OS- Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

All of the following statements are common functions of computer hardware are TRUE, except a. The physical, tangible parts or components of a computer. b. The software instructions which are executed by computer processor c. The input and output devices used to input and output data/information between users. d. The motherboard, CPU, sockets, expansion busses, and chipsets used by mobile, personal and enterprise computers. e. The volatile RAM or permanent storage devices and media that stores software, data and information.

b. The software instructions which are executed by computer processor

Which of the following is not considered one of the five primitive data types that is used to store data? a. 1010 is a binary number; 1010 is a two's complement value; 1010 is a hexadecimal number; 0 is the high order bit b. Integer c. Boolean d. Memory addressWhat does the '0x' in the written text '0x1010' signify?

a. 1010 is a binary number; 1010 is a two's complement value; 1010 is a hexadecimal number; 0 is the high order bit

Which of the following represents the integer number 15 as a 4-bit binary code a. 1111 b. 0015 c. 1010 d. F e. 01111

a. 1111

Which of the following statements BEST describes the hardware concept of a slot? a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals. b. An interface hardware and protocol standard for connecting high-speed components to a system board. c. Low-level software that starts and controls the boot (startup) process for PCs before loading and booting (passing control) to your operating system. d. An external connection point or interface to connect an external device. e. An internal motherboard connection to add removable circuity cards to add extra processing capabilities to a computer.

a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals.

Which of the following statements BEST describes the concept of a virtual "Page Fault"? a. A frame page requested by an executing program is not in the system memory and a slot page must be retrieved from swap file. b. A slot requested by an executing program is not in the swap file and a frame page must be retrieved from system memory. c. The requested page cannot be found. d. The requested page is either corrupted or not up to date. e. Either the page file or swap is not available

a. A frame page requested by an executing program is not in the system memory and a slot page must be retrieved from swap file.

IBM's z System Architecture takes pride that you can still execute applications developed in the 1960s on newer mainframes. Given this business requirement which of the following instruction set architectures would be the BEST to consider? a. CISC b. RISC c. EPIC d. ISA e. AMD

a. CISC

Which of following BEST describes a type of full instruction set architecture that is normally backward compatible? a. CISC b. RISC c. EPIC d. IBM e. MAC

a. CISC

Which of the following statement BEST describes an example or the concept of computer "load balancing". a. Checks which web server machine is the least busy and then sends the request to that machine. b. Two or more network connected computers or nodes independently monitors the same process or transaction. As soon as a service on one machine breaks down the other machines try to take over. c. Two or more network connected computers or processing nodes spreads parallelized or separate processing requirements. d. Manually or dynamically adds or subtracts more processing nodes on demand to meet specified quality of performance policies or agreements.

a. Checks which web server machine is the least busy and then sends the request to that machine.

Which of the following statements BEST describes the concept of application software? a. Computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. b. Computer software designed to manage the computer's memory. c. Computer instructions that are executed execute by the processor d. Computer software that has been translated into executable program code. e. Computer software that provides functions or services, not normally provided by the operating system or application.

a. Computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

All of the following statements are advantages of computerized data processing systems as compared to manual data processing systems, except a. Greater flexibility to scale when processing demand increases. b. Greater flexibility to change processing requirements c. Easier to enforce security and fraud prevention policies d. Cost effectiveness. e. Greater potential for consistent higher

a. Greater flexibility to scale when processing demand increases.

The Magnetic Ink Character (MICR) binary code is a very old 4-bit binary code and has many different variations and rule. Which of the following BEST describes the use of the MICR code? a. Identify your bank account number, routing number and check number b. Identify retail inventory items c. Used by older systems that cannot support the Uniform Product Code (UPC) d. Used by magnetron inventory scanners e. Used by optical medical scanners

a. Identify your bank account number, routing number and check number

All of the following statements are common examples of application software, except a. Microsoft NTFS File System Software b. Microsoft Office Suite c. SAP Enterprise Resource Planning Software d. IBM Rational Concert Project Management Software e. PeopleSoft Human Resource Management Systems (HRMS),

a. Microsoft NTFS File System Software

Why are data representations codes used? a. Not much information can be stored by using one bit b. To combine primitive data elements together c. To combine data and methods d. To perform mathematical calculations

a. Not much information can be stored by using one bit

Which of the following results are possible when adding, subtracting, or multiplying two integers? a. Overflow b. Truncation c. Excess d. Two Complements

a. Overflow

All of the following statements BEST describes the function of a virtual page table, except a. Storage space on disk for virtual pages b. A system memory table that inventories virtual page and status information for executing operating system, application and middleware storage. c. Stores the disk address of a slot or system memory address of a frame. d. A page table is used to dynamically translate a virtual storage address into a corresponding storage reference or a corresponding system memory address. e. Virtual memory address really do not exist; rather they are dynamically translated.

a. Storage space on disk for virtual pages

Which of the following describes the concept of mathematical accuracy? a. The correctness of a result of a calculation or representing data. b. The number of bits used to store a numerical value c. The rounding calculated answers d. The loss of data for calculate answers

a. The correctness of a result of a calculation or representing data.

Due to the risk of truncation and processing complexity problems when using various data representation methods, it is recommended to _______ a. Use (floating point data representation methods to store numerical data whenever possible b. Use integer data representation methods to store numerical data whenever possible c. Use ASCII data representation methods to store character data whenever possible d. Use pointer data representation methods to store memory addresses whenever possible

a. Use (floating point data representation methods to store

A(n) ____ is the location of some data element within a storage device. a. address b. index c. pointer d. object

a. address

Which of the following is not a CPU instruction type executed by the ALU? a. data movement b. logical comparison c. addition d. subtraction

a. data movement

During what CPU operation of the instruction life cycle is an instruction moved from primary storage to the control unit? a. fetch b. execution c. access d. refresh

a. fetch

IEEE 754 and IEEE 854 standards are used to describe the binary coding standards for __________ a. floating-point binary codes b. Unicode c. integer codes d. data time formats e. object stored data

a. floating-point binary codes

Cache memory is used to: a. increase the speed of data access for the processor, as compare to standard system memory (RAM) b. increase the size of memory available to programs c. store data in nonvolatile memory, such as flash memory d. augment the memory used for the operating system kernel e. the more cache memory, the faster the CPU executes programs

a. increase the speed of data access for the processor, as compare to standard system memory (RAM)

Which of the following stores the computer memory address of the NEXT computer instruction to be executed? a. instruction pointer b. instruction register c. program status word d. index register e. none of the above

a. instruction pointer

An event that alters the sequence in which the processor executes instructions is called? a. interrupt processing b. jump instruction c. conditional PSW d. dispatching e. serialization

a. interrupt processing

A system file that stores the applications' content of memory at the time of a crash is called _____? a. memory dump b. analysis file c. error file d. program status word

a. memory dump

A Time Management concept that best emphasize throughput as compared to response time performance is a. multiprogramming b. multiprocessing c. multicore parallelism d. time sharing e. interrupt capability

a. multiprogramming

A Time Management concept that enables a processor to temporarily suspend the execution of one program waiting for an I/O to complete and start (switch) another program to improve CP utilization, normally used in batch processing, is called a(n) _______? a. multiprogramming b. multiprocessing c. multicore parallelism d. time sharing e. interrupt capability

a. multiprogramming

Which of the following BEST describes the number of Program Status Word (s) (PSW) for each processor core? a. only one per core, i.e., the current executing program b. a number equal to the number of program being processed .d. c. only one for 32-bit applications and two for 64-bit applicationse. d. varies by the size of the application being processed

a. only one per core, i.e., the current executing program

The primary advantage of using virtual addressing is? a. permits an address range that is greater than central memory storage (physical memory) b. enables address space isolation c. enables 64-bit addressing d. encourages cross-memory addressing.

a. permits an address range that is greater than central memory storage (physical memory)

All of the following are components used to store the a Floating point numeric code, except a. radix point b. sign of the exponent c. exponent d. sign of the mantissa e. mantissa

a. radix point

Many CPU architectures incur a(n) ____ when it must access storage devices that are slower than its own cycle time. a. refresh cycle b. offset c. wait state d. rest state

a. refresh cycle

From where does the ALU retrieve its input data? a. registers b. cache memory c. control unit d. primary memory

a. registers

A CPU typically will execute multiple instruction formats. Which of the following are the major differences among computer instructions formats. a. the differences in the number and type of operands b. the difference in clock cycles c. the differences in fetch cycle time d. the difference in the types of program counters

a. the differences in the number and type of operands

The ability to fully utilize the benefits of a multicore processor is dependent on __________ a. the features of operating system, but no changes are necessary in the application b. the features of operating system, but changes are also necessary in the application c. the features of application, but no changes are necessary in the operating system d. the operating system, application, and motherboard

a. the features of operating system, but no changes are necessary in the application

The maximum amount of memory locations that can be used to store computer instructions or data that a computer architecture can access is determined by _______ a. the maximum number of bits a processor can address b. the maximum amount of memory that can be mounted on the system board. c. the maximum amount of memory that memory chips can store. d. the maximum amount of memory that can be stored on a disk.

a. the maximum number of bits a processor can address

Which of the following statements BEST describes the hardware concept of PCIe bus? a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals. b. An interface hardware and protocol standard for connecting high-speed components to a system board. c. Low-level software that starts and controls the boot (startup) process for PCs before loading and booting (passing control) to your operating system. d. Communication wires that connects the computer's processor to the system memory (RAM) and other components on a motherboard. e. The mechanical and electrical connection hardware used to mount the CPU to the system board

b. An interface hardware and protocol standard for connecting high-speed components to a system board.

The GREATEST RISK that may result from an application ABEND is _______ a. The application program may stop. b. An unexpected program stop may leave an open door for hacker to attack the system c. Data may be corrupted, saturated (max value) or truncated (chopped - off). d. The loss of customer goodwill. e. Restarting the application.

b. An unexpected program stop may leave an open door for hacker to attack the system

Select the BEST Statement. Data types like PIC 999, PIC XXXX, USAGE IS COMP, or USAGE IS COMP-3 are normally coded in ______________. a. Java b. COBOL c. Oracle or DB2 SQL d. C, C++ or C# e. A or D.

b. COBOL

Which of the following statement BEST describes the concept of a virtual "page thrashing"? a. The swap file is contaminated or full. b. CPU time to process virtual page swaps either exceeds normal processing performance or virtual page policies.. c. CPU time allocated to virtual page swaps has been exceeded. d. The size of the page table has been exceeded. e. No system memory is available to store more frames

b. CPU time to process virtual page swaps either exceeds normal processing performance or virtual page policies

Which of the following statements is TRUE? a. Computer virtualization is built on cloud services. b. Cloud services are built on computer virtualization. c. Computer virtualization is built on grid computing architectures. d. Cloud services are built on cluster architectures

b. Cloud services are built on computer virtualization.

Which of the following descriptions represent one the different methods to implement multiprocessing? a. Duplicate circuitry for some or all of the stages with a single CPU (pipelining) b. Duplicate CPUs implemented as separate microprocessors sharing main memory and a single system bus (dual processors multiprocessors) c. Duplicate CPUs on a single microprocessor that also contains main memory caches and a special bus to interconnect the CPUs (dual-core processors) d. All of the above

b. Duplicate CPUs implemented as separate microprocessors sharing main memory and a single system bus (dual processors multiprocessors)

Which of the following is TRUE about 8-bit ACSII or ANSI? a. It is a sixteen?bit code. b. It is used with Microsoft Windows. c. It is used with IBM mainframe computers. d. The first 128 characters are the same as in EBCDIC.

b. It is used with Microsoft Windows

Which of the following BEST describes how does a CPU know memory location contains the next instruction to be executed? a. It doesn't. The system memory fetches the next computer instruction automatically b. It looks in the instruction pointer register. c. The output of the last instruction is the address of the next instruction d. It increments the address of the previous instruction

b. It looks in the instruction pointer register.

Which of the following types of cache comes in the largest memory sizes? a. L2 b. L3 c. Registers d. L1

b. L3

Overclocking means setting your CPU and memory to run at speeds higher than their official speed grade. All of the following are TRUE about overclocking except: a. Overclocking voids the CPU warranty b. Overclocking works for all motherboards and CPUs c. Overclocking can cause damage to other components on the motherboard d. Overclocking can cause a system or application to hang.

b. Overclocking works for all motherboards and CPUs

Which of the following unique identifier does Windows, UNIX or Linux use to identify an executing task or process assigned to system memory storage? a. ASID (address space identifier). b. Process ID c. Program address d. Task ID e. Program ID

b. Process ID

A business requirement is to design a high performance, anti-lock automobile braking system. Other things being equal, which of the following may be the better instruction set architecture to be considered for the processors? a. CISC b. RISC c. EPIC d. ISA e. AMD

b. RISC

The IBM AIX and Power System processors use a(n) ______ instruction set. a. CISC b. RISC c. EPIC d. ISA e. AMD

b. RISC

Which of following BEST describes the instruction set architecture that has fewer computer instructions, can be executed at a high speed, and is more cost-effective to produce? a. CISC b. RISC c. EPIC d. 9980

b. RISC

Which of the following statements BEST describes the concept of computer clusters when applied to mainframe architectures? a. Mainframe grids. b. Sysplex c. IBM clusters d. Mainframe cluster e. Dynamic Managers

b. Sysplex

Concerning Character binary codes all of the following are TRUE, except a. The 7-bit ASCII character code can represent 128 combinations of characters, and can store alphabetic, numeric and special characters. b. The 16-bit Unicode character code based on EBCDIC can represent 65,536 combinations of characters c. The 8-bit EBDIC is an IBM proprietary character code that can represent 256 combinations of characters, and can store alphabetic, numeric and special characters. d. The 8-bit ASCII character code can represent 256 combinations of characters, and can store alphabetic, numeric and special characters. e. The 7-bit ASCII is used to transmit characters between many Internet applications, such as SMTP, POP3 and IMAP email protocols.

b. The 16-bit Unicode character code based on EBCDIC can represent 65,536 combinations of characters

All of the following statements concerning binary integer data codes are TRUE, except a. A 4-bit integer code combines four bits, which represents 23, 22, 21, and 20 or symbolically the decimal numbers of 8, 4, 2 or 1 b. The largest integer that be store in a 4-bit integer binary is 8. c. The more bits used by a integer binary code, e.g., 8, 16, 32, and 64-bits Integer Binary Codes, the larger the integer number may that be used. d. The more bits used by a integer binary code, e.g., 8, 16, 32, and 64-bits Integer Binary Codes, the greater storage will be required, whether or not you need that storage space. e. The Magnetic Ink Character (MICR) binary code is a historic 4-bit integer binary code.

b. The largest integer that be store in a 4-bit integer binary is 8.

Which of the following describes the concept of mathematical precision? a. The correctness of a result of a calculation or representing data. b. The number of bits used to store a numerical value c. The rounding calculated answers d. The loss of data for calculate answers

b. The number of bits used to store a numerical value

Which of the following statement BEST describes an example or the concept of computer "fail-over". a. Checks which web server machine is the least busy and then sends the request to that machine. b. Two or more network connected computers or nodes independently monitors the same process or transaction. As soon as a service on one machine breaks down the other machines try to take over. c. Combines two or more small computers or processing nodes to decrease processing costs to for large scale parallelized or separate processing requirements. d. Manually or dynamically adds or subtracts more processing nodes on demand to meet specified quality of performance policies or agreements.

b. Two or more network connected computers or nodes independently monitors the same process or transaction. As soon as a service on one machine breaks down the other machines try to take over.

All of the following statements are TRUE, except a. When using a product like Excel, a cell reference, e.g., A1, roughly represents the address of the data behind the scenes b. When using Database products, there is no need to understand data representation codes. These data types are assigned automatically. c. Program languages and data types must be code in a program before its use in a program statements. d. Content must be stored in a program language variable before its use in a program statements. e.. Strongly-typed program languages must properly declare data types before use and must follow the rules to store content and processed.

b. When using Database products, there is no need to understand data representation codes. These data types are assigned automatically.

A unique identity to identify the storage location of a computer instruction or data to be processed is called _____ a. a memory location b. a memory address c. an IP address d. an instruction address e. a computer register

b. a memory address

The frequency at which the system clock generates timing pulses is the ____ of the system. a. cycle time b. clock rate c. hertz d. execution cycle

b. clock rate

An IBM ASID (address space identifier) is used to _________? a. identify the user executing a task b. identify an executing task assigned to system memory storage c. provide memory protection for a task from malware and other misbehaving applications d. enable Linux applications to executed in a z/OS environment

b. identify an executing task assigned to system memory storage

Which of the following registers stores the computer instruction that is currently being executed? a. instruction pointer b. instruction register c. program status word d. index register e. none of the above

b. instruction register

Which of the following terms BEST matches the following definition: Any CPU or program architecture in which duplicate CPUs, processor cores, or clusters can be execute multiple computer instructions simultaneously? a. branch prediction instructions b. instruction-level parallelism c. Instruction pipelining d. Instruction multiprocessing e. Instruction multitasking

b. instruction-level parallelism

The simultaneous operation of two or more processors that share various hardware resources, e.g., system and disk storage, is called ______? a. multiprogramming b. multiprocessing c. multicore parallelism d. time sharing e. interrupt capability

b. multiprocessing

A(n) ____ is one instance, or variable, of a class. a. method b. object c. element d. string

b. object

Which of the following concepts BEST describes the process of moving pages between auxiliary storage and real storage? a. segmenting b. paging c. virtual address translation d. transferring e. I/O fetching

b. paging

A set of instructions that teaches a computer what to do is called a(n) ____ a. class b. program c. function d. algorithm

b. program

Compilers and interpreters are examples of __________ a. program editors b. program translators c. debugging tools d. application development software

b. program translators

Which of the following BEST describes the how to move the decimal to the right (making the number bigger) or to the left (making the number smaller). a. radix point b. sign of the exponent c. exponent d. sign of the mantissa e. mantissa

b. sign of the exponent

The reason why one may not want to store mathematical sign of an integer is a. to prevent the use of negative numbers b. to increase the positive range of the numeric data to be stored c. to use smaller 8-bit numbers instead of larger 16-bit numbers d. to permit mathematical operations on character data

b. to increase the positive range of the numeric data to be stored

Most programming language data types with automatically store a number with a mathematical sign, or as a positive or negative number. However, the COBOL programming language introduced in 1960, will the choice of the storing the mathematical sign as option. Which of the following is the advantage of not storing mathematical numbers. a. RISC processor may be used b. A math coprocessor is not required c. A larger number may be stored. d. Faster mathematical processing

c. A larger number may be stored.

All of the following statements concerning a manual or computerized data processing system are TRUE, except a. Data processing occurs when data is collected and translated into usable information. b. The detailed stages of data processing often includes: data collection, data preparation, data input collection processing, information output/ interpretation and data storage. c. A payroll check is an example of data input for a payroll processing system. d. A HTML document is an example of an input for an Internet browser. e. TCP/IP packets may be either data inputs or information depending on processing task, such as, wireless network devices or an Internet browser.

c. A payroll check is an example of data input for a payroll processing system.

You can assume that a CPU performance is faster when using pipeline technology because: a. One channel handles all of the processing faster than multiple channels. b. The processor completes two or more stages of the instruction life cycle at the same time c. A pipeline in a processor uses a larger word size than other system components d. It attempts to keep every part of the processor busy with some instruction by dividing incoming instructions into a series of sequential steps.

c. A pipeline in a processor uses a larger word size than other system components

Which of the following character coding schemes include control codes for I/O devices? a. ECBDIC b. IEEE c. ANSI d. BCD

c. ANSI

Concerning computers storage concepts which of the following statements is false? a. Each memory location contain inside a computer is assign a unique address. b. A program language variable name used a high-level programming language is a symbolic name of a memory address. c. An application programmer must assign addresses to a variable or identifier before he/she is permitted to use a variable. d. The contents of the memory location is different than its address. e. A computer address is like a house address, except only one piece of data can be stored at one memory location

c. An application programmer must assign addresses to a variable or identifier before he/she is permitted to use a variable.

All of the following statements concerning range and overflow are TRUE, except a. The range is the difference between the highest number that may be stored and the lowest the lowest number. b. The range of a numeric value that can be stored is determined number of bits used by the binary code and use of the mathematical sign. c. An attempt to a number that exceeds the capacity of the binary code to store that number, or is outside the range is a called a data integrity exception. d. Data may be corrupted, saturated (max value) or truncated when a program may attempt to store data into a numeric data type that exceeds the range of values that may be stored. e. Overflow conditions may cause an ABEND that will unexpectedly crash a program during execution.

c. An attempt to a number that exceeds the capacity of the binary code to store that number, or is outside the range is a called a data integrity exception.

A program translator translates a program written in a language such as Java or COBOL into _________ a. algorithms b. system software c. CPU instructions d. module

c. CPU instructions

All of the following statements concerning data representation codes are TRUE, except a. Integer binary codes and data types are used to store numeric data without a decimal point and to process mathematical calculations. b. Floating-point codes and data types are used to store numeric data with a decimal point and to process mathematical calculations. c. Character codes, data types and string objects are used to store only alphabetic data and may not be processed using mathematical calculations. d. Integer data types are processed faster as compared to floating- point or character data. e. The capabilities binary codes and data types are limited to the types of processors busses and registers, computer hardware, operating systems and programming languages.

c. Character codes, data types and string objects are used to store only alphabetic data and may not be processed using mathematical calculations.

Which of the following statement BEST describes an example or the concept of computer "high performance computing". a. Checks which web server machine is the least busy and then sends the request to that machine. b. Two or more network connected computers or nodes independently monitors the same process or transaction. As soon as a service on one machine breaks down the other machines try to take over. c. Combines two or more small computers or processing nodes to decrease processing costs to for large scale parallelized or separate processing requirements. d. Manually or dynamically adds or subtracts more processing nodes on demand to meet specified quality of performance policies or agreements.

c. Combines two or more small computers or processing nodes to decrease processing costs to for large scale parallelized or separate processing requirements.

All of the following statements concerning binary codes are TRUE, except a. The basic difference between word codes and character codes is that data stored in word codes can be processed mathematically. b. The more bits used in a character code, the greater the number of combination of characters can be used. c. Computers represents data as a pattern of bytes. d. A Programmer is most required to specify the desired binary code before it is used in a higher level program language, such as Java and COBOL. e. The basic distinction between a double precision binary code and a single precision binary code is the number of significant digits stored.

c. Computers represents data as a pattern of bytes.

All of the following statements are benefits of a Computer Cluster architecture, except a. Horizontal Scalability, i.e., add more processing nodes on demand. b. Fault tolerance (fail-over services) c. Decentralized management and control d. Cost efficiencies e. Load-balancing.

c. Decentralized management and control

All of the following statements concerning fetch operation of the instruction life cycle are TRUE, except a. During the fetch operation, the control unit increments instruction pointer to the address of the next instruction. b. During the fetch operation, the control unit separates the operation code and operands instruction into components. c. During the fetch operation, the control unit retrieves the computer instruction from a register. d. During the fetch operation, the control unit retrieves a computer instruction from a system memory or cache

c. During the fetch operation, the control unit retrieves the computer instruction from a register.

Which of following describes an Intel/HP 64-bit instruction set that provides additional computer instructions which supports parallel processing using multiple processors or cores? a. CISC b. RISC c. EPIC d. 9980

c. EPIC

All of the following statements concerning Character Sets and Character Encoding are TRUE, except a. Character encoding are the binary codes used to store characters, such as ANI, ASCI, EBCDIC or Unicode. b. Character sets represent the collection of displayed character that are displayed for a specific character encoding standard. c. Each Character Encoding standard has only one character set. d. Popular character sets include ISO, ISO-8859-1 (English), ISO-8859-6 (Arabic) UTF-8 e. The Meta charset tag is HTML is used to declare the character set of a web page.

c. Each Character Encoding standard has only one character set.

What do the concepts of pages, frames and slots have in common? a. Each is a type of real storage used in virtual addresses. b. Each is a type of control block used in virtual addresses. c. Each is a 4K unit of virtual storage. d. Each is a type of auxiliary storage used in z/OS virtual address.

c. Each is a 4K unit of virtual storage.

All of the following statements concerning hexadecimal codes are TRUE, except a. Hexadecimal codes are represented by 16 characters, such as the numbers 0, 1,2, 3, 4, 5, 6, 7, 8, 9, and the letters A, B, C, D, E and F. b. Hexadecimal is that it is much easier to express binary number representations in hex than it is in any other binary coding system. c. Hexadecimal is a convenient binary code used to store numbers and characters, or process data mathematically. d. Each hexadecimal character represents the value of four binary bits, such as, binary 0110 e. Hexadecimal characters are grouped a two characters, which represents the value of 8 binary bits, such as, binary 11111001 as hex F9.

c. Hexadecimal is a convenient binary code used to store numbers and characters, or process data mathematically.

All of the following statements are common functions of an operating system (or system software), except a. Memory Management - Managing the storage of programs, data or information in primary or virtual memory b. File Systems Management - Managing, storing, modifying, or deleting data on secondary storage disks, such as, disks or DASDs. c. Instruction Set Management - Managing, storing modifying, or deleting computer instructions used by the processor. d. Process Management - Managing the loading, execution, and termination of applications. e. Time Management - Managing the time allocated to processes in a multitasking operating systems.

c. Instruction Set Management - Managing, storing modifying, or deleting computer instructions used by the processor.

All of the following concerning called MIPS, or GIPS are TRUE, except a. An acronym meaning millions or billions of instructions per second b. Is directly related to the speed of the processor and number of instruction per cycle a processor can execute c. Is directly related to the internal speed of the internal memory d. Is a popular measurement of processor performance, not related to the type of programs be executed

c. Is directly related to the internal speed of the internal memory

What is the function of Hyper-Threading? a. It gives you multiple cores within the CPU. b. It enables for four simultaneous independent program instructions to be executed by one CPU core c. It enables for two simultaneous independent program units of code to be executed by one CPU core d. It is a high-speed connection from the CPU to RAM. e. It enables two or more processors to simultaneously execute independent units of code.

c. It enables for two simultaneous independent program units of code to be executed by one CPU core

Which of the following statements BEST describes how does 8-Bit ASCII character code store the capital letter "A" as data into a memory location. a. It stores the collating sequence number of the does an 8-Bit ASCII code b. It stores the ASCII numeric value of 65 c. It stores the binary pattern of 0100 0001 which represents the ASCII integer value of 65 d. It stores the hexadecimal value of 41 which represents the ASCII integer value of 65

c. It stores the binary pattern of 0100 0001 which represents the ASCII integer value of 65

Which of the following are statements does NOT describe a difference between a multicore processor and multiple independent microprocessors? a. Multicore processors executes a single program faster. On the other hand, multiprocessor executes multiple programs faster. b. Multiprocessor systems are more reliable than multicore systems. A multiprocessor has more CPUs. Failure in one will not affect the other CPUs. It is more tolerant to faults. c. Multicore processors architectures are more expensive than multiple processors do to the requirements to require more memory, specialized operating system or applications, d. The multicore systems have less traffic across the system compared to a multiprocessor because all the cores are integrated into a single chip. e. Web servers that need to process many independent transactions at once can easily take advantage of multiprocessing or multi-core architecture by splitting those transactions into separate threads.

c. Multicore processors architectures are more expensive than multiple processors do to the requirements to require more memory, specialized operating system or applications

Select the BEST Statement. Data types like SMALLINT, VARCHAR, BLOB, or NUMBER are normally coded in ______________. a. Java b. COBOL c. Oracle or DB2 SQL d. C, C++ or C# e. A or D.

c. Oracle or DB2 SQL

All of the following statements are common examples of middleware software, except a. Database Management or Data Access software b. Client-Server or API software c. Process Management software d. Transaction Processing and Management software (Application Servers) e. Remote communication protocols and access software

c. Process Management software

Which of the following statements BEST describes the concept of cloud computing architectures. a. One physical computer can run more than one operating system b. A collection of parallel and distributed computer systems that enables the sharing, selection, and aggregation of processing. c. Software management and deployment of virtual machines, virtual storage, virtual networks and virtual services d. A set of loosely or tightly connected computers that work together so that, in many respects can be viewed as a single system.

c. Software management and deployment of virtual machines, virtual storage, virtual networks and virtual services

Which of the following statements BEST describes the concept of computer virtualization. a. One physical computer can run more than one operating system b. A collection of parallel and distributed computer systems that enables the sharing, selection, and aggregation of processing. c. Software management and deployment of virtual machines, virtual storage, virtual networks and virtual services d. A set of loosely or tightly connected computers that work together so that, in many respects can be viewed as a single system.

c. Software management and deployment of virtual machines, virtual storage, virtual networks and virtual services

Which of the following statements BEST describes the function of a swap or page file? a. Stores the virtual page table. b. Stores all frames unit managed by a virtual memory operating system. c. Stores all slots managed by a virtual memory operating system. d. Stores all pages managed by a virtual memory operating system. e. Stores the virtual memory manager software.

c. Stores all slots managed by a virtual memory operating system.

Assume that a system board supports two processors, which enables multiprocessing. Which of the following statements is TRUE concerning the compatibility or requirements between the two processors? a. One processor may be manufactured by different manufacturer than the second processor b. The two processors may be of different processor families from the same processor manufacturer. c. The two processors must be of the same processor families from the same processor manufacturer and clock speed. d. The two processors used in the motherboard must be the same model e. The two processors require twice the amount of system memory.

c. The two processors must be of the same processor families from the same processor manufacturer and clock speed.

All of following statements concerning a "computer instruction" are true, except a. is a command, or group of bits, that a processor can directly execute. b. contains instruction codes and operands c. are specified in the syntax of a programming language, e.g., Java d. are a part of the instruction set of the processor

c. are specified in the syntax of a programming language, e.g., Java

Which of the following BEST describes the format that is used to move the decimal point to correct decimal position. a. radix point b. sign of the exponent c. exponent d. sign of the mantissa e. mantissa

c. exponent

What coding format encodes a real number as a mantissa multiplied by a power (exponent) of two? a. two's complement b. binary c. floating point d. excess notation

c. floating point

An active virtual storage page residing currently in central storage (real memory) is called a _______? a. segment b. region c. frame d. slot

c. frame

Before a page can be transferred from auxiliary storage into real storage (real memory) it must find real storage is available or un-used. Pages brought into real storage space are stored in a _________? a. segment b. region c. frame d. slot

c. frame

The set of machine commands that a CPU can execute is called a(n) ________ a. program b. computer instruction c. instruction set d. load module e. excitable load module

c. instruction set

Which of the following registers stores information that may be used to detect or diagnose the type of system error that occurred in your system? a. instruction pointer b. instruction register c. program status word d. index register e. none of the above

c. program status word

Which of the following application categories can best realize performance improvement by increasing CPU word size from 32 to 64 bits? a. word processors b. worksheets programs c. recording and editing digital audio d. Internet browsers

c. recording and editing digital audio

Relational databases, such as Oracle, DB2 and MySQL, assign data representation methods when a. the user specifies the DIM statement b. the user creates the database c. the user creates a table d. the user enters data

c. the user creates a table

All of the following statements concerning the types of the cache memory are TRUE, expect a. (L1) Level 1 Cache is built inside a processor core. Instructions are first searched in this cache. L1 cache very small in comparison to others, thus making it faster than the rest. b. (L2) Level 2 Cache is located inside the processor core. If the instructions are not present in the L1 cache then it looks in the L2 cache, which is a slightly larger pool of cache, thus accompanied by some latency. c. (L3) Level 3 Cache is located outside the processor core. With each cache miss, it proceeds to the next level cache. This is the largest among the all the cache, even though it is slower, but its still faster than the RAM. d. (L4) Level 4 Cache is built on flash memory outside the processor that is non-volatile.

d. (L4) Level 4 Cache is built on flash memory outside the processor that is non-volatile.

How many bits are used to represent a character under the Unicode coding standard? a. 7 b. 8 c. 6 d. 16

d. 16

When you select the Qword option when using the Windows Programmer Calculator, how many bits will be used to store the number? a. 8-bits b. 16-bits c. 32-bits d. 64-bits

d. 64-bits

What is (are) the maximum number pf physical cores of an Intel "Extreme" Core i7 processor? a. 1 b. 2 c. 4 d. 8 e. 10

d. 8

How does Excel know that the user wants to use a real number data representation method to store the contents of a value? a. By the user specifying the DIM statement b. By the row or column of the cell in which the user entered the data c. By the user typing the contents of a cell beginning with an equal sign. d. By the user typing only numeric digits, with an optional one decimal point, into the contents of a cell.

d. By the user typing only numeric digits, with an optional one decimal point, into the contents of a cell.

Which of the following statements BEST describes the hardware concept of the Front-side Bus? a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals. b. An interface hardware and protocol standard for connecting high-speed components to a system board.. c. Low-level software that starts and controls the boot (startup) process for PCs before loading and booting (passing control) to your operating system. d. Communication wires that connects the computer's processor to the system memory (RAM) and other components on a motherboard. e. The mechanical and electrical connection hardware used to mount the CPU to the system board

d. Communication wires that connects the computer's processor to the system memory (RAM) and other components on a motherboard.

You see a statement in a VB.NET that states DIM HOURS AS INTEGER All of the following statements are TRUE, except a. Assigns a memory location to store data. b. Specifies the binary code to be used to store data as integer c. Assigns the name the memory location to HOURS d. Stores data into the HOURS memory location

d. Stores data into the HOURS memory location

Primary storage is also referred to as ____. a. Cache memory b. Register memory c. Main memory d. System memory

d. System memory

When using floating point representations the mathematical results of the expression 1.0/3.0 * 3.0 will be similar to .999999, but not 1. The reason why the answer is not (correct). a. An integer numeric code should have been used instead. b. A character code should have been used instead. c. The binary codes of data was not properly declared. d. The result of the expression 1 divided by 3 was truncated and could not represent an infinite repeating number. e. The result of the expression 1 divided by 3 could not store a fractional answer and was truncated to zero,

d. The result of the expression 1 divided by 3 was truncated and could not represent an infinite repeating number.

All of the following are practical applications to use hexadecimal codes, except a. To display non-displayable characters in program code or stored data. b. To represent memory addresses. c. To represent colors in web pages. d. To represent foreign characters e. To present IP or MAC network addresses

d. To represent foreign characters

Excel attempts to guess the type of data to be stored. When you type a character it automatically uses a. 8-bit ASCII b. 8-bit ECDBIC c. Integer codes d. Unicode e. Boolean codes

d. Unicode

All of the following statements are TRUE concerning the characteristics of a Computer Cluster architectures, except a. Computer Cluster architectures are a set of loosely or tightly connected computers that work together so that, in many respects can be viewed as a single system. b. A computer cluster node (computer or virtual machine) runs its own instance of an operating system, but shares a processing requirement that is centrally management and coordinated. c. Nodes of Computer Cluster are often interconnected by a comuter network. d. Unlike multiprocessing and mulicore architectures, computer clusters will always increase performance. e. Computer Cluster architecture performance may rival mainframe and supercomputer architecures by increasing cost effiecnies by using lower-cost computers or servers.

d. Unlike multiprocessing and mulicore architectures, computer clusters will always increase performance.

A set of computational and data movement computer instructions that are designed to calculate an answer is called a(n) ____ a. class b. program c. function d. algorithm

d. algorithm

Which of the following statement(s) BEST describes the reasons why doubling (or increasing) the number of microprocessors will not double (or decrease) the total net throughput of a multiprocessing architecture system? a. the extra overhead of synchronizing each processor to avoid conflict accessing the same resource or memory location at the same time will increasingly add complexity to the systems b. not all applications can be run in parallel c. instruction or task dependency d. all of the above

d. all of the above

The assignment of numeric codes to characters follows a specific order called a(n) ____. a. vertical tabulation b. record separator c. boolean sequence d. collating sequence

d. collating sequence

The primary components of a CPU are ____. a. control unit, primary storage, and secondary storage b. control unit, primary storage, and secondary storage c. primary storage, secondary storage, and bus d. control unit, arithmetic logic unit, and registers

d. control unit, arithmetic logic unit, and registers

A(n) ____ is a template that specifies the number of operands and the position and length of the op code and operands. a. Reduced Instruction Set b. PSW c. heat sink d. instruction forma

d. instruction forma

A(n) ____ is a data element that contains the address of another data element. a. address b. object c. index d. pointer

d. pointer

Which of the following concepts BEST describes an inactive virtual storage page residing currently in auxiliary (disk) storage? a. segment b. region c. frame d. slot

d. slot

A Time Management concept that switches between programs after executing a period of allocated time designed to improve user response is called a. multiprogramming b. multiprocessing c. multicore parallelism d. time sharing e. interrupt capability

d. time sharing

The Time Management concept that best emphasize response time as compared to through put performance is a. multiprogramming b. multiprocessing c. multicore parallelism d. time sharing e. interrupt capability

d. time sharing

Select the BEST Statement. Data types like short, int, long, float or double are normally coded in ______________. a. Java b. COBOL c. Oracle or DB2 SQL d. C, C++ or C# e. A or D.

e. A or D

Which of the statement(s) BEST describes that strategies used by application program languages to prevent overflow risks and data corruption. a. COBOL uses the ON OVERFLOW or ON SIZE ERROR clauses to prevent ABEND Errors caused by overflow or divide by zero conditions. b. Java use an ArithmeticException, which you can catch and handle and overflow and divide by zero conditions. c. Both COBOL and Java may use conditional tests to check for inappropriate attempts to store unaccepted values. d. Java provdes isNaN or isInfinite functions. COBOL supplies the numeric function. e. All of the above are TRUE

e. All of the above are TRUE

Computer performance is the amount of useful work accomplished by a computer system. When it comes to high computer performance, which of the following may be a factor(s) to be considered? a. Short response time for a given piece of work. Response time is the total amount of time it takes to respond to a request for service. b. High throughput (rate of processing work). Throughput is the maximum rate of production or the maximum rate at which something can be processed. c. Low utilization of computing resource(s). d. High availability of the computing system or application. e. All of the above are factors in evaluating computer performance.

e. All of the above are factors in evaluating computer performance.

Which of the following may be cause(s) of virtual "page thrashing"? a. Inadequate system memory storage space. (Increase the RAM.) b. Slow storage devices, which store the page file or slots. (Consider SSD storage.) c. Low data transfer rates between the storage devices that store swap files and system memory. (Switch to PCIe interfaces.) d. Excessive number of processes that may store only one frame per process. (Proper scheduling of tasks.) e. All of the above may be cause(s) of virtual "page thrashing".

e. All of the above may be cause(s) of virtual "page thrashing"

Which of following statements BEST describes the tasks that may occur during a "page swap"? a. The page table is consulted to determine the location of the requested page. b. A swap page or slot must be copied and retrieved from secondary storage and stored in system memory, e.g., opening a new Word document. c. If system memory is full an existing frame must be copied to the swap file to replace the slot if the frame had been changed, e.g., saving changes of you word document. d. The status of page table must be updated. e. All of the above tasks that describes the tasks that may occur during a page swap.

e. All of the above tasks that describes the tasks that may occur during a page swap.

Which of the following statements is (are) TRUE? a. An overflow condition occurs when the absolute value of a computational result requires too many bits to be stored into a fixed-width data format. b. When a programming language encounters an overflow condition is prompts you with a warning. Programs often specify double precision numeric data types to provide greater accuracy and prevent overflow. c. Double precision integers are frequently called LONG integers, in many database schemas and programming languages d. Declaring the use of a mathematical sign in the storage of numbers is optional in some programming languages e. All of the previous statements are TRUE.

e. All of the previous statements are TRUE.

Which of the following statements BEST describes the hardware concept of a slot? a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals. b. An interface hardware and protocol standard for connecting high-speed components to a system board. c. Low-level software that starts and controls the boot (startup) process for PCs before loading and booting (passing control) to your operating system. d. An external connection point or interface to connect an external device. e. An internal motherboard connection to add removable circuity cards to add extra processing capabilities to a computer.

e. An internal motherboard connection to add removable circuity cards to add extra processing capabilities to a computer.

Which of the following statements BEST describes the concept of middleware software? a. Computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. b. Computer software designed to manage the computer's memory. c. Computer instructions that are executed execute by the processor d. Computer software that has been translated into executable program code. e. Computer software that provides functions or services, not normally provided by the operating system or application.

e. Computer software that provides functions or services, not normally provided by the operating system or application.

Which of the following BEST describes the concept of a "computer task"? a. A translated (compiled) computer program b. A set of computer instructions supported by a processor. c. The number of processors under the control of an operating system d. The number of processor cores waiting to be executed e. Executable programs stored in system memory waiting to be executed

e. Executable programs stored in system memory waiting to be executed

Excel attempts to guess the type of data to be stored. When you type the number 8.827 it automatically uses a. 8-bit ASCII b. 8-bit ECDBIC c. Integer codes d. Unicode e. Floating point codes

e. Floating point codes

9. Which of the following statements BEST describes the hardware concept of a socket? a. A computer component that controls the communication between the CPU, RAM, storage and other peripherals. b. An interface hardware and protocol standard for connecting high-speed components to a system board. c. Low-level software that starts and controls the boot (startup) process for PCs before loading and booting (passing control) to your operating system. d. Communication wires that connects the computer's processor to the system memory (RAM) and other components on a motherboard. e. The mechanical and electrical connection hardware used to mount the CPU to the system board

e. The mechanical and electrical connection hardware used to mount the CPU to the system board

When using integers floating point representations the mathematical results of the expression 1/3 * 3 would be 0 (zero). The reason why the answer is not (correct). a. An integer numeric code should have been used instead. b. A character code should have been used instead. c. The binary codes of data was not properly declared. d. The result of the expression 1 divided by 3 was truncated and could not represent an infinite repeating number. e. The result of the expression 1 divided by 3 could not store a fractional answer

e. The result of the expression 1 divided by 3 could not store a fractional answer

Which method(s) may be used to determine the speed of a microprocessor? a. read the microprocessor's technical documentation or Google it b. use a click counter c. read it off the processor chip d. divide the RAM speed by 2 e. both a and c

e. both a and c

Which of the following BEST describes the fractional part of scientific notation representing a positive number between 0 and 1 of a floating point format. a. radix point b. sign of the exponent c. exponent d. sign of the mantissa e. mantissa

e. mantissa

Which of the following registers stores the computer memory address of the CURRENT computer instruction to be executed? a. instruction pointer b. instruction register c. program status word d. index register e. none of the abovee. none of the above

e. none of the above

When you select the Dword option hen using the Windows Programmer Calculator, what will be the largets stored that may be stored? a. 64 Terabytes b. 32 Exabytes c. 16 Exabyte d. 4 Gigabytes

b. 32 Exabytes

What is the numeric range of an eight bit unsigned binary number? a. 0...7 b. 0...8 c. 0...255 d. 0...256

c. 0...255

What is (are) the maximum number pf physical cores of an IBM z14 processor? a. 6 b. 8 c. 10 d. 16 e. 32

c. 10

Which of the following is the 4 bit unsigned binary integer representation of the base ten value 9? a. 11111 b. 01111 c. 10001 d. 00001

c. 10001

Which of the following statements does not describe the concept of "Context Switching". a. Context switching is a process which implements multitasking. b. Context switching is a process of storing the state of an executing process or of a thread, so that it can be restored and execution resumed at the same point later. c. Context refers to the data stored in the registers and program counter at a specific moment in time. d. Context switching is a process that the application address memory space will be switched to a storage device to make available system memory for other executing space. e. Context switching permits the user gets the impression that the computer is performing multiple tasks in a parallel fashion, when the CPU actually alternates or rotates between or among the tasks at a high rate of speed.

d. Context switching is a process that the application address memory space will be switched to a storage device to make available system memory for other executing space.

All of the following statements are advantages of manual data processing systems as compared to computerized data processing systems, except a. Always accessible and not prone to outages or data corruption. b. Easier to modify processing requirements and error detection policies. c. Human common sense, experience or knowledge of proper accounting or other procedural requirement. d. Flexibility to scale by adding more employees when processing demand increases

d. Flexibility to scale by adding more employees when processing demand increases

All of the following statements are TRUE concerning the characteristics of a Grid computing architectures, except a. Grid computing architectures provide the ability, using a set of open standards and protocols, to gain access to applications and data, processing power, storage capacity and other computing resources over a network. b. Grid Computing architectures is a collection of parallel and distributed computer systems that enables the sharing, selection, and aggregation of processing (CPU grids) or storage resources (Data Grids), on-demand, across 'multiple' decentralized administrative or dissimilar systems (nodes). c. Grid Computing architectures provide on-demand resource availability, capacity, performance, cost and users' quality-of-service requirements. d. Grid Computing is a form of Cluster computing, expect a Grid centrally manages different types of tasks than a cluster.

d. Grid Computing is a form of Cluster computing, expect a Grid centrally manages different types of tasks than a cluster.

Commonly used standards for floating point representation are defined by the ____. a. AITP b. ACM c. ANSI d. IEEE

d. IEEE

Where are "registers" located? a. Inside cache memory b. In System RAM c. On the System Motherboard d. Inside the processor e. Inside storage devices.

d. Inside the processor

Which of the following is NOT true about Unicode? a. It can represent over 65,000 different characters b. It can theoretically represent every character in every language. c. It can facilitate localization of software. d. It is default code used to transmit character data between Internet applications

d. It is default code used to transmit character data between Internet applications

Since characters cannot be physically store in a memory location, the 8-bit ASCI character code will store the capital letter "A" as an integer value of 65. Which of the following BEST describes the method used to assign the integer value of 65 to capital- letter "A? a. It is was the 65th position in the collating sequence b. It was the 65th offset from the lower-case letter "a". c. It was probably assigned by a group or computer engineers who were drinking at a St. Patrick's day party d. It was a relatively an arbitrary and compromise process to address the varied requirements to store character data.

d. It was a relatively an arbitrary and compromise process to address the varied requirements to store character data.

Which of the following types of cache operates at the fastest speed? a. L2 b. L3 c. RAM d. L1

d. L1

Which of the following statement BEST describes an example or the concept of computer "scalability". a. Checks which web server machine is the least busy and then sends the request to that machine. b. Two or more network connected computers or nodes independently monitors the same process or transaction. As soon as a service on one machine breaks down the other machines try to take over. c. Combines two or more small computers or processing nodes to decrease processing costs to for large scale parallelized or separate processing requirements. d. Manually or dynamically adds or subtracts more processing nodes on demand to meet specified quality of performance policies or agreements.

d. Manually or dynamically adds or subtracts more processing nodes on demand to meet specified quality of performance policies or agreements.

Data stored in the computer's memory is stored as a combination of binary or on-and-off electronic states. Which of following statements is FALSE concerning the binary representation of data? a. A computer bit is limited to store a binary value, which are symbolically represented by a 1s and 0s, or on-and-off states. b. A computer address may store a combination of bits, bytes, or words. c. Computers combine multiple bits together to represent complex units required to store and process human information. d. Programming languages use data representation codes to store program objects. e. Program language and database data representation codes are popularly called data types.

d. Programming languages use data representation codes to store program objects.


संबंधित स्टडी सेट्स

Bonding, Lewis Structures, Geometry and Intermolecular Forces

View Set

Chapter 7: Membrane Structure and Function

View Set

chapter 11 sensation and perception vocab

View Set