IS310 Exam 4

Card Set Information

Author:
tttran1
ID:
122752
Filename:
IS310 Exam 4
Updated:
2011-12-12 07:35:23
Tags:
IS310exam4
Folders:

Description:
Exam number 4 for IS310
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user tttran1 on FreezingBlue Flashcards. What would you like to do?


  1. The command layer is the user interface to an operating system.
    A. True
    B. False
    A. True
  2. Application software makes calls to the operating system service layer to perform functions such as file manipulation and printer control.
    A. True
    B. False
    A. True
  3. The operating system kernel is responsible for allocating hardware resources to application programs.
    A. True
    B. False
    A. True
  4. Device drivers are located within the operating system service layer.
    A. True
    B. False
    A. True
  5. An operating system that supports multitasking allows a single program to be divided into components that can execute concurrently
    A. True
    B. False
    B. False
  6. A(n) thread is an executable subunit of a process that is scheduled independently but shares memory and I/O resources with its parent.
    A. True
    B. False
    A. True
  7. A virtual resource is apparent to a process or user, although it may not physically exist.
    A. True
    B. False
    A. True
  8. Under virtual memory management, a page hit occurs when a program attempts to access a page not held in physical memory.
    A. True
    B. False
    B. False
  9. A file’s directory entry normally contains information about its owner, access controls, and physical location.
    A. True
    B. False
    A. True
  10. A buffer used for storage device I/O should be smaller than the block size of the storage device.
    A. True
    B. False
    A. True
  11. The term incremental backup describes a system of tracking old file versions and automatically moving them to off-line and archival storage devices.
    A. True
    B. False
    A. True
  12. In an incremental backup operation, all files within a directory or storage device are copied to backup storage.
    A. True
    B. False
    B. False
  13. Transaction logging imposes a performance penalty because every file update requires two write operations.
    A. True
    B. False
    A. True
  14. System administration is the process of ensuring efficient and reliable delivery of IS services.
    A. True
    B. False
    A. True
  15. Because IS resources can be considered operating expenditures, issues of service standards, cost, and cost recovery are important components of the IS strategic plan.
    A. True
    B. False
    A. True
  16. A request for proposals (RFP) is a formal document that solicits proposals from hardware and/or software vendors.
    A. True
    B. False
    A. True
  17. Which of the following statements about dynamically linked executable programs is true.
    A. they are more reliable than statically linked executable programs
    B. they are larger than statically linked executable programs
    C. they execute more quickly than statically linked executable programs
    D. they automatically incorporate updated operating system service routines
    D. they automatically incorporate updated operating system service routines
    (this multiple choice question has been scrambled)
  18. A(n) ____ interleaves source code translation, link editing, and execution.
    A. compiler
    B. interpreter
    C. link editor
    D. external function
    A. compiler
    (this multiple choice question has been scrambled)
  19. Java programs are compiled into object code for a hypothetical hardware and system software environmentcalled the ____.
    A. 2GL
    B. rapid prototyping machine
    C. sandbox
    D. JVM
    D. JVM
    (this multiple choice question has been scrambled)
  20. A Java applet runs within the ____ of a Web browser.
    A. interpreter
    B. compiler
    C. debugging version
    D. sandbox
    D. sandbox
    (this multiple choice question has been scrambled)
  21. Which software component supports a broad range of system development activities with particular emphasis on model development?
    A. assembler
    B. CASE tool
    C. compiler
    D. fourth generation language (4GL)
    B. CASE tool
    (this multiple choice question has been scrambled)
  22. A tool suite that primarily supports program development based on specific analysis and design models sometimes is called a(n) ____.
    A. back-end CASE
    B. compiler library
    C. front-end CASE tool
    D. class library
    A. back-end CASE
    (this multiple choice question has been scrambled)
  23. A tool suite that primarily supports model development is sometimes called a(n) ____.
    A. class library
    B. front-end CASE tool
    C. back-end CASE tool
    D. symbolic debugger
    B. front-end CASE tool
    (this multiple choice question has been scrambled)
  24. Which of the following terms describes software that glues together parts of a client-server or multi-tierapplication?
    A. Peer-to-peer
    B. Three-tier architecture
    C. Protocol stack
    D. Middleware
    D. Middleware
    (this multiple choice question has been scrambled)
  25. All Web resources are identified by a unique ____.
    A. URL
    B. protocol
    C. port number
    D. host
    A. URL
    (this multiple choice question has been scrambled)
  26. A(n) ____ is a private network that uses Internet protocols but is accessible only by a limited set of internal users.
    A. WWW
    B. Telnet
    C. intranet
    D. SMTP
    C. intranet
    (this multiple choice question has been scrambled)
  27. Which of the following characteristics is typical of technology-based infrastructure?
    a. Service to a large number of users
    b. Easy allocation of costs to users
    c. Low maintenance costs
    d. No need for new capital expenditure
  28. Which of the following security procedures is most effective against unauthorized user access by repeated login attempts with guessed passwords?
    A. Password encryption during network transmission
    B. Password file encryption
    C. Lockout after a specified number of failed logins
    D. Authentication
    C. Lockout after a specified number of failed logins
    (this multiple choice question has been scrambled)
  29. A(n) ____ provides auxiliary power during blackouts and can notify the operating system when it is activated.
    A. uninterruptible power supply (UPS)
    B. power surge
    C. hardware monitor
    D. firewall
    A. uninterruptible power supply (UPS)
    (this multiple choice question has been scrambled)
  30. With respect to computer security, ____ is the process of creating and managing records of user activity and resource access.
    A. encryption
    B. auditing
    C. authentication
    D. authorization
    B. auditing
    (this multiple choice question has been scrambled)
  31. Which of the following is not used to perform biometric authentication?
    A. Retinal scan
    B. Password
    C. Facial scan
    D. Fingerprint
    B. Password
    (this multiple choice question has been scrambled)
  32. ____ are widely deployed in modern information systems to protect servers and information resources from unauthorized access over the Internet.
    A. Firewalls
    B. Surge protectors
    C. Software monitors
    D. Encryption software
    A. Firewalls
    (this multiple choice question has been scrambled)
  33. Which of the following statements is not true?
    A. Computer facilities need not provide protection for data communication lines.
    B. Short circuits can cause circuit damage and fire when computer equipment is operating.
    C. All electrical devices generate heat as a byproduct of normal operation.
    D. Excessive moisture is an enemy of electrical circuitry due to the danger of short circuits.
    A. Computer facilities need not provide protection for data communication lines.
    (this multiple choice question has been scrambled)
  34. Which of the following is a typical operating expenditure?
    A. Land
    B. Equipment maintenance
    C. Equipment
    D. Buildings
    B. Equipment maintenance
    (this multiple choice question has been scrambled)
  35. From the class discussion: The best choice for fire protection is?
    a. A water based sprinkler system since it is commonly available and part of the building
    b. A foam based system since it reduces electrical shorts
    c. A carbon dioxide system since it isn’t corrosive
    d. A Halon system since it doesn’t suffocate peoplee. Never have a fire.
  36. 1.First Generation Languages
    • binary instructions for a CPU
    • machine language
    • difficult remembering and manipulating long strings of binary digits
    • programming with binary numbers is tedious and error prone
  37. 2.Second Generation Languages
    • mnemonic instructions for a CPU
    • assember for translator
    • early compiled programs
  38. 3.Third Generation Languages
    • instruction explosion, machine independence, and usually standardization
    • use Cobol, Fortan, C, BASIC, Pascal
    • requires more hardware resources and easiest to learn program
    • use compilers, link editors, and interpreters as automated tools used to translate 3GL program
    • 3GL program more complex than 2GL translation
    • program is machine independence/ hardware independence
  39. 4.Fourth Generation Languages
    • higher instruction explosion, interactive and graphical I/O support, database support, limited nonprocedural programming, and proprietary standards
    • Database query and report support
    • use Visual Basic SQL
  40. 5.Fifth Generation Languages
    high instruction explosion, nonprocedural programming, expert systems, and artificial intelligence applications
  41. Object-oriented language
    High instruction explosion, support for modern code development, and code reuse methods, such as inheritance and message passing
  42. Scripting language
    very high instruction explosion; interpreted execution, usesd for Web applications
  43. put the programming language generation in the blank for their description(s). (1,2,3,4,or 5 generation)
    ____ A. Cobol, Fortran, 'C'
    ____B. Natural Language Processing
    ____C. Database query and report support
    ____D. Difficult for programmers, easy on hardware
    ____ E. High Instruction Explosion
    ____ F. Assembler for translator
    ____ G. Machine Language
    ____ H. Early compiled programs
    ____ I. Requires more hardware resources and easiest to learn to program
    • _3_ A. Cobol, Fortran, 'C'
    • _1_ B. Natural Language Processing
    • _4_ C. Database query and report support
    • _1_ D. Difficult for programmers, easy on hardware
    • _5_ E. High Instruction Explosion
    • _2_ F. Assembler for translator
    • _1_ G. Machine Language
    • _2_ H. Early compiled programs
    • _3_ I. Requires more hardware resources and easiest to learn to program
  44. Tower of Hanoi and Grandfather-Father-Son were offered in class as two examples of what security proce-dures?
  45. Compare and Contrast NAS and SAN. In your answer define what each is, how they are implemented andappropriate uses.
    • Network-attached Storage (NAS)
    • -a storage architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers
    • Storage area network (SAN)
    • -a high-speed interconnection between general-purpose servers and a separate storage server; sotrage accesses are at the level of disk sectors in a logical address space
  46. Compare and Contrast RAID 0,1, and 5.
    • RAID 0 data striping without redundancy
    • RAID 1 mirroring
    • RAID 5 data block striping with parity check data stored on multiple disks
    • generate parity bits for data bytes or blocks and store them on one or more of the RAID disks, if a single disk fails, no data is lost because of missing bits can be reconstructed from the data and parity bits on the remaining disks
    • some read operaions don't require parity computations
    • RAID 0 and 5
    • use data striping while RAID 1 disk mirroring,
    • data striping improves read performance by breaking a large read operation into smaller parallel read operations,
    • the elapsed time to perform an entire read or write operation is reduced
    • overhead is incurred
    • achieve fault tolerance by generating and storing redundant data during each write operaion
    • RAID 1
    • reduced system performance
    • if one device fails, the other device contains a duplicate of all data
    • data is available continuously because either device can respond to a read request

What would you like to do?

Home > Flashcards > Print Preview