Deck 4: Hardware and Software
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/143
Play
Full screen (f)
Deck 4: Hardware and Software
1
Cloud computing is more efficient because
A)it adds to the ability to store data.
B)it is pay for service software.
C)customers pay for what they use.
D)it adds to the ability to access data remotely.
E)it uses several computers to address a single problem.
A)it adds to the ability to store data.
B)it is pay for service software.
C)customers pay for what they use.
D)it adds to the ability to access data remotely.
E)it uses several computers to address a single problem.
C
2
The __________ system manages the computer's resources.
A)operating
B)application
C)information
D)software
E)open source
A)operating
B)application
C)information
D)software
E)open source
operating
3
Business people who prefer to ignore technology and leave technology knowledge strictly to the technology professionals are giving the (a)__________to others in the industry.
A)competitive advantage
B)appropriate timing
C)information systems
D)software edge
E)customer management edge
A)competitive advantage
B)appropriate timing
C)information systems
D)software edge
E)customer management edge
competitive advantage
4
One__________ is equivalent to 1024 GB.
A)kilobyte
B)gigabyte
C)megabyte
D)gigaflop
E)terabyte
A)kilobyte
B)gigabyte
C)megabyte
D)gigaflop
E)terabyte
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
5
Grid computing use software to
A)share operating systems among a number of computers.
B)coordinate all the activities in a large collection of computers.
C)divide and apportion pieces of a program among several computers.
D)allow multiple operating systems to operate on a single computer.
E)create a private network of computers at a school or company.
A)share operating systems among a number of computers.
B)coordinate all the activities in a large collection of computers.
C)divide and apportion pieces of a program among several computers.
D)allow multiple operating systems to operate on a single computer.
E)create a private network of computers at a school or company.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
6
Reading articles about technology trends specific to your business,attending workshops on technology trends,and reading technology ads are all examples of
A)looking for a technology job.
B)customer management trends.
C)ways of staying current in your business.
D)ways of staying current on technology.
E)vendor retrieval.
A)looking for a technology job.
B)customer management trends.
C)ways of staying current in your business.
D)ways of staying current on technology.
E)vendor retrieval.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
7
Users employ__________ computers for work processing, spreadsheets, and database access.
A)operating
B)dumb terminal
C)custom
D)server
E)client
A)operating
B)dumb terminal
C)custom
D)server
E)client
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
8
Main memory is an example of
A)volatile memory.
B)optical memory.
C)cache memory.
D)input memory.
E)non -volatile memory.
A)volatile memory.
B)optical memory.
C)cache memory.
D)input memory.
E)non -volatile memory.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
9
Which device listed below is an example of a processing hardware device?
A)Printer
B)Keyboard
C)Magnetic tape
D)Touch screen
E)Main memory
A)Printer
B)Keyboard
C)Magnetic tape
D)Touch screen
E)Main memory
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
10
As predicted by Moore's Law,the capacity of storage devices is___________as the costs __________
A)increasing; decrease
B)increasing; increase
C)decreasing; stay the same
D)increasing; stay the same
E)decreasing; decrease
A)increasing; decrease
B)increasing; increase
C)decreasing; stay the same
D)increasing; stay the same
E)decreasing; decrease
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
11
What of the following is not a function of the central processing unit?
A)Stores results in memory
B)Selects instructions
C)Performs calculations
D)Stores data
E)Performs arithmetic and logical comparisons
A)Stores results in memory
B)Selects instructions
C)Performs calculations
D)Stores data
E)Performs arithmetic and logical comparisons
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
12
Linux is an example of
A)one -of -a -kind application.
B)an application.
C)open source software.
D)vertical -market software.
E)horizontal -market software.
A)one -of -a -kind application.
B)an application.
C)open source software.
D)vertical -market software.
E)horizontal -market software.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
13
Data in the CPU is processed in the form of
A)bits.
B)dots.
C)pixels.
D)bytes.
E)characters.
A)bits.
B)dots.
C)pixels.
D)bytes.
E)characters.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
14
To keep from getting a virus on your computer,be sure never to download files,programs,or attachments from__________ web sites.
A)unknown
B)hijacked
C)private
D)commercial
E)pirated
A)unknown
B)hijacked
C)private
D)commercial
E)pirated
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
15
When you purchase a copy of Microsoft Windows 7,
A)you own the software.
B)you purchased the right to use the software.
C)you are licensed to use the software.
D)A and C.
E)B and C.
A)you own the software.
B)you purchased the right to use the software.
C)you are licensed to use the software.
D)A and C.
E)B and C.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
16
Which device listed below is an example of a storage hardware device?
A)Printer
B)Mouse
C)Keyboard
D)Optical disk
E)Bar code scanner
A)Printer
B)Mouse
C)Keyboard
D)Optical disk
E)Bar code scanner
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
17
Instructions move from main memory into the CPU via the (a)
A)memory chip.
B)network card.
C)cache.
D)operating system.
E)data channel.
A)memory chip.
B)network card.
C)cache.
D)operating system.
E)data channel.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
18
The first patent on a digital computer was filed in to others in the industry.
A)1950.
B)1939.
C)1947.
D)1960.
E)1895.
A)1950.
B)1939.
C)1947.
D)1960.
E)1895.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
19
Data moves between main memory and the CPU via (the)
A)CPU.
B)data application.
C)data bus.
D)instruction set.
E)main memory.
A)CPU.
B)data application.
C)data bus.
D)instruction set.
E)main memory.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
20
__________ Is installed in special,read -only memory in devices like printers or communication devices.
A)Vertical -market
B)Application
C)BIOS
D)Operating system
E)Firmware
A)Vertical -market
B)Application
C)BIOS
D)Operating system
E)Firmware
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is an example of an output device?
A)A microphone
B)A scanner
C)A mouse
D)A computer keyboard
E)A set of headphones
A)A microphone
B)A scanner
C)A mouse
D)A computer keyboard
E)A set of headphones
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
22
Software that provides capabilities common across all organizations and industries are called
A)productivity software.
B)supply chain management software.
C)enterprise resource planning software.
D)value chain management software.
E)operating system software.
A)productivity software.
B)supply chain management software.
C)enterprise resource planning software.
D)value chain management software.
E)operating system software.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
23
A grocery scanning check out system is an example of
A)horizontal -market software.
B)system software.
C)firmware.
D)vertical -market software.
E)operating system software.
A)horizontal -market software.
B)system software.
C)firmware.
D)vertical -market software.
E)operating system software.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
24
The__________ of a CPU is measured in hertz.
A)clock speed
B)data bus
C)dot pitch
D)seek time
E)size
A)clock speed
B)data bus
C)dot pitch
D)seek time
E)size
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
25
Customer relationship management can be delivered over the Internet through the use of
A)server farms.
B)grid computing.
C)thick clients.
D)thin clients.
E)cloud computing.
A)server farms.
B)grid computing.
C)thick clients.
D)thin clients.
E)cloud computing.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
26
A virus delivers a(n)__________when its program deletes programs and data.
A)packet
B)bomb
C)payload
D)MB
E)worm
A)packet
B)bomb
C)payload
D)MB
E)worm
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
27
Perhaps falsely,__________is generally regarded as one of the more difficult operating systems to learn to use.
A)Windows Vista
B)Mac OS X
C)Unix
D)Linux
E)Windows XP
A)Windows Vista
B)Mac OS X
C)Unix
D)Linux
E)Windows XP
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is an example of an operating system?
A)Java
B)Glass Fish
C)Leopard
D)Boot Camp
E)VMware Fusion
A)Java
B)Glass Fish
C)Leopard
D)Boot Camp
E)VMware Fusion
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
29
Hardware includes all of the following except
A)instruction sets.
B)CPUs.
C)monitors.
D)printers.
E)motherboards.
A)instruction sets.
B)CPUs.
C)monitors.
D)printers.
E)motherboards.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following computers is based on vacuum tube technology?
A)Apple Macintosh
B)Intel Pentium 4
C)IBM 650
D)IBM Z96
E)Texas Instrument TI -99/4
A)Apple Macintosh
B)Intel Pentium 4
C)IBM 650
D)IBM Z96
E)Texas Instrument TI -99/4
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
31
__________is designed to increase the overall throughput of the CPU.
A)Cache memory
B)Non -volatile memory
C)Volatile memory
D)Main memory
E)Seek time
A)Cache memory
B)Non -volatile memory
C)Volatile memory
D)Main memory
E)Seek time
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
32
A __________is a virus that disguises itself as a program or game and secretly delivers a payload.
A)worm
B)zombie
C)time bomb
D)Trojan horse
E)macro
A)worm
B)zombie
C)time bomb
D)Trojan horse
E)macro
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
33
A kilobyte is a collection of
A)1024 gigabytes.
B)8 bytes.
C)512 bytes.
D)1024 megabytes.
E)1024 bytes.
A)1024 gigabytes.
B)8 bytes.
C)512 bytes.
D)1024 megabytes.
E)1024 bytes.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
34
A __________is the smallest piece of data in this list.
A)table
B)record
C)file
D)field
E)byte
A)table
B)record
C)file
D)field
E)byte
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
35
A__________ is a virus that replicates itself over the Internet and other networks.
A)Trojan horse
B)worm
C)time bomb
D)macro
E)patch
A)Trojan horse
B)worm
C)time bomb
D)macro
E)patch
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
36
A__________virus attaches itself to Word,Excel,or other type of documents.
A)macro
B)worm
C)Trojan horse
D)payload
E)time bomb
A)macro
B)worm
C)Trojan horse
D)payload
E)time bomb
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
37
A computer monitor is an example of
A)software.
B)data.
C)hardware.
D)spaceware.
E)a DSS.
A)software.
B)data.
C)hardware.
D)spaceware.
E)a DSS.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
38
A bar code scanner is an example of a(n)
A)processing device.
B)storage device.
C)optical device.
D)input device.
E)output device.
A)processing device.
B)storage device.
C)optical device.
D)input device.
E)output device.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
39
The Y2K problem refers to
A)the use of 2 digits to represent the year in early computers.
B)the use of the 1929 rule to determine the first two digits of the year.
C)the inability of all computers to function after year 2000.
D)the use of 4 digits to represent the year in early computers.
E)a manufacturing flaw in some Intel processors in 1998.
A)the use of 2 digits to represent the year in early computers.
B)the use of the 1929 rule to determine the first two digits of the year.
C)the inability of all computers to function after year 2000.
D)the use of 4 digits to represent the year in early computers.
E)a manufacturing flaw in some Intel processors in 1998.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
40
A spreadsheet program is an example of
A)vertical -market software.
B)system software.
C)operating system software.
D)horizontal -market software.
E)firmware.
A)vertical -market software.
B)system software.
C)operating system software.
D)horizontal -market software.
E)firmware.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is an example of optical storage media?
A)Cache
B)Memory chip
C)A hard drive
D)A USB memory key
E)DVD disc
A)Cache
B)Memory chip
C)A hard drive
D)A USB memory key
E)DVD disc
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
42
__________application software like a word processor application provides common capabilities across all organizations and industries.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
43
__________software consists of programs that perform business functions like general ledger and accounting.
A)Tailor -made
B)Application
C)Operating system
D)Vertical -market software
E)Firmware
A)Tailor -made
B)Application
C)Operating system
D)Vertical -market software
E)Firmware
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
44
Software vendors should make it easy for users to download and apply__________to fix known holes in their software.
A)repairs
B)viruses
C)bugs
D)patches
E)encryption keys
A)repairs
B)viruses
C)bugs
D)patches
E)encryption keys
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
45
Which device listed below is an example of an output hardware device?
A)Keyboard
B)Printer
C)Magnetic tape
D)Bar code scanner
E)Touch screen
A)Keyboard
B)Printer
C)Magnetic tape
D)Bar code scanner
E)Touch screen
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
46
Which device listed below is not an example of an input hardware device?
A)Keyboard
B)Printer
C)Bar code scanner
D)Microphone
E)Mouse
A)Keyboard
B)Printer
C)Bar code scanner
D)Microphone
E)Mouse
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
47
A(n)__________is equal to 1024 gigabytes.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
48
In 2003,the__________ worm clogged the Internet and caused Bank of America ATM machines and information systems of hundreds of other organizations to fail.
A)911
B)viral
C)Michelangelo
D)Trojan
E)Slammer
A)911
B)viral
C)Michelangelo
D)Trojan
E)Slammer
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
49
If you install the specialized software given to you by a supply chain partner,it should be carefully checked for
A)errors.
B)bugs.
C)Trojan horses.
D)ease of use.
E)query optimization.
A)errors.
B)bugs.
C)Trojan horses.
D)ease of use.
E)query optimization.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
50
The operating system employs__________ so that users can run multiple applications and files at the same time.
A)main memory
B)memory swapping
C)patches
D)seek time
E)rotational delay
A)main memory
B)memory swapping
C)patches
D)seek time
E)rotational delay
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
51
A bit has a value of
A)1024.
B)0 or 1.
C)1)
D)1001010.
E)0)
A)1024.
B)0 or 1.
C)1)
D)1001010.
E)0)
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
52
Volatile memory means that
A)such devices are fragile.
B)such devices are susceptible to electromagnetic interference.
C)these devices maintain there contents as soon as the content is added to them.
D)these devices are cheaper than non -volatile memory.
E)the contents are lost once power is off.
A)such devices are fragile.
B)such devices are susceptible to electromagnetic interference.
C)these devices maintain there contents as soon as the content is added to them.
D)these devices are cheaper than non -volatile memory.
E)the contents are lost once power is off.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
53
A__________ is a virus that propagates using the Internet or other computer network.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is an example of an output device?
A)A microphone
B)A laser printer
C)A computer keyboard
D)A scanner
E)A mouse
A)A microphone
B)A laser printer
C)A computer keyboard
D)A scanner
E)A mouse
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
55
Volatile memory__________ data when the power is turned off.
A)corrects
B)backs up
C)removes
D)loses
E)saves
A)corrects
B)backs up
C)removes
D)loses
E)saves
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
56
When one buys an operating system like Windows 7,you are actually buying (a)software
A)upgrade.
B)copyright.
C)rights.
D)version.
E)license.
A)upgrade.
B)copyright.
C)rights.
D)version.
E)license.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
57
The Slammer virus that clogged the Internet in 2003 is an example of a(n)___________.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
58
Bytes consist of__________ bits of memory.
A)6
B)8
C)4
D)2
E)12
A)6
B)8
C)4
D)2
E)12
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
59
Software that is installed often in special,read -only memory in devices like printers or communication devices is called ___________.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
60
Vertical market software refers to
A)productivity software.
B)supply chain management software.
C)value chain management software.
D)industry specific software.
E)enterprise resource planning software.
A)productivity software.
B)supply chain management software.
C)value chain management software.
D)industry specific software.
E)enterprise resource planning software.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
61
Software that is tailor -made for special applications is called__________ Software
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
62
Computer programs like QuickBooks that perform a specific business function are called__________software.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
63
The__________ of the CPU continues to increase according to Moore's Law.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
64
The tremendous growth in the amount of new data being created today is largely because of storing audio and__________files.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
65
Viruses that are specifically programmed to spread are called__________ .
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)_____is equal to 1024 MB.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
67
The __________is a loosely coupled group of programmers who mostly volunteer their time to code various projects.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
68
Users of cloud computing______the usage of computers from third -party providers.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
69
__________memory helps speed up the overall throughput of the CPU.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
70
A__________ stipulates how a program may be used by the purchaser.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
71
A byte is equivalent to one_______of information.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
72
The __________is a computer program that controls all of the computer's resources.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
73
__________application software serves the needs of a specific industry.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
74
__________programs search the computer's memory and disk for known viruses.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
75
__________computers have been used primarily by graphic artists and workers in the arts community.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
76
Gigahertz (GHz)stands for______of cycles per second
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
77
__________is a version of Unix that was developed by the open source community.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
78
__________viruses attach themselves to Word,Excel,or other type of documents.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
79
__________was developed by Bell Labs and is generally regarded as more difficult to use than Windows or Mac OS.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck
80
The clock speed of the CPU is measured in__________, or cycles per second.
Unlock Deck
Unlock for access to all 143 flashcards in this deck.
Unlock Deck
k this deck