Beruflich Dokumente
Kultur Dokumente
Question 1
0 out of 1 points
Client computer's servers are used for word processing and spreadsheets. Selected Answer: Correct Answer: True False 0 out of 1 points
Collaboration Tools
Discussion Board Chat Wimba Live Wimba Guide Calendar Course Blogs Course Journal Groups
Question 2
The CPU works in conjunction with the ________, Selected Answer: Correct Answer:
Question 3
How is data represented and processed in the CPU? Selected Answer: Correct Answer:
SBEG Resources
Academic Policies Blackboard Status
NSU Resources
NSU Libraries Online Help Desk NSU Bookstore Current Student Resources Blackboard Help Student Blackboard Help Tegrity Classes Staff Information
Computers use bits to represent data. A bit, or binary digit, has a value of zero or one. These bits are used to represent both computer instructions and also data and are processed in the CPU. They are loaded from the magnetic disk into main memory and then into the memory registers of the CPU where the instructions are fetched, decoded, and then executed. The results are stored in more registers and then moved back to main memory via the data bus.
Question 4
1 out of 1 points
CPU works with the main memory. Selected Answer: Correct Answer: True True 1 out of 1 points
Question 5
Main memory is ________. Selected Answer: Correct Answer: volatile volatile
Question 6
0 out of 1 points
The ________ is a loosely coupled group of programmers who mostly volunteer their time to code to various projects Selected Answer: Correct Answer: [None Given] open-source community 0 out of 1 points
Question 7
Viruses that masquerade as useful programs like computer games, or MP3 files are called ________. Selected Answer: Correct Answer: [None Given] Trojan horses. 0 out of 1 points
Question 8
A ________ stipulates how a program may be used by the purchaser Selected Answer: Correct Answer: [None Given] license 1 out of 1 points
Question 9
LCD monitors have dot pitch. Selected Answer: Correct Answer: False False
Question 10
1 out of 1 points
The only sure way to eliminate a virus is to wipe the magnetic disk. Selected Answer: Correct Answer: True True 0 out of 1 points
Question 11
A ________ is a client-server application that requires programs other than the browser on the user's computer. Selected Answer: Correct Answer: [None Given] thick client 0 out of 1 points
Question 12
Which device listed below is NOT an example of an input hardware device? Selected Answer: Correct Answer: Keyboard Printer 0 out of 1 points
Question 13
A macro virus propagates using the Internet or other computer network, and become so overwhelming that the network becomes unusable Selected Answer: Correct Answer: True False 0 out of 1 points
Question 14
"Dot pitch" is found on a ________. Selected Answer: Correct Answer: LCD monitor CRT monitor
Question 15
A chunk is a grouping of 8 bit bytes. Selected Answer: Correct Answer: True False
0 out of 1 points
Management Info Systems Assignments Chapter 4: Hardware and Software Review Test Submission: Chapter 4: Practice Quiz
Question 1
0 out of 1 points
________ are commands that CPU can process, and may be specific for each processor type. Selected Answer: Correct Answer: Application software Instruction sets 0 out of 1 points
Collaboration Tools
Discussion Board Chat Wimba Live Wimba Guide Calendar Course Blogs Course Journal Groups
Question 2
Selected Answer: Correct Answer: False True
Question 3
Selected Answer: Correct Answer: True False
0 out of 1 points
SBEG Resources
Academic Policies Blackboard Status
NSU Resources
NSU Libraries Online Help Desk NSU Bookstore Current Student Resources Blackboard Help Student Blackboard Help Tegrity Classes Staff Information
Question 4
Main memory is ________. Selected Answer: Correct Answer: nonvolatile volatile
0 out of 1 points
Question 5
0 out of 1 points
If there is not enough available unused memory, the operating system will remove something to make room, a process known as ________. Selected Answer: Correct Answer: [None Given] memory swapping 1 out of 1 points
Question 6
Specific function cards are added to computers to enhance clarity for the video display. Selected Answer: Correct Answer: True True 0 out of 1 points
Question 7
Computers represent data by using ________. Selected Answer: Correct Answer: bytes bits
Question 8
1 out of 1 points
Application software consist of programs that perform business functions. Selected Answer: Correct Answer: True True 1 out of 1 points
Question 9
Which of the following is best for storing many large disks and files, and easily swapping files in and out of memory? Selected Answer: Correct Answer: Magnetic disk Magnetic disk 1 out of 1 points
Question 10
________ software consists of programs that perform specific business functions like general ledger and accounting. Selected Answer: Correct Answer: Application Application 0 out of 1 points
Question 11
Client computer's servers are used for word processing and spreadsheets. Selected Answer: Correct Answer: True False 1 out of 1 points
Question 12
A collection of servers called a ________ coordinates the activities of hundreds of users. Selected Answer: Correct Answer: server farm server farm 0 out of 1 points
Question 13
Main memory is sometimes called ________. Selected Answer: Correct Answer: [None Given] RAM
Question 14
Selected Answer: Correct Answer:
Needs Grading
A Trojan horse virus masquerades as a game, music file, or a useful program that users want to download and then delivers a malicious payload. A macro virus attaches to a Word, Excel, or other type of document file. Then when the file is opened, it places itself in the startup file of that particular application and then infects every file the application processes after that. Worm viruses use the Internet or other computer network to spread and propagate. They can choke networks with a high volume of traffic to make the network unusable.
Question 15
1 out of 1 points
Linux is a version of Unix that was developed by the open source community. Selected Answer: Correct Answer: True True
Management Info Systems Assignments Chapter 4: Hardware and Software Review Test Submission: Chapter 4: Practice Quiz
Question 1
0 out of 1 points
A ________ stipulates how a program may be used by the purchaser Selected Answer: Correct Answer: [None Given] license 0 out of 1 points
Collaboration Tools
Discussion Board Chat Wimba Live Wimba Guide Calendar Course Blogs Course Journal Groups
Question 2
When you work on a spreadsheet program like Excel, the program is loaded into main memory for processing. Selected Answer: Correct Answer: False True 0 out of 1 points
Question 3
Main memory is sometimes called ________. Selected Answer: Correct Answer: [None Given] RAM
SBEG Resources
Academic Policies Blackboard Status
NSU Resources
NSU Libraries Online Help Desk NSU Bookstore Current Student Resources Blackboard Help Student Blackboard Help Tegrity Classes Staff Information
Question 4
Optical disks are examples or magnetic disks. Selected Answer: Correct Answer: [None Given] False
0 out of 1 points
Question 5
1 out of 1 points
Specific function cards are added to computers to enhance clarity for the video display. Selected Answer: Correct Answer: True True
Question 6
0 out of 1 points
A ________ is a client-server application that requires programs other than the browser on the user's computer. Selected Answer: Correct Answer: [None Given] thick client 0 out of 1 points
Question 7
One ________ is equivalent to 1024 GB. Selected Answer: Correct Answer: megabyte terabyte
Question 8
8-bit chunks of data are called ________. Selected Answer: Correct Answer: bytes bytes
1 out of 1 points
Question 9
A ________ computer has 4 CPUs. Selected Answer: Correct Answer: [None Given] quad processor
0 out of 1 points
Question 10
0 out of 1 points
Software that is installed often in special, read-only memory in devices like printers or communication devices is called ________. Selected Answer: Correct Answer: [None Given] firmware 0 out of 1 points
Question 11
Memory moving is the process of moving blocks of memory into and out of unused memory as the user brings up new programs. Selected Answer: Correct Answer: True False 0 out of 1 points
Question 12
A collection of servers called a ________ coordinates the activities of hundreds of users. Selected Answer: Correct Answer: server station server farm 0 out of 1 points
Question 13
Software that is tailor-made for special applications is called ________ software. Selected Answer: Correct Answer: [None Given] custom-developed 1 out of 1 points
Question 14
Which device listed below is NOT an example of an input hardware device? Selected Answer: Correct Answer: Printer Printer 1 out of 1 points
Question 15
The contents of an optical disk will survive if power is suddenly lost. Selected Answer: Correct Answer: True True
Management Info Systems Assignments Chapter 4: Hardware and Software Review Test Submission: Chapter 4: Practice Quiz
Question 1
Needs Grading
What is the difference between off-the-shelf and custom software? What are the advantages and disadvantages of custom software? Selected Answer: Correct Answer: Off-the-shelf software is purchased and then modified to fit the particular need. Custom software is programmed from scratch to meet the needs of the company. Custom software development can be difficult and risky. They are hard to manage and are often 200 to 300 percent over budget and late. It may be that the needs of the organization are so unique that no packaged system comes close and so because the potential gain in competitive advantage may be great, it may be enough to justify the risk. It is also risky because many other existing applications may have to be modified in order to be integrated with the custom application. If the original developers of the system leave the organization, there must be good documentation of the custom system in order for other people to properly maintain it.
Collaboration Tools
Discussion Board Chat Wimba Live Wimba Guide Calendar Course Blogs Course Journal Groups
SBEG Resources
Academic Policies Blackboard Status
NSU Resources
NSU Libraries Online Help Desk NSU Bookstore Current Student Resources Blackboard Help Student Blackboard Help Tegrity Classes Staff Information
Question 2
A megabyte is 1000 kilobytes. Selected Answer: Correct Answer: False False
1 out of 1 points
Question 3
0 out of 1 points
Large sites that require numerous servers will organize then onto a Web farm. Selected Answer: Correct Answer: True False 0 out of 1 points
Question 4
Which device listed below is NOT an example of an input hardware device? Selected Answer: Correct Answer: Microphone Printer 1 out of 1 points
Question 5
Selected Answer: Correct Answer: False False
Question 6
Selected Answer: Correct Answer: [None Given] CRT
0 out of 1 points
Question 7
1 out of 1 points
The contents of an optical disk will survive if power is suddenly lost. Selected Answer: Correct Answer: True True 0 out of 1 points
Question 8
Computers represent data by using ________. Selected Answer: Correct Answer: bytes bits
Question 9
Selected Answer: Correct Answer: True True
1 out of 1 points
Question 10
0 out of 1 points
A ________ is a client-server application that requires programs other than the browser on the user's computer. Selected Answer: Correct Answer: [None Given] thick client 1 out of 1 points
Question 11
The application program is the set of commands that the CPU can process. Selected Answer: Correct Answer: False False 0 out of 1 points
Question 12
Horizontal-market application software serves the needs of a specific industry. Selected Answer: Correct Answer: True False 1 out of 1 points
Question 13
Selected Answer: Correct Answer: Client Client
Question 14
1 out of 1 points
________ software consists of programs that perform specific business functions like general ledger and accounting. Selected Answer: Correct Answer: Application Application 0 out of 1 points
Question 15
Software that is installed often in special, read-only memory in devices like printers or communication devices is called ________. Selected Answer: Correct Answer: [None Given] firmware