07 Jun CS 35 multiple choice questions
Question
a. machine cycle c. clock speed
b. record d. instruction time
____ 2. The term ____ is used to describe a CPU operation in which multiple execution phases are performed in a single machine cycle.
a. source data automation c. pipelining
b. disk mirroring d. grid computing
____ 3. Each CPU produces a series of electronic pulses at a predetermined rate, called the ____, which affects machine cycle time.
a. clock speed c. RAM
b. cache d. ROM
____ 4. A(n) ____ combines two or more independent processors into a single computer so that they can share the workload and boost processing capacity.
a. optical disc c. RFID
b. storage area network d. multicore microprocessor
____ 5. A(n) ____ is a special-purpose, high-speed network that provides direct connections between data-storage devices and computers across the enterprise
a. LAN c. WAN
b. storage area network d. Intranet
____ 6. The devices used only to access secondary storage data sequentially are called ____.
a. sequential access storage devices c. primary storage devices
b. secondary storage devices d. direct access storage devices
____ 7. The devices used only to access secondary storage data directly are called ____.
a. sequential access storage devices c. primary storage devices
b. secondary storage devices d. direct access storage devices
____ 8. Inexpensive and easy to use, ____ are input and display devices that perform data entry and input at the same time.
a. terminals c. optical readers
b. scanning devices d. magnetic stripe cards
____ 9. ____ allows people and organizations to tap into unused computer power over a network.
a. Object source software c. Grid computing
b. Object-oriented programming d. File compression
____ 10. ____ allows spreadsheets to maximize or minimize quantity, subject to certain constraints.
a. Optimization c. CRM
b. Time-sharing d. Paging
____ 11. IS professionals work with ____, which are sets of keywords, symbols, and rules for constructing statements by which people can communicate instructions to be executed by a computer.
a. programming languages c. interpreters
b. indexers d. Compilers
____ 12. Fifth-generation languages are sometimes called ____ because they use even more English-like syntax than 4GLs.
a. assembly languages c. natural languages
b. high-level languages d. machine languages
____ 13. Virtual memory works by swapping programs or parts of programs between memory and one or more disk devices – a concept called ____.
a. paging c. caching
b. buffering d. Scheduling
____ 14. ____ software can permit one user to run several programs or tasks at the same time and allow several users to use the same computer at the same time.
a. Time-sharing c. Cache management
b. Memory management d. Task-management
____ 15. A ____ is a skilled and trained IS professional who directs all activities related to an organization’s database, including providing security from intruders.
a. network administrator c. database administrator
b. software engineer d. system administrator
____ 16. The ____ is a database model that describes data in which all data elements are placed in two-dimensional tables, called relations.
a. domain model c. entity model
b. query model d. relational model
____ 17. ____ involves the manipulation of data to eliminate rows according to certain criteria.
a. Data mining c. Projecting
b. Selecting d. Joining
____ 18. A(n) ____ is a simple database program whose records have no relationship to one another.
a. flat file c. data mart
b. data dictionary d. Attribute
____ 19. A(n) ____ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
a. machine language c. assembly language
b. procedural languages d. data definition language
____ 20. A ____ is one that directly interacts with people or users.
a. database application c. proprietary application
b. front-end application d. back-end application
____ 21. A ____ interacts with other programs or applications; it only indirectly interacts with people or users.
a. database application c. proprietary application
b. front-end application d. back-end application
____ 22. An object-oriented database uses a(n) ____ to provide a user interface and connections to other programs.
a. object-oriented database management system
b. Java
c. Visual Basic
d. object-relational database management system
____ 23. ____ involves the use of a database to store and access data according to the locations it describes and to permit spatial queries and analysis.
a. Spatial data technology c. Predictive analysis
b. SQL d. SQL
____ 24. The ____ is a widely used Transport-layer protocol that most Internet applications use with IP.
a. SLIP c. TCP
b. HTTP d. PPP
____ 25. A(n) ____ is any company that provides people and organizations with access to the Internet.
a. Internet Service Provider c. personal information manager
b. host d. application service provider
____ 26. ____ provides a way for a Web service application to describe its interfaces in enough detail to allow a user to build a client application to talk to it.
a. Universal Discovery Description and Integration
b. Web Services Description Language
c. Simple Object Access Protocol
d. PHP
____ 27. ____ is an old technology that uses e-mail to provide a centralized news service.
a. Telnet c. Usenet
b. FTP d. Instant messaging
____ 28. ____ is the direct sale of products or services by businesses to consumers through electronic storefronts, which are typically designed around the familiar electronic catalog and shopping cart model.
a. Electronic retailing c. Personalization
b. Electronic bill presentment d. Source data automation
____ 29. A(n) ____ is a single Web site that offers many products and services at one Internet location.
a. online exchange c. cyber outlet
b. cybermall d. public exchange
____ 30. ____ Web pages contain variable information and are built to respond to a specific Web site visitor’s request.
a. Dynamic c. Static
b. Cache friendly d. HTML
____ 31. ____ software combines different product data formats into a standard format for uniform viewing, aggregating, and integrating catalog data.
a. Web service c. Catalog management
b. Product configuration d. Web page construction
____ 32. ____ software tools were originally developed in the 1980s to assist B2B salespeople to match their company’s products to customer needs.
a. Web service c. Catalog management
b. Product configuration d. Web page construction
____ 33. The ____ is a communications protocol is used to secure sensitive data during e-commerce.
a. HTTP c. Secure Sockets Layer
b. FTP d. TCP/IP
____ 34. Information that is of great importance to a firm and for which strong measures are taken to protect it are ____.
a. trade practices c. trade secrets
b. online profiles d. Web services
____ 35. The ____ inventory technique is used when the demand for one item depends on the demand for another.
a. flexible manufacturing c. material requirements planning
b. just-in-time d. computer-assisted
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
