Management Chapter 5 System Software explanation true false Write T

subject Type Homework Help
subject Pages 9
subject Words 2096
subject Authors George Schell, Raymond McLeod

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Exam
Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1)
Which computer device is not an input/output device?
1)
A)
zip disk
B)
floppy disk
C)
touch-screen
D)
printer
2)
What is a common standard for encrypting data over a wireless home network?
2)
A)
Spyware
B)
Java
C)
ASP
D)
WEP
3)
A network that has a physical distance limit of roughly 30 miles is known as a(n):
3)
A)
Internet.
B)
MAN.
C)
LAN.
D)
WAN.
4)
People who try to break into computer systems in order to gather information, deny the owner
access to his or her computer resources, delete files, or otherwise disrupt the use of the
microcomputer by its owner are called:
4)
A)
hackers.
B)
trackers.
C)
slackers.
D)
smackers.
5)
Which of the following statements is false regarding user-friendly software?
5)
A)
The software has been carefully engineered to accommodate a wide range of users.
B)
User-friendly programs are easy to write.
C)
The software is simple and intuitive to use.
D)
The software has gained widespread use.
1
page-pf2
6)
Which of the following types of storage is fixed?
6)
A)
hard drive
B)
zip disk
C)
CD
D)
tape
7)
Which protocol is important for packet switching?
7)
A)
peer-to-peer
B)
open protocol
C)
Token Ring
D)
TCP/IP
8)
The type of modem that connects most home computers to the Internet is the:
8)
A)
DSL.
B)
telephone modem.
C)
cable modem.
D)
ISDN.
9)
The PDA that gained its popularity by being one of the first to effectively utilize seamless
communications roaming across the United States, Europe, and Asia was the:
9)
A)
Nokia.
B)
Handspring.
C)
Palm.
D)
BlackBerry.
10)
Which storage type is rewritable?
10)
A)
DVD
B)
CD-RW
C)
CD
D)
CD-R
11)
A group of computers and other devices that are connected together by a common medium is
called a:
11)
A)
WAN.
B)
MAN.
C)
HUB.
D)
LAN.
page-pf3
12)
The type of connection that is used for authorized users of a network outside the boundaries of the
firm is called a(n):
12)
A)
intranet.
B)
internet.
C)
extranet.
D)
Internet.
13)
Which is not an advantage of ink-jet printers?
13)
A)
They are mechanically small.
B)
They generally cost less than laser printers.
C)
They produce color output at a relatively low cost.
D)
They produce copier quality pages.
14)
Which of the following is not a characteristic of personal computing devices?
14)
A)
ability to synchronize data files with other computer resources
B)
small, but functional display screen
C)
wireless network access
D)
short battery life between recharging
15)
In the Open Systems Interconnect Reference Model which layer routes data from one network
address to another?
15)
A)
network layer
B)
transport layer
C)
physical layer
D)
data link layer
16)
Which Internet connection provides the fastest speed?
16)
A)
telephone modem
B)
ISDN
C)
DSL
D)
cable modem
page-pf4
17)
Which storage type holds the most data?
17)
A)
DVD
B)
Zip disk
C)
CD
D)
3½ inch floppy
18)
A small computer program that monitors what you are doing with your computer resources is
called:
18)
A)
spyware.
B)
antivirus software.
C)
off-the-shelf software.
D)
pop-ups.
19)
Which processor speed refers to millions of cycles per second?
19)
A)
megabyte
B)
gigahertz
C)
terahertz
D)
megahertz
20)
Which is not a common feature of personal digital assistants?
20)
A)
word processing
B)
contact lists
C)
notes
D)
calendars
21)
Which is not considered a human-captured data device?
21)
A)
bar code
B)
touching a monitor
C)
speaking into a microphone
D)
clicking a mouse
page-pf5
22)
Which of the following is not important for today’s computers to achieve their remarkable growth
of power?
22)
A)
storage capacity
B)
word size
C)
circuitry improvement
D)
processor speed
23)
Which of the following is not a major computer component?
23)
A)
storage
B)
memory
C)
CPU
D)
bus
24)
The type of printer that sprays ink onto the surface of the paper is a(n):
24)
A)
laser printer.
B)
dot-matrix printer.
C)
ink-jet printer.
D)
plotter.
25)
Which type of communications line is the least expensive?
25)
A)
dedicated line
B)
private line
C)
leased line
D)
virtual private network
26)
Worms are:
26)
A)
protocols for accessing the Internet.
B)
self-contained files or programs.
C)
SIMM.
D)
read-only memory.
page-pf6
27)
Which computer is today’s fastest computer?
27)
A)
Blue Gene/L
B)
Earth Simulator
C)
Deep Blue
D)
Flight Simulator
28)
Which of the following performs certain fundamental tasks that all users of a particular computer
require?
28)
A)
system software
B)
translator program
C)
utility program
D)
application software
29)
Which protocol is referred to as the Token Ring?
29)
A)
open protocol
B)
peer-to-peer
C)
OSI
D)
system Network Architecture
30)
Which computer component is a device that captures data by a manual or electronic method and
transmits the data to storage or memory?
30)
A)
CPU
B)
input device
C)
output device
D)
RAM
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
31)
A ________ is the specifications for formatting data to be transferred between
communications equipment.
31)
32)
________ support hundreds or thousands of simultaneous users and operations.
32)
33)
________ is data captured by an electronic or mechanical device.
33)
page-pf7
34)
________ is produced by suppliers and sold to users.
34)
35)
________ are small computer programs that replicate by inserting themselves into
computer resources such as programs or files.
35)
36)
________ are people who try to break into computer systems in order to gather
information, deny the owner access to his or her computer resources, delete files, or
otherwise disrupt the use of the microcomputer by its owner.
36)
37)
________ are self-contained files or programs.
37)
38)
A cell phone is considered to be a ________ when it performs tasks typically associated
with microcomputers.
38)
39)
M ________ is the most widely adopted protocol in Europe, Asia, Africa, and Australia.
39)
40)
________ is software anyone can use for free and change it to meet their particular needs.
40)
41)
________ began as computers used by one person.
41)
42)
________ refers to input captured by a person typing on a keyboard, clicking a mouse,
touching a monitor, speaking into a microphone, or a similar interaction.
42)
43)
The main evolution of input and output devices is in the direction of ________, the use of
more than one medium at a time.
43)
44)
A ________ is a device to connect computers over standard telephone lines.
44)
page-pf8
45)
________ performs certain fundamental tasks that all users of a particular computer
require.
45)
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
46)
Today’s personal computing devices do not include the personal computer.
46)
47)
Digital video disks hold from 5 GB to 20 GB of data.
47)
48)
When the first computers were developed, there were no programming languages.
48)
49)
The operating system manages the computer’s processes, functioning as an interface connecting the
user, the application software, and the hardware.
49)
50)
Ethernet is a proprietary network for peer-to-peer communications.
50)
51)
The real importance of point-of-sale terminals is their technological sophistication.
51)
52)
Word size determines how many characters can be moved in a single cycle of the processor.
52)
53)
The ISO consists of a seven-layer model for network connections.
53)
54)
Processor speeds were originally expressed in gigahertz.
54)
55)
ISDN stands for Integrated Services Digital Network.
55)
page-pf9
56)
A cell phone is considered to be a smart phone when it performs tasks typically associated with
microcomputers.
56)
57)
Mainframe computers support hundreds or thousands of simultaneous users and operations.
57)
58)
User-friendly software is also programmer-friendly.
58)
59)
The key feature of today’s personal computing devices is their mobility.
59)
60)
Ethernet networks use a star topology.
60)
61)
To route packets through the Internet, an IP address is used.
61)
62)
When a business has its own programmers to write application software, the software is called
custom application software.
62)
63)
T-3 lines are generally available for home use.
63)
64)
A peer-to-peer protocol allows each computer to act as its own controller.
64)
65)
A packet is a piece of the total data to be communicated, combined with the address of the
destination computer, the sending computer, and other control information.
65)
66)
An intranet limits accessibility to computer resources to a select group of persons beyond the
boundaries of the firm.
66)
page-pfa
67)
The Internet is a collection of networks that can be joined together.
67)
68)
Retail stores have the option of placing bar codes on every product sold.
68)
69)
If two peer computers try to send data at the same time, a data transmission crash occurs.
69)
70)
A cable modem connects to the fiber optics cable provided by a cable TV provider to a computer
for Internet access.
70)
71)
Laser printers essentially act as copier machines.
71)
72)
Protocols for the public telephone systems were established to meet the minimum criteria of digital
transmissions.
72)
73)
Asynchronous transfer mode requires smaller packets than earlier protocols and increases the
speed of transmission.
73)
74)
An open protocol is open to the public and allowed to be used without cost.
74)
75)
The hard drive is fixed storage because it is permanently installed in the computer.
75)
ESSAY. Write your answer in the space provided or on a separate sheet of paper.
76)
What are the benefits of having prewritten software?
page-pfb
77)
List the characteristics of software that is said to be user friendly.
78)
Describe the three different sizes of networks.
79)
Define multimedia and explain how it has provided access to a group of users that may never have had
computer access before.
80)
Name the major computer components and provide a brief description of each.
11

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.