ITEC 1000 midterm

docx

School

York University *

*We aren’t endorsed by this school

Course

1000

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by LieutenantProtonPenguin37

Report
1. Anything outside the system boundary represents the ____ that the system operates. a. Subsystem b. Super system c. Interface d. Environment 2. Scalability is the ability of a system to ____. a. Allow configuration, monitoring and maintaining operation b. Handle a growing amount of work c. Allow access to information when it is needed d. Protect data against unauthorized access or modification 3. Data security is the ability of a system to ____. a. Allow configuration, monitoring and maintaining operation b. Protect data against unauthorized access or modification c. Allow access to information when it is needed d. Handle a growing amount of work. 4. The main memory, often known as primary storage, working storage, or RAM, holds a. Data b. Program instructions, data, and instructions for booting the computer c. Program instructions and data d. Program instructions 5. When the computer is cold-started, the CPU begins testing the system. Where is this bootstrap program stored? B a. Hard drive b. RAM c. Virtual memory d. Rom 6. The components of an individual computer system consist of processing hardware, input devices, output devices, storage devices ____. B a. And operating system software b. Application software and operating system software. c. Application software, file storage, and data processing d. And application programs 7. What is the only requirement for data to be manipulated and and processed by a computer? a. The size of the data must be smaller than the capacity of the hard drive. b. The data must be represented in binary form c. The data type must be numeric d. The data type must be alphanumeric, graphic, sound or color. 8, What does BCD stands for? Binary-coded decimal
9.System administration is the ability of a system to____ a. Allow configuration, monitoring and maintaining operation b. Protect data against unauthorized access or modification c. Allow access to information when it is needed d. Handle a growing amount of work 10. Many of the internal OS services are provided by the ____ module, which contains the most important operating system processing functions. a. CPU b. Kernel c. Interface d. Central 11. What is not part of an abstract description of system architecture? “C” a. System interconnections b. Linkages among the components c. Physical location of the servers d. System constraints 12. The division of a system or subsystem into its components and linkages is called____ a. Itemization b. Categorization c. Decomposition d. Reconstruction 13. The idea that the program instructions and data are both stored in memory while being processed the ____. a. Stored program concept b. Processing concept c. Data-instruction concept d. Memory data instruction concept 14. Images that are defined mathematically as geometrically definable shapes that can be easily moved around, scaled and rotated without losing their shape and identity are known as____ a. Vector b. Bitmap c. Raster d. GIF 15. Increasing or decreasing the number of pixels per inch changes the ___. a. codec b. resolution c. color depth d. amplitude 16. This is the number of bits/bytes that can be transmitted from one place to another in a fixed amount of time a. Frequency modulation b. Bandwidth c. Digital data d. Compression ratio
17. This refers to methods used to shrink the size of a movie file a. Spatial bit map b. Temporary compression c. Video codec d. Run-length compression 19. The order of the alphanumeric codes in the representation table, which will determine how data is sorted, is known as____. a. Control code b. Collating sequence c. Scan code d. Metadata 20. The binary numbers in a computer might represent __ . a. All of the options in this list. b. numbers. c. images. d. characters. 21. Which of the following is not an advantage of object images over bitmap images? a. Resolution independent b. Easy to create c. Require far less storage space d. Manipulated easily 22. As a matter of necessity, network interfaces must conform to standard agreements, known as ____, for messages to be understood by both computers during a message exchange between a pair of computers. a. Ethernet standards b. I/O services c. Protocols d. Device controllers 23. From a systems perspective, how would you classify a computer operating system? a. vector images b. bitmap images c. raster images d. GIF images 24. ____ extends cloud services to the software facilities that one would expect to find on a developer’s computer, e.g. Web programming development tools and application program interface. a. Software as a service b. Platform aas c. Infrastructure aas d. Database aas 25. Computers are typically made reliable because of these strengths, except ____. a. Memory b. Accuracy c. Speed
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
d. Correctness 26. 2 raised to the power of -1 (minus 1) is ____. a. -1/10 b. -2 c. 1/10 d. 1/2 e. -1/2 27. Cloud services offer these except __ . a. added security b. lower hardware and software investments c. None in this list is an exception. d. additional computing capability when and where it is needed e. backup and offsite storage 28. Because response time is considered an important measure by most WEB users, it is often more practical to separate the database and page processing into another computer. This is an example of ____. a. N-tier architecture b. 3-tier architecture c. Cluster computing d. Multiprocessing 29. This is improved by the use of data compression a. File path b. CPU performance c. Protocol d. Bandwidth 30. How many binary digits does it take to represent the decimal number 1000? a. 9 b. 15 c. 10 d. 13 31. The hexadecimal number FE is equivalent to the decimal number ____ a. 254 b. 127 c. 255 d. 128 31. What is NOT a benefit of cloud services? a. Lower hardware and software investments b. b. Added security c. c. Backup and offsite storage d. d. Additional computing capability when and where it is needed 32. The decimal fraction 1/3 is equivalent to __ . a. 0.3 Base-8 b. None in this list of options. c. 0.3 Base-2 d. 0.3 Base-16 33. Which of the following is true?
a. Octal 17 is less than Hexadecimal 10 b. Octal 101 is less than Hexadecimal 101 c. Octal 10 is less than Hexadecimal 1 d. Octal 12 is less than Hexadecimal A 34. The exponent of a floating point number is stored using ____. a. Ones complement b. Binary coded decimal c. Twos complement d. Excess notation 35. How many binary digits does it take to represent the decimal number 1000? a. 10 b. 15 c. 9 d. 13 36. The delimiter which divides whole numbers from fractional numbers is called __ . a. radix point b. fractal point c. bit point d. division point 37. When the number to be expressed is outside of the integer range of the computer (too large or too small), or when the number contains a fractional part it must be stored as a[No] __ number. a. complement b. unsigned c. signed d. floating-point 38. The excess notation the non negative sign bit is ? A) -1 b) -0 C) 0 d)1 39. When adding two numbers using 2's complement, carries beyond the leftmost digit are __ . a. inverteD. b. truncateD. c. shifted right. d. shifted left. 40. Performing a right shift of a number a. multiplies the number by 2 b. multiplies the number by 10 c. divides the number by 10 d. multiplies the number by its base e. divides the number by its base f. divides the number by 2 41. The leftmost bit in an IEEE standard floating-point number represents __ . a. the sign of the mantissa. b. the exponent. c. the sign of the exponent. d. the mantissa. 42. How do you find the 2's complement of positive numbers? a. Invert the numbers and add one b. Invert the numbers c. Invert the numbers and wrap around the leftmost bit d. Do nothing, the complement is the same as the original 43. Exactly how many binary digits are needed to be able to represent any hexadecimal digit? a. three b. two c. four d. eight 44. Represent decimal -30 to a 8-bit two's complement number.
45. The digit with the greatest weight (value) in a number is called the __ . a. least significant digit b. most significant digit c. heaviest bit d. radix 46. Convert number 11101010 Base-2 to Decimal. 47 Convert this hexadecimal number BC5C Hex to Binary. 48 Decode this 11-bit normalized floating-point number 110101001 having the form: SEEEEMMMMMM. 49. Assume a database of names, addressed and phone numbers. What data types are applied to each of the 3 fields? 50. Convert the decimal number 14.25 to Binary. 51. Encode this decimal number +5/32 to a 9-bit normalized floating-point number having the form: SEEEEMMMMMM. 52. Describe the relevant context in which the assumption that some data can be sacrificed without significant effect, based on known properties of human perception.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help