The command layer is the user interface to an operating system.
A. True
B. False
A. True
Application software makes calls to the operating system service layer to perform functions such as file manipulation and printer control.
A. True
B. False
A. True
The operating system kernel is responsible for allocating hardware resources to application programs.
A. True
B. False
A. True
Device drivers are located within the operating system service layer.
A. True
B. False
A. True
An operating system that supports multitasking allows a single program to be divided into components that can execute concurrently
A. True
B. False
B. False
A(n) thread is an executable subunit of a process that is scheduled independently but shares memory and I/O resources with its parent.
A. True
B. False
A. True
A virtual resource is apparent to a process or user, although it may not physically exist.
A. True
B. False
A. True
Under virtual memory management, a page hit occurs when a program attempts to access a page not held in physical memory.
A. True
B. False
B. False
A file’s directory entry normally contains information about its owner, access controls, and physical location.
A. True
B. False
A. True
A buffer used for storage device I/O should be smaller than the block size of the storage device.
A. True
B. False
A. True
The term incremental backup describes a system of tracking old file versions and automatically moving them to off-line and archival storage devices.
A. True
B. False
A. True
In an incremental backup operation, all files within a directory or storage device are copied to backup storage.
A. True
B. False
B. False
Transaction logging imposes a performance penalty because every file update requires two write operations.
A. True
B. False
A. True
System administration is the process of ensuring efficient and reliable delivery of IS services.
A. True
B. False
A. True
Because IS resources can be considered operating expenditures, issues of service standards, cost, and cost recovery are important components of the IS strategic plan.
A. True
B. False
A. True
A request for proposals (RFP) is a formal document that solicits proposals from hardware and/or software vendors.
A. True
B. False
A. True
Which of the following statements about dynamically linked executable programs is true.
C. they automatically incorporate updated operating system service routines
A(n) ____ interleaves source code translation, link editing, and execution.
D. compiler
Java programs are compiled into object code for a hypothetical hardware and system software environmentcalled the ____.
A. JVM
A Java applet runs within the ____ of a Web browser.
C. sandbox
Which software component supports a broad range of system development activities with particular emphasis on model development?
C. CASE tool
A tool suite that primarily supports program development based on specific analysis and design models sometimes is called a(n) ____.
D. back-end CASE
A tool suite that primarily supports model development is sometimes called a(n) ____.
C. front-end CASE tool
Which of the following terms describes software that glues together parts of a client-server or multi-tierapplication?
C. Middleware
All Web resources are identified by a unique ____.
D. URL
A(n) ____ is a private network that uses Internet protocols but is accessible only by a limited set of internal users.
D. intranet
Which of the following characteristics is typical of technology-based infrastructure?
a. Service to a large number of users
b. Easy allocation of costs to users
c. Low maintenance costs
d. No need for new capital expenditure
Which of the following security procedures is most effective against unauthorized user access by repeated login attempts with guessed passwords?
D. Lockout after a specified number of failed logins
A(n) ____ provides auxiliary power during blackouts and can notify the operating system when it is activated.
D. uninterruptible power supply (UPS)
With respect to computer security, ____ is the process of creating and managing records of user activity and resource access.
C. auditing
Which of the following is not used to perform biometric authentication?
C. Password
____ are widely deployed in modern information systems to protect servers and information resources from unauthorized access over the Internet.
B. Firewalls
Which of the following statements is not true?
C. Computer facilities need not provide protection for data communication lines.
Which of the following is a typical operating expenditure?
C. Equipment maintenance
From the class discussion: The best choice for fire protection is?
a. A water based sprinkler system since it is commonly available and part of the building
b. A foam based system since it reduces electrical shorts
c. A carbon dioxide system since it isn’t corrosive
d. A Halon system since it doesn’t suffocate peoplee. Never have a fire.
1.First Generation Languages
binary instructions for a CPU
machine language
difficult remembering and manipulating long strings of binary digits
programming with binary numbers is tedious and error prone
2.Second Generation Languages
mnemonic instructions for a CPU
assember for translator
early compiled programs
3.Third Generation Languages
instruction explosion, machine independence, and usually standardization
use Cobol, Fortan, C, BASIC, Pascal
requires more hardware resources and easiest to learn program
use compilers, link editors, and interpreters as automated tools used to translate 3GL program
3GL program more complex than 2GL translation
program is machine independence/ hardware independence
4.Fourth Generation Languages
higher instruction explosion, interactive and graphical I/O support, database support, limited nonprocedural programming, and proprietary standards
Database query and report support
use Visual Basic SQL
5.Fifth Generation Languages
high instruction explosion, nonprocedural programming, expert systems, and artificial intelligence applications
Object-oriented language
High instruction explosion, support for modern code development, and code reuse methods, such as inheritance and message passing
Scripting language
very high instruction explosion; interpreted execution, usesd for Web applications
put the programming language generation in the blank for their description(s). (1,2,3,4,or 5 generation)
____ A. Cobol, Fortran, 'C'
____B. Natural Language Processing
____C. Database query and report support
____D. Difficult for programmers, easy on hardware
____ E. High Instruction Explosion
____ F. Assembler for translator
____ G. Machine Language
____ H. Early compiled programs
____ I. Requires more hardware resources and easiest to learn to program
_3_ A. Cobol, Fortran, 'C'
_1_ B. Natural Language Processing
_4_ C. Database query and report support
_1_ D. Difficult for programmers, easy on hardware
_5_ E. High Instruction Explosion
_2_ F. Assembler for translator
_1_ G. Machine Language
_2_ H. Early compiled programs
_3_ I. Requires more hardware resources and easiest to learn to program
Tower of Hanoi and Grandfather-Father-Son were offered in class as two examples of what security proce-dures?
Compare and Contrast NAS and SAN. In your answer define what each is, how they are implemented andappropriate uses.
Network-attached Storage (NAS)
-a storage architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers
Storage area network (SAN)
-a high-speed interconnection between general-purpose servers and a separate storage server; sotrage accesses are at the level of disk sectors in a logical address space
Compare and Contrast RAID 0,1, and 5.
RAID 0 data striping without redundancy
RAID 1 mirroring
RAID 5 data block striping with parity check data stored on multiple disks
generate parity bits for data bytes or blocks and store them on one or more of the RAID disks, if a single disk fails, no data is lost because of missing bits can be reconstructed from the data and parity bits on the remaining disks
some read operaions don't require parity computations
RAID 0 and 5
use data striping while RAID 1 disk mirroring,
data striping improves read performance by breaking a large read operation into smaller parallel read operations,
the elapsed time to perform an entire read or write operation is reduced
overhead is incurred
achieve fault tolerance by generating and storing redundant data during each write operaion
RAID 1
reduced system performance
if one device fails, the other device contains a duplicate of all data
data is available continuously because either device can respond to a read request