Description of this paper

CS 35 multiple choice questions

Description

solution


Question

Question;1. The time it takes to perform the fetch-instruction and decode instruction steps of the instruction phase is called the ____.a. machine cycle c. clock speedb. record d. instruction time____ 2. The term ____ is used to describe a CPU operation in which multiple execution phases are performed in a single machine cycle.a. source data automation c. pipeliningb. disk mirroring d. grid computing____ 3. Each CPU produces a series of electronic pulses at a predetermined rate, called the ____, which affects machine cycle time.a. clock speed c. RAMb. cache d. ROM____ 4. A(n) ____ combines two or more independent processors into a single computer so that they can share the workload and boost processing capacity.a. optical disc c. RFIDb. storage area network d. multicore microprocessor____ 5. A(n) ____ is a special-purpose, high-speed network that provides direct connections between data-storage devices and computers across the enterprisea. LAN c. WANb. storage area network d. Intranet____ 6. The devices used only to access secondary storage data sequentially are called ____.a. sequential access storage devices c. primary storage devicesb. secondary storage devices d. direct access storage devices____ 7. The devices used only to access secondary storage data directly are called ____.a. sequential access storage devices c. primary storage devicesb. secondary storage devices d. direct access storage devices____ 8. Inexpensive and easy to use, ____ are input and display devices that perform data entry and input at the same time.a. terminals c. optical readersb. scanning devices d. magnetic stripe cards____ 9. ____ allows people and organizations to tap into unused computer power over a network.a. Object source software c. Grid computingb. Object-oriented programming d. File compression____ 10. ____ allows spreadsheets to maximize or minimize quantity, subject to certain constraints.a. Optimization c. CRMb. Time-sharing d. Paging____ 11. IS professionals work with ____, which are sets of keywords, symbols, and rules for constructing statements by which people can communicate instructions to be executed by a computer.a. programming languages c. interpretersb. indexers d. Compilers____ 12. Fifth-generation languages are sometimes called ____ because they use even more English-like syntax than 4GLs.a. assembly languages c. natural languagesb. high-level languages d. machine languages____ 13. Virtual memory works by swapping programs or parts of programs between memory and one or more disk devices - a concept called ____.a. paging c. cachingb. buffering d. Scheduling____ 14. ____ software can permit one user to run several programs or tasks at the same time and allow several users to use the same computer at the same time.a. Time-sharing c. Cache managementb. Memory management d. Task-management____ 15. A ____ is a skilled and trained IS professional who directs all activities related to an organization?s database, including providing security from intruders.a. network administrator c. database administratorb. software engineer d. system administrator____ 16. The ____ is a database model that describes data in which all data elements are placed in two-dimensional tables, called relations.a. domain model c. entity modelb. query model d. relational model____ 17. ____ involves the manipulation of data to eliminate rows according to certain criteria.a. Data mining c. Projectingb. Selecting d. Joining____ 18. A(n) ____ is a simple database program whose records have no relationship to one another.a. flat file c. data martb. data dictionary d. Attribute____ 19. A(n) ____ is a collection of instructions and commands used to define and describe data and relationships in a specific database.a. machine language c. assembly languageb. procedural languages d. data definition language____ 20. A ____ is one that directly interacts with people or users.a. database application c. proprietary applicationb. front-end application d. back-end application____ 21. A ____ interacts with other programs or applications, it only indirectly interacts with people or users.a. database application c. proprietary applicationb. front-end application d. back-end application____ 22. An object-oriented database uses a(n) ____ to provide a user interface and connections to other programs.a. object-oriented database management systemb. Javac. Visual Basicd. object-relational database management system____ 23. ____ involves the use of a database to store and access data according to the locations it describes and to permit spatial queries and analysis.a. Spatial data technology c. Predictive analysisb. SQL d. SQL____ 24. The ____ is a widely used Transport-layer protocol that most Internet applications use with IP.a. SLIP c. TCPb. HTTP d. PPP____ 25. A(n) ____ is any company that provides people and organizations with access to the Internet.a. Internet Service Provider c. personal information managerb. host d. application service provider____ 26. ____ provides a way for a Web service application to describe its interfaces in enough detail to allow a user to build a client application to talk to it.a. Universal Discovery Description and Integrationb. Web Services Description Languagec. Simple Object Access Protocold. PHP____ 27. ____ is an old technology that uses e-mail to provide a centralized news service.a. Telnet c. Usenetb. FTP d. Instant messaging____ 28. ____ is the direct sale of products or services by businesses to consumers through electronic storefronts, which are typically designed around the familiar electronic catalog and shopping cart model.a. Electronic retailing c. Personalizationb. Electronic bill presentment d. Source data automation____ 29. A(n) ____ is a single Web site that offers many products and services at one Internet location.a. online exchange c. cyber outletb. cybermall d. public exchange____ 30. ____ Web pages contain variable information and are built to respond to a specific Web site visitor?s request.a. Dynamic c. Staticb. Cache friendly d. HTML____ 31. ____ software combines different product data formats into a standard format for uniform viewing, aggregating, and integrating catalog data.a. Web service c. Catalog managementb. Product configuration d. Web page construction____ 32. ____ software tools were originally developed in the 1980s to assist B2B salespeople to match their company?s products to customer needs.a. Web service c. Catalog managementb. Product configuration d. Web page construction____ 33. The ____ is a communications protocol is used to secure sensitive data during e-commerce.a. HTTP c. Secure Sockets Layerb. FTP d. TCP/IP____ 34. Information that is of great importance to a firm and for which strong measures are taken to protect it are ____.a. trade practices c. trade secretsb. online profiles d. Web services____ 35. The ____ inventory technique is used when the demand for one item depends on the demand for another.a. flexible manufacturing c. material requirements planningb. just-in-time d. computer-assisted

 

Paper#36472 | Written in 18-Jul-2015

Price : $35
SiteLock