Deck 3: Hardware, software, and Networks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
Play
Full screen (f)
Deck 3: Hardware, software, and Networks
1
The CPU is considered "the brain" of the computer.
True
2
Custom software developed in-house is the first choice for most companies due to its low costs.
False
3
Object-oriented languages are required to create thin-client applications.
False
4
A server is a computer that is designed to support processing from many remote computers and users.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
The standard way for distributing native applications is via a company store.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
Magnetic and optical disks are nonvolatile.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
Vertical-market application software provides capabilities that can be applied across all organizations and industries.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
Main memory is also called random access memory (RAM).
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
Mac OS is the operating system used on the iPhone,iPad,and iPod Touch.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
RAM,or the main memory of a computer,is considered nonvolatile.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
Operating systems generally do little application-specific work.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
Linux is a version of Unix that was developed by the open source community.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
Magnetic disks are the most common form of storage hardware.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
A kilobyte is exactly 1,024 bits.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
Unix is generally regarded as being more easy to use than Windows.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
The CPU stores results of operations on the flash drive.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
A collection of thousands of servers is called a server farm.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
Native applications are preferred to thin-client applications because they require only a browser.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
The CPU selects instructions,processes them,performs arithmetic and logical comparisons,and stores results of operations in memory.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
Machine code is easily understood by humans.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
A given version of a thin-client application will run only on one operating system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
Simple Mail Transfer Protocol (SMTP)is the transmission protocol used primarily to move files over the Internet.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
The Internet is a network of networks connecting LANs,WANs,and other internets.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
Native applications created for one OS must be recoded to run on a different OS.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
Wireless LAN connections are governed by IEEE standard 802.3.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
Chrome is a term that is used to measure the percentage of display given to users' content.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
Thin-client applications are limited by the capabilities of the browser.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
Bluetooth is a wireless protocol designed for transmitting data over short distances.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
For two devices to communicate,they must use the same protocol.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
Wide area networks are used to connect computers that reside in a single geographic location.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
Updates to thin-client applications require re-installation of the operating system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
Roaming occurs when users move their activities across devices.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
A user interface (UI)is the presentation format of an application.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
A digital subscriber line (DSL)operates on the same lines as voice telephones,but do not interfere with voice telephone service.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
Push data is data that the server sends to the device.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
The protocol architecture of the Internet uses a scheme of five protocol types arranged in layers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
Hyper Text Transport Protocol (HTTP)is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
NIC (Network Interface Controller)devices in laptops and printers have been replaced by WNIC (wireless NIC)devices.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
The distinguishing characteristic of a LAN from a WAN is that it is confined to a single geographic location.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
The protocols used on the Internet are arranged according to a structure known as File Transfer Protocol (FTP).
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
Computers represent data using ________.
A) binary digits
B) alphabets
C) alphanumerics
D) quantum numbers
A) binary digits
B) alphabets
C) alphanumerics
D) quantum numbers
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following devices is a tablet?
A) Motorola Droid
B) Apple Mac Pro
C) Microsoft Surface
D) Dell PowerEdge
A) Motorola Droid
B) Apple Mac Pro
C) Microsoft Surface
D) Dell PowerEdge
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is an example of a storage device?
A) optical disk
B) router
C) scanner
D) UPC reader
A) optical disk
B) router
C) scanner
D) UPC reader
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
A Web page is a document that is coded in one of the standard page markup languages.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is an example of an optical disk?
A) magnetic disk
B) thumb drive
C) SSD
D) DVD
A) magnetic disk
B) thumb drive
C) SSD
D) DVD
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
HTML is a markup language that is commonly used for program-to-program interaction over the Web.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
Cloud computing is a form of hardware/software leasing in which organizations obtain server resources from vendors.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
Application programs are provided by vendors under platform as a service (PaaS).
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
To ensure acceptable performance,commercial Web sites are usually supported by Web server computers in a facility called a Web farm.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
The CPU works in conjunction with ________.
A) magnetic disks
B) main memory
C) wired data communication devices
D) wireless data communication devices
A) magnetic disks
B) main memory
C) wired data communication devices
D) wireless data communication devices
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following statements about computer data is true?
A) A binary digit is either a zero or a one.
B) All computer data is represented by alphabets.
C) Binary digits are grouped into 100-bit chunks called bytes.
D) Bytes are only used to measure sizes of character data.
A) A binary digit is either a zero or a one.
B) All computer data is represented by alphabets.
C) Binary digits are grouped into 100-bit chunks called bytes.
D) Bytes are only used to measure sizes of character data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
A browser like Google Chrome usually implements the File Transfer Protocol.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
In the three-tier architecture,the server tier consists of computers,phones,and other devices that have browsers that request and process Web pages.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
Most e-commerce applications use the three-tier architecture.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
________ are small,portable magnetic storage devices that can be used to transfer data from one computer to another.
A) Cloud servers
B) Thumb drives
C) Compact disks
D) Blu-ray disks
A) Cloud servers
B) Thumb drives
C) Compact disks
D) Blu-ray disks
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
A kilobyte is exactly ________.
A) 1,024 bytes
B) 1,000 bytes
C) 1,024 bits
D) 8 bytes
A) 1,024 bytes
B) 1,000 bytes
C) 1,024 bits
D) 8 bytes
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
A commerce server is an application program that runs on a server-tier computer.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
________ consist(s)of electronic components and related gadgetry that input,process,output,and store data according to instructions encoded in computer programs.
A) Software
B) Hardware
C) Programs
D) Operating systems
A) Software
B) Hardware
C) Programs
D) Operating systems
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is the largest unit of data for computer memory?
A) gigabyte
B) terabyte
C) megabyte
D) exabyte
A) gigabyte
B) terabyte
C) megabyte
D) exabyte
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
XML is the most popular markup language for defining the structure and layout of Web pages.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a mobile client operating system?
A) Unix
B) Mac OS X
C) Android
D) Linux
A) Unix
B) Mac OS X
C) Android
D) Linux
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following statements is true about desktop virtualization?
A) It refers to a system in which a desktop hosts only one desktop operating system.
B) It refers to a system in which a server hosts one or more server computers.
C) It allows a user to access the virtualized server from any computer.
D) It allows a user to access the virtualized desktop from any computer.
A) It refers to a system in which a desktop hosts only one desktop operating system.
B) It refers to a system in which a server hosts one or more server computers.
C) It allows a user to access the virtualized server from any computer.
D) It allows a user to access the virtualized desktop from any computer.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
________ is the process by which multiple operating systems share the same hardware.
A) Hyperlinking
B) Additive manufacturing
C) Virtualization
D) Dual-core processing
A) Hyperlinking
B) Additive manufacturing
C) Virtualization
D) Dual-core processing
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
The cache and main memory lose their contents when the power is off.Hence,they are considered to be ________.
A) kinetic
B) static
C) volatile
D) nonvolatile
A) kinetic
B) static
C) volatile
D) nonvolatile
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following statements is true about quality mobile user experiences?
A) Apple was the first to introduce charms icons on its iPad.
B) Context-sensitive chrome appears only when appropriate.
C) Roaming is achieved without the use of cloud services.
D) Push data is data that the device requests from the server.
A) Apple was the first to introduce charms icons on its iPad.
B) Context-sensitive chrome appears only when appropriate.
C) Roaming is achieved without the use of cloud services.
D) Push data is data that the device requests from the server.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)________ connects computers that reside in a single geographic location.
A) URL
B) WAN
C) HTTP
D) LAN
A) URL
B) WAN
C) HTTP
D) LAN
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
When a Windows license is bought,Microsoft ________.
A) sells the buyer the right to use Windows
B) transfers the ownership of Windows to the buyer
C) provides the buyer with the source code for Windows
D) allows the buyer to make any number of copies of the Windows program
A) sells the buyer the right to use Windows
B) transfers the ownership of Windows to the buyer
C) provides the buyer with the source code for Windows
D) allows the buyer to make any number of copies of the Windows program
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
A megabyte is equal to ________.
A) 1,024 bytes
B) 1,024 KB
C) 1,024 TB
D) 1,024 GB
A) 1,024 bytes
B) 1,024 KB
C) 1,024 TB
D) 1,024 GB
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
CPU speed is expressed in cycles called ________.
A) hertz
B) bytes
C) bits
D) pixels
A) hertz
B) bytes
C) bits
D) pixels
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is true about thin-client applications?
A) They are developed using serious, heavy-duty, professional programming languages.
B) They are more expensive relative to native applications.
C) They need to be manually updated from time to time.
D) They run inside a browser.
A) They are developed using serious, heavy-duty, professional programming languages.
B) They are more expensive relative to native applications.
C) They need to be manually updated from time to time.
D) They run inside a browser.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is a difference between native and thin-client applications?
A) Native applications are developed using HTML5, whereas thin-client applications are developed using Objective-C.
B) Native applications are generally written by technically-oriented business professionals, whereas thin-client applications are developed by professional programmers.
C) Thin-client applications generally cost more than native applications.
D) Thin-client applications have less sophisticated user experiences than native applications.
A) Native applications are developed using HTML5, whereas thin-client applications are developed using Objective-C.
B) Native applications are generally written by technically-oriented business professionals, whereas thin-client applications are developed by professional programmers.
C) Thin-client applications generally cost more than native applications.
D) Thin-client applications have less sophisticated user experiences than native applications.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
________ is an open source variant of Unix that is free to use.
A) Mac OS
B) AmigaOS
C) Windows
D) Linux
A) Mac OS
B) AmigaOS
C) Windows
D) Linux
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
The computers in a hospital are most likely connected to each other using ________.
A) WAN
B) VPN
C) LAN
D) Bluetooth
A) WAN
B) VPN
C) LAN
D) Bluetooth
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following statements is true about scaling of applications?
A) Modern operating systems do not support scaling of native applications based on the device.
B) Based on the device on which it is running, IE 10 chooses the size and version of graphics.
C) Applications must be designed to scale up and block out other applications from the display area.
D) Charms is the term used to refer to applications that support scaling on various devices.
A) Modern operating systems do not support scaling of native applications based on the device.
B) Based on the device on which it is running, IE 10 chooses the size and version of graphics.
C) Applications must be designed to scale up and block out other applications from the display area.
D) Charms is the term used to refer to applications that support scaling on various devices.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
Mac OS is an example of a ________.
A) nonmobile client operating system
B) mobile client operating system
C) nonmobile application program
D) mobile application program
A) nonmobile client operating system
B) mobile client operating system
C) nonmobile application program
D) mobile application program
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is an example of a horizontal-market application software?
A) a software developed by the IRS for its own needs
B) ArtRage, the iPad application
C) AutoCad
D) Microsoft Excel
A) a software developed by the IRS for its own needs
B) ArtRage, the iPad application
C) AutoCad
D) Microsoft Excel
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following statements is true about content in quality mobile user interfaces?
A) Menus and toolbars must be given a significant portion of the display.
B) Users' content on a computer display is referred to as chrome.
C) Using content to drive application behavior is called direct interaction.
D) Context-sensitive chrome is present whenever the users' contents are being displayed.
A) Menus and toolbars must be given a significant portion of the display.
B) Users' content on a computer display is referred to as chrome.
C) Using content to drive application behavior is called direct interaction.
D) Context-sensitive chrome is present whenever the users' contents are being displayed.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
Phobas Inc.develops a new software named "ET Fanome" to meet its own needs and requirements.The software isn't sold to the public or other organizations.Such a software is called ________.
A) vertical-market application software
B) horizontal-market application software
C) one-of-a-kind application software
D) open source software
A) vertical-market application software
B) horizontal-market application software
C) one-of-a-kind application software
D) open source software
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following statements is true of native applications?
A) Native applications are developed using professional programming languages.
B) Native applications are less expensive than thin-client applications.
C) Native applications can be developed by less-skilled, lesser-paid employees.
D) The same version of native applications will run on all operating systems.
A) Native applications are developed using professional programming languages.
B) Native applications are less expensive than thin-client applications.
C) Native applications can be developed by less-skilled, lesser-paid employees.
D) The same version of native applications will run on all operating systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following is a feature of open source projects?
A) The source code of the program cannot be modified.
B) The machine code of the program can be easily understood by humans.
C) The source code of the program is available to the public.
D) The source code cannot be obtained from the open source project's Web site.
A) The source code of the program cannot be modified.
B) The machine code of the program can be easily understood by humans.
C) The source code of the program is available to the public.
D) The source code cannot be obtained from the open source project's Web site.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck