IS 310 Exam 1
The word size of recent processor generations such as the Intel Core2 and IBM POWER 8 is ____________________ bits.
64
The membership of the _________ consists mainly of IS managers and application developers.
Association for Information Technology Professionals
The membership of the _____ consists mainly of IS managers and application developers.
Association of Information Technology Professionals
A ______ instruction causes the processor to depart from sequential instruction order
BRANCH/JUMP
__________ is a generic term for describing secondary storage data transfer units.
Block
_____ is a philosophy of processor design that deliberately includes complex instructions
CISC
___________ typically make use of both multi computer configuration and virtualization
Clouds
A perfect conductor can be described as one having maximum resistance.
False
According to Moore's law, the doubling of transistor density is achieved with a 50% increase in unit cost
False
Arithmetic SHIFT instructions are more complex when applied to twos complement values because the rightmost bit is a sign bit.
False
By far, the most important of activity to keep your knowledge current is taking training courses from hardware and software vendors
False
Communication channel capacity is generally a restriction on a single disk drive's data transfer rate
False
Computers are designed to process character data and can therefore represent characters directly.
False
Cost per unit decreases as an access method moves from serial to random to parallel.
False
Double-precision integers are sometimes called large integers
False
In ASCII, NAK is sent to acknowledge correct receipt of data, and ERR is sent to indicate that an error has been detected
False
In the binary32 format, the leading sign bit applies to the exponent, not the mantissa
False
Intel microprocessors have been used in PCs since 1961
False
Low voltage circuits are less susceptible to damage from voltage surges and static electricity.
False
Mechanical computation devices cannot perform complex calculations
False
Mechanical computers such as the Mark One were used during World War 1 to compute trajectory tables for naval guns and torpedoes
False
Practical optical processors will probably appear first as full-fledged computer processors.
False
Rewritable DVDs use a single standard adopted by the entire industry
False
Secondary storage is generally expensive compared with primary storage
False
The complexity of data structures is limited only by the software.
False
The deployment discipline is the set of activities for building, acquiring, and integrating application software components
False
The knowledge required to perform business and requirements modeling covers a narrow range of current technology
False
To avoid overflow and increase accuracy, some computers and programming languages define additional numeric data types called long-precision data formats.
False
Unbiased information exists on the Web, and it's generally easy to find.
False
Wait states increase CPU and computer system performance.
False
____________ are typically implemented by installing software on each machine that accepts tasks from a central server and performs them when not busy doing other work
Grids
When manipulating single-precision floating-point numbers, CPU performance is measured in
MFLOPS
___________ stores bit values by using two magnetic elements, one with fixed polarity and the other with polarity that changes when a bit is written.
MRAM
_____ web sites have detailed information on their products and offer technical and customer support services
Manufacturer
__________ is based on the observation that the rate of increase in transistor density on microchips had increased steadily, roughly doubling every 18 to 24 months
Moore's Law
________ describes any CPU architecture in which duplicate CPUs or processor stages can execute in parallel
Multiprocessing
____ signals can carry more data than electrical signals.
Optical
In current computer hardware, main memory is implemented with silicon-based semiconductor devices commonly called ____.
RAM
The term _____________ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can randomly access bytes, words, or larger data units
RAM
______ in the CPU are storage locations for instructions and data
Registers
__________ is the time required to read the second of two adjacent sectors on the same track and platter
Sequential access time
__________________ are made of semiconductor material that has been treated, or doped, with chemical impurities to enhance the semiconducting effects
Transistors
A URL identifies one specific WWW resource.
True
A typical computer system must have much more secondary storage capacity than primary storage capacity
True
Capacitors can charge and discharge much faster than batteries
True
Consolidation in periodical publishers has created large corporate families of technology-related Web sites and publications
True
Data inputs are accessed from storage or extracted directly from the operands and stored in one or more registers.
True
Early Xeon processors filled an important niche in the small server market but weren't powerful enough to perform processing duties in many large-scale servers.
True
Large computer systems and the software that runs on them use more complex technology than smaller ones do
True
One action that occurs during the fetch cycle is incrementing a pointer to the location of the next instruction
True
Pipelining is a method of organizing CPU circuitry so that multiple instructions can be in different stages of execution at the same time
True
Primary storage extends the limited capacity of CPU registers
True
The 80836 provided hardware support for running multiple programs simultaneously, simplified partitioning primary storage among programs, and provided mechanisms for preventing programs from interfering with one another.
True
The CPU moves data and instructions continually between registers and primary storage
True
The evolution of Microsoft OSs is a good example of how software development depends on hardware technology
True
The membership of the ACM represents a broad cross-section of the computer community, including hardware and software manufacturers, educators, researchers, IT professionals, and students.
True
The physical structure of a storage device's read/write mechanism and storage medium determines the ways in which data can be accessed
True
The representation format for each data type balances compactness, range, accuracy, ease of manipulation, and standardization
True
The write operation for recordable discs is destructive, so recordable disc formats can be written only one time
True
To increase capacity per platter disk manufacturers divide tracks into two or more zones and vary the sectors per track in each zone
True
To make an informed choice when purchasing a computer, you must know your preferences and requirements, such as the application software you plan to use and whether you plan to discard or upgrade the computer in a year or two.
True
Whether implemented in system or application software, almost all data structures make extensive use of pointers and addresses.
True
With bit strings, NOT treats each bit in the bit string as a separate Boolean value.
True
_____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.
Underflow
__________ web sites are oriented toward sales, but they usually contain detailed information on specific products or links to other Web sites.
Vendor
__________ offers flexibility in server configuration and deployment, including the ability to "resize" virtual machines easily to match changing requirements.
Virtualization
Storage device speed is called
access time
A _____ is a program in which different sets of instructions are applied to different data input values.
algorithm
_________ is the sum of average access delay and the time required to read a single sector
average access time
A ____________ is a measure of CPU or computer system performance when carrying out one or more specific tasks
benchmark
In computer terminology, each digit of a binary number is called a
bit
In the UP, the business and its environment are defined and modeled within the ___________ discipline
business modeling
A ______ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run a single application
cluster
A simple definition of a computer is a device that can accept numeric inputs, perform computational functions, and
communicate results
A __________ provides the interface between the storage device and system bus
device controller
Current optical storage devices use a(n) ____________________ storage medium.
disc
In the UP, related activities are grouped into UP ______________
disciplines
In a __________ device, the movement of electrons performs essentially the same functions as gears and wheels in mechanical computers
electronic computing
A moving photon's _____________ can be harnessed to perform computational work
energy
During the ____ cycle of the CPU, the transformation takes place and data output is stored.
execution
A sequence of records on secondary storage is called a ____.
file
A __________ is a group of dissimilar computers, connected by a high-speed network, that cooperate to provide services or run a shared application.
grid
A _________ is an object specifically designed to absorb heat and rapidly dissipate it via air or water movement
heat sink
A __________ is an array of pointers to records
index
Several transistors and their interconnections on a single chip form a(n) ____.
integrated circuit
The right most digit in a bit string is the
least significant digit
A _______ operation is a data transfer from main memory into a register
load
The _________ can extract a single bit from a bit string
logic SHIFT
Although not a formal UP discipline, systems evaluation and ____ is an important group of activities that accounts for much of the long-range system cost.
maintenance
Quantum physics describes subatomic behavior with ________________
mathematical rules
The programs in a class are called
methods
A ________________ is a microchip containing all the circuits and connections that implement a CPU
microprocessor
Access times for secondary storage devices are typically expressed in __________ or microseconds
milliseconds
Memory devices comprised of semiconductors and other forms of RAM with long-term or permanent data retention are generically known as
nonvolatile memory
The first group of bits in an instruction represents its unique binary number, commonly called the _____________
op code
A __________ is a collection of utility programs that supports users and application programs, allocates resources, and controls access to hardware
operating system
For computer components such as processors, ____________________ are expected to gradually supplant electronics during the 21st Century.
optics
In a CD, concave dents in the reflective layer that are used to represent bit values are called
pits
An unsigned integer's value is always assumed to be _________
positive
Storage devices that hold currently executing programs are called
primary storage
A __________ is a stored set of instructions for performing a specific task
program
A ___________ is a program that translates instructions in a programming language into CPU instructions
program translator
Typically, the first iteration or two of the UP produces documentation and a ________ system
prototype
One way of dealing with the tradeoff between range and precision is to abandon the concept of a fixed __________ point
radix
The stored charge held within a bit of magnetic storage must be above the ____________________ for a read operation to be successful.
read threshold
Each refresh operation in DRAM is called a(n) _________________
refresh cycle
The loss of electrical power that occurs as electrons pass through a conductor is called
resistance
Storage devices that hold data not needed by currently running programs are called _______________
secondary storage
The term ____ can describe computers as small as midrange computers and as large as supercomputers.
server
To represent a specific integer value in excess notation, you must know how many ________________ are to be used
storage bits
The ______ software layer has utility programs used by system management and application programs to perform common functions
system services
A ______________ is one concentric circle of a platter, or the surface area that passes under a read/write head when its position is fixed
track
A _________ is an electrical switch with three electrical connections
transistor
Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.
unsigned integer
A storage device or medium is __________________ if it can't hold data reliably for long periods
volatile