ITEC 1000 midterm

.docx

School

York University *

*We aren’t endorsed by this school

Course

1000

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by LieutenantProtonPenguin37

Report
1. Anything outside the system boundary represents the ____ that the system operates. a. Subsystem b. Super system c. Interface d. Environment 2. Scalability is the ability of a system to ____. a. Allow configuration, monitoring and maintaining operation b. Handle a growing amount of work c. Allow access to information when it is needed d. Protect data against unauthorized access or modification 3. Data security is the ability of a system to ____. a. Allow configuration, monitoring and maintaining operation b. Protect data against unauthorized access or modification c. Allow access to information when it is needed d. Handle a growing amount of work. 4. The main memory, often known as primary storage, working storage, or RAM, holds a. Data b. Program instructions, data, and instructions for booting the computer c. Program instructions and data d. Program instructions 5. When the computer is cold-started, the CPU begins testing the system. Where is this bootstrap program stored? B a. Hard drive b. RAM c. Virtual memory d. Rom 6. The components of an individual computer system consist of processing hardware, input devices, output devices, storage devices ____. B a. And operating system software b. Application software and operating system software. c. Application software, file storage, and data processing d. And application programs 7. What is the only requirement for data to be manipulated and and processed by a computer? a. The size of the data must be smaller than the capacity of the hard drive. b. The data must be represented in binary form c. The data type must be numeric d. The data type must be alphanumeric, graphic, sound or color. 8, What does BCD stands for? Binary-coded decimal
9.System administration is the ability of a system to____ a. Allow configuration, monitoring and maintaining operation b. Protect data against unauthorized access or modification c. Allow access to information when it is needed d. Handle a growing amount of work 10. Many of the internal OS services are provided by the ____ module, which contains the most important operating system processing functions. a. CPU b. Kernel c. Interface d. Central 11. What is not part of an abstract description of system architecture? “C” a. System interconnections b. Linkages among the components c. Physical location of the servers d. System constraints 12. The division of a system or subsystem into its components and linkages is called____ a. Itemization b. Categorization c. Decomposition d. Reconstruction 13. The idea that the program instructions and data are both stored in memory while being processed the ____. a. Stored program concept b. Processing concept c. Data-instruction concept d. Memory data instruction concept 14. Images that are defined mathematically as geometrically definable shapes that can be easily moved around, scaled and rotated without losing their shape and identity are known as____ a. Vector b. Bitmap c. Raster d. GIF 15. Increasing or decreasing the number of pixels per inch changes the ___. a. codec b. resolution c. color depth d. amplitude 16. This is the number of bits/bytes that can be transmitted from one place to another in a fixed amount of time a. Frequency modulation b. Bandwidth c. Digital data d. Compression ratio
17. This refers to methods used to shrink the size of a movie file a. Spatial bit map b. Temporary compression c. Video codec d. Run-length compression 19. The order of the alphanumeric codes in the representation table, which will determine how data is sorted, is known as____. a. Control code b. Collating sequence c. Scan code d. Metadata 20. The binary numbers in a computer might represent __ . a. All of the options in this list. b. numbers. c. images. d. characters. 21. Which of the following is not an advantage of object images over bitmap images? a. Resolution independent b. Easy to create c. Require far less storage space d. Manipulated easily 22. As a matter of necessity, network interfaces must conform to standard agreements, known as ____, for messages to be understood by both computers during a message exchange between a pair of computers. a. Ethernet standards b. I/O services c. Protocols d. Device controllers 23. From a systems perspective, how would you classify a computer operating system? a. vector images b. bitmap images c. raster images d. GIF images 24. ____ extends cloud services to the software facilities that one would expect to find on a developer’s computer, e.g. Web programming development tools and application program interface. a. Software as a service b. Platform aas c. Infrastructure aas d. Database aas 25. Computers are typically made reliable because of these strengths, except ____. a. Memory b. Accuracy c. Speed
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help