Exam 7: Secondary Storage
Exam 1: Information Technology,The Internet,and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce80 Questions
Exam 3: Application Software69 Questions
Exam 4: System Software69 Questions
Exam 5: The System Unit77 Questions
Exam 6: Input and Output82 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
(Multiple Choice)
4.7/5
(29)
Three common storage options discussed in your text are hard disk,________,and solid-state storage.
(Multiple Choice)
4.9/5
(37)
The hard-disk's surface is scratched and some or all of the data is destroyed when there is a ________.
(Multiple Choice)
4.9/5
(34)
A ________ occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface.
(Multiple Choice)
4.7/5
(33)
File servers are appropriate devices to use in an enterprise storage system.
(True/False)
5.0/5
(36)
Which of the following characteristics about RAID is incorrect?
(Multiple Choice)
4.9/5
(39)
Typically a personal computer uses a(n)________ to store the operating system and software applications.
(Multiple Choice)
4.8/5
(31)
Due to its expanded storage capability,fast access speed,and high reliability,________ is (are)often used by Internet servers and large organizations.
(Multiple Choice)
4.8/5
(41)
CD-ROMs are often used to archive data and to record music downloaded from the Internet.
(True/False)
4.7/5
(37)
If you have used Google Docs to create a word processing document,you have used cloud computing.
(True/False)
4.7/5
(35)
One way to improve the storage capacity of a hard disk is to ________.
(Multiple Choice)
4.7/5
(35)
Most large organizations store data through a strategy called a(n)________ to promote efficient and safe use of data across the networks within their organizations.
(Multiple Choice)
4.9/5
(42)
The process of accessing information from secondary storage devices is referred to as ________.
(Multiple Choice)
4.9/5
(33)
________ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)