transformation functions including computation, comparison, and data movement

processor

A program's ____ version omits the symbol table and debugging checkpoints to reduce program size and increase execution speed.

production

A ____ is a program that translates instructions in a programming language into CPU instructions.

program translator

Typically, the first iteration or two of the UP produces documentation and a ____ system.

prototype

Data can be represented as ____ and stored directly, such as an image as a hologram.

pulses of light

Any matter that stores data in multiple simultaneous quantum states is called a ____.

qubit

Quantum computing, introduced in a Technology Focus in Chapter 2, uses quantum states to simultaneously encode two values per bit, called a ____.

qubit

​The term ____ describes transmissions using frequencies between 50 Hz and 1 terahertz (THz).

radio frequency

The fractional portion of a real number is represented by digits to the right of the ____.

radix point

Average access time is computed under the assumption that two consecutive accesses are sent to __________ locations

random

In the early days of networks, the only important distributed resource was ____.

raw data

The stored charge held within a bit of magnetic storage must be above the ____________________ for a read operation to be successful.

read threshold

In a magnetic disk drive, a(n) ____________________ is mounted on the end of an access arm for each platter surface.

read/write head

A(n) ____ can contain both whole and fractional components.

real number

A(n) ____________________ is a data structure composed of other data structures or primitive data elements.

record

Each refresh operation in DRAM is called a(n) _________________

refresh cycle

The number of refresh cycles per second is normally stated in hertz and called the ____.

refresh rate

The CPU contains a few internal storage locations called ____, each capable of holding a single instruction or data item.

registers

Early mechanical computation devices were built to perform ____.

repetitive mathematical calculations

The loss of electrical power that occurs as electrons pass through a conductor is called ____.

resistance

​In a single communication channel a ____ wire completes an electrical circuit between sending and receiving devices.

return

The process of converting analog sound waves to digital representation is called ____.

sampling

____ is an approach that partitions processing and other tasks among multiple computer systems.

scaling out

When keys are pressed, a keyboard controller generates output called a(n) ____________________.

scan code

Bar-code readers use ____that sweep a narrow beam back and forth across the bar code.

scanning lasers

A(n) ____ enables programmers to develop applications that do most of their work by calling other applications and system software.

scripting language

The term ____________________ describes the data transfer unit for magnetic disk and optical disc drives.

sector

____________________ transmission uses only a single transmission line and a return wire.

serial

A ____ storage device stores and retrieves data items in a linear, or sequential, order.

serial access

The term ____ can describe computers as small as microcomputers and as large as supercomputers.

server

The term _______ can describe computers as small as midrange computers and as large as supercomputers

server

A Java ____________________ runs in a Web server and performs functions such as calculations, database access, and creation of Web pages that are transmitted to a Web browser for display.

servlet

In ____ mode, messages flow in only one direction.

simplex

____ is the most expensive cable type.

single mode fiber optic

____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.

software programs

​____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.

software programs

A ____ is a reserved area of main memory accessed on a last-in, first-out (LIFO) basis.

stack

A special-purpose register called the ____________________ always points to the next empty address in the stack and is incremented or decremented automatically each time the stack is pushed or popped.

stack pointer

A(n) ____________________ operation is a data transfer from a register into primary storage.

store

Lossy compression of audio and video can achieve compression ratios up to ____.

50:1

A single disk sector usually holds ____ or 4096 bytes

512

As buffer size increases above ____ bytes, CPU cycle consumption decreases at a linear rate.

8

In classical physics, a group of 3 bits can store only one of ____ possible values at a time.

8

The IEEE has drafted a number of network standards, collectively referred to as the IEEE ____________________ standards.

802

Large numeric values expressed in octal notation are one-third the length of corresponding ____ notation.

Binary

"____" is the concept that the per-unit cost of producing goods or providing services decreases as the organization size increases.

Economies of scale

A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations

MOVE

Nodes sharing a common transmission medium follow a(n) ____________________ protocol to determine how to share the medium efficiently.

Media Access Control (MAC)

A(n) ___ instruction transforms the Boolean value true (1) into false (0) and the value false into true.

NOT

The ____ position is one of the most demanding in breadth and depth of required skills and technical knowledge.

Network administrator

In CSMA/CA, a node that wants to transmit sends a(n) ____________________ signal.

RTS

Activities in the business modeling discipline and the ____ discipline are primarily concerned with building models of the organization that will own and operate the system, models of the system's environment, and models of system and user requirements.

Requirements

When developing an information system, IS professionals follow a series of steps called a ____.

SDLC

A(n) ____________________ instruction accepts two numeric inputs and produces their arithmetic sum.

ADD

The membership of the _____ consists mainly of IS managers and application developers.

AITP

The ____ section of the CPU performs all computation and comparison operations.

ALU

A(n) ____ instruction generates the result true if both of its data inputs are true.

AND

The standard ASCII version used for data transfer is sometimes called _______

ASCII-7

Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.

Boolean

The ____ data type has only two data values—true and false.

Boolean

Workstation hardware capabilities depend on the resources being shared and the number of simultaneous users.

False

​The 32-bit addresses for an IP node are defined in Internet Protocol version 6 (IPv6).

False

​The OSI model predates the TCP/IP model by almost a decade.

False

​To connect four end nodes in a mesh technology, three transmission lines and six connections per node are required.

False

If the instruction format is ____, the amount by which the instruction pointer must be incremented after each fetch is a constant.

Fixed length

In a ____, any device can assume control of the bus or act as a bus master for transfers to any other device.

Peer-to-peer bus

____ improved memory access and raw CPU speeds and added features such as support for higher-speed system buses, pipelined instruction execution, and multimedia processing instructions.

Pentium processors

Unicode is widely supported in modern software, including most OSs and word-processing applications.

True

With bit strings, NOT treats each bit in the bit string as a separate Boolean value.

True

A(n) __________ identifies a specific web resource

URL

Decades ago, printers adopted 1/32 of an inch as a standard pixel size.

False

Devices such as printers and secondary storage arrays cannot be attached directly to the network.

False

Each element of a doubly linked list has two pointers: one pointing to the next element in the list and one pointing to the top element in the list.

False

Electricity travels through a trace at approximately 50% of the speed of light.

False

Electricity travels through a trace at approximately 70% of the speed of light

False

Intel microprocessors have been used in PCs since 1961.

False

MOVE tests the bit values in the source location and moves these values to the destination location.

False

Most people feel comfortable purchasing complex devices, such as cars, home theater systems, and computers.

False

Phosphors emit colored light in liquid crystal displays.

False

The control unit cannot execute instructions without assistance from the ALU.

False

The membership of the Association for Information Technology Professionals (AITP) represents a broad cross-section of the computer community including IS managers and application developers.

False

Today, a computer is considered useful even if it doesn't have the capability to interact with other computers.

False

Transistors and the tracks that interconnect them are the fundamental building blocks of all CPUs.

False

____ design activities are narrower in scope and constrained by the information architecture compared to the remaining design activities.

detailed

A ____ operation is a data transfer from main memory into a register.

load

A(n) ____ directs the CPU to route electrical signals representing data inputs through predefined processing circuits that implement the appropriate function.

instruction

A(n) ____ is the lowest-level command that software can direct a processor to perform.

instruction

When the control unit fetches an instruction from memory, it stores it in the ____.

instruction register

The collection of instructions that a CPU can process is called the CPU's ____________________.

instruction set

An ____ is a template that specifies the number of operands and the position and length of the op code and operands.

instructional format

The steps in the Unified Process are called

iterations

____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.

java

In a CD, flat areas in the reflective layer that represent bit values are called "______"

lands

With ____________________, programmers can reuse source and executable code, thus speeding up application development.

libraries

A(n) ____ searches an object code file for external function calls.

link editor

A(n) ____ is one instance, or variable, of a class.

object

The first group of bits in an instruction represents its unique binary number, commonly called the ____.

op code

The term ____________________ describes hardware that can generate multiple sound frequencies at the same time.

polyphonic

A(n) ____________________ is a TCP connection with a unique integer number.

port

The ____________________ distributes electrical power to directly attached devices or their device controllers.

power bus

In essence, system software plays two roles in each network resource access: ____.

request and response

Activities in the business modeling discipline and the ____ discipline are primarily concerned with building models of the organization that will own and operate the system, models of the system's environment, and models of system and user requirements.

requirements

A(n) ____________________ topology directly connects every node to two other nodes with a set of links forming a loop or ring.

ring

____ make forwarding decisions by using layer 3 addresses.

routers

​In a single electrical communication channel, a(n) ____ wire carries data and the return wire completes the electrical circuit.

signal

A(n) ____________________ integer uses one bit to represent whether the value is positive or negative.

signed

Many ____ create application software for specific processing needs.

software developer

The term ____ describes instructions executed after the guess but before the final result is known with certainty.

speculative execution

_______ is the most important characteristic differentiating primary and secondary storage

speed

A ____ connects secondary storage devices to the system bus.

storage bus

A ____ is designed for one purpose—rapid mathematical computation.

supercomputer

A key function of ____________________ software is allocating resources to users and programs.

system

The accuracy, or precision, of data format representation increases with ____.

the number of data bits used

Expect to pay for unbiased information.

true

High quality and ____________________ information is the product of intensive research and something for which you should expect to pay.

unbiased

____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.

underflow

Like ASCII, ____________________ is a coding table that assigns nonnegative integers to represent printable characters.

unicode

Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.

unsigned integer

Video display panels are connected to a ____ that's connected to a port on the system bus or a dedicated video bus.

video controller

A(n)____ instruction generates the value true if either (but not both) data input is true.

XOR

A ____ performs specific tasks that can be counted or measured.

benchmark program

If multiple nodes attempt to transmit across the same medium at the same time, their messages mix, producing noise or interference that's called a ____.

collision

More storage locations are required for a linked list than for an array with equivalent content because both data and pointers must be stored.

True

The earliest computers were constructed with ordinary copper wire and vacuum tube switches and were unreliable because of the heat the vacuum tubes generated.

True

The mix of activities in each iteration of the UP is tailored to each development project.

True

The number of bits in a floating-point string and the formats of the mantissa and exponent impose limits on the range of values that can be represented.

True

When the data needed isn't in the cache, the access is called a ____.

cache miss

A sequence of records on secondary storage is called a ____.

file

The ____ can extract a single bit from a bit string.

logical SHIFT

____ is a specific time point in a wave's cycle.

phase

The data types a CPU supports are sometimes called ____ data types.

primitive

____ is the most widely used error-detection method.

Cyclic redundancy checking

A ____ instruction causes the processor to depart from sequential instruction order.

BRANCH

is a philosophy of processor design that deliberately includes complex instructions.

CISC

Touch position sensing in a touch screen is usually based on ____.

Capacitance

_____ is the time required to read the second of two adjacent sectors on the same track and platter.

Sequential access time

____ is implemented entirely with transistors.

Static RAM

_____________ is a generic term for describing secondary storage data transfer units

block

In their written form, English and many other languages use alphabetic letters, numerals, punctuation marks, and a variety of other special-purpose symbols known as ____.

characters

Written Western languages are based on systems of symbols called ____.

characters

A ____ is a set of computing resources with front-end interfaces and back-end resources.

cloud

The assignment of numeric codes to characters follows a specific order called a(n) ____.

collating sequence

The term "____" describes the number of bits used to represent a numeric value.

compactness

The term ____ describes the ratio of data size in bits or bytes before and after compression.

compression ratio

Students of information systems generally focus on application software. Students of ______ generally focus on system software.

computer science

A(n) ____ instruction generates the value true if either or both data inputs are true.

inclusive OR

A(n) ___________ instruction generates the value true if either or both data inputs are true

inclusive OR

A modern large format printer is a _____ printer that can print on wider-than normal rolls of paper.

inkjet

The procedure for forwarding a message between two end nodes in the same LAN depends on the ____________________ network topology.

logical

With ____ compression, any data input that's compressed and then decompressed is exactly the same as the original input.

lossless

A(n) ____________________ is a unit of data or information transmitted from a sender to a recipient.

message

The ____ layer forwards messages to their correct destinations.

network

​In a communication channel, ____ refers to unwanted signal components added to the data signal that might be interpreted incorrectly as data.

noise

A particle of light is called a ____.

photon

Electronic computers addressed most shortcomings of mechanical computation.

true

Messages can be loosely categorized into two types—data messages and command messages.​

true

Primary storage extends the limited capacity of CPU registers.

true

The CPU alternates constantly between fetch and execution cycles.

true

The PC revolution wouldn't have been possible without standardized microprocessors.

true

The evolution of Microsoft OSs is a good example of how software development depends on hardware technology.

true

When multiple processors occupy a single motherboard, they share primary storage and a single system bus.

true

Numbers such as 1/3 are stored in floating-point format by ____.

truncation

Hexadecimal numbering uses ____ as its base or radix.

16

____ is a process that generates color approximations by placing small dots of different colors in an interlocking pattern.

Dithering

____ is a character-coding method developed by IBM in the 1960s and used in all IBM mainframes well into the 2000s.

EBCDIC

A computer system requires at least two hardware devices to connect to a network.

False

A full-featured 64-bit CPU, even one with multiple ALUs and pipelined processing, typically requires fewer than 50 million transistors.

False

Binary addition works with complex data types, such as floating-point and double-precision numbers.

False

By far, the most important of activity to keep your knowledge current is taking training courses from hardware and software vendors.

False

Compared with CISC processors, RISC processors are efficient at executing programs that do many of the functions complex instructions are designed for.

False

Under the UP, an information system is built in a series of 3- to 5-week repeated steps.

False

____ is the number of cycles occurring in one second and is measured in hertz (Hz).

Frequency

____ represents bit values by varying carrier wave frequency while holding amplitude constant.

Frequency modulation

Postscript is a(n) ____________________ designed mainly for printed documents, although it can also be used to generate video display outputs.

Image Description Language (IDL)

When manipulating single-precision floating-point numbers, CPU performance is measured in ____.

MFLOPS

Although not a formal UP discipline, systems evaluation and ____ is an important group of activities that accounts for much of the long-range system cost.

Maintenance

is a more traditional approach to multiprocessing that uses two or more processors on a single motherboard or set of interconnected motherboards.

Multiple-processor Architecture

____ is a standard for storing and transporting control information between computers and electronic musical instruments.

Musical Instrument Digital Interface (MIDI)

Optical light pulses can be stored indirectly, such as ____.

On the surface of a DVD

A(n) ____ is a communication pathway from the CPU to a peripheral device.

I/O port

If the CPU is idle while a device completes an access request, the CPU cycles that could have been (but weren't) devoted to instruction execution are called ____.

I/O wait states

Spectrum is a publication of the ____________________ professional society.

IEEE

Most compression algorithms have a corresponding ____________________ algorithm that restores compressed data to its original or nearly original state.

Decompression

____ are used only by the currently executing program.

General purpose registers

____ are typically implemented by installing software on each machine that accepts tasks from a central server and performs them when not busy doing other work.

Grids

A(n) ____ instruction suspends the normal flow of instruction execution in the current program.

HALT

A Java compiler or interpreter translates Java source code into machine instructions and service routine calls for a hypothetical computer and OS called the ____.

Java Virtual Machine

In a magneto-optical drive, the laser polarity shift used in reading is known as the "____________________ effect."

Kerr

____ devices combine optical-scanning technology with a special-purpose processor or software to interpret bitmap content.

Optical Character Recognition (OCR)

Modern ____ displays achieve high-quality color display with organic compounds.

LED

____ output is only able to generate one frequency (note) at a time.

Monophonic

____ is based on the observation that the rate of increase in transistor density on microchips had increased steadily, roughly doubling every 18 to 24 months.

Moore's Law

A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.

Move

Direct3D and ____________________ are widely-used video controller IDLs.

OpenGL

Subsequent groups of bits after the first group in an instruction hold its input values, called ____.

Operands

____ physics describes the behavior of matter at a subatomic level.

Quantum

In current computer hardware, main memory is implemented with silicon-based semiconductor devices commonly called ____.

RAM

The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can randomly access bytes, words, or larger data units.

RAM

____ states that the cost of fabrication facilities for the latest chip generation doubles every four years.

Rock's Law

____ develop system software, such as operating systems, compilers, database management systems, Web servers, and network security monitors.

Systems programmers

​The ____ model was originally intended to unite disparate network standards in a way that enabled any node connected to any type of network to communicate with any other node.

TCP/IP

____ is targeted to general-purpose tasks that support many application programs and users.

System software

ASCII is a 7-bit format because most computers and peripheral devices transmit data in bytes and because parity checking was used widely in the 1960s to 1980s for detecting transmission errors.

True

An 8-bit op code provides 256 possible instructions numbered 0 through 255.

True

Automated data processing combines physics and mathematics.

True

Early Xeon processors filled an important niche in the small server market but weren't powerful enough to perform processing duties in many large-scale servers.

True

In a sequential file, records are stored in contiguous storage locations.

True

Light can be used as a basis for computation.

True

​____ is a connectionless protocol that provides less reliable transport services.

User Datagram Protocol


Ensembles d'études connexes

Chapter 4-Critical Thinking in Nursing-Final Exam Adaptive Quiz

View Set

Smartbook Recharge Chapter 14 ACCT 405

View Set

Reden, informieren, fragen, antworten

View Set

MGMT 340: Pearson Quiz Questions (EXAM 1 PREP)

View Set

EXAM 3: Urinary System & Electrolyte Balance

View Set

Brunner & Suddarth's Textbook of Medical-Surgical Nursing

View Set

Prueba Escrita Leccion 5 VHL Answers

View Set