IS310 Exam 4

  1. The command layer is the user interface to an operating system.
    A. True
    B. False
    A. True
  2. Application software makes calls to the operating system service layer to perform functions such as file manipulation and printer control.
    A. True
    B. False
    A. True
  3. The operating system kernel is responsible for allocating hardware resources to application programs.
    A. True
    B. False
    A. True
  4. Device drivers are located within the operating system service layer.
    A. True
    B. False
    A. True
  5. An operating system that supports multitasking allows a single program to be divided into components that can execute concurrently
    A. True
    B. False
    B. False
  6. A(n) thread is an executable subunit of a process that is scheduled independently but shares memory and I/O resources with its parent.
    A. True
    B. False
    A. True
  7. A virtual resource is apparent to a process or user, although it may not physically exist.
    A. True
    B. False
    A. True
  8. Under virtual memory management, a page hit occurs when a program attempts to access a page not held in physical memory.
    A. True
    B. False
    B. False
  9. A file’s directory entry normally contains information about its owner, access controls, and physical location.
    A. True
    B. False
    A. True
  10. A buffer used for storage device I/O should be smaller than the block size of the storage device.
    A. True
    B. False
    A. True
  11. The term incremental backup describes a system of tracking old file versions and automatically moving them to off-line and archival storage devices.
    A. True
    B. False
    A. True
  12. In an incremental backup operation, all files within a directory or storage device are copied to backup storage.
    A. True
    B. False
    B. False
  13. Transaction logging imposes a performance penalty because every file update requires two write operations.
    A. True
    B. False
    A. True
  14. System administration is the process of ensuring efficient and reliable delivery of IS services.
    A. True
    B. False
    A. True
  15. Because IS resources can be considered operating expenditures, issues of service standards, cost, and cost recovery are important components of the IS strategic plan.
    A. True
    B. False
    A. True
  16. A request for proposals (RFP) is a formal document that solicits proposals from hardware and/or software vendors.
    A. True
    B. False
    A. True
  17. Which of the following statements about dynamically linked executable programs is true.



    C. they automatically incorporate updated operating system service routines
  18. A(n) ____ interleaves source code translation, link editing, and execution.



    D. compiler
  19. Java programs are compiled into object code for a hypothetical hardware and system software environmentcalled the ____.



    A. JVM
  20. A Java applet runs within the ____ of a Web browser.



    C. sandbox
  21. Which software component supports a broad range of system development activities with particular emphasis on model development?



    C. CASE tool
  22. A tool suite that primarily supports program development based on specific analysis and design models sometimes is called a(n) ____.



    D. back-end CASE
  23. A tool suite that primarily supports model development is sometimes called a(n) ____.



    C. front-end CASE tool
  24. Which of the following terms describes software that glues together parts of a client-server or multi-tierapplication?



    C. Middleware
  25. All Web resources are identified by a unique ____.



    D. URL
  26. A(n) ____ is a private network that uses Internet protocols but is accessible only by a limited set of internal users.



    D. intranet
  27. Which of the following characteristics is typical of technology-based infrastructure?
    a. Service to a large number of users
    b. Easy allocation of costs to users
    c. Low maintenance costs
    d. No need for new capital expenditure
  28. Which of the following security procedures is most effective against unauthorized user access by repeated login attempts with guessed passwords?



    D. Lockout after a specified number of failed logins
  29. A(n) ____ provides auxiliary power during blackouts and can notify the operating system when it is activated.



    D. uninterruptible power supply (UPS)
  30. With respect to computer security, ____ is the process of creating and managing records of user activity and resource access.



    C. auditing
  31. Which of the following is not used to perform biometric authentication?



    C. Password
  32. ____ are widely deployed in modern information systems to protect servers and information resources from unauthorized access over the Internet.



    B. Firewalls
  33. Which of the following statements is not true?



    C. Computer facilities need not provide protection for data communication lines.
  34. Which of the following is a typical operating expenditure?



    C. Equipment maintenance
  35. From the class discussion: The best choice for fire protection is?
    a. A water based sprinkler system since it is commonly available and part of the building
    b. A foam based system since it reduces electrical shorts
    c. A carbon dioxide system since it isn’t corrosive
    d. A Halon system since it doesn’t suffocate peoplee. Never have a fire.
  36. 1.First Generation Languages
    • binary instructions for a CPU
    • machine language
    • difficult remembering and manipulating long strings of binary digits
    • programming with binary numbers is tedious and error prone
  37. 2.Second Generation Languages
    • mnemonic instructions for a CPU
    • assember for translator
    • early compiled programs
  38. 3.Third Generation Languages
    • instruction explosion, machine independence, and usually standardization
    • use Cobol, Fortan, C, BASIC, Pascal
    • requires more hardware resources and easiest to learn program
    • use compilers, link editors, and interpreters as automated tools used to translate 3GL program
    • 3GL program more complex than 2GL translation
    • program is machine independence/ hardware independence
  39. 4.Fourth Generation Languages
    • higher instruction explosion, interactive and graphical I/O support, database support, limited nonprocedural programming, and proprietary standards
    • Database query and report support
    • use Visual Basic SQL
  40. 5.Fifth Generation Languages
    high instruction explosion, nonprocedural programming, expert systems, and artificial intelligence applications
  41. Object-oriented language
    High instruction explosion, support for modern code development, and code reuse methods, such as inheritance and message passing
  42. Scripting language
    very high instruction explosion; interpreted execution, usesd for Web applications
  43. put the programming language generation in the blank for their description(s). (1,2,3,4,or 5 generation)
    ____ A. Cobol, Fortran, 'C'
    ____B. Natural Language Processing
    ____C. Database query and report support
    ____D. Difficult for programmers, easy on hardware
    ____ E. High Instruction Explosion
    ____ F. Assembler for translator
    ____ G. Machine Language
    ____ H. Early compiled programs
    ____ I. Requires more hardware resources and easiest to learn to program
    • _3_ A. Cobol, Fortran, 'C'
    • _1_ B. Natural Language Processing
    • _4_ C. Database query and report support
    • _1_ D. Difficult for programmers, easy on hardware
    • _5_ E. High Instruction Explosion
    • _2_ F. Assembler for translator
    • _1_ G. Machine Language
    • _2_ H. Early compiled programs
    • _3_ I. Requires more hardware resources and easiest to learn to program
  44. Tower of Hanoi and Grandfather-Father-Son were offered in class as two examples of what security proce-dures?
  45. Compare and Contrast NAS and SAN. In your answer define what each is, how they are implemented andappropriate uses.
    • Network-attached Storage (NAS)
    • -a storage architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers
    • Storage area network (SAN)
    • -a high-speed interconnection between general-purpose servers and a separate storage server; sotrage accesses are at the level of disk sectors in a logical address space
  46. Compare and Contrast RAID 0,1, and 5.
    • RAID 0 data striping without redundancy
    • RAID 1 mirroring
    • RAID 5 data block striping with parity check data stored on multiple disks
    • generate parity bits for data bytes or blocks and store them on one or more of the RAID disks, if a single disk fails, no data is lost because of missing bits can be reconstructed from the data and parity bits on the remaining disks
    • some read operaions don't require parity computations
    • RAID 0 and 5
    • use data striping while RAID 1 disk mirroring,
    • data striping improves read performance by breaking a large read operation into smaller parallel read operations,
    • the elapsed time to perform an entire read or write operation is reduced
    • overhead is incurred
    • achieve fault tolerance by generating and storing redundant data during each write operaion
    • RAID 1
    • reduced system performance
    • if one device fails, the other device contains a duplicate of all data
    • data is available continuously because either device can respond to a read request
Author
tttran1
ID
122752
Card Set
IS310 Exam 4
Description
Exam number 4 for IS310
Updated