Computer Architecture and Organization
|Q1. Most local phone service is based on a channel-sharing strategy called ____.
a. packet switching
b. route switching
c. circuit switching
d. path switching
Q2. Noise can be introduced into copper, aluminum, and other wire types by ____.
a. spectral interference
b. hyperspectral interference
c. electromagnetic interference
d. optical interference
Q3. The FM method holds frequency constant while varying amplitude to represent data.
Q4. Wave characteristics, such as frequency and amplitude, are inherently discrete.
Q5. In ____, both the optical fiber and cladding have different but uniform densities throughout the cable, which results in many reflections.
a. singlemode step-index cable
b. multimode step-index cable
c. singlemode modulated cable
d. multimode modulated cable
Q6. ____ is the most widely used error-detection method.
a. Hamming code
c. Cyclic redundancy checking
d. Message Digest
Q7. A(n) ____ sends digital signals by modulating a carrier wave to embed bits in one or more analog wave characteristics.
Q8. An end node is a device such as a workstation, server, or printer that can be the source or destination of a message.
Q9. ____ is based on the 802.3z standard and the 802.3ab standard.
a. Wireless Ethernet
b. Standard Ethernet
c. Gigabit Ethernet
d. Megabit Ethernet
Q10. ____ make forwarding decisions by using layer 2 addresses.
Q11. WiMAX is a replacement for and an extension to the IEEE 802.11 standards.
Q12. Each network covering a floor or building is called a ____.
a. wide area network
b. metropolitan area network
c. local area network
d. zone network
Q13. The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
a. network infrastructure
b. network topology
c. network path
d. network interface
Q14. A network for an entire campus is known as a(n) ____ and includes end nodes, LANs, zone networks, the campus backbone network, and central nodes.
a. metropolitan area network
b. wide area network
c. regional network
d. enterprise network
Q15. A ____ is a request to execute a specific method and return a response.
Q16. A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.
a. fifth-generation language
b. fourth-generation language
c. third-generation language
d. second-generation language
Q17. ____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.
b. Visual Basic
Q18. A tool suite that primarily supports model development is sometimes called a ____ tool.
a. front-end CASE
b. back-end CASE
c. mid-tier CASE
d. late-bound CASE
Q19. Java bytecode programs usually run 10 times faster than native applications.
Q20. The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.
a. computer-generated software development
b. computer-assisted software development
c. computer-assisted system engineering
d. computer-assisted software engineering
Q21. A(n) ____ searches an object code file for external function calls.
c. link editor
Q22. ____ store information about page locations, allocated page frames, and secondary storage space.
a. Page tears
b. Page blocks
c. Page tables
d. Page addresses
Q23. The CPU maintains a ____ containing descriptors for all memory segments.
a. local descriptor table
b. page allocation table
c. global definition table
d. global descriptor table
Q24. In ____ memory allocation, each process partition has its own offset value.
Q25. A blocked thread is waiting for an event to occur, such as allocation of a requested resource or correction of an error condition.
Q26. A hypervisor can make the sum of physical resources allocated to all virtual machines appear greater than the underlying physical resources.
Q27. Data values and instructions generally occupy multiple bytes of storage.
Q28. Noncontiguous memory allocation is more flexible than contiguous memory allocation, but flexibility comes at a price.
Q29. An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices.
Q30. On larger computers, a volume can span multiple physical disks.
Q31. On a desktop or laptop computer, a ____ is usually an entire physical disk, a partition of the disk, or a removable storage medium, such as a DVD or flash drive.
Q32. Current FMSs include a framework to support additional file types.
Q33. A ____ usually contains information about a single person, thing, or event.
Q34. Users and applications view secondary storage logically as a collection of files organized in directories and storage volumes.
Q35. Each record in a data file is composed of multiple ____.
Q36. A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.
Q37. The Internet and cloud computing change shape and can grow over time.
Q38. In an LDAP directory, a(n) ____ defines the attributes common to all member objects.
a. distinguished name
b. common name
Q39. The term ____ has been coined to summarize new approaches to distributing and accessing software and hardware services across the Internet.
a. cloud computing
b. distributed computing
c. platform computing
d. shared computing
Q40. With P2P architecture, there are more potential bottlenecks and points of failure.
Q41. Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.
Q42. In CORBA, ____ is a component message-passing protocol.
a. Internet Inter-ORB Protocol
b. Local Inter-ORB Protocol
Q43. ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program.
Q44. In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.
Q45. A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
a. program profiler
b. transaction monitor
c. software monitor
d. limit monitor
Q46. The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.
a. performance requirements
b. storage requirements
c. user requirements
d. hosting requirements
Q47. The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
a. operating system
b. application software
c. transaction monitor
d. database system
Q48. Fire detection is a special problem in computer facilities.
Q49. A(n) ____ is a device that provides power to attached devices in the event of external power failure.
b. uninterruptible power supply
c. power filter
Q50. The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.