Q1. Most local phone service is based on a channel-sharing strategy called ____. a. packet switching b. route switching c. circuit switching d. path switching Q2. Noise can be introduced into copper, aluminum, and other wire types by ____. a. spectral interference b. hyperspectral interference c. electromagnetic interference d. optical interference Q3. The FM method holds frequency constant while varying amplitude to represent data. a. true b. false Q4. Wave characteristics, such as frequency and amplitude, are inherently discrete. a. true b. false Q5. In ____, both the optical fiber and cladding have different but uniform densities throughout the cable, which results in many reflections. a. singlemode step-index cable b. multimode step-index cable c. singlemode modulated cable d. multimode modulated cable Q6. ____ is the most widely used error-detection method. a. Hamming code b. SHA1 c. Cyclic redundancy checking d. Message Digest Q7. A(n) ____ sends digital signals by modulating a carrier wave to embed bits in one or more analog wave characteristics. a. analog-converter b. modulator-demodulator c. modulator-converter d. demodulator-module Q8. An end node is a device such as a workstation, server, or printer that can be the source or destination of a message. a. true b. false Q9. ____ is based on the 802.3z standard and the 802.3ab standard. a. Wireless Ethernet b. Standard Ethernet c. Gigabit Ethernet d. Megabit Ethernet Q10. ____ make forwarding decisions by using layer 2 addresses. a. Switches b. Routers c. Hubs d. Bridges Q11. WiMAX is a replacement for and an extension to the IEEE 802.11 standards. a. true b. false Q12. Each network covering a floor or building is called a ____. a. wide area network b. metropolitan area network c. local area network d. zone network Q13. The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another. a. network infrastructure b. network topology c. network path d. network interface Q14. A network for an entire campus is known as a(n) ____ and includes end nodes, LANs, zone networks, the campus backbone network, and central nodes. a. metropolitan area network b. wide area network c. regional network d. enterprise network Q15. A ____ is a request to execute a specific method and return a response. a. conduit b. message c. path d. function Q16. A ____ is a nonprocedural language suitable for developing software that mimics human intelligence. a. fifth-generation language b. fourth-generation language c. third-generation language d. second-generation language Q17. ____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s. a. C++ b. Visual Basic c. Java d. C# Q18. A tool suite that primarily supports model development is sometimes called a ____ tool. a. front-end CASE b. back-end CASE c. mid-tier CASE d. late-bound CASE Q19. Java bytecode programs usually run 10 times faster than native applications. a. true b. false Q20. The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines. a. computer-generated software development b. computer-assisted software development c. computer-assisted system engineering d. computer-assisted software engineering Q21. A(n) ____ searches an object code file for external function calls. a. compiler b. parser c. link editor d. interpreter Q22. ____ store information about page locations, allocated page frames, and secondary storage space. a. Page tears b. Page blocks c. Page tables d. Page addresses Q23. The CPU maintains a ____ containing descriptors for all memory segments. a. local descriptor table b. page allocation table c. global definition table d. global descriptor table Q24. In ____ memory allocation, each process partition has its own offset value. a. partitioned b. contiguous c. dynamic d. noncontiguous Q25. A blocked thread is waiting for an event to occur, such as allocation of a requested resource or correction of an error condition. a. true b. false Q26. A hypervisor can make the sum of physical resources allocated to all virtual machines appear greater than the underlying physical resources. a. true b. false Q27. Data values and instructions generally occupy multiple bytes of storage. a. true b. false Q28. Noncontiguous memory allocation is more flexible than contiguous memory allocation, but flexibility comes at a price. a. true b. false Q29. An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices. a. true b. false Q30. On larger computers, a volume can span multiple physical disks. a. true b. false Q31. On a desktop or laptop computer, a ____ is usually an entire physical disk, a partition of the disk, or a removable storage medium, such as a DVD or flash drive. a. page b. block c. sector d. volume Q32. Current FMSs include a framework to support additional file types. a. true b. false Q33. A ____ usually contains information about a single person, thing, or event. a. record b. field c. table d. column Q34. Users and applications view secondary storage logically as a collection of files organized in directories and storage volumes. a. true b. false Q35. Each record in a data file is composed of multiple ____. a. tuples b. columns c. fields d. records Q36. A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object. a. true b. false Q37. The Internet and cloud computing change shape and can grow over time. a. true b. false Q38. In an LDAP directory, a(n) ____ defines the attributes common to all member objects. a. distinguished name b. common name c. objectType d. objectclass Q39. The term ____ has been coined to summarize new approaches to distributing and accessing software and hardware services across the Internet. a. cloud computing b. distributed computing c. platform computing d. shared computing Q40. With P2P architecture, there are more potential bottlenecks and points of failure. a. true b. false Q41. Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application. a. true b. false Q42. In CORBA, ____ is a component message-passing protocol. a. Internet Inter-ORB Protocol b. Local Inter-ORB Protocol c. SOAP d. XML-RPC Q43. ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program. a. Sockets b. Packets c. Pipes d. Procedures Q44. In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports. a. access b. auditing c. monitoring d. certifying Q45. A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests. a. program profiler b. transaction monitor c. software monitor d. limit monitor Q46. The first step in stating hardware and software requirements is to state the application tasks to be performed and their____. a. performance requirements b. storage requirements c. user requirements d. hosting requirements Q47. The starting point for determining hardware requirements is the ____ that will run on the hardware platform. a. operating system b. application software c. transaction monitor d. database system Q48. Fire detection is a special problem in computer facilities. a. true b. false Q49. A(n) ____ is a device that provides power to attached devices in the event of external power failure. a. generator b. uninterruptible power supply c. power filter d. rectifier Q50. The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware. a. true b. false |