Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Computer Storage & Operating Systems: Memory Cards, Interfaces, & Functions, Exams of Nursing

The process of turning on a computer or mobile device, the role of memory cards, and the differences between various storage interfaces such as eide, scsi, sas, and sata. It also covers the functions of various windows and mac operating system features.

Typology: Exams

2023/2024

Available from 04/11/2024

samuel-waweru-2
samuel-waweru-2 🇺🇸

83 documents

1 / 17

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Computer Storage & Operating Systems: Memory Cards, Interfaces, & Functions and more Exams Nursing in PDF only on Docsity! CIS 100 TEST QUESTIONS WITH COMPLETE SOLUTIONS Discuss how the speed of storage devices and memory is defined. correct answer: When you turn on a computer or mobile device, it locates the operating system on its storage medium and loads the operating system into its memory (specifically, RAM). When you issue a command to run an application, such as a browser, the operating system locates the application on a storage medium and loads it into memory (RAM). When you are finished using the application, the operating system removes it from RAM, but the application remains on the storage medium. A storage medium is similar to a filing cabinet that holds file folders, and memory is similar to the top of your desk. When you want to work with a file, you remove it from the filing cabinet (storage medium) and place it on your desk (memory). When you are finished with the file, you remove it from your desk (memory) and return it to the filing cabinet (storage medium). Why would you use an external hard drive (hard disk or SSD) instead of a second internal hard drive (hard disk or SSD)? correct answer: • Transport a large number of files. • Back up important files or an entire internal hard drive (most external hard drive models include backup software). • Easily store large audio and video files. • Secure your data; for example, at the end of a work session, you can relocate or lock up an external hard drive, leaving no data in a computer. • Add storage space to a mobile computer, such as a laptop or tablet. • Add storage space to a desktop without having to open the case or connect to a network. What is the life span of a memory card? correct answer: 10 to 100 years with proper care Guidelines for care of memory cards: correct answer: • Do not bend the card. • Avoid dropping the card. • Keep cards away from direct sunlight. • Do not expose cards to extreme temperatures. • Do not remove the card while data is transferring to or from it. Explain the advantages of cloud storage. correct answer: • To access files on the Internet from any computer or device that has Internet access • To store large audio, video, and graphics files on the Internet instantaneously, instead of spending time downloading to a local hard disk or other media • To allow others to access their files on the Internet so that others can listen to an audio file, watch a video clip, or view a photo — instead of sending the file to them via an email message • To view time-critical data and images immediately while away from the main office or location; for example, doctors can view X-ray images from another hospital, home, or office, or while on vacation • To store off-site backups of data • To provide data center functions, relieving enterprises of this task Discuss the life span of an optical disc. correct answer: optical disc will last 5 years but could last up to 100 years. Tips for proper care of optical discs: correct answer: • Never bend a disc; it may break. • Do not expose discs to extreme temperatures or humidity. The ideal temperature range for disc storage is 50 to 70 degrees Fahrenheit. • Stacking discs, touching the underside of discs, or exposing them to any type of contaminant may scratch a disc. • Place an optical disc in its protective case, called a jewel case, when you are finished using it, and store it in an upright (vertical) position. In addition to USB, what are the four types of interfaces for use in personal computers for connecting drives? correct answer: Four other types of interfaces for use in personal computers are EIDE, SCSI, SAS, and SATA. EIDE correct answer: • EIDE (Enhanced Integrated Drive Electronics) is an interface that uses parallel signals to transfer data, instructions, and information. EIDE interfaces provide connections for hard disks, RAID, SSDs, optical disc drives, and tape drives. SCSI correct answer: SCSI (Small Computer System Interface) also uses parallel signals, but can support up to 8 or 15 peripheral devices. Supported devices include hard disks, RAID, SSDs, optical disc drives, tape drives, printers, scanners, network cards, and more. SAS correct answer: SAS (serial-attached SCSI) is a type of SCSI that uses serial signals to transfer data, instructions, and information. Advantages of SAS over parallel SCSI include thinner, longer cables; reduced interference; lower cost; support for many more connected devices at once; and faster speeds. SAS Disk Defragmenter: Reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs and apps run faster Screen Saver: Causes a display's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time File Compression: Shrinks the size of a file(s) PC Maintenance: Identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance Backup and Restore: Copies selected files or the contents of an entire storage medium to another storage location What are the features offered by Windows 8, in addition to its basic capabilities? correct answer: • Start screen interface with tiles • Includes the desktop interface • Support for input via touch, mouse, and keyboard • Email app, calendar app, and browser (Internet Explorer) included • Photos, files, and settings can sync with SkyDrive, Microsoft's cloud server • Enhanced security through an antivirus program, firewall, and automatic updates • Windows Store offers additional applications for purchase List the features of the latest version of OS X correct answer: • Mail, calendars, contacts, and other items sync with iCloud, Apple's cloud server • Communicate and play games with users of mobile devices running Apple's mobile operating system • Mail, calendars, contacts, and other items sync with iCloud, Apple's cloud server • Communicate and play games with users of mobile devices running Apple's mobile operating system What features are unique to recent versions of the Android operating system? correct answer: • Google Play app store provides access to apps, songs, books, and movies. • Google Drive provides access to email, contacts, calendar, photos, files, and more. • Face recognition can unlock the device. • Share contacts and other information by touching two devices together (using NFC technology). • Speech output assists users with vision impairments. You are looking for a program that will allow you to install Windows on your Mac. Which of the following will accomplish this for you? a. Windows Me c. WinEmulation b. Microsoft Simulator d. Boot Camp correct answer: D One of the steps you have to take in order to install Windows on your Mac is to create a section of storage or memory reserved for a specific program or application. What is the term for this section? a. partition c. divider b. window d. keyspace correct answer: A You have been asked to select a desktop operating system that will work best for power users in terms of its flexibility and its capabilities. What is the best choice given these circumstances? a. Windows 8 c. UNIX b. Mac OS X d. Chrome correct answer: C The company would like to make sure that the operating system used on its desktops is open source because it believes strongly in the philosophy of this kind of OS. Which of the following is an option for you in light of this recommendation? a. Windows 8 c. UNIX b. Mac OS X d. Chrome correct answer: C The company would like to make sure that the operating system used on its desktops is open source because it believes strongly in the philosophy of this kind of OS. Which of the following is an option for you in light of this recommendation? a. Mac OS X c. Windows 8 b. Linux d. UNIX correct answer: B Define LAN, and discuss the most common types of LANs. Define which type of LAN is in use in the accompanying figure. correct answer: Networks usually are classified as a local area network, metropolitan area network, wide area network, or personal area network. The main difference among these classifications is their area of coverage. A local area network (LAN) is a network that connects computers and devices in a limited geographical area, such as a home, school, office building (Figure 10-3), or closely positioned group of buildings. Each computer or device on the network, called a node, often shares resources, such as printers, large hard drives, and programs. Often, the nodes are connected via cables. A wireless LAN (WLAN) shown in the figure, is a LAN that uses no physical wires. Computers and devices that access a wireless LAN must have built-in wireless capability or the appropriate wireless network card, USB adapter, or other wireless device. A WLAN may communicate with a wired LAN for access to its resources, such as software, hardware, and the Internet. What is TCP/IP and how does it work? Define packet switching in the course of your response. correct answer: Short for Transmission Control Protocol/Internet Protocol, TCP/IP is a network protocol that defines how messages (data) are routed from one end of a network to the other, ensuring the data arrives correctly. TCP/IP describes rules for dividing messages into small pieces, called packets; providing addresses for each packet; checking for and detecting errors; sequencing packets; and regulating the flow of messages along the network. TCP/IP has been adopted as the network standard for Internet communications. Thus, all hosts on the Internet follow the rules defined in this standard. Internet communications also use other standards, such as the Ethernet standard, as data is routed to its destination. When a computer sends data over the Internet, the data is divided into packets. Each packet contains the data, as well as the recipient (destination), the origin (sender), and the sequence information used to reassemble the data at the destination. Each packet travels along the fastest individual available path to the recipient's computer or mobile device via routers. This technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called packet switching Discuss a dedicated line and different types of dedicated lines. correct answer: A dedicated line is a type of always-on physical connection that is established between two communications devices. Businesses often use dedicated lines to connect geographically distant offices. Dedicated lines can be either analog or digital. Digital lines increasingly are connecting home and business users to networks around the globe because they transmit data and information at faster rates than analog lines. Digital dedicated lines include cable television lines, DSL, ISDN lines, FTTP, T-carrier lines, and ATM. Cable correct answer: Cable: The cable television (CATV) network provides high-speed Internet connections, called cable Internet service. The CATV signal enters a building through a single line, usually a coaxial cable. This cable connects to a modem (discussed in the next section), which typically attaches to your computer via an Ethernet cable. Home and small business users often subscribe to cable Internet service. DSL correct answer: DSL: DSL (Digital Subscriber Line) transmits on existing standard copper phone wiring. Some DSL installations include a dial tone, providing users with both voice and data communications. These DSL business users. Businesses also use fiber-optic cables in high-traffic networks or as the backbone in a network. If you are charged with setting up a network for your team and there is one device whose reliability you are concerned about, which of the following network topologies is a bad idea for you? a. bus c. ring b. star d. intranet correct answer: C You are very confident about the hub you are going to use in your new network — it is brand new and highly recommended by some colleagues that you trust. Which of the following network topologies is a good choice for you? a. star c. ring b. intranet d. bus correct answer: A You are looking for a way to transmit signals through a door, and with a high transfer rate, because you have some video to transfer from a digital video camera. Which of the following protocols is the best bet for you? a. Wi-Fi c. Bluetooth b. IrDA d. UWB correct answer: D You are looking for a technology that will replace the requirement for a line-of-sight transmission between devices like digital cameras, fax machines, and printers, and you also would like the data transfers between the devices to occur at a rate of up to 3 Mbps. Which of the following network standards is a good match for your needs? a. Wi-Fi c. Bluetooth b. RFID d. TCP/IP correct answer: C Discuss the four conversion strategies. correct answer: The final implementation activity is to change from the old system to the new system. This change can take place using one or more of the following conversion strategies: direct, parallel, phased, or pilot. • With direct conversion, the user stops using the old system and begins using the new system on a certain date. The advantage of this strategy is that it requires no transition costs and is a quick implementation technique. The disadvantage is that it is extremely risky and can disrupt operations seriously if the new system does not work correctly the first time. • Parallel conversion consists of running the old system alongside the new system for a specified time. Results from both systems are compared. The advantage of this strategy is that you can fix any problems in the new system before you terminate the old system. The disadvantage is that it is costly to operate two systems at the same time. • In a phased conversion, each location converts at a separate time. For example, an accounting system might convert its accounts receivable, accounts payable, general ledger, and payroll sites in separate phases. Each site can use a direct or parallel conversion. Larger systems with multiple sites may use a phased conversion. • With a pilot conversion, only one location in the organization uses the new system — so that it can be tested. After the pilot site approves the new system, other sites convert using one of the other conversion strategies. What is a data type? List the data types commonly found in a database. correct answer: • Text: Letters, numeric characters, or special characters • Number (also called numeric values): Positive or negative numbers, and the number zero, with or without decimal points • AutoNumber: Unique number automatically assigned by the DBMS to each added record, which provides a value that identifies the record (such as a student ID) • Currency: Dollar and cent amounts or numbers containing decimal values • Date (also called date/time): Month, day, year, and sometimes time • Memo (also called long text): Lengthy text entries, which may or may not include separate paragraphs • Yes/No (also called Boolean): Only the values Yes or No (or True or False) • Hyperlink: Email address or web address that links to a webpage on the Internet or document on a network • Object (also called BLOB, for binary large object): Photo, audio, video, or a document created in other programs or apps, such as word processing or spreadsheet, stored as a sequence of bytes in the database • Attachment: Document or image that is attached to the field, which can be opened in the program that created the document or image (functions similarly to email attachments) Explain data validation. correct answer: Validation is the process of comparing data with a set of rules or values to determine if the data meets certain criteria. Many programs perform a validity check that analyzes data, either as you enter the data or after you enter it, to help ensure that it is valid. For instance, when an admissions department specialist adds or modifies data in a student record, the DBMS tests the entered data to verify it meets certain criteria. If the data fails a validity check, the computer either should not allow the invalid data to be entered, or it should display an error message that instructs the user to enter the data again. Validity checks, sometimes called validation rules, reduce data entry errors and thus enhance the data's integrity. Types of Data Validation: Alphabetic/Numeric Check correct answer: An alphabetic check ensures that users enter only alphabetic data into a field. A numeric check ensures that users enter only numeric data into a field. For example, data in a First Name field should contain only characters from the alphabet. Data in a Current Enrollment field should contain integers. Types of Data Validation:Range Check correct answer: A range check determines whether a number is within a specified range. Assume the lowest per credit hour fee at the school is $75.00 and the highest is $370.75. A range check for the Credit Hour Fee field ensures it is a value between $75.00 and $370.75. Types of Data Validation: Consistency Check correct answer: A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and their data is in the correct format. For example, the value in a Date Admitted field cannot occur earlier in time than a value in a Birth Date field. Types of Data Validation: Completeness Check correct answer: A completeness check verifies that a required field contains data. For example, some fields cannot be left blank; others require a minimum number of characters. One completeness check can ensure that data exists in a Last Name field. Another can ensure that a day, month, and year are included in a Birth Date field. Types of Data Validation:Check Digit correct answer: A check digit is a number(s) or character(s) that is appended to or inserted in a primary key value. A check digit often confirms the accuracy of a primary key value. Bank account, credit card, and other identification numbers often include one or more check digits. Discuss at least four strengths of the database approach. correct answer: • Reduced data redundancy: Most data items are stored in only one file, which greatly reduces duplicate data. For example, a school's database would record a student's name and address only once. When student data is entered or changed, one employee makes the change once. • Improved data integrity: When users modify data in the database, they make changes to one file Some salespeople work directly for technology equipment manufacturers, mobile device manufacturers, or software manufacturers. Others work for resellers, including retailers that sell personal computer products. The technology salesperson in a retail store often is a suitable entry- level job for students working toward a certificate or degree in computer-related fields. Before consulting the opinion of a salesperson, be sure to independently research the product so that you can better determine whether answers to your questions are unbiased. Define technology service and repair field and discuss a typical job in this field. correct answer: The technology service and repair field provides preventive maintenance, component installation, and repair services to customers. Some technology service technicians possess general knowledge that enables them to work with a variety of devices from different manufacturers. Other technicians receive training and certifications directly from manufacturers to specialize in devices from that manufacturer. This work is best suited for those individuals who like to troubleshoot and solve problems and who have a strong background in electronics. Many technology equipment manufacturers include diagnostic software with their computers and devices that assists technicians in identifying problems. Today's technology also allows technicians to diagnose and repair software problems from a remote location; that is, the technician accesses the user's hard drive or smartphone from a different location. Define and discuss the software and apps field correct answer: The software and apps field consists of companies that develop, manufacture, and support a wide range of software and apps for computers, the web, and mobile devices. Some companies specialize in a particular type, such as productivity software or tools, or focus on a device type. Other companies — especially larger firms, such as Microsoft — produce and sell many types of software that work with both computers and mobile devices and may use Internet services to sync data among devices or provide collaborative features. Some employees develop desktop, web, and mobile apps, such as productivity software, games, simulations, and more; others develop operating systems and related tools. Define and discuss the technology equipment field. correct answer: The technology equipment field consists of manufacturers and distributors of computers, mobile devices, and other hardware, such as magnetic and optical drives, monitors, printers, and communications and networking devices. In addition to the companies that make end-user equipment, thousands of companies manufacture components used inside a computer or mobile device, such as chips, motherboards, cables and connectors, and power supplies. Available careers in this field include positions with companies that design, manufacture, and produce computers and input, output, communications, mobile, and networking devices. Careers include designing and fabricating chips, testing internal components, assembling computers and devices, and packing finished products List the jobs typically found in an IT department: correct answer: • Management — directs the planning, research, development, evaluation, and integration of technology. • Research and software development — analyzes, designs, develops, and implements new information technology and maintains and improves existing systems. • Technical support services — evaluates and integrates new technologies, administers the organization's data resources, and supports the centralized computer operating system and servers. • Operations — operates the centralized computer equipment and administers the network, including both data and voice communications. • Training/Support — teaches employees how to use components of the information system or answers specific user questions. • Information security services — develops and enforces policies that are designed to safeguard an organization's data and information from unauthorized users. • Marketing/Strategy — directs and implements Internet and social media marketing, and manages customer relationships. You need to hire someone to use data modeling techniques and tools to analyze and specify data usage. Who do you hire? a. database analyst c. web analytics expert b. forensics examiner d. data scientist correct answer: A You need to speak with the person responsible for creating the data dictionary. Who do you contact? a. database analyst c. database administrator b. data scientist d. web analytics expert correct answer: C Who installs and maintains operating system software? a.systems programmer c. cloud architect b. web developer d. database designer correct answer: A Now that you know who installs software, you need to discuss the requirements of the software. Who do you contact? a. app developer c. web developer b. database designer d. systems analyst correct answer: D
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved