Вы находитесь на странице: 1из 15

Terms

Definitions

System bus

1. The _______ is the communication channel that connects


all computer system components.

L1 Cache

2. A(n) _______ cache is generally implemented on the same


chip as the CPU.

bus master

3. The CPU is always capable of being a(n) _______, thus


controlling access to the bus by all other devices in the
computer system.

buffer

4. A(n) _______ is a small area of memory used to resolve


differences in data transfer rate or data transfer unit size.

cache

5. A(n) _______ is an area of fast memory where data held in


a storage device is prefeteched in anticipation of future
requests for that data.

cache swap

6. A cache controller is a hardware device that initiates a(n)


_______ when it detects a cache miss.

control bus

7. The _______ transmits command, timing, and status


signals between devices in a computer system.

clock

8. If possible, the system bus _______ rate should equal the


speed of the CPU.

stack pointer,

9. The _______ is a register that always contains a pointer to

stack

the top of the _______.

supervisor,

10. The _______ calls an interrupt handler after it looks up its

interrupt table

memory address in the _______.

machine state

11. The set of register values placed on the stack while


processing an interrupt is also called the _______.

interrupt handler

12. A(n) _______ is a software program that is executed in


response to a specific interrupt.

stack

13. During interrupt processing, register values of a


suspended process are held on the ______.

interrupt

14. A(n) _______ is a signal to the CPU or operating system


that some device or program requires processing services.

bus arbitration
unit

15. A(n) _______ is a hardware device that intervenes


when two potential bus masters want control of the

bus at the same


time.
bus master, bus

16. The initiator of a bus transfer assumes the role of a(n)

slave

_______. The recipient assumes the role of a(n) _______.

wait states

17. The CPU incurs one or more _______ if it is idle pending


the completion of an I/O operation.

address bus,

18. The system bus can be decomposed logically into three

control bus, data


bus

sets of transmission lines: the _______ bus, the _______ bus,


and the _______ bus.

push operation,

19. During a(n) ________, one or more register values are

pop operation

copied to the top of the stack. During a(n) _______, one or


more values are copied from the top of the stack to registers.

algorithm

20. The relative size of a data set before and after data
compression is described by the compression ______.

control bus,

25. Primary storage receives a read command on the

address bus,
data bus

_______, the address to be accessed on the _______, and


returns the accessed data on the _______.

linear address

26. The operating system normally views any storage device

space

as a(n) _______, ignoring the device's physical storage


organization.

logical accesses

27. Part of the function of a storage secondary device


controller is to translate _______ into physical accesses.

Direct memory

28. _______ is used to transfer data directly between memory

access

and secondary storage devices, without the assistance of the


CPU.

channel

29. A(n) _______ is a high capacity device controller used in


mainframe computers.

cache hit

30. An access to primary storage that is found within a


cache is called a(n) _______.

bus protocol

32. A(n) _______ defines the control, signals, and other


communication parameters of a bus.

1.

20. The relative size of a data set before and after data compression is described
by the compression ______.
INCORRECT: You gave no answer
ANSWER: algorithm

2.

9. The _______ is a register that always contains a pointer to the top of the _______.
INCORRECT: You gave no answer
ANSWER: stack pointer, stack

3.

19. During a(n) ________, one or more register values are copied to the top of the
stack. During a(n) _______, one or more values are copied from the top of the stack to
registers.
INCORRECT: You gave no answer
ANSWER: push operation, pop operation

4.

10. The _______ calls an interrupt handler after it looks up its memory address in
the _______.
INCORRECT: You gave no answer
ANSWER: supervisor, interrupt table

5.

8. If possible, the system bus _______ rate should equal the speed of the CPU.
INCORRECT: You gave no answer
ANSWER: clock

5 Matching Questions
1.

cache
INCORRECT: No answer given
ANSWER: d 5. A(n) _______ is an area of fast memory where data held in a storage
device is prefeteched in anticipation of future requests for that data.

2.

Direct memory access


INCORRECT: No answer given

ANSWER: e 28. _______ is used to transfer data directly between memory and
secondary storage devices, without the assistance of the CPU.
3.

control bus
INCORRECT: No answer given
ANSWER: a 7. The _______ transmits command, timing, and status signals between
devices in a computer system.

4.

bus master
INCORRECT: No answer given
ANSWER: b 3. The CPU is always capable of being a(n) _______, thus controlling
access to the bus by all other devices in the computer system.

5.

channel
INCORRECT: No answer given
ANSWER: c 29. A(n) _______ is a high capacity device controller used in mainframe
computers.
a 7. The _______ transmits command, timing, and status signals between devices

1.

in a computer system.
b 3. The CPU is always capable of being a(n) _______, thus controlling access to the

2.

bus by all other devices in the computer system.


c 29. A(n) _______ is a high capacity device controller used in mainframe

3.

computers.
d 5. A(n) _______ is an area of fast memory where data held in a storage device is

4.

prefeteched in anticipation of future requests for that data.


e 28. _______ is used to transfer data directly between memory and secondary

5.

storage devices, without the assistance of the CPU.

5 Multiple Choice Questions


1.

12. A(n) _______ is a software program that is executed in response to a specific


interrupt.(No Answer)
1.
CORRECT: interrupt handler
2.
channel
3.
bus master
4.
interrupt
b. 11. The set of register values placed on the stack while processing an interrupt is
also called the _______.(No Answer)

1.

b.
1.

b.
1.

b.

cache hit
2.
CORRECT: machine state
3.
cache swap
4.
wait states
18. The system bus can be decomposed logically into three sets of transmission
lines: the _______ bus, the _______ bus, and the _______ bus.(No Answer)
control bus
2.
CORRECT: address bus, control bus, data bus
3.
control bus, address bus, data bus
4.
bus master, bus slave
2. A(n) _______ cache is generally implemented on the same chip as the CPU.(No
Answer)
CORRECT: L1 Cache
2. cache
3. stack
4. algorithm
30. An access to primary storage that is found within a cache is called a(n) _______.
(No Answer)
1. cache swap
2. L1 Cache
3. cache
4. CORRECT: cache hit

5 True/False Questions
1.

logical accesses 2. A(n) _______ cache is generally implemented on the same


chip as the CPU.
This is false. You gave no answer.
It should be logical accesses 27. Part of the function of a storage secondary
device controller is to translate _______ into physical accesses..

2.

stack 13. During interrupt processing, register values of a suspended process


are held on the ______.
This is true. You gave no answer.

3.

linear address space 27. Part of the function of a storage secondary device
controller is to translate _______ into physical accesses.
This is false. You gave no answer.
It should be linear address space 26. The operating system normally views any
storage device as a(n) _______, ignoring the device's physical storage
organization..

4.

interrupt 12. A(n) _______ is a software program that is executed in response to


a specific interrupt.
This is false. You gave no answer.
It should be interrupt 14. A(n) _______ is a signal to the CPU or operating system
that some device or program requires processing services..

5.

wait states 11. The set of register values placed on the stack while processing
an interrupt is also called the _______.
This is false. You gave no answer.
It should be wait states 17. The CPU incurs one or more _______ if it is idle
pending the completion of an I/O operation..

15 Written Questions
1.

operating system program that is responsible for booting the computer system
INCORRECT: You gave no answer
ANSWER: BIOS

2.

The technology that uses cables consisting of very thin filaments of glass fibers
that can conduct the light generated by lasers for high-speed telecommunications.
INCORRECT: You gave no answer
ANSWER: fiber optics

3.

(computing) a security system consisting of a combination of hardware and


software that limits the exposure of a computer or computer network to attack from
crackers
INCORRECT: You gave no answer
ANSWER: firewall

4.

steals information for identity theft and more illegal; more mischievous than
criminal

INCORRECT: You gave no answer


ANSWER: gray hat hacker
5.

a unit of information equal to one billion (1,073,741,824) bytes or 1024


megabytes
INCORRECT: You gave no answer
ANSWER: gigabyte

6.

Windows utility command to delete temporary files stored on your computer


INCORRECT: You gave no answer
ANSWER: disk cleanup

7.

Someone who uncovers computer weaknesses without exploiting them. The goal
of the white hat hacker is to improve system security.
INCORRECT: You gave no answer
ANSWER: white hat hacker

8.

Bill Gates GUI operating system used for IBM clone computers
INCORRECT: You gave no answer
ANSWER: Windows

9.

The distance in millimeters between each like-color pixel on a display. The smaller
the distance between the pixels, the sharper the image. Dot pitch is one
measurement of image clarity on a CRT monitor. Also called pixel pitch
INCORRECT: You gave no answer
ANSWER: dot pitch

10.

an internet connection such as DSL or cable modem that offers higher bandwidth,
and therefore faster transmission speed, than standard modem connections.
INCORRECT: You gave no answer
ANSWER: broadband connections

11.

a computer program that detects viruses and repairs files.

INCORRECT: You gave no answer


ANSWER: antivirus
12.

involves reducing the electricity consumed and environmental waste generated


when using a computer
INCORRECT: You gave no answer
ANSWER: green computing

13.

a computer criminal
INCORRECT: You gave no answer
ANSWER: black hat hacker

14.

software that is available free of charge


INCORRECT: You gave no answer
ANSWER: shareware

15.

a low-speed service that uses a phone line. Transfer rate a high of 56 Kbps per
second.
INCORRECT: You gave no answer
ANSWER: dial-up

15 Matching Questions
1.

url
INCORRECT: No answer given
ANSWER: n the address of a web page on the world wide web

2.

application
INCORRECT: No answer given
ANSWER: k Word, Excel and Power Point can be classified as this type of software

3.

2nd generation
INCORRECT: No answer given

ANSWER: h this generation of computers used transistors


4.

CPN
INCORRECT: No answer given
ANSWER: e brain of your computer

5.

usenet group
INCORRECT: No answer given
ANSWER: f -exchange of comments among participants sometimes called a news
group

6.

MAN
INCORRECT: No answer given
ANSWER: i type of network which is city-wide (metropolitan)

7.

plotter
INCORRECT: No answer given
ANSWER: b an instrument (usually driven by a computer) for drawing graphs or
pictures

8.

dock
INCORRECT: No answer given
ANSWER: o MS Word file name extension for Office 2010

9.

phishing
INCORRECT: No answer given
ANSWER: d a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail

10.

terabyte
INCORRECT: No answer given

ANSWER: j a unit of information equal to a trillion (1,099,511,627,776) bytes or


1024 gigabytes
11.

freedom of information act


INCORRECT: No answer given
ANSWER: l citizens have the right to inspect all government records except those
containing military, intelligence, or trade secrets or revealing private personnel
actions

12.

adware
INCORRECT: No answer given
ANSWER: a any software application in which advertising banners are displayed
while the program is running

13.

cookie
INCORRECT: No answer given
ANSWER: c tracking program used by internet browsers to track visited websites

14.

biometrics
INCORRECT: No answer given
ANSWER: m method of using fingerprints and retina scans for security measures

15.

supercomputer
INCORRECT: No answer given
ANSWER: g most powerful and more expensive type of computer

1.

a any software application in which advertising banners are displayed while the
program is running

2.

b an instrument (usually driven by a computer) for drawing graphs or pictures

3.

c tracking program used by internet browsers to track visited websites

4.

d a technique to gain personal information for the purpose of identity theft,


usually by means of fraudulent e-mail

5.

e brain of your computer

6.

f -exchange of comments among participants sometimes called a news group

7.

g most powerful and more expensive type of computer

8.

h this generation of computers used transistors

9.

i type of network which is city-wide (metropolitan)

10.

j a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024


gigabytes

11.

k Word, Excel and Power Point can be classified as this type of software

12.

l citizens have the right to inspect all government records except those containing
military, intelligence, or trade secrets or revealing private personnel actions

13.

m method of using fingerprints and retina scans for security measures

14.

n the address of a web page on the world wide web

15.

o MS Word file name extension for Office 2010

15 Multiple Choice Questions


1.

b.
1.

b.
1.

b.
1.

b.
1.

b.
1.

an open-source version of the UNIX operating system, FREE(No Answer)


1. NOW
2.
MIN
3.
CORRECT: Linux
4.
MAN
term for the software program that allows you to connect to the internet(No Answer)
BIOS
2.
CORRECT: browser
3.
cookie
4.
plotter
Excel function used if you have 2 or more possible outcomes(No Answer)
dial-up
2.
CORRECT: V-lookup
3.
dock
4.
Linux
Excel function used to insert the current date and time(No Answer)
url
2.
CPN
3.
USB
4.
CORRECT: NOW
term for illegal copying or distribution of software(No Answer)
spyware
2.
dot pitch
3.
CORRECT: software piracy
4.
shareware
computer software that is designed to collect personal info about users without their
informed consent(No Answer)
CORRECT: spyware
2.
spam

3.
byte
4.
shareware
b. places on the outside of the computer where you plug in hardware(No Answer)
1.
byte
2.
dock
3.
RAM
4.
CORRECT: ports
b. MS Word feature that automatically puts text at the top of a page(No Answer)
1.
CORRECT: header
2.
CD-R
3.
browser
4.
RAM
b. network topology where 1 computer controls everything(No Answer)
1.
CORRECT: client-server
2.
mail merge
3.
CD-R
4.
header
b. a semiconductor device capable of amplification(No Answer)
1.
BIOS
2.
dot pitch
3.
browser
4.
CORRECT: transistor
b. is a feature that allows a user to create mass mailings of letters, mailing labels, and
other documents and personalize the information in each on MS Word(No Answer)
1.
CORRECT: mail merge
2.
biometrics
3.
adware
4.
internet
b. a computer network consisting of a worldwide network of computer networks that
use the TCP/IP network protocols to facilitate data transmission and exchange(No
Answer)
1.
cookie
2.
CORRECT: internet
3.
header
4.
MIN
b. Excel function which returns the smallest value in the range of selected cells(No
Answer)
1.
MAN
2.
CORRECT: MIN
3.
CPN
4.
USB
b. term for stealing fractions of cents from interest bearing financial accounts(No
Answer)
1.
phishing
2.
CORRECT: salami slicing
3.
transistor

4.
mosaic
b. The main circuit board of a microcomputer. The motherboard contains the
connectors for attaching additional boards.(No Answer)
1.
terabyte
2.
CORRECT: motherboard
3.
plotter
4.
shareware

15 True/False Questions
1.

DVD a digital videodisc has more storage space than CD


This is true. You gave no answer.

2.

laptop type of network which is city-wide (metropolitan)


This is false. You gave no answer.
It should be laptop a portable computer small enough to use in your lap.

3.

byte a sequence of 8 bits (enough to represent one character of alphanumeric


data) processed as a single unit of information
This is true. You gave no answer.

4.

USB the address of a web page on the world wide web


This is false. You gave no answer.
It should be USB the newest type of port found on most computer systems.

5.

trojan horse a semiconductor device capable of amplification


This is false. You gave no answer.
It should be trojan horse a program that appears desirable but actually contains
something harmful.

6.

e-commerce is a feature that allows a user to create mass mailings of letters,


mailing labels, and other documents and personalize the information in each on MS
Word
This is false. You gave no answer.
It should be e-commerce term for conducting business on the internet.

7.

RAM unwanted e-mail (usually of a commercial nature sent out in bulk)

This is false. You gave no answer.


It should be RAM the temporary memory on your computer system.
8.

microprocessor method of using fingerprints and retina scans for security


measures
This is false. You gave no answer.
It should be microprocessor integrated circuit semiconductor chip that performs
the bulk of the processing and controls the parts of a system, used in 3rd and 4th
generation of computers.

9.

mosaic tracking program used by internet browsers to track visited websites


This is false. You gave no answer.
It should be mosaic first graphic web browser.

10.

signature file term for salutation that is automatically added to the end of an
email
This is true. You gave no answer.

11.

CD-R a digital videodisc has more storage space than CD


This is false. You gave no answer.
It should be CD-R A compact disk on which you can write only once and thereafter
is read-only memory..

12.

ergonomics The study of workplace equipment design or how to arrange and


design devices, machines, or workspace so that people and things interact safely
and most efficiently.
This is true. You gave no answer.

13.

computer viruses programs that "infect" your computer and cause harm to your
disk or programs
This is true. You gave no answer.

14.

legacy MS Word file name extension for Office 2010


This is false. You gave no answer.
It should be legacy term for computer technology that is no longer being used.

15.

spam the temporary memory on your computer system


This is false. You gave no answer.
It should be spam unwanted e-mail (usually of a commercial nature sent out in
bulk).

Вам также может понравиться