ITM 3060 - Chapter 4

Ace your homework & exams now with Quizwiz!

41) (T/F) Objects that are connected to the Internet are increasingly being embedded with hardware capable of sensing, processing, and transmitting data.

Answer: TRUE

42) (T/F) Objects connected to a network can share data with any other application, device, or service.

Answer: TRUE

61) (T/F) Application programs can be processed by both clients and servers.

Answer: TRUE

65) (T/F) A host operating system controls the activities of the virtual machines it hosts.

Answer: TRUE

66) (T/F) Modifying an existing firmware requires knowledge of special programs and techniques.

Answer: TRUE

77) (T/F) Open source software is typically free, modifiable, and its source code is publicly available.

Answer: TRUE

27) (T/F) A bit is either a zero or a one.

Answer: TRUE

34) (T/F) Saving one's work frequently is advised to tackle the issue of memory volatility.

Answer: TRUE

28) (T/F) A specification that a computing device has 100 million bytes of memory means that the device could hold up to 100 million characters.

Answer: TRUE

30) (T/F) An exabyte is equivalent to 1,024 petabytes.

Answer: TRUE

32) (T/F) A computer's performance depends on the speed of its central processing unit (CPU).

Answer: TRUE

33) (T/F) Magnetic and optical disks are examples of nonvolatile memory.

Answer: TRUE

1) The ________ selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. A) central processing unit (CPU) B) random access memory (RAM) C) hard disk D) plotter

Answer: A

10) A ________ is a collection of 1,024 bytes. A) kilobyte B) megabyte C) gigabyte D) terabyte

Answer: A

11) The speed of a central processing unit (CPU) is expressed in cycles called ________. A) hertz B) bits C) bytes D) pixels

Answer: A

12) A device's cache and main memory are ________. A) volatile B) nonvolatile C) stable D) nonperishable

Answer: A

3) ________ computers have four central processing units (CPUs). A) Quad-processor B) Dual-processor C) Tri-processor D) Tetra-processor

Answer: A

47) Application programs that run within a browser, without the need to be preinstalled on client computers, are referred to as ________. A) thin-client applications B) native applications C) desktop programs D) thick-client applications

Answer: A

55) McCann Systems, a leading IT firm, develops a customized billing software to meet the needs of its individual customers. In this case, the software developed by the firm is referred to as a(n) ________. A) vertical-market application software B) horizontal-market application software C) open source software D) application simulation software

Answer: A

58) ________ is a type of computer software that is installed into devices such as printers, print servers, and various types of communication devices. A) Firmware B) Freeware C) Slate D) Server farm

Answer: A

7) Bits are grouped into 8-bit chunks called ________. A) bytes B) kilobytes C) terabytes D) megabytes

Answer: A

37) Differentiate between client and server computers.

Answer: A server is a computer that is designed to support processing requests from many remote computers and users. Personal computers (PCs), tablets, and smartphones that access servers are called clients. A server is essentially a PC on steroids, and it differs from a PC principally because of what it does. The relationship between PCs and servers is similar to the relationship between clients and servers at a typical restaurant: In short, servers take requests from clients and then bring them things. In restaurants, these things are food, drinks, and silverware. Similarly, in computing environments, servers can send webpages, email, files, or data to PCs or other devices.

73) What are the different categories of application programs?

Answer: Application software consists of programs that perform a service or a function. Some application programs are general purpose. Other application programs provide specific functions. 1. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. 2. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients. Vertical applications usually can be altered or customized. 3. One-of-a-kind application software is developed for a specific, unique need. The U.S. Department of Defense develops such software, for example, because it has needs that no other organization has.

15) If the contents of a device are lost when the power is turned off, the memory of the device is said to be ________. A) nonvolatile B) volatile C) random D) discrete

Answer: B

44) A(n) ________ is a program that controls a computer's resources. A) cache B) operating system C) central processing unit D) data bus

Answer: B

45) Which of the following statements is true of an operating system? A) It does a lot of application-specific work. B) It comes in particular versions that are written for particular types of hardware. C) It does only little or no memory management. D) It has to be the same across all computers in a network in order to process application programs.

Answer: B

48) Which of the following statements is true of thick-client applications? A) They are application programs that need not be preinstalled on the client computer. B) They mostly run on a single operating system. C) They do not need a server connection to run. D) They require nothing more than a browser to function.

Answer: B

50) Which of the following is the most widely used operating system in business? A) Linux B) Windows C) Unix D) Mac OS

Answer: B

52) ________ is the process by which one physical computer hosts many different virtual computers within it. A) Machine coding B) Virtualization C) License sharing D) Cloud computing

Answer: B

57) Which of the following is an advantage of custom-developed software? A) They are less expensive than off-the-shelf software. B) They can be tailored according to an organization's requirements. C) They are easier to develop than using horizontal applications. D) They need not be adapted to changing needs.

Answer: B

8) One ________ is equivalent to 1,024 kilobytes. A) terabyte B) megabyte C) gigabyte D) bit

Answer: B

9) One ________ is equivalent to 1,024 gigabytes. A) petabyte B) terabyte C) megabyte D) kilobyte

Answer: B

13) Which of the following is an example of nonvolatile memory? A) cache memory B) main memory C) magnetic disk D) RAM drive

Answer: C

2) A dual-processor computer has ________ CPUs. A) eight B) four C) two D) sixteen

Answer: C

38) The ________ refers to the idea in which objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. A) Premium Internet B) Symbian C) Internet of Things D) server farm

Answer: C

4) Which of the following statements is true of a server? A) It stores the results of computations in the main memory. B) It provides access only for one user at a time. C) It supports processing requests from remote computers. D) It creates a backup of all information within a system.

Answer: C

40) Which of the following is most likely to be a disadvantage of self-driving cars? A) More accidents will occur. B) More parking lots will have to be built. C) More people will use cars and avoid planes or trains. D) More stress during commute.

Answer: C

46) ________ are programs that are written to use a particular operating system. A) Web applications B) Thin-client applications C) Native applications D) Vertical-market applications

Answer: C

49) Which of the following is an open-source operating system? A) Unisys B) Windows C) Linux D) Mac OS

Answer: C

5) A ________ is used to receive and process thousands of requests from a large number of users. A) cache memory B) stand-alone server C) server farm D) client computer

Answer: C

53) When individuals buy a computer program, they buy a license to ________. A) convert the program into open source software B) modify the features of the program C) use the program D) sell the program

Answer: C

54) ________software provides capabilities that are common across all organizations and industries. A) Vertical-market application B) Custom-developed C) Horizontal-market application D) Off-the-shelf with alterations

Answer: C

56) Which of the following refers to software that is developed for a specific and unique need? A) simulation software B) horizontal-market application software C) one-of-a-kind application software D) open source software

Answer: C

76) ________ is a computer code that is written by humans and understandable by humans. A) Bar code B) Machine code C) Source code D) Overhead code

Answer: C

35) Explain the basic constituents and the different types of computer hardware.

Answer: Computer hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. All hardware today has more or less the same components, at least to the level that is important to us. The common types of computer hardware used are: a) Personal computers (PCs): PCs are classic computing devices that are used by individuals. b) Server: It is a computer that is designed to support processing requests from many remote computers and users. c) Clients: PCs, tablets, and smartphones that access servers are called clients. d) Server farm: It is a collection of, typically, thousands of servers.

74) What are the drawbacks of developing custom application software for an organization?

Answer: Custom development is difficult and risky. Staffing and managing teams of software developers is challenging. Managing software projects can be daunting. Many organizations have embarked on application development projects only to find that the projects take twice as long, or longer, to finish than planned. Cost overruns of 200 and 300 percent are not uncommon while developing custom application software.

14) The memory of a device is said to be nonvolatile if ________ when the system is restarted. A) its contents are destroyed B) the memory becomes unusable C) a new memory is replicated D) its contents are retained

Answer: D

39) Which of the following is most likely to be an advantage of self-driving cars? A) Fewer cars will be shared by family members. B) More auto loans will be taken. C) More insurance policies will be taken. D) Fewer accidents will occur.

Answer: D

51) Host operating systems that run one or more operating systems as applications are referred to as ________. A) application programs B) server farms C) server operating systems D) virtual machines

Answer: D

6) Computers represent data using binary digits called ________. A) dots B) pixels C) tags D) bits

Answer: D

36) Briefly describe the functions and working of a central processing unit (CPU).

Answer: Every computer has a central processing unit (CPU), which is sometimes called "the brain" of the computer. The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. Some computers have two or more CPUs. A computer with two CPUs is called a dual-processor computer. Quad-processor computers have four CPUs. Some high-end computers have 16 or more CPUs. CPUs vary in speed, function, and cost. The CPU works in conjunction with main memory. The CPU reads data and instructions from memory, and then stores the results of computations in main memory. In addition to random access memory, RAM, and one or more CPUs, all computers also include storage hardware, which is used to save data and programs.

67) What is an operating system? How is it different from an application program?

Answer: Every computer has an operating system, which is a program that controls that computer's resources. The functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices. Although the operating system makes the computer usable, it does little application-specific work. An application program is any program designed to perform a specific function for a user or for another application program. Both clients and servers can process application programs and the application's design determines whether the client, the server, or both, process it. If one wants to check the weather or access a database, he or she needs application programs such as an iPad weather application or Oracle's customer relationship management (CRM) software. Some application programs are general purpose, such as Microsoft Excel or Word. Other application programs provide specific functions.

19) (T/F) The speed and costs of central processing units are the same across multiple hardware vendors.

Answer: FALSE

21) (T/F) The central processing unit (CPU) of a computer reads data and instructions only from a read-only memory.

Answer: FALSE

22) (T/F) Optical disks are non-portable storage devices

Answer: FALSE

24) (T/F) Main memory is also called read-only memory.

Answer: FALSE

25) (T/F) A hard drive is much faster than a solid-state storage device.

Answer: FALSE

26) (T/F) A server farm can process only one service request per minute.

Answer: FALSE

29) (T/F) One gigabyte is equivalent to 1,024 terabytes.

Answer: FALSE

31) (T/F) A terabyte is a larger unit than a petabyte.

Answer: FALSE

59) (T/F) Although an operating system does a lot of application-specific work, it does little to make the computer usable.

Answer: FALSE

60) (T/F) Both client and server computers must use the same operating system.

Answer: FALSE

62) (T/F) Microsoft Access and Microsoft Word are examples of thin-client applications.

Answer: FALSE

63) (T/F) Firefox, Chrome, Opera, and Internet Explorer are examples of thick-client applications.

Answer: FALSE

64) (T/F) A virtual machine does not have a disk space.

Answer: FALSE

78) (T/F) Any programmer or student can access and alter the source code of a closed source project.

Answer: FALSE

79) (T/F) Modifications to the source code of an open source project cannot be added to the project.

Answer: FALSE

75) What is firmware?

Answer: Firmware is computer software that is installed into devices such as printers, print servers, and various types of communication devices. The computer software is coded just like other software, but it is installed into special, read-only memory in the printer or other device. In this way, the program becomes part of the device's memory; it is as if the program's logic is designed into the device's circuitry. Users do not need to load firmware into the device's memory. Firmware can be changed or upgraded, but this is normally a task for IS professionals. The task is easy, but it requires knowledge of special programs and techniques that most business users choose not to learn.

68) What are the two important software constraints? Explain with suitable examples.

Answer: First, remember that particular versions of an operating system are written for particular types of hardware. For example, Microsoft Windows works only on processors from Intel and from companies that make processors that conform to the Intel instruction set (i.e., the commands that a CPU can process). With other operating systems, such as Linux, many versions exist for many different instruction sets. Second, be aware that two types of application programs exist: native and Web. Native applications are programs that are written to use a particular operating system, while Web applications run within a computer browser and can therefore run on any type of computer.

70) What is unique about Linux as an operating system?

Answer: Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but usually only when budget is of paramount concern. By far, Linux is most popular as a server OS. According to DistroWatch.com, the five most popular versions of Linux as of 2014 were Linux Mint, Ubuntu, Debian GNU/Linux, Mageia, and Fedora.

16)(T/F) Computer hardware consists of electronic components that input, process, output, and store data.

Answer: TRUE

17) (T/F) The central processing unit is referred to as the brain of a computer.

Answer: TRUE

18) (T/F) High-end computers can have as many as 16 central processing units.

Answer: TRUE

20) (T/F) Some computers have two or more central processing units (CPUs).

Answer: TRUE

23) (T/F) USB flash drives are used to back up data and transfer it from one computer to another.

Answer: TRUE

43) How can the Internet of Things act as a disruptive force to change the way in which businesses function?

Answer: The Internet of Things is the idea that objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. In other words, everyday objects are increasingly being embedded with hardware capable of sensing, processing, and transmitting data. These objects can then connect to a network and share data with any other application, service, or device. Over time, mobile phones became smartphones. by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to interconnect with other devices and applications. People thus began to use their mobile phones much differently than before. This shift also changed the way businesses operate. This shift away from "dumb" devices to interconnected smart devices is not lost on businesses. Consumers like smart devices and are willing to pay more for them. Accordingly, businesses want to improve the existing devices they manufacture into smart devices, and then sell them for twice as much.

69) Explain the four major nonmobile client operating systems and their functions.

Answer: The four major nonmobile client operating systems are Windows, Mac OS, Unix, and Linux. 1. The most popular operating system is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world's desktops, and when considering just business users, the figure is more than 95 percent. The most recent client version of Windows is Windows 8, a major rewrite of prior versions. 2. Apple Computer, Inc. developed its own operating system for the Macintosh, Mac OS. The current version is Mac OS X Mavericks. Macintosh computers are used primarily by graphic artists and workers in the arts community. 3. Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. 4. Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but is by far most popular as a server OS.

80) How do open source projects work? How is it different from closed source projects?

Answer: The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and that is understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. In a closed source project, like Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is very well protected. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project's Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, programmers can incorporate open source code into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Open source succeeds because of collaboration. A programmer examines the source code and identifies a need or project that seems interesting. He or she then creates a new feature, redesigns or reprograms an existing feature, or fixes a known problem. That code is then sent to others in the open source project to evaluate the quality and merits of the work and to add it to the product, if appropriate.

71) What is virtualization?

Answer: Virtualization is the process by which one physical computer hosts many different virtual (not literal) computers within it. One operating system, called the host operating system, runs one or more operating systems as applications. Those hosted operating systems are called virtual machines (vm). Each virtual machine has disk space and other resources allocated to it. The host operating system controls the activities of the virtual machines it hosts to prevent them from interfering with one another. With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment. Three types of virtualization exist: • PC virtualization • Server virtualization • Desktop virtualization

72) Explain how computer programs are licensed to individuals and organizations.

Answer: When a person buys a computer program, it does not mean actually buying that program. Instead, he is buying a license, which is the right to use that program. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license, which is a flat fee payment for the right to install the product (operating system or application) on all of that company's computers or on all of the computers at a specific site.


Related study sets

Fundamental Assignment for 200 questions ATI

View Set

Milady Chapter 4 Infection Control

View Set

Chapter 3 - Understanding Cloud Computing

View Set

Patho Exam 3; L. 29 Spinal Cord injury, disorders of neuromuscular function

View Set

Chapter 33 - Assessment of the Cardiovascular System

View Set

Marketing Management Chapter 5: B2B

View Set

CHEM 1312 Practice Test 5 Rahman

View Set

ATI Pharmacology Made Easy 4.0: Infection

View Set