Upgrade to remove ads
Only A$47.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (14)
Completing an instruction involves two phases—instruction and execution—which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps?
a. fetch instruction
b. store results
c. execute instruction
d. process data
d. process data
CPU clock speed is the _______________ at a predetermined rate.
a. number of instructions processed
b. number of electronic pulses created
c. number of files created
d. number of memory pages loaded
b. number of electronic pulses created
Parker has an Android smartphone. Which type of processor is used in his mobile device?
a. x86
b.
Intel Atom
c. ARM
d. None of these answers
c. ARM
The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.
a. main memory
b. input/output device
c. bus
d. processor
a. main memory
A type of memory whose contents are not lost if
the power is turned off or interrupted is said to be _____.
a. unarbitrary
b. nonvolatile
c. inaccessible
d. nonadjacent
b. nonvolatile
Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______.
a. storage as a service
b. grid computing
c. cloud
computing
d. infrastructure as a service
a. storage as a service
The process of converting human-readable data into machine-readable form is called _____.
a. source data automation
b. data input
c. data entry
d. data conversion
c. data entry
Helen is 72 years old and is a retired school teacher on a fixed
income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.
a. smartphone
b. e-book
c. desktop
d. nettop
d. nettop
A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.
a. nettop computer
b. cloud computer
c. thin client
d. workstation
c. thin client
_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design
(CAD), video editing, and other applications requiring a high-end processor.
a. Desktops
b. Netbooks
c. Workstations
d. Notebooks
c. workstations
A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
a. cache b. register
c. server d. bus
c. server
_____
are the most powerful computers with the fastest processing speed and highest performance.
a. Blade servers
b. Workstations
c. Mainframe computers
d. Supercomputers
d. supercomputers
A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.
a. data mart
b. data warehouse
c.
data center
d. data mine
c. data center
_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
a. Green computing
b. Grid computing
c. Cloud computing
d. Utility computing
a. green computing
Recommended textbook solutions
Data Structures and Algorithms in Java
6th EditionMichael H Goldwasser, Michael T Goodrich, Roberto Tamassia
565 solutions
Essentials of Computer Organization and Architecture
5th EditionJulia Lobur
364 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Modern Database Management with Oracle 11g
10th EditionHeikki Topi, Jeffrey A Hoffer, Ramesh Venkataraman
118 solutions
Sets with similar termsChapter 3- Exam ?'s
14 terms
johnmich2480
CSC Chapter 3
14 terms
rachelle_schmude
Ch 3
31 terms
Courtney_Marie53
Chapter 3
75 terms
jivingjasonPLUS
Sets found in the same folderCSC 220 Chapter 4
12 terms
katie_pilo
MIS Chapter 3
30 terms
elakemn1
CSC 220 Chapter 5
16 terms
katie_pilo
MIS Chapter 2
20 terms
Schingle
Other sets by this creatorCSC220 Chapter 14
17 terms
katie_pilo
CSC220 Chapter 13
15 terms
katie_pilo
CSC220 Chapter 12
14 terms
katie_pilo
CSC220 Chapter 11
15 terms
katie_pilo
Verified questions
COMPUTER SCIENCE
Create a class called StatSet that can be used to do simple statistical calculations. The methods for the class are: _ _init_ _(self) Creates a statSet with no data in it. addNumber(self, x) x is a number. Adds the value x to the statSet. mean(self) Return the mean of the numbersin this StatSet. median(self) Returns the median of the numbers in this statSet. stdDev(self) Returns the standard deviation of the numbers in this statSet. count(self) Returns the count of numbers in this statSet. min(self) Returns the smallest value in this statSet. max(self) Returns the largest value in this statSet. Test your class with a program similar to the simple statistics program.
Verified answer
COMPUTER SCIENCE
Write a pseudocode algorithm for the inorder traversal.
Verified answer
COMPUTER SCIENCE
Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Telephone Number Account Balance Date of Last Payment The program should use an array of at least 10 structures. It should let the user enter data into the array, change the contents of any element, and display all the data stored in the array. The program should have a menu-driven user interface.
Verified answer
COMPUTER SCIENCE
A Caesar cipher is a simple substitution cipher based on the idea of shifting each letter of the plaintext message a fixed number (called the key) of positions in the alphabet. For example, if the key value is 2, the word "Sourpuss" would be encoded as "Uqwtrwuu." The original message can be recovered by "reencoding" it using the negative of the key. Write a program that can encode and decode Caesar ciphers. The input to the program will be a string of plaintext and the value of the key. The output will be an encoded message where each character in the original message is replaced by shifting it key characters in the Unicode character set.
Verified answer
Related questionsQUESTION
Which is the fastest type of optical drive on the market?
15 answers
QUESTION
The concept of multiple programs taking turns in execution is known as:
10 answers
QUESTION
1.2 What, in general terms, is the distinction between computer structure and computer function?
2 answers
QUESTION
[Dual In-line Memory Module] a small circuit board, capable of holding several memory chips, that has a 64-bit data path and can be easily connected to a PC's system board. (contrast with SIMM)
3 answers