IS 4410 Quiz 3
A BYOD policy is a statement concerning employees' permissions and responsibilities when they use their company's devices for organizational business.
False
Horizontal-market applications are developed for specific, unique needs of an industry.
False
Server virtualization is a technology for hosting several different operating systems for a desktop.
False
The CPU is a computer that is designed to support processing requests from many remote computers and users.
False
Which of the following is an example of vertical-market application software? Tally software that is used to maintain business and personal accounts Inventory tracking software for an automobile manufacturer Adobe suite used by graphic designers Microsoft PowerPoint used to create presentations
Inventory tracking software for an automobile manufacturer
Which of the following statements is true about closed source projects? Only users and developers are allowed to alter the source code in closed source projects. Anyone can obtain the source code for a closed source project. Only trusted programmers are allowed to make changes to a closed source project. Programmers can alter a closed source code based on their interests and goals.
Only trusted programmers are allowed to make changes to a closed source project.
Native applications are programs that are written to use a particular operating system.
True
Which of the following statements is true about firmware? Firmware cannot be changed or upgraded. The software is not coded like other software. Users do not need to load firmware into a device's memory. Firmware is the same as cache memory.
Users do not need to load firmware into a device's memory.
Bits are used for computer data because they ________. are easy to represent physically can have more than two values at a time are represented exclusively as letters of the alphabet represent the orientation of a nonoptical media
are easy to represent physically
Which of the following is an example of nonvolatile memory? optical disk static random access memory main memory cache memory
optical disk