Exam Review
A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.
Component
The ____ section of the CPU performs all computation and comparison operations.
ALU
A(n) ____ instruction generates the result true if both of its data inputs are true.
AND
A wireless ________ connects a wireless network to a wired network.
Access point
Storage device speed is called ____.
Access time
Windows Server has a directory service & security system built into the software call Microsoft ________.
Active Directory
The process of determining the physical memory address that corresponds to a memory reference is called ____.
Address mapping
This is the highest numbered storage byte that can be represented in a computer or Central Processing Unit.
Addressable memory
A(n) ____ is a program in which different sets of instructions are applied to different data input values.
Algorithm
With this type of number each digit can have only one of two possible values: 0 or 1.
Binary
In a modern digital computer, data is represented by groups of ____.
Bits
A ____ is a circuit board that contains most of a server.
Blade
____ is a generic term for describing secondary storage data transfer units.
Block
Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.
Boolean
This is a longer-term power sag that is usually initialized by the power provider and occurs when the demand for electricity exceeds the provider's generation and transmission capabilities during peak demand periods, such as hot summer days.
Brownout
During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.
Fetch
A sequence of records on secondary storage is called a ____.
File
____ type does many things including determining physical organization, allowable operations, and naming restrictions.
File
The relationship between file types and the programs or OS utilities that manipulate them is called ____.
File association
The ____ layer is the bridge between logical and physical views of secondary storage.
File control
The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.
File management system
Software stored in NVM is called ____.
Firmware
Binary CPU instructions, called ______, are the earliest programming languages.
First-generation languages
Real numbers are represented in computers by using ____.
Floating-point notation
With ______ parity, the sender sets the parity bit to 0 if the count of 1-valued data bits in the character is odd.
Odd
Subsequent groups of bits after the first group in an instruction hold its input values, called ____.
Operands
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.
Operating expenditures
____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.
Overflow
The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.
Packet-filtering
________ transmission uses a separate transmission line for each bit position.
Parallel
In ____ architecture, the roles of client and server are combined into a single application or group of related applications.
Peer-to-peer
System administrators can use the ____ utility to monitor hardware and software resource use in real time.
Performance Monitor
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.
Performance requirements
_______ is a specific time point in a wave's cycle.
Phase
Optical computation harnesses the energy of moving ____ to perform computational work.
Photons
A ____ is the unit of storage transferred between the device controller and memory in a single operation.
Physical record
A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.
Pipe
In a CD, concave dents in the reflective layer that are used to represent bit values are called "____."
Pits
____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.
Platform as a service
A(n) ____ is a data element containing the address of another data element.
Pointer
This normally occurs when a device that requires a large amount of power is started.
Power spikes
In ____, a thread can be removed involuntarily from the running state.
Preemptive sheduling
The ______ layer ensures that data transmitted by one network node is interpreted correctly by the other network node.
Presentation
Storage devices that hold currently executing programs are called ____
Primary storage
The data types a CPU supports are sometimes called ____ data types.
Primitive
A ____ describes the resource or service utilization of an application program during execution.
Program profiler
The register that holds bit values (flags) that describe comparison operation results, control conditional BRANCH execution, or indicate actual or potential error conditions ____.
Program status word
Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
Protocol stack
A(n) ____ is a server that handles service requests from external users of applications.
Proxy server
In current computer hardware, main memory is implemented with silicon-based semiconductor devices commonly called ____.
RAM
The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can randomly access bytes, words, or larger data units.
RAM
____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.
Software as a service
A program normally embedded in operating system service routines that senses and reports processing requests and/or activities.
Software monitor
A ____ is a storage device that mimics the behavior of a magnetic disk drive but uses flash RAM or other NVM devices as the storage medium and read/write mechanism.
Solid-state drive
____ is the most important characteristic differentiating primary and secondary storage.
Speed
A sequence of records stored in main memory is normally called a ____.
Table
Numbers such as 1/3 are stored in floating-point format by ____.
Truncation
The most common wired transmission media for LANs is ____ cable.
Twisted-pair cable
In ____ notation, nonnegative integer values are represented as ordinary binary values.
Twos complement
A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.
DNS
The ______ layer is the interface between network software and hardware.
Data Link
A _______ defines the name and data type of program variables.
Data declaration
A ________ is any instruction, such as assignment statement or a computation that updates or computes a data value.
Data operation
____ breaks a unit of data into smaller segments and stores these segments on multiple disks.
Data striping
A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.
Data structure
____ design activities are narrower in scope and constrained by the information architecture compared to the remaining design activities.
Detailed
A ____ is a CPU cycle spent waiting for access to an instruction or data.
Wait state
A ____ is a unit of data containing a fixed number of bytes or bits and can be loosely defined as the amount of data a CPU processes at one time.
Word
This is usually sent via an electronic-mail attachment and is stored in a stand alone executable software program, and is executed/runs instantly when the attachment is opened.
Worm
Hexadecimal numbering uses ____ as its base or radix.
16
In a ____, folders can contain other folders, but a folder can't be contained in more than one parent.
Hierarchical folder structure
The leftmost digit in a bit string is called the ____.
Most significant digit
This term _______ describes transmission situations involving multiple senders and receivers.
Multicasting
____ describes any CPU architecture in which duplicate CPUs or processor stages can execute in parallel.
Multiprocessing
Because the Simple Mail Transfer Protocol (SMTP) could not handle nontext files in email messages this protocol extended its features to allow for this.
Multipurpose Internet Mail Extensions
The term ______ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
Network topology
The term ____ describes any architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers.
Network-attached storage
In a communication channel, _______ refers to unwanted signal components added to the data signal that might be interpreted incorrectly as data.
Noise
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.
Application demand model
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
Application software
The first set of design activities, called ____ design, selects and describes the exact configuration of all hardware, network, system software, and application development tools to support system development and operations.
Architectural
A(n) ____ is an ordered list in which each element can be referenced by an index to its position.
Array
In accounting this term defines the act of going through accounts to decide whether GAAP were applied correctly in preparing financial documents. In computer security, this same term usually refers only to creating and managing records of resource access and/or user activity.
Auditing
____ is the process of determining or verifying the identity of a user or process owner.
Authentication
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.
Authorization
A ____ instruction causes the processor to depart from sequential instruction order.
BRANCH
This is a measurement of the performance of a computer system while executing processing task(s)?
Benchmark
Expenses/costs that are used in funding an organization can be categorized into two groups:
Capital expenditures and operating expenditures
Examples of these types of assets would be a copiers, data storage centers, mainframe computers and many computer equipment categories that are not expensed in the year you buy them, but expensed over a period of years.
Capital resources
This is a group of identical/like computers that are connected by high-speed networks working together to run a single application and/or provide services.
Cluster
Programs instructions are sometimes called _____.
Code
If multiple nodes attempt to transmit across the same medium at the same time, their messages mix, producing noise or interference that's called a ____.
Collision
The written format of 128-bit IP addresses is called ______ notation.
Colon hexadecimal
A ______ message contains instructions that control some aspect of the communication process.
Command
Through this layer a user/system administrator can manage system resources (such as files, folders, and Input/Output devices) and run Operating System and application utility software programs.
Command
This is the name given to a set of syntax & command requirements.
Command language
A simple definition of a computer is a device that can accept numeric inputs, perform computational functions, and ____.
Communicate results
The term "____" describes the number of bits used to represent a numeric value.
Compactness
This term defines the way a company uses resources to give it a benefit over other companies doing business in the same area they do business in.
Competitive advantage
Substances that electrons can flow through are called ____.
Conductors
When memory allocation is this it means all parts/portions of the Operating System and program are loaded sequentially into memory addresses.
Contiguous
________ is noise added to the signal in the wire from EMI generated by adjacent wires.
Crosstalk
In most CPUs, the ____ is the time required to fetch and execute the simplest instruction in the instruction set.
Cycle time
______ is the most widely used error-detection method.
Cyclic redundancy checking
A ____ consists of all tracks at an equivalent distance from the edge or spindle on all platter surfaces.
Cylinder
Data is represented in the CPU as ____.
Digital electrical signals
The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.
Directory services
A number of measures for this type of planning include the following: -Periodic data backup and storage of backups at alternate sites -Backup and storage of critical software at alternate sites -Duplicate or supplementary equipment installed at alternate sites -Arrangements for leasing existing equipment at alternate sites, such as another company or a service bureau
Disaster Recovery
In the Unified Process (UP), an information system is built in a series of 4-to-6-week related steps called iterations. Each iteration includes whatever activities are needed to produce testable models or working software and related activities are grouped into UP ____.
Disciplines
A ____ reorganizes disk content so that a file's contents are stored in sequential sectors, tracks, and platters.
Disk defragmentation utility
____ is a fault-tolerance technique in which all disk write operations are made simultaneously or concurrently to two storage devices.
Disk mirroring
____ linking is performed during program loading or execution.
Dynamic
"____" is the concept that the per-unit cost of producing goods or providing services decreases as the organization size increases.
Economics of scale
The term _______ describes the maximum number of bits or bytes per second that the channel actually achieves with a specific communication protocol.
Effective data transfer rate
____ is the flow of electrons from one place or device to another.
Electrical current
____ notation always uses a fixed number of bits, with the leftmost bit representing the sign.
Excess
A(n)____ instruction generates the value true if either (but not both) data input is true.
Exclusive OR
____ occurs when memory partitions allocated to a single process or purpose are scattered throughout physical memory.
Fragmentation
A disk with many program and data files scattered on it is said to be ____.
Fragmented
_______ is the number of cycles occurring in one second and is measured in hertz (Hz).
Frequency
_______ represents bit values by varying carrier wave frequency while holding amplitude constant.
Frequency modulation
In ______ mode, the receiver can communicate with the sender at any time over the second transmission line, even while data is still being transmitted on the first line.
Full-duplex
____ hold frequently used data items such as loop counters and array indexes.
General-purpose registers
____ are typically implemented by installing software on each machine that accepts tasks from a central server and performs them when not busy doing other work.
Grids
______ routes signals between two locations through a physical connection, such as copper wire or optical fiber.
Guided transmission
A(n) ____ instruction suspends the normal flow of instruction execution in the current program.
HALT
A(n) ____ archives only files that have been modified since the previous incremental or full backup.
Incremental backup
The address of an array element can be calculated with the starting address of the array and the element's ____.
Index
A(n) ____ directs the CPU to route electrical signals representing data inputs through predefined processing circuits that implement the appropriate function.
Instruction
A(n) ____ is the lowest-level command that software can direct a processor to perform.
Instruction
The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ________.
Instruction explosion
Several transistors and their interconnections on a single chip form a(n) ____.
Integrated circuit
A(n) ____ is a collection of automated support tools to speed development and testing.
Integrated development environment
Memory devices comprised of semiconductors and other forms of RAM with long-term or permanent data retention are generically known as ____.
Nonvolatile memory
The ____ is the Operating System piece that handles resources and works directly with the computer's hardware.
Kernel
In _________, the VoIP user perceives periods of silence before the other participant's speech is heard.
Latency
The rightmost digit in a bit string is the ____.
Least significant digit
A(n) ______ searches an object code file for external function calls.
Link editor
This data structure is defined as a set of related data values.
List
A ____ operation is a data transfer from main memory into a register.
Load
The ____ can extract a single bit from a bit string.
Logic SHIFT
_______ topology is the path messages traverse as they travel between end and central nodes.
Logical
This is the name for a group of fields and/or data items that an application software program accesses as one single unit.
Logical record
A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.
MOVE
A(n) ____ is a ribbon of plastic with a coercible (usually metallic oxide) coating.
Magnetic tape
This is not a formal Unified Process (UP) discipline but, systems evaluation and ____ is a key group of activities that make-up a lot of the long-range system cost.
Maintenance
____ are programs or hardware devices that detect and report processing or I/O activity.
Monitors
A ____ device isn't restricted to any specific order when accessing data.
Random access
This term _____ describes the maximum number of bits or bytes per second that the channel can carry.
Raw data transfer rate
Threads in the ____ are idle, pending availability of a CPU.
Ready state
The CPU contains a few internal storage locations called ____, each capable of holding a single instruction or data item.
Registers
This is a formal document sent to sellers/vendors that lists system infrastructure requirements and asks for proposals to meet the stated requirements. Vendors/sellers could submit multiples of these documents per different ways to meet these requirements.
Request for proposal
Activities in the these 2 Unified Process (UP) disciplines, the business modeling discipline and the ____ discipline, are mainly concerned with building: 1. Models of the organization that will own and operate the system 2. Models of the system's environment 3. Models of system and user requirements.
Requirements
This makes up the most part of a Request For Proposal?
Requirements statement
A ____ intelligently forwards messages between two or more networks.
Router
A(n) ________ enables programmers to develop applications that do most of their work by calling other applications and system software.
Scripting language
Storage devices that hold data not needed by currently running programs are called ____
Secondary storage
____ is an enhanced version of the protocol Telnet that encrypts data flowing among client-server/server-client to deal with a key security problem in Telnet.
Secure Shell
Modern computers use memory implemented with ____.
Semiconductors
A ____ storage device stores and retrieves data items in a linear, or sequential, order.
Serial access
The ____ of the Operating System contains 1000s of reusable pieces/components that supply a wide variety of functions r from file/folder manipulation to accessing Input/Output devices, starting/stopping programs, and creating/moving/resizing GUI windows.
Service layer
____ scheduling chooses the next thread to be dispatched based on the expected amount of CPU time needed to complete the process.
Shortest time remaining
Antivirus software uses data files, sometimes called "____," containing information about known viruses.
Signature files
In ____ mode, messages flow in only one direction
Simplex
______ programming languages guarantee program portability between other OSs and application programs.
Standard
A ____ topology directly connects every node to a shared hub, switch, or router.
Star
This is a firewall that traces the movement of complex client-server communications.
Stateful firewall
In order to create this, a user/system administrator must know the server & resource names before contacting/accessing the remote server.
Static connection
The ____ is the part of the kernel that accesses storage locations and manages data movement between storage devices and memory.
Storage I/O control layer
This is the name given to a data structure which records what allocation units belong to files and what allocation units are free.
Storage allocation table
The ____ is the device or substance that actually holds data.
Storage medium
A secondary storage region, called the ____, is reserved for the task of storing pages not held in memory.
Swap space
In general this term describes the overall process of: -Acquiring new IS resources -Maintaining existing IS resources -Developing and implementing an IS security policy
System Administration
The main responsibility of ____ is to ensure efficient and reliable delivery of information services.
System administration
____ models provide the detail needed to develop a system that meets users' needs.
System requirements
A progression of steps Information System professionals follow when creating an information system is called a ____.
Systems development life cycle
_______ is the glue that binds private networks together to form the Internet and the World Wide Web.
TCP/IP
The accuracy, or precision, of data format representation increases with ____.
The number of data bits used
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.
Underflow
Web resources are identified by a unique ____.
Uniform Resource Locator
This is a device that you attach physical computer equipment to (such as switches, routers etc) that delivers power to this equipment in the event of external power failure and these devices vary in their power delivery capacity, switching time, and battery life. Surge protection is normally a function of these too.
Uninterruptible power supply
Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.
Unsigned integer
____ is a connectionless protocol that provides less reliable transport services.
User Datagram Protocol
In a 3-layer architecture, this layer accepts user input and then formats & displays processing results.
View
As allocated by the OS, the resources that are apparent to a program or user are called ____.
Virtual resources
In computers, this is a program or program fragment that infects a computer by: -installing itself permanently, usually in a hard-to-find location -performs malicious acts on the infected computer -replicates and spreads itself by using services on the infected computer
Virus
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.
Viruses
_______ is a family of technologies and standards for carrying voice messages and data over a single packet-switched network.
Voice over IP
A storage device or medium is ____ if it can't hold data reliably for long periods.
Volatile
Modern Solid State Drives use a technique called "____" to spread write operations around the storage medium, thus evening out the impact of destructive writes and extending the storage device's useful life.
Wear leveling