CSIS 110

Ace your homework & exams now with Quizwiz!

FALSE

The Network layer of the Internet, IP, is inherently an extremely reliable communication channel.

24

The True Color scheme uses ____ bits.

TRUE

The Von Neumann bottleneck is the inability of the sequential one-instruction-at-a-time Von Neumann model computer to handle today's large-scale problems.

TRUE

The World Wide Web was completed and made available to all researchers at CERN in August 1991, the date that marks the birth of the web.

input/output units

The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.

interface

The ____ hides from the user the messy details of the underlying hardware.

program counter

The ____ holds the address of the next instruction to be executed.

bit depth

The ____ is the number of bits used to encode each sample.

latency

The ____ of a disk is the time for the beginning of the desired sector to rotate under the read/write head.

seek time

The ____ of a disk is the time needed to position the read/write head over the correct track.

NOT

The ____ operation complements the value of a Boolean expression.

compare

The ____ operation in Von Neumann machines uses a special set of bits known as condition codes.

algorithmic

The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

loudness

The amplitude of a sound wave is a measure of its ________.

digital subscriber line

A ____ uses the same wires that carry regular telephone signals into your home.

5 to 10

A cache is typically ____ times faster than RAM but possesses less storage capacity.

Virtualization

____ is the term for the separation of a service from the entity (or entities) providing that service.

Authentication

____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

Caesar

A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

gateway

A ____ makes internetwork connections and provides routing between different WANs.

naked

A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

source

A program written in assembly language is called the ____ program.

sequential

A purely ____ algorithm is sometimes termed a straight-line algorithm.

FALSE

A strictly black-and-white image has greater storage requirements than an image represented using a gray scale.

I/O Controller

A(n) ____ handles the details of input/output and compensates for any speed differences between I/O devices and other parts of the computer.

pseudo-op

A(n) ____ invokes a service of the assembler.

computer network

A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

register

A(n) ____ is a storage cell that holds the operands of an arithmetic operation and that, when the operation is complete, holds its result.

conditional

A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

256

ASCII is able to encode a total of ____ different symbols

256

ASCII is able to encode a total of ____ different symbols.

TRUE

All modern operating systems provide GUIs.

unambiguous

An operation that is ____ is called a primitive operation of the computing agent carrying out the algorithm.

more

Any whole number that can be represented in base 10 can also be represented in base 2, although it may take ____ digits.

TRUE

As computers become faster, memory access speeds are not keeping pace.

internet forums

Bulletin board systems evolved into modern-day _______.

binary values

John Von Neumann's stored program computer lay the groundwork for modern-day computing by allowing the computer to store instructions in ____ alongside the data.

high-level programming

C++ and Java are examples of ____ languages.

FALSE

Clients cannot perform local computations without access to the network.

MIMD

Cluster computing is an example of _________ parallel computing.

TRUE

The variable used to determine the address of a given instruction or piece of data is called the location counter. _________________________

execution

During the ____ phase, the control unit circuitry generates the necessary sequence of control signals and data transfer signals to the other units of the computer to carry out the instruction.

FALSE

Examples of volatile memory are mass storage devices such as disks and tapes. _________________________

dual authentication

Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______

analog

The voice-oriented dial-up telephone network was originally a(n) ____ medium.

TRUE

Groupware is software that facilitates the efforts of individuals connected by a network and working on a single, shared project.

2

How many digits are there in the binary number system?

point-and-click

Icons displayed on the screen are selected with a mouse and a button using a technique called ____.

logarithms

In 1614, John Napier invented ____ as a way to simplify difficult mathematical computations.

high-level programming; machine language

In ____, a single instruction provides multiple instructions in _______.

nondestructive fetch

In a ____, the original contents of the memory cell are unchanged.

end of each pass

In a posttest loop, the continuation condition is tested at the ____ through the loop.

TRUE

In a two-level memory hierarchy, when the computer needs a piece of information, it looks in cache memory first, then RAM.

label

In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.

computing agent

In computer science terminology, the machine, robot, person, or thing carrying out the steps of the algorithm is called a(n) ____.

Ethernet

In the commercial and office environment, the most widely used broadband technology is ____.

switched

In the early days of networking, the most common way to transmit data was via ____, dial-up telephone lines.

variable

In the line of pseudocode, "Set the value of Area to length × width", "Area" is a ____.

TRUE

Information is stored in the memory of a computer using the binary numbering system.

control unit

It is the task of the ____ to fetch and execute instructions.

external representation

The way information is entered at a keyboard and displayed on a screen is known as the ____ of information.

FALSE

MIMD parallelism is not a scalable architecture. _________________________

Wi-Fi

One of the most widely used standards for wireless local access is called ____.

TRUE

One of the services provided by pseudo-ops is program construction.

FALSE

The binary-to-decimal algorithm is based on successive divisions by 2. _________________________

sequential

The branch machine language instructions alter the normal _______ flow of control.

TRUE

The branch of computer science that studies computers in terms of their major functional units and how they work is known as computer organization.

op code table

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

FALSE

The emitter and collector are the two input lines of a transistor.

authorization

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

1622

The first slide rule appeared around ____.

TRUE

The instructions that can be decoded and executed by the control unit of a computer are represented in machine language.

gigabyte

There are 2 30 bytes in a _______.

TRUE

The principle of locality states that when the computer uses something, it will probably use it again very soon.

electronic commerce

____ is a general term applied to any use of computers and networking to support the paperless exchange of goods, information, and services in the commercial sector.

English

____ is an example of a natural language.

TRUE

The term switched, dial-up means that when you dial a telephone number, a temporary circuit is established between the caller and the call recipient.

cycles

The total number of ____ per second is called hertz.

counter

To create a loop that executes exactly b times, we create a ____.

two

To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.

functional units

To understand how computers process information, we must study computers as collections of ____ that perform tasks such as instruction processing, information storage, computation, and data transfer.

semiconductors

Transistors are constructed from ____, such as silicon and gallium arsenide.

high-level languages

Translators for ____ are called compilers.

Resource sharing

____ is the ability to share physical resources, such as a printer or storage device, as well as logical resources, such as software and information.

Social networks

____ are systems that create communities of users who share common interests and activities and which provide multiple methods of online interaction.

bit

What is a single binary digit called?

16

What is the decimal value of the largest digit in the hexadecimal number system?

8

What is the largest digit in the octal number system?

binary

What is the lowest base in which the number 10 could be a valid number?

decimal

What is the lowest base in which the number 987 could be a valid number?

a. It does not halt in a finite amount of time.

What is wrong with the following algorithm? 1. Set X to be 1 2. Increment X 3. Print X 4. If X > 0, repeat from 2 a. It does not halt in a finite amount of time. b. It is not well ordered. c. It does not produce a result. d. It is ambiguous.

b. polynomial

Which of the following can be used to express the value of every number in any number system? a. quotient b. polynomial c. rational number d. radix

a. number

Which of the following is a unit in an abstract mathematical system subject to the laws of arithmetic? a. number b. natural number c. integer d. negative number e. rational number

e. rational number

Which of the following is an integer or the quotient of two integers (excluding division by zero)? a. number b. natural number c. integer d. negative number e. rational number

d. word

Which unit of binary storage has a size that is processor-dependent? a. byte b. nibble c. bit d. word e. block

Cloud computing

____ behaves much like the client/server model, except that the servers no longer need to be local to the client population.

Authorization

____ governs what an authenticated user is allowed to do.

Hypertext

____ is a collection of documents interconnected by pointers.


Related study sets

Course 101: Professional Conduct and Fiduciary Responsibility, General Principles of Financial Planning, Personal Financial Planning Process, Behavioral Finance, Client and Planner Profiles, Communication

View Set

Chapter 12 : Health and Accident Insurance

View Set

Mike's Ultimate Mechanics Review

View Set

Personal, Subject Matter Jurisdiction and Venue

View Set

Caring for clients with disorders of the Liver, gallbladder, or Pancreas

View Set

Chapter 11 Anatomy and Physiology

View Set

U11, Decisions 1, Business Result Intermediate, 2e

View Set