CIS 312 Final
1 A(n) ____ increases
a signal’s strength (amplitude) and can extend a signal’s range by boosting
signal power to overcome attenuation.
2 Square waves can
be generated by rapidly switching (pulsing) an electrical or optical power source—a
technique called ____.
3 A(n) ____ is the
maximum number of bits or bytes per second that the channel can carry.
4 Messages can be
loosely categorized into two types—data messages and command messages.
5 ____ mode uses a
single shared channel, and each node takes turns using the transmission line to
transmit and receive.
6 Noise can be
introduced into copper, aluminum, and other wire types by ____.
7 In DCE, the
security server issues security “____” to each party that are exchanged to verify
identities.
8 Servers can be
offline or idle except when needed to access client resources.
9 With ____, a
resource user asks for a resource, and if it isn’t found in the local resource
registry, the resource locator searches for it in external locations.
10 With the ____
protocol, a process on one machine can call a process on another machine.
11 With P2P
architecture, there are more potential bottlenecks and points of failure.
12 A server manages
system resources and provides access to these resources through a well-defined
communication interface.
13 Static connections are easy to initialize and maintain.
14 Web resources are
identified by a unique ____.
15 If the logical
record size is less than the physical record size, a single physical record
might contain multiple logical records.
16 A ____ is a
temporary holding area for extracting logical records from physical records.
17 The directory
that’s currently being accessed is called the ____ directory
18 The ____ contains
a sequential set of file records, one for each file in the volume.
19 Physical storage
allocation considerations include placement of fields and records in a file and
distribution of a file across storage locations, media, or devices.
20 A typical computer
has up to a few hundred storage volumes.
21 With scripting
languages, programmers can assemble application software rapidly by “gluing”
together the capabilities of many other programs.
22 Software has
surpassed hardware to become the most costly component of most information
systems.
23 A ____ defines
the name and data type of program variables.
24 Class models and
other types of diagrams document user and system requirements.
25 A ____ is a
nonprocedural language suitable for developing software that mimics human
intelligence.
26 A ____ uses
mnemonics to represent instructions, variables, and labels and has a degree of
instruction explosion higher than 1:1.
27 ____ make
forwarding decisions by using layer 3 addresses.
28 The oldest and
most widely used VoIP protocol suite is ____.
29 The written
format of 128-bit IP addresses is called ____ notation.
30 ____ is a
connectionless protocol that provides less reliable transport services.
31 Star topologies
now dominate physical network topology for wired networks.
32 The OSI model predates the TCP/IP model by
almost a decade.
33 A reference to a page held in memory is
called a ____.
34 In ____ memory allocation, each process
partition has its own offset value.
35 ____ scheduling chooses the next thread to
be dispatched based on the expected amount of CPU time needed to complete the
process.
36 When considered
as a byte sequence, the rightmost byte is called the most significant byte.
37 ____ occurs when
memory partitions allocated to a single process or purpose are scattered
throughout physical memory.
38 In explicit
priority scheduling, the scheduler always dispatches the ready thread that has
been waiting the longest.
39 In accounting,
____ is the process of examining records to determine whether generally
accepted accounting principles were applied correctly in preparing financial
reports.
40 Computer and
software purchases are capital expenditures, even though the expected useful
lifetime of computer hardware and software has decreased in recent years
because of rapid technological change.
41 ____ can be seen
in the home when air conditioners, refrigerators, and electric dryers are
started and cause a momentary dimming of lights.
42 ____ is the
process of determining whether an authenticated user or process has enough
rights to access a resource.
43 A(n) longer-term
power sag that is often caused by the power provider is known as a ____.
44 A ____ consists of
a digitizing tablet and a pen, stylus, or both.
45 Early plasma displays accepted the same analog video
signals as CRTs.
46 ____ is a standard
for storing and transporting control information between computers and
electronic musical instruments.
47 A(n) ____ is a
microprocessor specialized for processing continuous streams of audio or
graphical data.
48 On paper, pixel
size corresponds to the smallest drop of ink that can be placed accurately on
the page.
49 For video display,
a pixel displays no light or light of a specific color and intensity.
50 The process of
converting analog sound waves to digital representation is called ____.
0 comments:
Post a Comment