CIS Midterm Ch 4 and 5
The speed of a central processing unit (CPU) is expressed in cycles called ________.
Modifications to the source code of an open source project cannot be added to the project.
Host operating systems that run one or more operating systems as applications are referred to as ________.
A server farm can process only one service request per minute.
One ________ is equivalent to 1,024 kilobytes
________ is the process by which one physical computer hosts many different virtual computers within it.
Which of the following statements is true of thick-client applications?
They mostly run on a single operating system
Magnetic and optical disks are examples of nonvolatile memory
Which of the following is most likely to be a disadvantage of self-driving cars?
________ software provides capabilities that are common across all organizations and industries.
Objects connected to a network can share data with any other application, device, or service
________ are programs that are written to use a particular operating system.
Application programs can be processed by both clients and servers.
________ computers have four central processing units (CPUs).
One ________ is equivalent to 1,024 gigabytes.
A(n) ________ is a program that controls a computer’s resources.
The central processing unit is referred to as the brain of a computer.
Objects that are connected to the Internet are increasingly being embedded with hardware capable of sensing, processing, and transmitting data.
Microsoft Access and Microsoft Word are examples of thin-client applications.
The speed and costs of central processing units are the same across multiple hardware vendors
_______ is a type of computer software that is installed into devices such as printers, print servers, and various types of communication devices.
A hard drive is much faster than a solid-state storage device.
USB flash drives are used to back up data and transfer it from one computer to another
The central processing unit (CPU) of a computer reads data and instructions only from a read-only memory
The ________ refers to the idea in which objects are becoming connected to the Internet so that they can interact with other devices, applications, or services.
Internet of Things
Modifying an existing firmware requires knowledge of special programs and techniques
A ________ is a collection of 1,024 bytes.
Both client and server computers must use the same operating system.
Which of the following is an open-source operating system?
If the contents of a device are lost when the power is turned off, the memory of the device is said to be ________.
A bit is either a zero or a one.
Which of the following refers to software that is developed for a specific and unique need?
one-of-a-kind application software
A specification that a computing device has 100 million bytes of memory means that the device could hold up to 100 million characters.
Open source software is typically free, modifiable, and its source code is publicly available.
Any programmer or student can access and alter the source code of a closed source project.
Application programs that run within a browser, without the need to be preinstalled on client computers, are referred to as ________
Computers represent data using binary digits called ________.
A host operating system controls the activities of the virtual machines it hosts.
Saving one’s work frequently is advised to tackle the issue of memory volatility.
Although an operating system does a lot of application-specific work, it does little to make the computer usable.
High-end computers can have as many as 16 central processing units.
Which of the following statements is true of an operating system?
It comes in particular versions that are written for particular types of hardware.
The memory of a device is said to be nonvolatile if ________ when the system is restarted.
its contents are retained
Which of the following is the most widely used operating system in business?
Which of the following is most likely to be an advantage of self-driving cars?
Fewer accidents will occur
Computer hardware consists of electronic components that input, process, output, and store data.
Some computers have two or more central processing units (CPUs).
An exabyte is equivalent to 1,024 petabytes.
A virtual machine does not have a disk space
One gigabyte is equivalent to 1,024 terabytes.
Bits are grouped into 8-bit chunks called ________.
Main memory is also called read-only memory.
A computer’s performance depends on the speed of its central processing unit (CPU).
Optical disks are non-portable storage devices.
Firefox, Chrome, Opera, and Edge (formerly Internet Explorer) are examples of thick-client applications.
A terabyte is a larger unit than a petabyte.
A dual-processor computer has ________ CPUs.
Which of the following is an advantage of custom-developed software?
They can be tailored to an organization’s requirements
When individuals buy a computer program, they buy a license to ________
Use the program
A ________ is used to receive and process thousands of requests from a large number of users.
The ________ selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.
Central processing unit (CPU)
________ is a computer code that is written by humans and understandable by humans.
The lost-update problem caused by multi-user processing in databases can be prevented by avoiding all types of database locking
SQL stands for ________.
Structured Query Language
The format of the metadata in a database depends on the software product that is processing the database
Databases that carry their data in the form of tables and that represent relationships using foreign keys are called discrete databases.
Which of the following is true of the relational database processing model?
It represents relationships with the help of foreign keys
Security requirements are more stringent for traditional applications than for browser-based ones.
Which of the following is an open source document-oriented NoSQL DBMS product?
Queries in database applications present data in a structured manner using operations such as sorting, grouping, and filtering.
In a database, a table is also called a ________.
A(n) ________ is a program that is used to create, process, and administer a collection of self-describing integrated records.
Database management system (DBMS)
Which of the following is considered an administrative function of the database management system (DBMS)?
adding structures to improve the performance of database applications
Which of the following best describes a byte in a database?
It is a character of data
________ refers to software products that support very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud.
To find out what a database contains, one can look at the metadata inside the database.
Most organizations develop their own database management systems.
In a database, bytes are grouped into ________.
In a database, a key is a column or group of columns that identifies a unique row in a table.
In single-user databases, the application, the database management system (DBMS), and the database all reside on a user’s computer.
Which of the following is a database management system (DBMS) product from Microsoft?
In a database, rows are also called ________.
Reports in database applications provide security, data consistency, and special-purpose processing.
The database management system (DBMS) provides applications for processing operations such as ________.
Inserting or deleting information
Traditional database application programs are written in object-oriented languages such as C++.
A database management system is also referred to as a database.
Database management system (DBMS) administrative functions include adding structures to improve the performance of database applications
Traditional database application programs are written in object-oriented languages like ________.
In a database, the collection of data for all columns is called a file.
Bytes are grouped into rows in a database.
In a database, a group of similar rows is called a ________.
Howie is a business analyst who is given access to the database of a product prior to its launch. He needs to understand the data presented and take appropriate action. Which of the following is Howie most likely to do?
use SQL or graphical tools to query the database
NoSQL database management system products are very technical and can be used only by those with a deep background in computer science
HyperText Markup Language is an international standard language for processing a database.
Browser database application forms, reports, and queries are displayed and processed using HyperText Markup Language (HTML).
Structured query language statements can be issued directly to the database management system (DBMS) by an application program.
Databases are static and it is only the information systems that change.
Which of the following elements of a database application provides security, data consistency, and special-purpose processing?
The database management system (DBMS) can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database.
All traditional databases require the Internet to transmit traffic between a user’s computer and a database management system (DBMS) server computer
The purpose of a database is to ________.
stores lists of data involving multiple themes
DB2 is a popular database management system product that is licensed from Microsoft.
One of the important functions of a database management system (DBMS) is to provide the necessary tools for ________
administering the database
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data
Databases are required to keep track of lists with multiple themes
In a database, columns that are keys of a different table than the one in which they reside are known as ________ keys.
In a database, columns are also called records.
A database application serves as an intermediary between users and database data.
In a database, a column or group of columns that identifies a unique row in a table is known as a ________.
Google is a database that is used by Facebook and Twitter.
Which of the following elements of a database application presents data in a structured manner using sorting, grouping, filtering, and other operations?
The administrative functions of a database management system (DBMS) include backing up database data.
Which of the following is a drawback of the relational database processing model?
It was never a natural fit with business documents
Which of the following best describes the metadata in a database?
special data that describes the structure of a database
Browser applications are thin-client applications that need not be preinstalled on the users’ computers.
One of the reasons for the appearance of new styles of nonrelational database processing is the need for ________.
storing data types such as images, audio, and videos in organizations
A ________ is a self-describing collection of integrated records
Access and SQL Server are popular ________ DBMS products
Databases that carry their data in the form of tables and represent relationships using foreign keys are called ________ databases.
_______ is a popular enterprise database management system (DBMS) product from IBM
Get access to
MOney BackBecome a Member
Guarantee No Hidden
Guarantee No Hidden