Computer Architecture and Organization

Computer Architecture and Organization

Q1. Most local phone service is based on a channel-sharing strategy called ____.
a. packet switching
b. route switching
c. circuit switching
d. path switching

Q2. Noise can be introduced into copper, aluminum, and other wire types by ____.
a. spectral interference
b. hyperspectral interference
c. electromagnetic interference
d. optical interference

Q3. The FM method holds frequency constant while varying amplitude to represent data.
a. true
b. false

Q4. Wave characteristics, such as frequency and amplitude, are inherently discrete.
a. true
b. false

Q5. In ____, both the optical fiber and cladding have different but uniform densities throughout the cable, which results in many reflections.
a. singlemode step-index cable
b. multimode step-index cable
c. singlemode modulated cable
d. multimode modulated cable

Q6. ____ is the most widely used error-detection method.
a. Hamming code
b. SHA1
c. Cyclic redundancy checking
d. Message Digest

Q7. A(n) ____ sends digital signals by modulating a carrier wave to embed bits in one or more analog wave characteristics.
a. analog-converter
b. modulator-demodulator
c. modulator-converter
d. demodulator-module

Q8. An end node is a device such as a workstation, server, or printer that can be the source or destination of a message.
a. true
b. false

Q9. ____ is based on the 802.3z standard and the 802.3ab standard.
a. Wireless Ethernet
b. Standard Ethernet
c. Gigabit Ethernet
d. Megabit Ethernet

Q10. ____ make forwarding decisions by using layer 2 addresses.
a. Switches
b. Routers
c. Hubs
d. Bridges

Q11. WiMAX is a replacement for and an extension to the IEEE 802.11 standards.
a. true
b. false

Q12. Each network covering a floor or building is called a ____.
a. wide area network
b. metropolitan area network
c. local area network
d. zone network

Q13. The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
a. network infrastructure
b. network topology
c. network path
d. network interface

Q14. A network for an entire campus is known as a(n) ____ and includes end nodes, LANs, zone networks, the campus backbone network, and central nodes.
a. metropolitan area network
b. wide area network
c. regional network
d. enterprise network

Q15. A ____ is a request to execute a specific method and return a response.
a. conduit
b. message
c. path
d. function

Q16. A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.
a. fifth-generation language
b. fourth-generation language
c. third-generation language
d. second-generation language

Q17. ____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.
a. C++
b. Visual Basic
c. Java
d. C#

Q18. A tool suite that primarily supports model development is sometimes called a ____ tool.
a. front-end CASE
b. back-end CASE
c. mid-tier CASE
d. late-bound CASE

Q19. Java bytecode programs usually run 10 times faster than native applications.
a. true
b. false

Q20. The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.
a. computer-generated software development
b. computer-assisted software development
c. computer-assisted system engineering
d. computer-assisted software engineering

Q21. A(n) ____ searches an object code file for external function calls.
a. compiler
b. parser
c. link editor
d. interpreter

Q22. ____ store information about page locations, allocated page frames, and secondary storage space.
a. Page tears
b. Page blocks
c. Page tables
d. Page addresses

Q23. The CPU maintains a ____ containing descriptors for all memory segments.
a. local descriptor table
b. page allocation table
c. global definition table
d. global descriptor table

Q24. In ____ memory allocation, each process partition has its own offset value.
a. partitioned
b. contiguous
c. dynamic
d. noncontiguous

Q25. A blocked thread is waiting for an event to occur, such as allocation of a requested resource or correction of an error condition.
a. true
b. false

Q26. A hypervisor can make the sum of physical resources allocated to all virtual machines appear greater than the underlying physical resources.
a. true
b. false

Q27. Data values and instructions generally occupy multiple bytes of storage.
a. true
b. false

Q28. Noncontiguous memory allocation is more flexible than contiguous memory allocation, but flexibility comes at a price.
a. true
b. false

Q29. An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices.
a. true
b. false

Q30. On larger computers, a volume can span multiple physical disks.
a. true
b. false

Q31. On a desktop or laptop computer, a ____ is usually an entire physical disk, a partition of the disk, or a removable storage medium, such as a DVD or flash drive.
a. page
b. block
c. sector
d. volume

Q32. Current FMSs include a framework to support additional file types.
a. true
b. false

Q33. A ____ usually contains information about a single person, thing, or event.
a. record
b. field
c. table
d. column

Q34. Users and applications view secondary storage logically as a collection of files organized in directories and storage volumes.
a. true
b. false

Q35. Each record in a data file is composed of multiple ____.
a. tuples
b. columns
c. fields
d. records

Q36. A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.
a. true
b. false

Q37. The Internet and cloud computing change shape and can grow over time.
a. true
b. false

Q38. In an LDAP directory, a(n) ____ defines the attributes common to all member objects.
a. distinguished name
b. common name
c. objectType
d. objectclass

Q39. The term ____ has been coined to summarize new approaches to distributing and accessing software and hardware services across the Internet.
a. cloud computing
b. distributed computing
c. platform computing
d. shared computing

Q40. With P2P architecture, there are more potential bottlenecks and points of failure.
a. true
b. false

Q41. Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.
a. true
b. false

Q42. In CORBA, ____ is a component message-passing protocol.
a. Internet Inter-ORB Protocol
b. Local Inter-ORB Protocol
c. SOAP
d. XML-RPC

Q43. ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large
program.
a. Sockets
b. Packets
c. Pipes
d. Procedures

Q44. In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing
financial reports.
a. access
b. auditing
c. monitoring
d. certifying

Q45. A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
a. program profiler
b. transaction monitor
c. software monitor
d. limit monitor

Q46. The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.
a. performance requirements
b. storage requirements
c. user requirements
d. hosting requirements

Q47. The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
a. operating system
b. application software
c. transaction monitor
d. database system

Q48. Fire detection is a special problem in computer facilities.
a. true
b. false

Q49. A(n) ____ is a device that provides power to attached devices in the event of external power failure.
a. generator
b. uninterruptible power supply
c. power filter
d. rectifier

Q50. The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
a. true
b. false

Order from us and get better grades. We are the service you have been looking for.