Cis

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The system administrator of a company would not be responsible for installing software on individual employee's computers.

F

You can store a number between 0 and 255 in 1 bit

F

you need 49 connections to connect 7 computers using a mesh topology.

F

Today's smart phones are more powerful computers than the earliest computers from the 1950s.

T

a computer at its lowest level consist of AND, OR, NOT, XOR circuits and storage locations.

T

to connect a group of computers and resources using a bus topology you need to use "T"

T

End User Layer

application

The binary addition 00001100 + 00101010 a. 00101010 b. 00110110 c. 01010101 d. 00111101

b. 00110110

Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T How many pages of the process given in the page table are currently in memory? a. 0 b. 4 c. 6 d. there is no way to tell

b. 4

The hexadecimal equivalent for the following binary number 1111111000101100 is a. FFC2 b. FE2C c. FD2C d. 7724

b. FE2C

Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T Where would you look for page# 1? a. Frame # 6 b. Frame # 4 c. Frame # 2 d. Page 1 is not in the memory

b. Frame # 4

If two processes are deadlocked, what is your best move to free them from deadlock? a. Kill all running processes b. Kill one of the processes c. Reboot all of the resources d. Wait until the deadlock resolves itself

b. Kill one of the processes

In streaming audio and video, which of ___________ protocol is preferred as it would trade off speed for assurance of arrival a. TCP b. UDP c. SSH d. HTTP

b. UDP

Which of the following provides a faster access time? a. Hard disk b. on-chip cache c. off-chip cache d. DRAM

b. on-chip cache

TCP/IP's network interface layer is roughly equivalent to the OSI model's a. physical layer b. physical and data link layers c. data link layer d. physical, data link and network layers combined

b. physical and data link layers

What is 11110000 XOR 10101010? a. 11110000 b. 10101010 c. 01011010 d. 10100000

c. 01011010

The following binary number 010011101 when converted to octal is a. 157 b. 234 c. 235 d. 471

c. 235

Which of the following is the largest storage capacity? a. 100 Megabytes b. 3,000,000 bytes c. 4 Gigabytes d. 1,000,000 bits

c. 4 Gigabytes

A type of network attack in which attacker modifies a switch's address table so that message intended for one machine go elsewhere a. Denial of service b. IP spoofing c. ARP poisoning d. SQL injection attack

c. ARP poisoning

Swap space is located where? a. DRAM b. SRAM c. Hard disk d. CPU

c. Hard disk

Volatility is a property of which of the following? a. Hard disk storage b. Processors c. Memory d. All of the above

c. Memory

When an updated version of software appears, if it is able to access and modify data files from older versions of the software, this is known as a. maintaining accessibility b. maintaining compatibility c. maintaining backward compatibility d. maintaining forward compatibility

c. maintaining backward compatibility

A security administrator would be responsible for administering which of the following? a. A web server b. A database server c. A web site d. A firewall

d. A firewall

Which of the following could be called a peripheral device? a. CPU b. memory c. registers d. printer

d. printer

Which of the following software is the only category that does not have any licensing requirements at all to obtain or use? a. commercial software b. freeware c. open source software d. public domain software

d. public domain software

Which of the following is not a form of input device? a. bar code reader b. MIDI device c. scanner d. speaker

d. speaker

Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T If the CPU generates an address for page 3, what happens? a. the page is converted to frame 4 b. the page is converted to frame 6 c. the page is not converted d. the memory references causes a page fault

d. the memory references causes a page fault

IPOS stands for

input, processing, output, storage

If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this

promotes computer security

Page Frame Valid 0 6 T 1 -- F 2 -- F 3 -- F 4 2 T 5 9 T If the CPU generates an address for page 2, what happens?

the memory references causes a page fault

The operating system is software.

T

Which of the following denotes the proper order of 2 bits from smallest to largest?

00, 01, 10, 11

Convert the decimal value -160 into an 8-bit binary number.

01100000

What is 11110000 AND 10101010?

10100000

Convert the decimal value 150 into an 8-bit binary number.

128 + 16 + 4 + 2 = 10010110

The unsigned binary number 11000011 is equal to which decimal number?

195

Page Frame Valid 0 6 T 1 -- F 2 -- F 3 -- F 4 2 T 5 9 T How many pages of the process given in the page table are currently in memory?

3

The Octal Equivalent of 111110010110 is

7626

Pascal's mechanical calculator is considered the first programmable device to change its behavior

F

SRAM and DRAM are the same thing.

F

What is the difference between a conditional loop and a counting loop?

A conditional loop iterates while a condition is true, for instance, while(x>y), whereas a counting loop counts the number of iterations from some starting point to some ending point like 1 to 10 or 100 down to 1.

A topology, each device is connected to a common cable using "T" Connector

Bus

Rank these sizes from smallest to largest: Megabyte, Terabyte, Byte, Kilobyte, Gigabyte.

Byte, Kilobyte, Megabyte, Gigabyte, Terabyte

The decimal number 128 would be stored using 8-bit unsigned binary as a. 11111111 b. 01111111 c. 10000000 d. None of the above, there are not enough bits to store 128

C. 10000000

What is CSMA/CD? How does it work?

CSMA/CD is carrier sense multiple access with collision detection. First, the device listens to the network to see if it can sense a message. Then it attempts to place its message on the network. If this causes a collision, the device immediately cancels the message, indicates a "jam", and waits a random amount of time before trying again

An example of a programming language translator program is

Compiler

The binary number 110110110101 when converted to hexadecimal is

DB5

During the instruction fetch portion of the fetch-execute cycle, the program instruction is passed from memory to the CPU over the ______ bus.

Data

Physical Addressing

Data Link

Which of these IT roles would most need knowledge of such software as MySQL and Oracle?

Database administrator

Computer components operate on _______ signals.

Digital

The Hexadecimal equivalent of 1111100100111010 is

E93A

That idea that a resource should only be accessed by one process at a time and that no other process should access that resource until the previous process is completely finished with it is known as mutual________.

Exclusion

(T/ F) the kernel is a part of the operating system that can be tailored for a particular user.

F

(T/ F) the shell is the portion of the operating system that always resides in memory

F

A Beta release of a software usually released quickly as the result of a discovered problem, may not warrant a minor release.

F

A WAN is a collection of LANs and other forms of connectivity to provide a network within one metropolitan area such as connecting devices within the same city

F

A virtual machine is hardware.

F

All programs written in high level languages require compilation before the programs can be executed.

F

MAC address consists of 32 bits

F

Main memory is used during the "S" portion of the IPOS cycle.

F

Moore's law is a physical law that establishes how we can further miniaturize the circuits on a chip.

F

Organizations typically only have one system administrator who will be responsible for all aspects of administering the computer systems.

F

First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Which records are returned if we use the restriction Age > 40?

George Duke, Frank Zappa

Swap space is located where?

Hard disk

Storage devices are part of which component of the computer?

I/o subsystem

A topology that connects all devices to each other

Mesh

First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 This relation does not have an ID number to use as a unique identifier. Why could we not use Last Name as the unique identifier?

Multiple records share the same value

Which of these IT roles would be in charge of securing a computer network?

Network administrator

Which of these IT roles would most need knowledge of VoIP and trunking protocols?

Network administrator

The layer responsible about routing

Networking

Cables, media, hardware and topology

Physical

A layer converts data into a format that allows it to be transmitted across the network

Presentation

A topology that each device connects to two neighbor devices in a form of loop

Ring

The system administrator is responsible for each of the following tasks except

Securing a web site

Data synchronization and session establishment

Session

A topology has a central connection such as switch

Star

Which of these IT roles would most need knowledge how to install computer hardware

System administrator

(T/ F) users can access the operating system via the graphical user interface or the command line interface.

T

1 Megabyte is bigger than 30 Kilobyte

T

A Domain Name System (DNS) server responds to IP alias requests to map IP addresses.

T

A JPEG file will be smaller than a bitmap of the same image because the JPEG throws out some of the data to compress the file into a smaller file size

T

A single high-level language instruction might require many assembly or machine language instructions to accomplish the same task.

T

Computer users of the 1940s and 1950s were often the engineers and programmers who built and programmed the computers.

T

Conditions will always evaluate to either true or false.

T

During the Fetch-Execute cycle memory returns instruction over the data bus to be stored in IR

T

If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.

T

It is the user who initiates when and what a computer should do.

T

Most of the first-generation computers were one-of-a-kind laboratory experimental machines.

T

PING is a network protocol that is used to determine if remote machine is accessible.

T

Pins on the CPU connect the internal CPU bus to the external system bus.

T

T/ F) if a printer is out of paper an interrupt is issued to interrupt the CPU's fetch-execute cycle

T

First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Which records are returned if we use the restriction State="CA"?

Thana Harris, Ian Underwood, Ruth Underwood, Frank Zappa

What is the difference between a router and a gateway?

They both serve as devices that route messages from one network to another but the gateway is used when the networks it connects are of different types

A layer provides a mechanism of carrying data across the network

Transport

Transistors replaced which of the following pieces of hardware?

Vacuum tubs

First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Should we make age the unique identifier? Provide a very brief explanation.

We might add records that have ages that are already in the table

Which of these IT roles would most need knowledge of using scripting languages like ASP, Perl and PHP?

Web developer

In what ways are high level programming languages easier to use than machine language and assembly language?

You are able to use instructions that convey more than primitive actions like if statements, for loops and lengthy assignment statements. You are also able to express your ideas in a more English and mathematical way.


Set pelajaran terkait

NCLEX Questions ~ End of Life Care

View Set

Modules 8-10: Communicating Between Networks

View Set

accounting software applications

View Set