Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Computer Systems and Databases, Exams of Financial Accounting

Various concepts related to computer systems and databases, including operating systems, memory management, data storage, and database management systems. It also discusses the internet protocol suite, local area networks, and network security.

Typology: Exams

Pre 2010

Uploaded on 09/17/2008

fox73-1
fox73-1 🇺🇸

1 document

1 / 31

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Computer Systems and Databases and more Exams Financial Accounting in PDF only on Docsity! 1. Hardware is electronic components that perform Your Answer: all of the above. 2. Special purpose computers are found in Your Answer: all of the above. 3. Input devices include Your Answer: all the above. 4. A binary digit can represent _________ states of nature Your Answer: two. 5. Which of these is the largest? Your Answer: Terabyte 6. Recently Apple Computer announced that they would offer Macintosh computers the choice of either the PowerPC or CPU chips from Your Answer: Intel. 7. A kilobyte is exactly Your Answer: one thousand bytes. Correct 1024 bytes. Answer: This is exactly 1024 bytes. The mathematical definition of k is 1024. 8. A circuit board upon which processing components are mounted and/or connected is called the Your Answer: motherboard. 9. Storage technologies that lose their contents when power is turned off are called Your Answer: volatile. 10 . The program that controls the computers operations is called a Your Answer: operating system. 11 . When the operating system uses a disk drive to expand available memory the process is called Your Answer: none of the above. Correct Answer: memory swapping. This is the definition of memory swapping. Sometimes the technique is referred to as virtual memory. 12 . What influences computer performance? Your Answer: All of the above. 24 . A binary digit can exhibit three possible states. Your Answer: False Two states there are, no more no less 25 . RAM memory or main memory of a computer is considered nonvolatile. Your Answer: True Correct Answer: False RAM is volatile, ROM is nonvolatile 26 . The CPU understands only instructions written in machine language which is composed of zeros and ones. Your Answer: True 27 . A kilobyte is exactly 1000 bytes. Your Answer: True Correct Answer: False The kilobyte is exactly 1024 bytes. 28 . The PowerPC CPU and the Intel Pentium CPU are interchangeable. Your Answer: False 29 . You cannot interpret the contents of a bit string just by looking at it. Your Answer: (blank) 30 . The circuit board upon which hardware, memory, and interface cards are mounted in a PC is called the daughter board. Your Answer: False 31 . Magnetic media is considered volatile. Your Answer: True Correct Answer: False Magnetic media is nonvolatile 32 . The operating system is a program that controls all the computers resources. Your Answer: True 33 . The operating system makes it possible to run multiple applications simultaneously through the technique of memory swapping. Your Answer: True 34 . Memory swapping takes place only when there is not enough physical memory available. Your Answer: False Correct Answer: True The operating system makes use of this technique only when necessary. 35 . The CPU reads instructions and data from memory via the data bus. Your Answer: True 36 . The most frequently used data are placed in cache memory. Your Answer: True 37 . Optical disks are read-only devices. Your Answer: False Optical disks are available in rewritable versions. At one time this was a read- only technology; this is no longer the case. 38 . For business users the most important operating system is Mac OS X. Your Answer: False 39 . Linux was developed by the open source community. Your Answer: True 40 . By developing custom software an organization can tailor the application to fit its requirements. Your Answer: True 11 . The fundamental operations that may be accomplished upon a database are read and Your Answer: All the above. 12 . Of these, which is used to show data in a structured format of context? Your Answer: All of the above. Correct Answer: Report This is the definition of a report. 13 . Before building a database, the developer must construct a logical representation of the database which is called a Your Answer: data flow diagram. Correct Answer: data model. This is the definition of a data model. 14 . Currently, the most common technique for creating the data model is called_________ diagramming Your Answer: Entity-Relationship 15 . Which of the following products has, for all intents and purposes, pushed the others out of the market for personal DBMS? Your Answer: Access 16 . The standard approach to data modeling conceives of a database as a collection of entities and their Your Answer: relationships. 17 . The process of converting poorly structured tables into two or more well-structured tables is called Your Answer: none of the above. Correct Answer: normalization. This is the definition of normalization. 18 . The primary motive for normalizing a database table or set of tables is to improve Your Answer: all of the above. Correct Answer: data integrity. This is the goal of normalization. 19 . The person or persons in the best position to advise the developer as to the correctness of the data model is Your Answer: the database administrator. Correct Answer: the user. The users are in the best position to determine correctness of a particular data model. 20 . The database administrator or his / her staff is responsible for Your Answer: all the above. 21 . Spreadsheets and databases can be used equally well to store data. Your Answer: False 22 . The database is a self describing collection of integrated records. Your Answer: True 23 . In a database, records are stored in column format. Your Answer: True Correct Answer: False Records are stored in row format. 24 . Databases that carry their data in the form of tables are called relational databases. Your Answer: False Correct Answer: True This is the definition of a relational database. 25 . Relationships between tables in a relational database are accomplished by associating a foreign key in one table with a key field in another. Your Answer: True 26 . Metadata are data that describe data. Your Answer: False diagram correctly, and that the underlying representation can be completely wrong. It is essential that the user provide feedback as to whether their presentation is appropriate. 37 . Normalization is the process of converting well structured tables into more stable simpler structures. Your Answer: True 38 . One of the primary motivations for performing normalization is to improve data integrity. Your Answer: True 39 . Many-to-many relationships in data models are implemented in the same manner as one-to-many relationships. Your Answer: False 40 . The database administrator is responsible for the information and data stored by an organization. Your Answer: True 1. What is the distinguishing characteristic of a local area network? Your Answer: (blank) 2. The layered protocol model in use on the Internet today is Your Answer: TCP/IP. 3. There are________ layers in the TCP/IP-OSI model. Your Answer: four Correct Answer: five There are five; no more, no less. 4. The protocol for an applications program operates at layer ________ Your Answer: seven. Correct Answer: five. Applications program protocols work at layer five. This is the highest of the five layers. 5. Which of these is not an applications layer protocol? Your Answer: TCP 6. In order to transmit large messages across the Internet, the TCP protocol calls for the message to be broken into a series of elements called Your Answer: packets. Correct Answer: segments. At layer four, the containers are called segments. At layer three containers are packets. Finally, at layer two the containers are frames. 7. When a message moves along the Internet it is passed along between a series of network computers called Your Answer: switches. Correct routers. Answer: Routers are special-purpose telecommunications computers that implement IP. 8. One key feature of the TCP protocol is that it provides Your Answer: security. Correct Answer: reliability. It is the TCP portion of the protocol stack that provides reliable communications capabilities. The lower level protocols are considered unreliable. 9. Basic connectivity and network access is accomplished by layers Your Answer: one and two. 10 . Every network interface card created has its own unique Your Answer: IP address. Correct Answer: Mac address. The Mac address is unique to each device. It never changes nor can it be changed easily unlike the logical address known as the IP address. 11 . Movement of data frames on a local area network is accomplished by devices known as Your Answer: routers. Correct Answer: switches. This is the most fundamental role of a switch. Note that switches are usually described as layer two devices. 12 The physical layer of most local networks today is based on . geographic location or premises. Your Answer: True 23 . The Internet uses as its transport protocol a protocol suite called SMTP. Your Answer: True Correct Answer: False The Internet use is a protocol suite called TCP/IP. The transport protocol is TCP. 24 . The protocol architecture of the Internet uses five layers. Your Answer: False Correct Answer: True The TCP/ IP -OSI architecture is a five layer architecture. See figure 5.4. 25 . The mail transfer protocol, SMTP, is an application layer protocol. Your Answer: True 26 . Every layer of the Internet protocol architecture has only a single protocol. Your Answer: False 27 . The Internet transports messages as a single packet. Your Answer: False Messages are generally broken into a number of different segments, or packets. 28 . The IP protocol layer works with the device known as a modem. Your Answer: True Correct Answer: False IP protocol works with devices known as routers. 29 . The Mac address is the same as the IP address for a computer. Your Answer: False 30 . Most physical network connections are made using unshielded twisted pair cabling. Your Answer: False Correct Answer: True This is the most common cabling connection. Other connections such as fiber optics and coaxial cable are also common. 31 . The preferred cabling method for long network segments is optical fiber cabling. Your Answer: False Correct Answer: True This is true for long run lengths. Unshielded twisted pair is common for short run lengths. 32 . The most common local area network protocol is Ethernet. Your True Answer: 33 . Wireless local area networks are governed by IEEE standard 802.3. Your Answer: True Correct Answer: False The correct standard is 802.11. 34 . Dial up modems are used to connect computers and networks using conventional telephone lines. Your Answer: True 35 . Dial-up telephone lines are capable of broadband transmission speeds. Your Answer: False 36 . An organization can create its own wide area network by leasing telephone lines from the phone company. Your Answer: True 37 . The highest speed available by public switched data network is provided by asynchronous transfer mode. Your Answer: True 38 Secure communication over the Internet is available using a 9. Once requirements have been determined, the project manager should next Your Answer: proceed with design. Correct Answer: obtain user approval. The validation and approval of user requirements is considered a key step in the outcome of the project. 10 . The testing phase that employs users in real life situations is called Your Answer: alpha testing. Correct Answer: beta testing. Correct term is beta test. 11 . Project managers consider which of the following to be the most dangerous or risky type of conversion? Your Answer: Plunge 12 . Creators of software packages sometimes issue fixes for a number of low-priority problems. This group of fixes is called a service. Your Answer: patch. Correct Answer: pack. The correct term for low priority fixes is a service pack. 13 . When a software developer issues a fix for a high- priority problem, the fix is called a Your Answer: pack. Correct patch. Answer: This is referred to as a patch. Companies such as Microsoft have formal methods for disseminating these releases. 14 . The systems development lifecycle is described as having problems because of its _____________ nature. Your Answer: whirlpool Correct Answer: waterfall Waterfall is the customary characterization. 15 . In systems development a project that reaches a pathological state where that team spends too much time documenting requirements is said to be in a state of the ________________ analysis. Your Answer: paralysis 16 . Rapid application development as a technique is characterized by which of the following? Your Answer: All of the above 17 . A technique for documenting requirements that arose from the object tradition is known as Your Answer: use case modeling. 18 . The system development life-cycle and object-oriented development have the greatest difference in which of the following phases? Your Construction Answer: 19 . The emerging technique of extreme programming is characterized by which of the following? Your Answer: All of the above. 20 . Which of the following methodology reduces risk through iterative design? Your Answer: XP Correct Answer: RAD Each method has advantages and disadvantages. One of the RAD advantages is its iterative nature. See figure 6.8. 21 . There are no alternatives to the systems development lifecycle methodology. Your Answer: False 22 . The fundamental nature of the SDLC is described as a waterfall. Your Answer: False 23 . Moore's law states "adding more people to a project makes the project later". Your Answer: True Correct Answer: False This is Brook's law. 35 . The systems project which spends too much time documenting requirements is often said to be in "analysis paralysis". Your Answer: True 36 . Late projects are often the result of overly optimistic estimates. Your Answer: False Correct Answer: True Overly optimistic estimates are one of several causes of late projects. Combine this with poor management practice and you have the recipe for a late project that is over budget. 37 . The rapid application development process is considered to be less detailed and complete than the systems development life- cycle method. Your Answer: True 38 . Object-oriented techniques were developed in order to reduce developer freedom. Your Answer: False Correct Answer: True Object-oriented techniques were developed in part to encourage programmers to follow consistent practice in the development of software and systems. 39 . The common method for expressing requirements in object oriented projects is the "use case". Your Answer: True 40 . Extreme programming is an emerging technique that is useful for systems involving new business processes and procedures. Your Answer: False
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved