Deck 3: Hardware, Software, and Networks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/124
Play
Full screen (f)
Deck 3: Hardware, Software, and Networks
1
Cloud computing is a form of hardware/software leasing in which organizations obtain server resources from vendors that specialize in server processing.
True
2
The most frequently used data and instructions are placed in cache memory.
True
3
Ubuntu, a Windows-like desktop operating system, is an open source program.
True
4
Magnetic disk is the most common form of storage hardware.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
5
Thick-client applications are preferred to thin-client applications because they require only a browser.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
6
Vertical-market application software provides capabilities that can be applied across all organizations and industries.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
7
Servers need a great deal of RAM and storage space.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
8
The distinguishing characteristic of a LAN from a WAN is that it is confined to a single geographic location.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
9
Special function cards are added to computers to augment their basic capabilities.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
10
Hardware refers to both electronic components and the related gadgetry that input, process, output, and store data.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
11
The CPU stores results of operations on the flash drive.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
12
Servers in a farm coordinate their activities in a highly sophisticated and complex way.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
13
MAC OS is the operating system used on the iPhone, iPad, and iPod Touch.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
14
A kilobyte is exactly 1,024 bits.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
15
Custom software developed in-house is the first choice of most companies due to its low costs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
16
Machine code is understandable by humans.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
17
Unix is generally regarded as being more easy to use than Windows.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
18
RAM, or the main memory of a computer, is considered nonvolatile.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
19
The CPU is considered "the brain" of the computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
20
Special function cards are examples of input hardware.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
21
DSL modems operate on the same lines as voice telephones, but do not interfere with voice telephone service.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
22
The switches on each floor connect to each other via the faster-speed UTP cable.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
23
Wide area networks connect computers that reside in a single geographic location.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet is a network of networks connecting LANs, WANs, and other internets.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
25
The signals on optical fiber cables are light rays that reflect inside the glass core of the optical fiber cable.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
26
When you are using a browser like Google Chrome, you are using a program that implements the FTP protocol.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
27
DSL stands for dual subscriber line.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
28
For two devices to communicate, they must use the same protocol.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
29
The protocols used on the Internet are arranged according to a structure known as FTP.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
30
NIC devices in laptops and cell phones have been replaced by WNIC devices.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
31
Most LAN connections are made using unshielded twisted pair (UTP)cable.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
32
Routers detect the transmission speed that a given device can handle and communicate with it at that speed.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
33
TCP/ IP is an application layer protocol.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
34
The protocol architecture of the Internet uses a scheme of five protocol types arranged in layers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
35
A modulator/demodulator converts the digital data in the computer to a wavy, or analog, signal.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
36
If a connection carries a lot of traffic, it is advised to replace the UTP cable with optical fiber cables.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
37
Narrowband lines typically have transmission speeds in excess of 56 kbps, while broadband lines have speeds less than 256 kbps.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
38
SMTP is the transmission protocol used to deliver data across the Internet.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
39
ADSLs have similar upload and download speeds.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
40
Wireless local area networks are governed by IEEE standard 802.3.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following statements about computer data is true?
A) A binary digit is either a zero or a one.
B) All computer data is represented by alphabets.
C) Binary digits are grouped into 100-bit chunks called bytes.
D) Bytes are used to measure sizes of character data only.
A) A binary digit is either a zero or a one.
B) All computer data is represented by alphabets.
C) Binary digits are grouped into 100-bit chunks called bytes.
D) Bytes are used to measure sizes of character data only.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
42
A virtual private network (VPN)uses the Internet to create the appearance of private point-to-point connections.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
43
Computers represent data using ________.
A) binary digits
B) alphabets
C) alphanumerics
D) protocols
A) binary digits
B) alphabets
C) alphanumerics
D) protocols
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is the largest unit of data for computer memory?
A) gigabyte
B) kilobyte
C) megabyte
D) terabyte
A) gigabyte
B) kilobyte
C) megabyte
D) terabyte
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
45
XML is the most popular markup language.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is an input hardware device?
A) printer
B) scanner
C) thumb drive
D) projector
A) printer
B) scanner
C) thumb drive
D) projector
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is an example of a storage device?
A) optical disks
B) special function cards
C) scanners
D) UPC readers
A) optical disks
B) special function cards
C) scanners
D) UPC readers
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
48
HTML is a markup language that fixes several XML deficiencies and is commonly used for program-to-program interaction over the Web.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is an example of an optical disk?
A) magnetic disks
B) thumb drives
C) flash drives
D) Digital Versatile Disks
A) magnetic disks
B) thumb drives
C) flash drives
D) Digital Versatile Disks
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
50
In the three-tier architecture, the server tier consists of computers, phones, and other devices that have browsers that request and process Web pages.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
51
Most e-commerce applications use the three-tier architecture.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
52
To ensure acceptable performance, commercial Web sites usually are supported by Web server computers in a facility called a Web farm.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
53
The Internet transports messages as a single packet, through a router.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
54
Routers are special purpose computers that move traffic from one node on a network to another.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
55
A kilobyte is exactly ________.
A) 1,024 bytes
B) 1,000 bytes
C) 1,024 bits
D) 8 bytes
A) 1,024 bytes
B) 1,000 bytes
C) 1,024 bits
D) 8 bytes
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
56
The CPU works in conjunction with ________.
A) magnetic disks
B) main memory
C) wired data communication devices
D) wireless data communication devices
A) magnetic disks
B) main memory
C) wired data communication devices
D) wireless data communication devices
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
57
________ consist(s)of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs.
A) Software
B) Hardware
C) Programs
D) The Internet
A) Software
B) Hardware
C) Programs
D) The Internet
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
58
TCP provides reliable internet transport and IP provides internet routing.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is an example of a processing device?
A) UPC readers
B) special function cards
C) scanners
D) plotters
A) UPC readers
B) special function cards
C) scanners
D) plotters
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
60
To ensure security, VPN client software breaks the original message into packets so that its contents are protected from snooping.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
61
________ is the process whereby multiple operating systems share the same hardware.
A) Silverlight
B) Bluetooth
C) Virtualization
D) Dual processing
A) Silverlight
B) Bluetooth
C) Virtualization
D) Dual processing
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
62
A ________ is a set of rules, followed by communicating devices, that governs data communication.
A) source code
B) protocol
C) domain
D) license
A) source code
B) protocol
C) domain
D) license
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following statements is true about cloud computing?
A) It is yet to be adopted on a large scale as it is expensive.
B) It enables multiple organizations to utilize the same computing infrastructure.
C) It is the leasing out of a fixed amount of server time and resources.
D) It is difficult for cloud vendors to reconfigure servers to support changes in workload.
A) It is yet to be adopted on a large scale as it is expensive.
B) It enables multiple organizations to utilize the same computing infrastructure.
C) It is the leasing out of a fixed amount of server time and resources.
D) It is difficult for cloud vendors to reconfigure servers to support changes in workload.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
64
A program that controls the client computer's resources is called a ________.
A) client operating system
B) client application program
C) server operating system
D) server application program
A) client operating system
B) client application program
C) server operating system
D) server application program
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
65
The cache and main memory lose their contents when the power is off. Hence, they are referred to as ________.
A) kinetic
B) static
C) volatile
D) non-volatile
A) kinetic
B) static
C) volatile
D) non-volatile
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
66
The computers in a hospital are usually connected to each other using ________.
A) WAN
B) VPN
C) LAN
D) Ethernet
A) WAN
B) VPN
C) LAN
D) Ethernet
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
67
A megabyte is ________.
A) 1,024 bytes
B) 1,024 K
C) 1,024 MB
D) 1,024 GB
A) 1,024 bytes
B) 1,024 K
C) 1,024 MB
D) 1,024 GB
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
68
What particular feature of an open source project distinguishes it from a closed source project?
A) The source code of the program is not modifiable.
B) The machine code of the program can be understood by humans.
C) The source code of the program is available to the public.
D) The machine code of the program is available to the public.
A) The source code of the program is not modifiable.
B) The machine code of the program can be understood by humans.
C) The source code of the program is available to the public.
D) The machine code of the program is available to the public.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
69
To run a program or process data, a computer first transfers the program or data from the disk to the ________.
A) scanner
B) display
C) cache
D) main memory
A) scanner
B) display
C) cache
D) main memory
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
70
Today, nearly all personal computers and all mobile devices ship from the factory with an onboard ________, which allows them to connect to the Internet.
A) modem
B) WNIC
C) UTP
D) memory card
A) modem
B) WNIC
C) UTP
D) memory card
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
A) modem
B) access point
C) protocol
D) switch
A) modem
B) access point
C) protocol
D) switch
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
72
When you buy the setup CD of Microsoft Office, Microsoft is selling you ________.
A) the right to use Windows Office
B) the ownership rights of Microsoft Office
C) Microsoft Office for a short period on rent
D) the piracy rights to Microsoft Office
A) the right to use Windows Office
B) the ownership rights of Microsoft Office
C) Microsoft Office for a short period on rent
D) the piracy rights to Microsoft Office
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
73
The CIA develops a new software named "ET Fonome" to meet its own needs and requirements. The software isn't sold to the public or other organizations. Such a software is called a ________.
A) vertical-market application software
B) horizontal-market application software
C) one-of-a-kind application software
D) VPN client software
A) vertical-market application software
B) horizontal-market application software
C) one-of-a-kind application software
D) VPN client software
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
74
________ is an open source variant of Unix that has been adapted to almost every type of computing device.
A) Mac OS
B) Solaris
C) Windows
D) Linux
A) Mac OS
B) Solaris
C) Windows
D) Linux
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
75
CPU speed is expressed in cycles called ________.
A) hertz
B) bytes
C) bits
D) pixels
A) hertz
B) bytes
C) bits
D) pixels
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
76
LAN connections, made using UTP cable, contain sets of wires that are twisted together to ________.
A) improve signal quality
B) prevent against wear and tear
C) increase bandwidth
D) consume less space
A) improve signal quality
B) prevent against wear and tear
C) increase bandwidth
D) consume less space
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is an example of a horizontal-market application software?
A) a software developed by IRS for its own needs
B) FitnessBuilder, the iPad application
C) AutoCad
D) Microsoft Excel
A) a software developed by IRS for its own needs
B) FitnessBuilder, the iPad application
C) AutoCad
D) Microsoft Excel
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is a mobile client operating system?
A) Unix
B) Mac OS X
C) Android
D) Linux
A) Unix
B) Mac OS X
C) Android
D) Linux
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
79
A(n)________ connects computers that reside in a single geographic location.
A) ADSL
B) WAN
C) DSL
D) LAN
A) ADSL
B) WAN
C) DSL
D) LAN
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following is true about a thin-client application?
A) They have more features and functions than thick clients.
B) They have to be pre-installed on the client.
C) They need to be manually updated from time to time.
D) They require only a browser.
A) They have more features and functions than thick clients.
B) They have to be pre-installed on the client.
C) They need to be manually updated from time to time.
D) They require only a browser.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck