Академический Документы
Профессиональный Документы
Культура Документы
Definitions
System bus
L1 Cache
bus master
buffer
cache
cache swap
control bus
clock
stack pointer,
stack
supervisor,
interrupt table
machine state
interrupt handler
stack
interrupt
bus arbitration
unit
slave
wait states
address bus,
push operation,
pop operation
algorithm
20. The relative size of a data set before and after data
compression is described by the compression ______.
control bus,
address bus,
data bus
linear address
space
logical accesses
Direct memory
access
channel
cache hit
bus protocol
1.
20. The relative size of a data set before and after data compression is described
by the compression ______.
INCORRECT: You gave no answer
ANSWER: algorithm
2.
9. The _______ is a register that always contains a pointer to the top of the _______.
INCORRECT: You gave no answer
ANSWER: stack pointer, stack
3.
19. During a(n) ________, one or more register values are copied to the top of the
stack. During a(n) _______, one or more values are copied from the top of the stack to
registers.
INCORRECT: You gave no answer
ANSWER: push operation, pop operation
4.
10. The _______ calls an interrupt handler after it looks up its memory address in
the _______.
INCORRECT: You gave no answer
ANSWER: supervisor, interrupt table
5.
8. If possible, the system bus _______ rate should equal the speed of the CPU.
INCORRECT: You gave no answer
ANSWER: clock
5 Matching Questions
1.
cache
INCORRECT: No answer given
ANSWER: d 5. A(n) _______ is an area of fast memory where data held in a storage
device is prefeteched in anticipation of future requests for that data.
2.
ANSWER: e 28. _______ is used to transfer data directly between memory and
secondary storage devices, without the assistance of the CPU.
3.
control bus
INCORRECT: No answer given
ANSWER: a 7. The _______ transmits command, timing, and status signals between
devices in a computer system.
4.
bus master
INCORRECT: No answer given
ANSWER: b 3. The CPU is always capable of being a(n) _______, thus controlling
access to the bus by all other devices in the computer system.
5.
channel
INCORRECT: No answer given
ANSWER: c 29. A(n) _______ is a high capacity device controller used in mainframe
computers.
a 7. The _______ transmits command, timing, and status signals between devices
1.
in a computer system.
b 3. The CPU is always capable of being a(n) _______, thus controlling access to the
2.
3.
computers.
d 5. A(n) _______ is an area of fast memory where data held in a storage device is
4.
5.
1.
b.
1.
b.
1.
b.
cache hit
2.
CORRECT: machine state
3.
cache swap
4.
wait states
18. The system bus can be decomposed logically into three sets of transmission
lines: the _______ bus, the _______ bus, and the _______ bus.(No Answer)
control bus
2.
CORRECT: address bus, control bus, data bus
3.
control bus, address bus, data bus
4.
bus master, bus slave
2. A(n) _______ cache is generally implemented on the same chip as the CPU.(No
Answer)
CORRECT: L1 Cache
2. cache
3. stack
4. algorithm
30. An access to primary storage that is found within a cache is called a(n) _______.
(No Answer)
1. cache swap
2. L1 Cache
3. cache
4. CORRECT: cache hit
5 True/False Questions
1.
2.
3.
linear address space 27. Part of the function of a storage secondary device
controller is to translate _______ into physical accesses.
This is false. You gave no answer.
It should be linear address space 26. The operating system normally views any
storage device as a(n) _______, ignoring the device's physical storage
organization..
4.
5.
wait states 11. The set of register values placed on the stack while processing
an interrupt is also called the _______.
This is false. You gave no answer.
It should be wait states 17. The CPU incurs one or more _______ if it is idle
pending the completion of an I/O operation..
15 Written Questions
1.
operating system program that is responsible for booting the computer system
INCORRECT: You gave no answer
ANSWER: BIOS
2.
The technology that uses cables consisting of very thin filaments of glass fibers
that can conduct the light generated by lasers for high-speed telecommunications.
INCORRECT: You gave no answer
ANSWER: fiber optics
3.
4.
steals information for identity theft and more illegal; more mischievous than
criminal
6.
7.
Someone who uncovers computer weaknesses without exploiting them. The goal
of the white hat hacker is to improve system security.
INCORRECT: You gave no answer
ANSWER: white hat hacker
8.
Bill Gates GUI operating system used for IBM clone computers
INCORRECT: You gave no answer
ANSWER: Windows
9.
The distance in millimeters between each like-color pixel on a display. The smaller
the distance between the pixels, the sharper the image. Dot pitch is one
measurement of image clarity on a CRT monitor. Also called pixel pitch
INCORRECT: You gave no answer
ANSWER: dot pitch
10.
an internet connection such as DSL or cable modem that offers higher bandwidth,
and therefore faster transmission speed, than standard modem connections.
INCORRECT: You gave no answer
ANSWER: broadband connections
11.
13.
a computer criminal
INCORRECT: You gave no answer
ANSWER: black hat hacker
14.
15.
a low-speed service that uses a phone line. Transfer rate a high of 56 Kbps per
second.
INCORRECT: You gave no answer
ANSWER: dial-up
15 Matching Questions
1.
url
INCORRECT: No answer given
ANSWER: n the address of a web page on the world wide web
2.
application
INCORRECT: No answer given
ANSWER: k Word, Excel and Power Point can be classified as this type of software
3.
2nd generation
INCORRECT: No answer given
CPN
INCORRECT: No answer given
ANSWER: e brain of your computer
5.
usenet group
INCORRECT: No answer given
ANSWER: f -exchange of comments among participants sometimes called a news
group
6.
MAN
INCORRECT: No answer given
ANSWER: i type of network which is city-wide (metropolitan)
7.
plotter
INCORRECT: No answer given
ANSWER: b an instrument (usually driven by a computer) for drawing graphs or
pictures
8.
dock
INCORRECT: No answer given
ANSWER: o MS Word file name extension for Office 2010
9.
phishing
INCORRECT: No answer given
ANSWER: d a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail
10.
terabyte
INCORRECT: No answer given
12.
adware
INCORRECT: No answer given
ANSWER: a any software application in which advertising banners are displayed
while the program is running
13.
cookie
INCORRECT: No answer given
ANSWER: c tracking program used by internet browsers to track visited websites
14.
biometrics
INCORRECT: No answer given
ANSWER: m method of using fingerprints and retina scans for security measures
15.
supercomputer
INCORRECT: No answer given
ANSWER: g most powerful and more expensive type of computer
1.
a any software application in which advertising banners are displayed while the
program is running
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
k Word, Excel and Power Point can be classified as this type of software
12.
l citizens have the right to inspect all government records except those containing
military, intelligence, or trade secrets or revealing private personnel actions
13.
14.
15.
b.
1.
b.
1.
b.
1.
b.
1.
b.
1.
3.
byte
4.
shareware
b. places on the outside of the computer where you plug in hardware(No Answer)
1.
byte
2.
dock
3.
RAM
4.
CORRECT: ports
b. MS Word feature that automatically puts text at the top of a page(No Answer)
1.
CORRECT: header
2.
CD-R
3.
browser
4.
RAM
b. network topology where 1 computer controls everything(No Answer)
1.
CORRECT: client-server
2.
mail merge
3.
CD-R
4.
header
b. a semiconductor device capable of amplification(No Answer)
1.
BIOS
2.
dot pitch
3.
browser
4.
CORRECT: transistor
b. is a feature that allows a user to create mass mailings of letters, mailing labels, and
other documents and personalize the information in each on MS Word(No Answer)
1.
CORRECT: mail merge
2.
biometrics
3.
adware
4.
internet
b. a computer network consisting of a worldwide network of computer networks that
use the TCP/IP network protocols to facilitate data transmission and exchange(No
Answer)
1.
cookie
2.
CORRECT: internet
3.
header
4.
MIN
b. Excel function which returns the smallest value in the range of selected cells(No
Answer)
1.
MAN
2.
CORRECT: MIN
3.
CPN
4.
USB
b. term for stealing fractions of cents from interest bearing financial accounts(No
Answer)
1.
phishing
2.
CORRECT: salami slicing
3.
transistor
4.
mosaic
b. The main circuit board of a microcomputer. The motherboard contains the
connectors for attaching additional boards.(No Answer)
1.
terabyte
2.
CORRECT: motherboard
3.
plotter
4.
shareware
15 True/False Questions
1.
2.
3.
4.
5.
6.
7.
9.
10.
signature file term for salutation that is automatically added to the end of an
email
This is true. You gave no answer.
11.
12.
13.
computer viruses programs that "infect" your computer and cause harm to your
disk or programs
This is true. You gave no answer.
14.
15.