Cop4858 Final Review - 52 Questions

52 Questions

Settings
Please wait...
CPU Quizzes & Trivia

.


Questions and Answers
  • 1. 
    In the decimal or binary notations, the symbol used to represent a digit and the digit’s position in a string determines its ____.
    • A. 

      Sign

    • B. 

      Placement

    • C. 

      Base

    • D. 

      Value

  • 2. 
    ____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated tostore it.
    • A. 

      Rounding

    • B. 

      Rotation

    • C. 

      Overflow

    • D. 

      Underflow

  • 3. 
    A(n) ____ is a set of related data values.
    • A. 

      Pointer

    • B. 

      List

    • C. 

      Array

    • D. 

      Record

  • 4. 
    A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.
    • A. 

      Array

    • B. 

      Queue

    • C. 

      Linked list

    • D. 

      Stack

  • 5. 
    During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.
    • A. 

      Execution

    • B. 

      Store

    • C. 

      Fetch

    • D. 

      Wait

  • 6. 
    A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.
    • A. 

      JUMP

    • B. 

      LOAD

    • C. 

      STORE

    • D. 

      MOVE

  • 7. 
    An ____ is a template that specifies the number of operands and the position and length of the op code and operands.
    • A. 

      Instruction format

    • B. 

      Instruction template

    • C. 

      Operation format

    • D. 

      Operand template

  • 8. 
    When manipulating single-precision floating-point numbers, CPU performance is measured in ____.
    • A. 

      Watts

    • B. 

      MHZ

    • C. 

      MFLOPS

    • D. 

      MIPS

  • 9. 
    ____ states that the cost of fabrication facilities for the latest chip generation doubles every four years.
    • A. 

      Rick’s Law

    • B. 

      Moore’s Law

    • C. 

      Nelson’s Law

    • D. 

      Lamb’s Law

  • 10. 
    ____ is a generic term for describing secondary storage data transfer units.
    • A. 

      Sector

    • B. 

      Wafer

    • C. 

      Cluster

    • D. 

      Block

  • 11. 
    ____ stores each bit by using a single transistor and capacitor.
    • A. 

      Dynamic ROM

    • B. 

      Static ROM

    • C. 

      Dynamic RAM

    • D. 

      Static RAM

  • 12. 
    The ratio of cache hits to read accesses is called the cache’s ____.
    • A. 

      Hit ratio

    • B. 

      Efficiency

    • C. 

      Performance

    • D. 

      Hit boundary

  • 13. 
    ____ sensors capture input from special-purpose symbols placed on paper or the flat surfaces of 3D objects.
    • A. 

      Dot and image

    • B. 

      Mark and image

    • C. 

      Mark and pattern

    • D. 

      Image capture

  • 14. 
    PDF417 bar codes can hold around ____ of data.
    • A. 

      1 KB

    • B. 

      1 MB

    • C. 

      1 GB

    • D. 

      1 TB

  • 15. 
    A(n) ____ is the maximum number of bits or bytes per second that the channel can carry.
    • A. 

      Minimum data transfer rate

    • B. 

      Overhead data transfer rate

    • C. 

      Net data transfer rate

    • D. 

      Raw data transfer rate

  • 16. 
    As bit transmission speed is increased, the duration of each bit in the signal, known as the ____, decreases.
    • A. 

      Bit time

    • B. 

      Overhead

    • C. 

      Block time

    • D. 

      Modulation time

  • 17. 
    A(n) ____ extracts the data embedded in the signal it receives and retransmits a new signalcontaining the same data.
    • A. 

      Repeater

    • B. 

      Multiplexer

    • C. 

      Amplifier

    • D. 

      Booster

  • 18. 
    The ____ standard divides frequency bands in the 5.2, 5.7, and 5.8 GHz ranges into 12 channels.
    • A. 

      802.11n

    • B. 

      802.11g

    • C. 

      802.11b

    • D. 

      802.11a

  • 19. 
    The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
    • A. 

      Network infrastructure

    • B. 

      Network topology

    • C. 

      Network path

    • D. 

      Network interface

  • 20. 
    The ____ layer includes communication protocols used by programs that make and respond to high-level requests for network services.
    • A. 

      Presentation

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Application

  • 21. 
    The ____ layer forwards messages to their correct destinations.
    • A. 

      Session

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Data Link

  • 22. 
    The ____ layer is the interface between network software and hardware.
    • A. 

      Session

    • B. 

      Data link

    • C. 

      Application

    • D. 

      Network

  • 23. 
    IP accepts messages called ____ from Transport-layer protocols and forwards them to theirdestination.
    • A. 

      Datagrams

    • B. 

      Frames

    • C. 

      Blocks

    • D. 

      Packets

  • 24. 
    The written format of 128-bit IP addresses is called ____ notation.
    • A. 

      Dotted decimal

    • B. 

      Dotted hexadecimal

    • C. 

      Colon decimal

    • D. 

      Colon hexadecimal

  • 25. 
    At the sending node, the ____ layer’s role is to translate IP datagrams into a format that can be transported and forwarded over a specific physical network.
    • A. 

      Application

    • B. 

      Network Interface

    • C. 

      Session

    • D. 

      Transport

  • 26. 
    ____ perform design activities to create models that produce an architectural blueprint for system implementation.
    • A. 

      System developers

    • B. 

      System architects

    • C. 

      System managers

    • D. 

      System engineers

  • 27. 
    The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.
    • A. 

      Instruction explosion

    • B. 

      Instruction expansion

    • C. 

      Mnemonic explosion

    • D. 

      Instruction compression

  • 28. 
    A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.
    • A. 

      Next-generation language

    • B. 

      Second-generation language

    • C. 

      Third-generation language

    • D. 

      Fifth-generation language

  • 29. 
    A ____ is a source code instruction that controls the execution of other source code instructions. 
    • A. 

      Data declaration

    • B. 

      Control structure

    • C. 

      Data operation

    • D. 

      Function call

  • 30. 
    ____ linking is performed during program loading or execution.
    • A. 

      Dynamic

    • B. 

      Static

    • C. 

      Early

    • D. 

      Objective

  • 31. 
    Threads in the ____ are idle, pending availability of a CPU.
    • A. 

      Ready state

    • B. 

      Wait state

    • C. 

      Hold state

    • D. 

      Run state

  • 32. 
    The OS maintains a ____ and updates it each time a partition is allocated or freed.
    • A. 

      Memory use table

    • B. 

      Memory partition table

    • C. 

      Memory map table

    • D. 

      Memory control table

  • 33. 
    In virtual memory management, a ____ is a small fixed-size portion of a program, normally between 1 and 4 KB.
    • A. 

      Block

    • B. 

      Page

    • C. 

      Sheet

    • D. 

      Sheet

  • 34. 
    A reference to a page held in memory is called a ____.
    • A. 

      Page hit

    • B. 

      Page pull

    • C. 

      Page miss

    • D. 

      Page collision

  • 35. 
    The CPU maintains a ____ containing descriptors for all memory segments.
    • A. 

      Local descriptor table

    • B. 

      Page allocation table

    • C. 

      Global definition table

    • D. 

      Global descriptor table

  • 36. 
    A ____ is the unit of storage transferred between the device controller and memory in a single operation.
    • A. 

      Virtual record

    • B. 

      Physical record

    • C. 

      Logical record

    • D. 

      Hard record

  • 37. 
    Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
    • A. 

      Protocol stack

    • B. 

      System stack

    • C. 

      Conversion stack

    • D. 

      Application stack

  • 38. 
    In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.
    • A. 

      Network map registry

    • B. 

      Local resource registry

    • C. 

      System resource registry

    • D. 

      Remote resource registry

  • 39. 
    All objects in an LDAP schema have a(n) ____ attribute.
    • A. 

      Objectclass

    • B. 

      Distinguished name

    • C. 

      ObjectType

    • D. 

      Common name

  • 40. 
    Active Directory clients rely on a ____ to locate Active Directory servers.
    • A. 

      WINS server

    • B. 

      DHCP server

    • C. 

      BOOTP server

    • D. 

      DNS server

  • 41. 
    With the ____ protocol, a process on one machine can call a process on another machine.
    • A. 

      Remote Activation Call

    • B. 

      Remote Procedure Call

    • C. 

      Remote Execution Call

    • D. 

      Remote Calling Convention

  • 42. 
    In DCE, the security server issues security “____” to each party that are exchanged to verify identities.
    • A. 

      Tokens

    • B. 

      Signatures

    • C. 

      Keys

    • D. 

      Tickets

  • 43. 
    ____ is a collection of resources that can be accessed over the Internet by standard protocols, such as Hypertext Transfer Protocol (HTTP).
    • A. 

      The World Wide Internet

    • B. 

      An extranet

    • C. 

      The World Wide Web

    • D. 

      An intranet

  • 44. 
    ____ specifies the middleware objects use to interact across networks.
    • A. 

      COM+

    • B. 

      LDAP

    • C. 

      CIFS

    • D. 

      CORBA

  • 45. 
    ____ is a key supporting technology in IaaS because it enables a customer/user to configureapplication and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.
    • A. 

      Hardware virtualization

    • B. 

      Software virtualization

    • C. 

      Network virtualization

    • D. 

      System virtualization

  • 46. 
    ____ are assets or resources expected to provide benefits beyond the current fiscal year.
    • A. 

      Operating resources

    • B. 

      System resources

    • C. 

      Manage resources

    • D. 

      Capital resources

  • 47. 
    The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
    • A. 

      Operating system

    • B. 

      Application software

    • C. 

      Transaction monitor

    • D. 

      Database system

  • 48. 
    A ____ is a measure of computer system performance while executing one or more processing tasks.
    • A. 

      Benchmark

    • B. 

      Requirement

    • C. 

      Standard

    • D. 

      Watermark

  • 49. 
    A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
    • A. 

      Program profiler

    • B. 

      Transaction monitor

    • C. 

      Software monitor

    • D. 

      Limit monitor

  • 50. 
    A ____ describes the resource or service utilization of an application program during execution.
    • A. 

      Transaction monitor

    • B. 

      Program profiler

    • C. 

      Software monitor

    • D. 

      Limit monitor

  • 51. 
    A(n) ____ tracks the progress of complex client/server interactions.
    • A. 

      Application firewall

    • B. 

      Stateful firewall

    • C. 

      Packet-filtering firewall

    • D. 

      Proxy

  • 52. 
    In general, the humidity level of a room containing computer equipment should be near ____%.
    • A. 

      15

    • B. 

      25

    • C. 

      40

    • D. 

      50