Intro to IT WGU Module 12 - 15
Which of the following is a program that will allow a computer to easily access the hardware and software of the computer system? Operating system Workstation Server Mobile device
Operating system
Information is stored here until it needs to be retrieved for a specific application
Data Tier
Harold inputs the new customer list for January. Which step of the N-tier development would this be? Data tier Logic tier Presentation tier
Data tier - Harold is putting in new information that will be stored in the tier
What are the tiers used in N-tier development
Data, Logic, Presentation
Protects the creation of inventive concepts as well as the tangible work product
Patent
The _____ will prevent others from making, selling, or using the invention for 20 years from the application filing date.
Patent
What will prevent others from making, selling, or using an invention for 20 years? Fair Use Patent Copyright GNUs Public License
Patent
What will protect the original work and the creation of inventive concepts? Copyright Fair Use Patent GNUs Public License
Patent
Both compiled and interpreted languages are written in binary code. True False
False - Compiled and interpreted languages are written in high-level language and translated to machine code for execution.
Machine language is more concise than high-level languages. True False
False - High-level languages are more concise because they only require one step to execute a task.
All operating systems have graphical representations that can be clicked for an easier user experience. True False
False - Some operating systems are entirely text-based
A advantage of an interpreted language is that when the program is executed it will run faster than a compiled language. True False
False - While compiled languages can be executed faster, some interpreted languages, once translated and executed, now have the option to be compiled.
Which of the following is a scripting language? Java BASIC Javascript C++
Javascript
The core components of the operating system that handle process management, resource management, and memory management
Kernel
Which layer of the operating system will handle process management, resource management, and memory management? Kernel Services Shell Utility programs
Kernel
Which operating system layer is the interface between hardware and software? Kernel Device Drivers Shell
Kernel
What is a disadvantage of a compiled program compared to an interpreted language? Lack of portability Must convert programming language to machine code Extra translation time Requires additional translation time
Lack of portability
What two inventions have allowed programmers to avoid writing programs in machine language? Binary numbers and computers Language Translators and high-level programming languages High-level programming languages and binary numbers Computers and language translators
Language Translators and high-level programming languages
A patent must show that an idea is original. not useful. obvious to someone of ordinary skill in the field.
original.
What do you use to change to the user account? Switch user (su) with the username Switch user (su) without the username
Switch user (su) with the username
Which software consists of daemons? Application System Server
System
Which software consists of programs that make up the operating system and directly supports the computer system? Application System Server
System
Which software is run automatically rather than by the end user? System Microsoft PowerPoint Server Application
System
A program written in a high-level language must be converted into _____ to be executed by the computer
machine code
Example of Machine Language:
1111 0000000000001
Which two of these non-decimal numbers are examples of hexadecimal numbers? 13 and 64A 8G and 3KF 64A and 8G 3KF and 13
13 and 64A
How many bits does a single hexadecimal digit represent? 4 2 8 16
4
How many bits are in a byte? 16 24 8 5
8
Which of the following statements is true of intranet? Applications that are stored on an individual's local computer must be transferred to the intranet. A company's internal website would be an example of a intranet. Intranet is the same thing as internet.
A company's internal website would be an example of a intranet.
Which of the following is a disadvantage of a compiled language? A compiled language translates the entire program. A compiled language is not portable. A compiled language creates a portable program.
A compiled language is not portable.
Which of the following is the correct function of a compiler? A compiler is a program that takes one program, written in a high-level language, as input, and creates a machine language program as output. A compiler takes the most recently entered instruction, translates it into machine language, and executes it. A compiler translates the entire program, creating an executable program, which can be run at a later time.
A compiler translates the entire program, creating an executable program, which can be run at a later time.
In the MVC model, the VIEW is where:
A form is used to capture the user input data
Which two are both types of scripting languages? C++ and Pascal Python and C++ Pascal and ASP ASP and Python
ASP and Python
Adding/deleting user accounts is the role of which account? Employee User Guest Administrator
Administrator
Which account is also referred to as root or superuser? Guest User Administrator Employee
Administrator
Which account typically has greater authority to write to or execute programs? Administrator User
Administrator
When must a software license agreement be accepted when using proprietary software? After using the software Before purchasing the software A software license agreement is not necessary After downloading (or obtaining via another medium) but before using the software
After downloading (or obtaining via another medium) but before using the software
Sally's day starts when she logs on to her computer at work. She reviews her upcoming schedule, shared by everyone on her team across the globe. She then checks her company's email account to get status updates on the project she is working on. After reviewing this, she loads the IDE and begins editing the software for her current project. Which type of systems will Sally need to use for these activities? Local applications Intranet Cloud computing All
All
Which of the following statements pertain to an algorithm? For security reasons, programmers create algorithms that are as complicated as possible. An algorithm is a description of the various steps in a computer process. For each computer process there is only one correct way to write the algorithm.
An algorithm is a description of the various steps in a computer process.
What is an algorithm
An algorithm is a formula that solves problems and/or outlines how to execute a task
Which of the following describes a computer program? A set of processes An elaborate algorithm A translator A set of JavaScript code
An elaborate algorithm
Issues commands through the GUI and command line prompt
An operating system
Which of the following operating systems is for mobile devices? Linux Windows Server Windows 7/8 Android
Android
Which software is run by the end user? Application System
Application
Which type of software includes programs such as Microsoft Word and PowerPoint? Daemons Application System Server
Application
Today's operating systems _____
Are easier to use
Select the item from the list below that was NOT a historical factor in the development of operating systems. Computers became more reliable and thus able to run longer programs that required more computer resources. As program execution speed improved, lowering the transition time between programs became more important to developers. As computers became more widely available, users wanted more detailed control over how the computer ran programs. The increased availability of computers and decreased cost lead to more computer users without an extensive programming background.
As computers became more widely available, users wanted more detailed control over how the computer ran programs.
Which two are both types of high-level programming languages but not considered scripting languages? JavaScript and Tcl Ada and JavaScript Tcl and BASIC BASIC and Ada
BASIC and Ada
Hexadecimal numbers are on which base system? Base 10 Base 2 Base 16 Base 8
Base 16
What kind of numbering system is binary? Base 8 Base 10 Base 16 Base 2
Base 2
Is the foundation for machine language
Binary
What is an example of a non-computer scenario that represents an algorithm? Select three that apply. Being asleep Building a swing-set Solving a math problem Making a sandwich
Building a swing-set Solving a math problem Making a sandwich
Can be defined as a high-level programming language with a vocabulary and set of rules for instructing a computer to perform certain tasks.
C++
In the MVC model, the MODEL is where:
Changes and updates are made to the data based on new data
Chris has received a technical support call from a university client. The client has recently bought a specialized software suite to be used for data analysis from the company he works for. He has scheduled an appointment with the university to connect remotely to one of their workstations that is having difficulty and check the installation. When Chris connects and begins his work, he realizes that he is unable to uninstall the suite and attempt a new installation. What is most likely cause for Chris's issue? Chris is logged in under a user account that does not have permission to modify the software suite program files. The university firewall is blocking Chris' remote connection software. The university has not opened a port for the software in the network and thus the software suite cannot connect properly to the server. The university workstation has a virus that is preventing Chris from accessing the files he needs.
Chris is logged in under a user account that does not have permission to modify the software suite program files.
Which describes an ideal algorithm? Infinite Complex Clear Ambiguous
Clear
Ajax company has just developed a new app for iOS, they don't know how many users will download it and don't want to get caught without adequate computer capacity. How should they roll out their new app? Local applications Intranet Cloud computing All
Cloud computing
Which of the following statements is true of cloud computing? Cloud computing is a way to store data, but doesn't have the capability of computation. Cloud computing allows for the offloading of computation and storage from your local computer. Cloud computing is the same thing as intranet. You are more limited in where you can access applications stored in the cloud as compared to those stored on your local computer.
Cloud computing allows for the offloading of computation and storage from your local computer.
Which of the following languages can create an executable program? Compiled language Interpreted language Assembly language Scripting language
Compiled language
Which of the following are types of language translators? Compiler and interpreter Compiler and binary numbers Interpreter and digital circuits Binary numbers and digital circuits
Compiler and interpreter
Protects an original work (in its tangible, expressed form), but not the ideas behind the work
Copyright
The _____ has the exclusive right to make copies, prepare derivative works, and distribute copies of the work for the duration of the author's life plus 70 years.
Copyright
Dante manages the inventory and ordering systems for a large auto parts manufacturing plant. He must make sure that part orders are in the company system and are updated if a client changes their order. Additionally, in order to plan production to meet the needs of upcoming or potential future orders, Dante must analyze patterns in ordering and recommend production rates to the plant manager. FTP Server E-mail Server File Server Web Server Database Server
Database Server - The database server is needed if Dante is responding to user queries to manipulate the database and performing tasks such as data analysis.
Uses base 10
Decimal
Which number system is read and used by humans every day? Decimal Hexadecimal Binary Octal
Decimal
Provide specific interfaces between the OS running a computer and hardware
Device Drivers
Which operating system layer is the interface between the OS and hardware? Kernel Device Drivers Shell
Device Drivers
In the MVC model, the CONTROLLER:
Facilitates communication between the model and the view
Many of today's operating systems require the user to have specialized training concerning specific commands needed to instruct the operating system to perform different functions. True False
False
Photomagnet is a software company that has released many versions of popular image editing software over the past ten years. Now in their sixth version of editing software, Photomagnet has decided that they will no longer support their very first basic image editing software program, because there are now several programs like it on the market and it is too basic to compete with their newer software versions. So, they have made it free to download for anyone wishing to use it for personal image editing
Freeware
Dragging, pointing, clicking, and double clicking with the mouse are examples of:
Graphical user interface
Is created by converting 4-bit binary numbers
Hexadecimal
Why do high-level programming languages need to be translated? In order for the computer to understand the code. In order for the load times to be reduced for a user. In order for the programmer to understand the code. In order for the program to take up less space.
In order for the computer to understand the code.
Which of the following is NOT a factor in the need for development of operating systems? Development of language translators Increased number of users Improved speed of hardware Increased use of vacuum tubes in computers
Increased use of vacuum tubes in computers
What is another term that defines a script? Machine code Pascal Interpreted program Compiler
Interpreted program
Your organization needs to maintain its own internal e-mail system. Which approach would typically be used? Local applications Intranet Cloud computing All
Intranet
Why is it best to keep the data independent from the application? Select two that apply. It shields users from the complexities of the data. The data is not independent from the application. So the data can not be seen or changed. It removes the need for a user to interact directly with the data.
It shields users from the complexities of the data. It removes the need for a user to interact directly with the data.
Which of the following is the correct function of the interpreter? It takes the most recently entered instruction, translates it into machine language, and executes it. It translates the entire program, creating an executable program, which can be run at a later time. It allows programmers to more easily write programs. It takes one program, written in a high-level language, as input, and creates a machine language program as output.
It takes the most recently entered instruction, translates it into machine language, and executes it.
The End User License Agreement for proprietary software Is free Leaves room for negotiation Limits modifying the software Is a public license
Limits modifying the software
Which operating system uses the point-and-click GUI? Linux Tablets Smart phones
Linux
Example of Assembly Language:
Load #1
The level where data processing occurs
Logic Tier
Nancy needs to determine the annual rate of increase in sales over last year. Which step of the N-tier development would this be? Data tier Logic tier Presentation tier
Logic Tier - The logic tier performs logical tasks that would determine the rate of increase
Has a standard set of menus always listed along the top of the desktop. Each application software adds to the menu selections.
Mac OS
Which of the following statements applies to an open source software license? Made freely available as a source code to enhance and distribute the software. Purchased from a vendor and gives you the right to use the software but is not yours to own. Must be purchased after the trial version. Free from purchase but you are bound to some agreements when you install it.
Made freely available as a source code to enhance and distribute the software.
Jackie has recently received a technical support call from a team of graphic artists that works with her at a website design firm. The graphic art team has a variety of design and modeling software to help develop websites and often install a variety of plugins on workstation computers to test their design prototypes. Although Jackie knows that company policy is for the technical support staff to approve and install plugins, she knows that many members of the graphic arts team have circumvented the policy and installed their own plugins. Today she is working to repair the installation of a web browser that is intermittently crashing the workstation system. She suspects that the workstation user has installed an unapproved plug-in. What would be the best way for Jackie to avoid this type of problem in the future? Remind the graphics team of the company technical policy that requires plug-ins to be approved by the technical support staff. Install a more comprehensive suite of web plug-ins on the workstations for the graphics team so that they will not need to install their own. Assign a member of the technical support staff to work directly with the graphics team and train them in avoiding potentially malicious plug-ins. Make sure that the graphics team are all using user accounts and that they do not have access to the administrator account or password.
Make sure that the graphics team are all using user accounts and that they do not have access to the administrator account or password.
Which of the following is a role of an administrator account? It can view programs but not write to or execute them. Allow the casual user to log in as the administrator. Manipulate system files. It can add but not delete user accounts.
Manipulate system files.
Android, Chrome, and IOS are operating systems for:
Mobile Devices
Android, Windows, and iOS are operating systems for: Mobile devices Workstations Servers
Mobile devices
What does MVC stand for? Model-View-Controller Model-Variable-Controller Model-View-Component Model-View-Computer
Model-View-Controller
All Microsoft operating systems used GUI interfaces. Yes No
No - DOS the original Microsoft operating system used a command line interface.
A new feature added to Windows Vista allowed users to download files more quickly. Yes No
No - Download speeds are dependent on other features such as network capacity and not the operating system.
Windows software was developed to work on any computer type. Yes No
No - Windows is designed to work on traditional computers not servers or mobile devices.
Is used to make machine language easier to read and uses base 8
Octal
In which of the following pairs of numbering systems would machine code be the most human readable? decimal and hexidecimal decimal and binary binary and hexidecimal octal and binary octal and hexidecimal
Octal and Hexidecimal - Both the octal and hexadecimal numbering systems reduce the number of binary digits in machine language code making it easier to view.
Cooper is working on recording audio tracks for his band and wishes that the audio editing software he downloaded had the ability to filter some of the lower frequencies. So, he goes into the program source code and makes some adjustments to the filtering algorithm. Cooper is so pleased with the results that he posts his algorithm on a forum for the software so that other users can implement his algorithm if they are looking for the same functionality.
Open Source
Linux is free and the contents of the OS (the source code) are readily available to developers, who may enhance or alter it to produce their own software. Linux is:
Open Source
Which software requires the user to abide by the copyright? Public domain Open source
Open Source - Open source software is free as a source code but users have to abide by the copyright provided with the software.
Which software can you obtain for free, and can also be enhanced and distributed? Proprietary Shareware Freeware Open source
Open source
Translates the final results into a user-friendly format
Presentation Tier
Natasha prints out the quarterly report of sales figures. Which step of the N-tier development would this be? Data tier Logic tier Presentation tier
Presentation tier - The presentation tier is where the user interacts with the computer and the icons needed to print a document
Vaughn is writing code to create a large multiplayer online game where users can download game code to their home computer and then connect to game servers over an internet connection. Vaughn is designing the game so that players can modify their avatars, explore multiple game environments, communicate with other players, and battle computer generated monsters. Scripting Language Programming Language
Programming Language - Given the complexity of the game Vaughn is writing, it is most likely that Vaughn is using a programming language to achieve complex tasks through a predefined programming vocabulary and set of rules.
Define Application
Programs users run to accomplish a task
3D model wiz is a new computer modeling software that is available for purchase online and through major software retailers. Marty buys a group license for 10 users for his graphics team.
Proprietary
Microsoft Windows has been developed as a commercial platform; new versions are released in order to compel users to spend money to upgrade. Windows is:
Proprietary
Which software can be purchased from a vendor (from a company or a consultant) and gives you the right to use the software but is not yours to own? Proprietary Shareware Freeware Open source
Proprietary - Proprietary software is purchased and gives you the right to use the software.
Which server will cache web pages and block certain content? File Proxy Database E-mail
Proxy
Antonio runs the computer lab for River County High School. Many of the teachers at the high school send students to the computer lab to work on research projects or homework assignments. Antonio is looking for a way to speed up access to websites that students commonly access, such as Wikipedia while also blocking certain websites that students shouldn't be on while they are working, like social networking sites. Proxy Server E-mail Server File Server Web Server Database Server
Proxy Server - A proxy server would allow students to access some websites quicker by accessing a local rather than a remote copy. Additionally, using a proxy server, Antonio could block specific websites from the lab.
Which of the following statements applies to a proprietary software license? Free from purchase but you are bound to some agreements when you install it. Purchased from a vendor and gives you the right to use the software but is not yours to own. Free to use for a limited amount of time or with a restriction on features. Made freely available as a source code to enhance and distribute the software.
Purchased from a vendor and gives you the right to use the software but is not yours to own.
The End User License Agreements is a contract between the Licensor and the
Purchaser
Which other model is the MVC model similar to? Interface model n-tier development model Input model Business model
n-tier development model
The term _____ is sometimes used to refer to a small program.
Script
Cassandra is writing code to register conference attendees by extracting the attendee's information and saving it to a database. The information is obtained from the conference website and once they click submit the information is saved to the database and a new confirmation webpage is generated showing the attendees specific information. Scripting Language Programming Language
Scripting Language - Since Cassandra is coding is for a specific environment within the web browser, this would be considered a scripting language.
Windows Server 2008/2012 is an operating system for which type of device? Workstation Server Mobile device Android
Server
Operating system programs that start when the operating system is loaded but run in the background and do not take up any CPU time until it is called
Services
Which layer of the operating system run in the background and will handle an event? Utility programs Kernel Services Shell
Services
Alexis is working on a class project and realizes she needs some screen recording software to complete the video tutorial for her class. She doesn't want to spend money and she isn't really sure what program will be best, so she downloads a 30-day free trial of a popular software program. It works great for 30 days, but then it locks up unless she buys a license.
Shareware
An interface for the user that gives access to the kernel
Shell
Which layer of the operating system provides access to the kernel? Utility programs Services Shell Device drivers
Shell
Which operating system layer is the interface for the user and provides access to the kernel? Utility Programs Device Drivers Shell
Shell
Which of the following can be patented? Math Science Smart phones
Smart Phones - Smart phones are an actual invention so they can be patented.
When you purchase proprietary software, you will be given a:
Software License Agreement
What is the difference between the administrator account and the user account? The administrator account is given a password that only the administrator or few should know. The casual user should know the administrator password. The casual user can create user accounts, test for security holes, and manipulate system files. The user account is also referred to as root or superuser.
The administrator account is given a password that only the administrator or few should know.
How was the first operating system different from the latest operating system? The first operating system handled more tasks. The first operating system was faster. The first operating system was time consuming to switch between programs. The first operating system permitted multiple users to use the computer at the same time.
The first operating system was time consuming to switch between programs.
What is the main disadvantage of compiled program? The main disadvantage of compiled program is the extra translation time that occurs. The main disadvantage of compiled program is that it is not portable. The main disadvantage of compiled program is that it is experimental in nature. The main disadvantage of compiled program is that it cannot be run at a later time.
The main disadvantage of compiled program is that it is not portable.
What is one way the n-tier development model differs from the MVC model? The n-tier model scans new data for errors. The n-tier model has tiers that are each separate applications. The n-tier model sends data to the controller. The n-tier model controls all edits to data.
The n-tier model has tiers that are each separate applications.
Which of the following is not a primary task of the operating system? The operating system allows the user easy access to the hardware and software of a computer system. The operating system works with hardware to provide a network service. The operating system allows the user to control the actions of software.
The operating system works with hardware to provide a network service.
Copyrights will protect _____
The original work for the duration of the author's life plus 70 years
What rights does the End User License Agreement for proprietary software typically give to purchasers? The freedom to share the software with others The right to modify the software Ownership rights to the software The right to use the software
The right to use the software
Which of the following best describes the main role of the administrator account in an operating system? To provide a means for employers to keep track of what their employees are doing on their work computers. To keep track of computer hardware. To limit access to the system software so that they cannot be changed by anyone who has access to the network.
To limit access to the system software so that they cannot be changed by anyone who has access to the network.
Which of the following is the correct function of the compiler? Every instruction is translated first and then executed, and this must be done every time the program is run. Takes the most recently entered instruction, translates it into machine language, and executes it. Allows programmers to more easily write programs. Translates the entire program, creating an executable program, which can be run at a later time.
Translates the entire program, creating an executable program, which can be run at a later time.
All operating systems give users a means to interact with the computer system hardware and software. True False
True
Operating systems are programs. True False
True
Interpreted language translation allows programmers to test code more quickly. True False
True - Interpreters can test code as they go before it is executed.
A disadvantage of a compiled language is that it is not capable of being executed on different types of computers, e.g., Mac and PC. True False
True - Since compiled languages are not portable, the program needs to be compiled differently for each type of computer.
Machine languages cannot be understood by human beings. True False
True - Since machine language is a series of 1's and 0's (binary code) it is not understandable by humans.
A compiler translates the entire program, creating an executable program, which can be run at a later time, while the interpreter does this incrementally. True False
True - While a compiler creates an entire program; interpreters write the code in an interpreted environment and then translate and execute it in small increments.
High-level languages often use words or abbreviations from the English language. True False
True - any programs will use words that are recognizable from the English language to set up commands.
Define Operating System (or System)
Typically started automatically, it directly supports the computer system
The proprietary software license agreement gives the purchaser the right to:
Use the software
What will violate a proprietary software agreement? Using the software after rejecting the agreement Using the software after purchasing the software Purchasing the software Using the software after accepting the agreement
Using the software after rejecting the agreement
Programs that allow the user to monitor and improve system performance
Utility Programs
Natalie works for an advertising firm that specializes in web distributed advertising. Natalie needs to report to clients how many potential customers have viewed or traveled to the advertising website and if those potential customers continued to the company website to directly purchase products. Additionally, Natalie must make sure that the company's web advertising remains free from malicious code that could affect potential customer computers. Proxy Server E-mail Server File Server Web Server Database Server
Web Server - The web server is needed if Natalie is using web advertising and wants to ensure that HTTP requests are not attacks.
Which of the following statements about algorithms is true? Understanding algorithms is not necessary for programming computers. When writing an algorithm for a computer program there is usually only one "correct" way to write it. When developing an algorithm for a computer system it is best to try and make it as complex as possible. When writing an algorithm one should strive to make it as clear and simple as possible.
When writing an algorithm one should strive to make it as clear and simple as possible.
Which of the following operating systems is for workstations? Android Chrome Windows 10 iOS
Windows 10
No desktop level menu selection. Each software title has its own set of menus.
Windows 7
A gesture-based interface where movements include such operations as swipe, tap, pinch, and reverse pinch.
Windows 8
Which operating system is for workstations? Windows Server 8 Windows 8 Windows Phone 8
Windows 8
Which operating system uses the touch screen GUI? Windows 8 Linux Mac
Windows 8
Which of the following operating systems is for servers? Windows 7/8 Windows Server iOS Android
Windows Server
What is the difference between the FTP server and HTTP? With HTTP, any downloaded files are saved to disk. HTTP is older. HTTP requires that the user has an account. With FTP, users have access to files in the form of uploading files.
With FTP, users have access to files in the form of uploading files.
Define Server
Works with hardware to provide a network service
Windows 7/8, Linux, and Mac OS X are operating systems for:
Workstations
Windows 7/8/10, Linux, and Mac OS X are operating systems for: mobile devices. Workstations Servers
Workstations
A new feature in Windows 1.0 required the use of a new peripheral, the mouse. Yes No
Yes - To interact with a GUI interface you need a pointing device.
Can be accessed by anyone at anytime in anyplace. local applications intranet cloud computing all
cloud computing
If an entire program is used as input to create executable code, the translator is a/an
compiler
What will protect the original work but not the creation of the inventive concepts? copyright patent
copyright
Example of High-Level Programming Language:
int a = 1, b = 5, c;
Slow execution time is experienced by both users and programmers when using a/an
interpreted program
The _____ takes the most recently entered instruction, translates it into machine language, and executes it
interpreter
The End User License Agreement or Software License Agreement is created by the user. has room for negotiation with the purchaser. is a contract between the software company and the purchaser.
is a contract between the software company and the purchaser.
If a company decides for security reasons they want to limit access to certain documents the best implementation of this would be local applications. intranet. cloud computing. all.
local applications.
An operating system will issue commands using the command line prompt by pointing the mouse. dragging the mouse. clicking the mouse. typing in commands.
typing in commands.
The presentation tier is where the _____ is developed
user interface
A proprietary software license agreement will stay free regardless of who modifies the software. will use a copyright to limit users. will use a copyleft to promote flexibility of use.
will use a copyright to limit users.