Provides permanent storage for data and instructions

Assignment Help Basic Computer Science
Reference no: EM131135996

1. A(n) ____ is a set of elements or components that interact to accomplish goals.

a. process c. system
b. network d. intranet

2. A firm's ____ includes all the hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information.

a. technology infrastructure c. transaction processing system
b. e-business d. MIS

3. ____ consists of computer equipment used to perform input, processing, and output activities.

a. Virtual reality c. Hardware
b. Software d. Artificial intelligence

4. ____ include the strategies, policies, methods, and rules for using a CBIS, including the operation, maintenance, and security of the computer.

a. Procedures c. Databases
b. Vision systems d. Podcasts

5. A ____ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.

a. procedure c. network
b. process d. transaction

6. A(n) ____ is a set of integrated programs that manages the vital business operations for an entire multisite, global organization.

a. enterprise resource planning system c. database unit
b. network unit d. value chain

7. A ____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making.

a. vision system c. decision support system
b. virtual reality system d. podcast

8. The collection of data, rules, procedures, and relationships that must be followed to achieve value or the proper outcome is contained in the expert system's ____.

a. knowledge base c. intranet
b. value chain d. network unit

9. The ____ is that part of the computer that consists of three associated elements: the arithmetic/logic unit, the control unit, and the register areas.

a. gateway c. bridge
b. central processing unit d. channel bandwidth

10. ____ are high-speed storage areas used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.

a. Registers c. Magnetic tapes
b. MP3s d. Arithmetic/logic units

11. ____ is a hypothesis which states that transistor densities on a single chip double every 18 months.

a. RAID c. Parallel processing
b. RFID d. Moore's Law

12. ____ provides permanent storage for data and instructions that do not change, such as programs and data from the computer manufacturer.

a. RAM c. ROM
b. Linux d. UNIX

13. ____ is a type of high-speed memory that a processor can access more rapidly than main memory.

a. RAM c. Cache memory
b. MP3 d. ROM

14. ____ parallel processors all execute the same instruction on many data values simultaneously.

a. Thin client c. Embedded
b. Single instruction/multiple data d. UNIX

15. The term ____ is used to describe devices that store larger amounts of data, instructions, and information more permanently than allowed with main memory.

a. secondary storage c. RAM
b. primary storage d. ROM

16. A(n) ____ is a computer used by many users to perform a specific task, such as running network or Internet applications.

a. z/OS c. workgroup
b. MP3 d. server

17. The devices used only to access secondary storage data directly are called ____.

a. sequential access storage devices c. primary storage devices
b. secondary storage devices d. direct access storage devices

18. A(n) ____ allows people to access and command the computer system.

a. workgroup c. user interface
b. utility program d. interpreter

19. A(n) ____ is a collection of single application programs packaged in a bundle.

a. database c. applet
b. proprietary software d. software suite

20. ____ is designed to support teamwork, whether people are in the same location or dispersed around the world.

a. Proprietary software c. Off-the-shelf software
b. Workgroup application software d. Distributed software

21. ____ involves translating what a user wants to accomplish into a code that the computer can understand and execute.

a. Pre-emptive multitasking c. Time-sharing
b. Virtualization d. Programming

22. The term ____ is used to describe software that is very inexpensive or free, usually for use in personal computers, but whose source code cannot be modified.

a. middleware c. applet
b. open-source d. shareware

23. Red Hat Linux for IBM mainframe computers is an example of a(n) ____.

a. utility program c. embedded operating system
b. Internet service provider d. enterprise operating system

24. ____ applications can be used to plan, schedule, allocate, and control people and resources (money, time, and technology) needed to complete a project according to schedule.

a. Financial management c. Spreadsheet
b. Database d. Project management

25. ____ is a set of integrated programs that manage a company's vital business operations for an entire multisite, global organization.

a. Project management c. Financial management
b. Enterprise resource planning software d. Online information services

26. A ____ is typically a name, number, or combination of characters that describes an aspect of a business object

a. field c. record
b. character d. file

27. A collection of related records is a(n) ____.

a. entity c. file
b. attribute d. schema

28. A(n) ____ is a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained.

a. data model c. relational model
b. entity d. attribute

29. ____ is a way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from elemental data, and some data attributes are repeated in more than one data entity to improve database performance.

a. Data modeling c. Concurrency control
b. Planned data redundancy d. Data mining

30. The ____ is a database model that describes data in which all data elements are placed in two-dimensional tables, called relations.

a. domain model c. entity model
b. query model d. relational model

31. ____ involves the manipulation of data to eliminate rows according to certain criteria.

a. Data mining c. Projecting
b. Selecting d. Joining

32. ____ involves eliminating columns in a table.

a. Joining c. Projecting
b. Selecting d. Data mining

33. A ____ is one that directly interacts with people or users.

a. database application c. proprietary application
b. front-end application d. back-end application

34. A(n) ____ is a subset of a data warehouse.

a. data model c. object
b. data mart d. schema

35. ____ is a form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events such as future product sales or the probability that a customer will default on a loan.

a. Query by example c. Data modeling
b. OLAP d. Predictive analysis

36. ____ involves gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive effect on business strategy, tactics, or operations.

a. Data synchronization c. CRM
b. Business intelligence d. Paging

37. The term ____ describes the steps an organization takes to protect information sought by "hostile" intelligence gatherers.

a. predictive analysis c. data cleanup
b. data synchronization d. counterintelligence

38. ____ allows users to explore data from a number of perspectives.

a. SQL c. OLAP
b. Data mining d. Predictive analysis

39. A ____ system employs many satellites, each in a circular orbit at an altitude of a few hundred miles.

a. geostationary satellite c. small mobile satellite
b. very small aperture terminal d. low earth orbit satellite

40. A(n) ____ sends signals through the air via light waves at a frequency of 300 GHz and above.

a. infrared transmission c. multiplexer
b. analog transmission d. radio transmission

41. A(n) ____ is a telecommunications service that delivers high-speed Internet access to homes and small businesses over the existing phone lines of the local telephone network.

a. ISP c. DSL
b. switch d. Slingbox

42. A(n) ____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or city.

a. URL c. ISP
b. metropolitan area network d. local area network

43. A(n) ____ is a telecommunications network that connects large geographic regions.

a. ISP c. URL
b. local area network d. wide area network

44. With ____, processing devices are placed at various remote locations.

a. centralized processing c. sequential processing
b. decentralized processing d. direct processing

45. A ____ forwards data packets across two or more distinct networks toward their destinations through a process known as routing.

a. bridge c. router
b. switch d. gateway

Reference no: EM131135996

Questions Cloud

How distribution of fossil fuel deposits influence economic : How does the distribution of fossil fuel deposits influence economic and social development in Central Asia
Restatement of the law third : From the e-Activity, determine the primary manner in which an Attorney General at both the state and federal level would use the "Restatement of the Law Third, Agency". Describe the potential impact of the Attorney General's issued opinions in cr..
What is the effect of an increase in g on the equilibrium : What is the effect of an increase in β on the equilibrium? Provide an intuition for this result.
What is the northern latitude limit of this soil order : Distribution of Oxisols- What is the northern latitude limit of this soil order? What is the southern latitude limit of this soil order? What two latitude zones does this latitudinal range span
Provides permanent storage for data and instructions : Provides permanent storage for data and instructions that do not change, such as programs and data from the computer manufacturer.
Describe the publication and codification of statutory law : According to the Library of Congress, approximately 40,000 state and federal laws are ratified annually. For this reason, it is important to have an understanding of the manner in which a law is enacted. Imagine that your supervising attorney has ..
Examine two forces that would cause company to want to move : Imagine that you work for an organization that decided to move its operations to another country due to decreased costs of employee salary and operational expenses. Examine two (2) forces that would cause a company to want to move their operational..
About the additional annual cost : Garden Variety Flower Shop uses 760 clay pots a month. The pots are purchased at $2 each. Annual carrying costs per pot are estimated to be 30 percent of cost, and ordering costs are $20 per order. The manager has been using an order size of 1,500 fl..
Consumer reviews from the brand managers perspective : Evaluate the pros and cons of online consumer reviews from the consumer's perspective - Discuss the use of online consumer reviews from the brand manager's perspective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a new parameter query in design view

Create a new parameter query in Design view based on the Guides table with the following options: Add the FirstName, LastName, PhoneNumber, Address, State, and Postal Code fields (in that order) from the Guides table to the query.

  Create a pivot table, an active surveillance, in excel

Create a pivot table, an active surveillance, in Excel to identify adverse events related to flu vaccine. I need to come up with a background information, indicate the goals of the surveillance and data management then decide what information you ..

  What permissions are required on that file

On a directory with read permission but not execute permission, the names of files in the directory can be listed, but the files themselves can't be accessed, regardless of the permissions on them.

  Create usable human-computer interfaces

Argue that interface usability ultimately determines whether or not a human-computer interface is successful. So, in an essay type format define the terms "human-computer interface", "human-computer interaction", "interaction design", and "usa..

  Delete the body of text from the template file.

The outline must include at least two in-text citations and two sources, both in APA style.Computer Input-Output Technologies that Link Pilots and Air Traffic Controllers

  Implementation of security mechanisms

A security designer is planning the implementation of security mechanisms in a RBAC (Role Based Access Control) compliant system. The designer has determined that there are three types of resources in the system including files, printers, and mail..

  Provide a basis of competitive advantage

How can a mission statement be an enduring statement of values and simultaneously provide a basis of competitive advantage? What is the agency theory? How do agency problems occur? How can a board of directors solve agency problems?

  Facilitate assembly of information for business decisions

This module is about "business intelligence" and tools which facilitate assembly of information/knowledge in ways which enable "better" business decisions to be made.

  Shortest path between each pair of nodes using floyd''s meth

find the shortest path between each pair of nodes using floyd's method

  Which can be categorized as host ids and network ids

which can be categorized as Host IDS and Network IDS

  The goal of this problem is to simulate a geometric random

The goal of this problem is to simulate a geometric random variable (which will be covered on Friday, Feb 6th in lecture). We will break this problem into two parts.

  Similarities between a lumped and a distributed element

What are the differences and similarities between a lumped element and a distributed element. How many steps are required to design a) an RF circuit? b) A microwave circuit?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd