itec1000_midterm.pdf.pdf
Document Details
Uploaded by InnovativeOrientalism
York University
Tags
Related
- Des Plaines Police Department Information Technology Use PDF
- ITEC 101 - Introduction to Information Technology PDF
- Information Technology Essentials Lecture 02 PDF Fall 2024
- Information Technology Lecture Notes PDF
- Information Technology PDF
- Information Technology System Admin and Maintenance Past Paper PDF
Full Transcript
lOMoARcPSD|33666164 Itec1000 Midterm Introduction to Information Technologies (York University) Studocu is not sponsored or endorsed by any college or university Downloaded by Vidhi patel ([email protected])...
lOMoARcPSD|33666164 Itec1000 Midterm Introduction to Information Technologies (York University) Studocu is not sponsored or endorsed by any college or university Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 Chapter 1 Computers and Systems 1) The architecture of the computer system rests on a solid foundation that has changed only slightly and gradually since the __________. a) late 1930s b) late 1940s c) late 1950s d) late 1960s 2) The work performed by an individual computer system within the IT system can be characterized by a) hardware and software b) input, storage and output c) storage processing and output d) input, processing, and output. 3) As a matter of necessity, network interfaces must conform to standard agreements, known as ___________ , for messages to be understood by both computers during a message exchange between a pair of computers. a) protocols b) I/O services c) device controllers d) Ethernet standards 4) The components of an individual computer system consist of processing hardware, input devices, output devices, storage devices, a) and application programs. b) and operating system software. c) application software and operating system software. d) application software, file storage, and data processing. 5) The _____________ provides the physical mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and storage components. a) data b) network c) computer hardware d) computer software 6) What is the only requirement for data to be manipulated and processed by a computer? a) The data type must be numeric. b) The data must be represented in binary form. c) The data type must be alphanumeric, graphic, sound or color. d) The size of the data must be smaller than the capacity of the hard drive. 7) Which of the following is not part of the conceptual view of a CPU? a) ALU b) Control Unit c) Interface Unit d) Main memory 8) The main memory, often known as primary storage, working storage, or RAM (for random access memory), holds a) data. b) program instructions. c) program instructions and data. d) program instructions, data, and instructions for booting the computer. Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 9) The idea that the program instructions and data are both stored in memory while being processed is known as the a) processing concept. b) stored program concept. c) data-instruction concept. d) memory-data-instruction concept. 10) Many of the internal OS services are provided by the ___________ module, which contains the most important operating system processing functions. a) CPU b) root c) kernel d) central 11) The operating system's ________________________ acts as an interface for application programs and utilities to access the internal services provided by the operating system. a) monitoring system b) supervising system c) application subsystem d) application program interface 12) When the computer is started, a bootstrap or IPL (Initial Program Load) begins testing the system. Where is this bootstrap program stored? a) RAM b) ROM c) hard drive d) virtual memory 13) The fact that different types of computers can work together, share files, and communicate successfully is known as a) supercomputing b) open computing c) distributed computing d) coupled systems computing 14) The word, "virtual," as used in the text, is most synonymous with which word? a) logical b) notional c) tangible d) theoretical 15) ___________ are agreements among interested parties, often manufacturers, to assure that various system components will work together interchangeably. a) Manuals b) Standards c) References d) Operating procedures 16) Unicode is a(n) a) character encoding standard b) video encoding standard c) audio encoding standard d) graphic encoding standard 17) MPEG-4 is a(n) a) text standard b) video standard c) audio standard d) graphic standard Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 18) MP3 is a(n) a) text standard b) video standard c) audio standard d) graphic standard 19) Which of the following is not a feature defined in a protocol specification for communication? a) message format b) data representation c) Operating System vendor d) identification and authentication 20) Storage devices communicate with a computer using protocols. One such protocol is: a) SATA b) PATA c) serial encoded messages (SEM) d) hard-disk parallel communications protocol (HDPC) Chapter 2 An Introduction to System Concepts 1) From a systems perspective, how would you classify a computer operating system? a) A tangible system b) A physical system c) A conceptual system d) A perceptible system 2) Anything outside the system boundary represents the _____________ that the system operates. a) interface b) subsystem c) environment d) super system 3) A large organization’s IT system might have specific programs such as marketing, manufacturing, purchasing, inventory, finance, and accounting. These are considered ____________ to the larger IT system. a) interfaces b) subsystems c) the environment d) super systems 4) The division of a system or subsystem into its components and linkages is called a) itemization b) reconstruction c) decomposition d) categorization 5) What is not part of an abstract description of system architecture? a) system constraints b) system interconnections c) linkages among the components d) physical location of the servers 6) Which of the following are not input devices? a) stylus b) headphones c) touch screen d) mouse and keyboard Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 7) The system architecture representation of the flow and processing of data within an organization is called a) three-tier architecture b) application architecture c) flow control architecture d) customer oriented architecture 8) Scalability is the ability of a system to a) handle a growing amount of work. b) allow access to information when it is needed. c) protect data against unauthorized access or modification. d) allow configuration, monitoring, and maintaining operation. 9) Information availability is the ability of a system to a) handle a growing amount of work. b) allow access to information when it is needed. c) protect data against unauthorized access or modification. d) allow configuration, monitoring, and maintaining operation. 10) Data security is the ability of a system to a) handle a growing amount of work. b) allow access to information when it is needed. c) protect data against unauthorized access or modification. d) allow configuration, monitoring, and maintaining operation. 11) System administration is the ability of a system to a) handle a growing amount of work. b) allow access to information when it is needed. c) protect data against unauthorized access or modification. d) allow configuration, monitoring, and maintaining operation. 12) In a client-server architecture, the only limitations to running multiple applications on a single server are the potential slowdowns that may result from the load on the server computer and a) traffic on the Internet. b) load on client computer. c) users who open many web browsers. d) the traffic on the network to that server. 13) A two-tier architecture simply means that there are ________ computers involved in the service. a) one b) two c) two to five d) two or more 14) A web-browser connected to a web-server is an example of a) multiprocessing b) cluster computing c) n-tier architecture d) client-server technology 15) Because response time is considered an important measure by most Web users, it is often more practical to separate the database and page processing into a third computer system. This is an example of a) multiprocessing b) cluster computing c) n-tier architecture d) three-tier architecture 16) The protocol that makes communication between a Web server and a database application possible is called a) SQL b) HTTP c) Database Control Language Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 d) Common Gateway Interface 17) ______________ is software designed to handle potential incompatibilities between the application software that resides on different equipment. a) Middleware b) Versioning software c) Compatibility software d) Application interface software 18) The organization's internal network, isbcommonly called a(n) a) intranet b) employee network c) corporation network d) organizational network 19) Internet standards such as _______ allow the easy identification of relevant data within data streams between interconnected systems, making these applications possible and practical. a) XML b) FTP c) SSH d) HTTPS 20) What is not a benefit of cloud services? a) Backup and offsite storage b) Additional computing capability when and where it is needed c) Lower hardware and software investments d) Added security Chapter 3 Number Systems 1) How many binary digits does it take to represent the decimal number 2013? a) 16 b) 8 c) 11 d) 2013 2) How many bytes does it take to store the binary equivalent of the decimal number 1945? a) 1 b) 2 c) 4 d) 10 3) The largest number that can be represented 8 bits without considering a sign is Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 a) 15 b) 255 c) 65,535 d) 10,000,000 4) The largest single digit in octal is a) 1 b) 7 c) 8 d) 10 5) The largest single digit in hexadecimal is a) 1 b) 8 c) F d) 9 6) The binary number 101100112 is equivalent to the decimal number a) 113 b) 179 c) 133 d) 10,110,011 7) Eight raised to the power zero is a) 0 b) 1 c) 8 d) -8 8) Eight raised to the power one is a) 0 b) 1 c) 8 Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 d) -8 9) The number of different items that can be represented by a given number of digits, n, in a particular base, b, is given by the formula: bn equals _____________. a) field b) radix c) range d) parameter 10) The digit with the greatest weight (value) in a number is called the a) radix b) heaviest bit c) least significant digit d) most significant digit 11) The octal number 128 is equivalent to the decimal number a) 9 b) 10 c) 24 d) 12 12) The hexadecimal number 1A16 is equivalent to the decimal number a) 9 b) 17 c) 26 d) 110 13) How many bits are there in one byte? a) 1 b) 4 c) 8 d) 10 14) A single digit that can have only one of two values, 0 or 1, is a Downloaded by Vidhi patel ([email protected]) lOMoARcPSD|33666164 a) bit b) blip c) signal d) character 15) In order to divide a number by its base we can perform a) a bit op b) a left shift c) a right shif d) a complex equation 16) In order to multiply a number by its base we can perform a) a bit op b) a lef shif c) a right shift d) a complex equation 17) The base 8 number system is called a) octal b) fractal c) ochodecimal d) hexadecimal 18) The base 2 number system is called a) binary b) fractal c) bitly d) radix 19) Which of the following is true? a) 12 0.18 b) 0.12 = 0.18 c) 0.12 < 0.18 d) None of these 21) Which of the following is true? a) 1018