System bus
1. The _______ is the communication channel that connects all computer system components.
L1 Cache
2. A(n) _______ cache is generally implemented on the same chip as the CPU.
bus master
3. The CPU is always capable of being a(n) _______, thus controlling access to the bus by all other devices in the computer system.
buffer
4. A(n) _______ is a small area of memory used to resolve differences in data transfer rate or data transfer unit size.
cache
5. A(n) _______ is an area of fast memory where data held in a storage device is prefeteched in anticipation of future requests for that data.
cache swap
6. A cache controller is a hardware device that initiates a(n) _______ when it detects a cache miss.
control bus
7. The _______ transmits command, timing, and status signals between devices in a computer system.
clock
8. If possible, the system bus _______ rate should equal the speed of the CPU.
stack pointer,
9. The _______ is a register that alw ays contains a pointer to
stack
the top of the _______.
supervisor,
10. The _______ calls an interrupt handler after it l ooks up its
interrupt table
memory address in the _______.
machine state
11. The set of register values placed on the stack while processing an interrupt is also called the _______.
interrupt handler
12. A(n) _______ is a software program that is executed in response to a specific interrupt.
stack
13. During interrupt processing, register values of a suspended process are held on the ______.
interrupt
14. A(n) _______ is a signal to the CPU or operating system that some device or program requires processing services.
bus arbitration
15. A(n) _______ is a hardware device that intervenes
unit
when two potential bus masters want control of the bus at the same time.
bus master, bus
16. The initiator of a bus transfer assumes the role of a(n)
slave
_______. The recipient assumes the role of a(n) _______.
wait states
17. The CPU incurs one or more _______ if it is idle pending the completion of an I/O operation.
address bus,
18. The system bus can be decomposed logically into three
control bus, data
sets of transmission lines: the _______ bus, the _______ bus,
bus
and the _______ bus.
push operation,
19. During a(n) ________, one or more register values are
pop operation
copied to the top of the stack. During a(n) _____ __, one or more values are copied from the top of the stack to registers.
algorithm
20. The relative size of a data set before and after data compression is described by the compression ______.
control bus,
25. Primary storage receives a read command on the _______,
address bus, data
the address to be accessed on the _______, and returns the
bus
accessed data on the _______.
linear address
26. The operating system normally views any storage device as
space
a(n) _______, ignoring the device's physical storage organization.
logical accesses
27. Part of the function of a storage secondary device controller is to translate _______ into physical accesses.
Direct memory
28. _______ is used to transfer data directly between memory
access
and secondary storage devices, without the assistance of the CPU.
channel
29. A(n) _______ is a high capacity device controller used in mainframe computers.
cache hit
30. An access to primary storage that is found within a cache is called a(n) _______.
bus protocol
32. A(n) _______ defines the control, signals, and other communication parameters of a bus.
1. 20. The relative size of a data set before and after data compression is described by the compression ______. You gave no answer algorithm 2. 9. The _______ is a register that always contains a pointer to the top of the _______. You gave no answer stack pointer, stack 3. 19. During a(n) ________, one or more register values are copied to the top of the stack. During a(n) _______, one or more values are copied from the top of the stack to registers. You gave no answer push operation, pop operation 4. 10. The _______ calls an interrupt handler after it looks up its memory address in the _______. You gave no answer supervisor, interrupt table 5. 8. If possible, the system bus _______ rate should equal the speed of the CPU. You gave no answer clock
1. No answer given d 5. A(n) _______ is an area of fast memory where data held in a storage
device is prefeteched in anticipation of future requests for that data. 2. No answer given e 28. _______ is used to transfer data directly between memory and secondary
storage devices, without the assistance of the CPU. 3. No answer given a 7. The _______ transmits command, timing, and status signals between
devices in a computer system. 4. No answer given b 3. The CPU is always capable of being a(n) _______, thus controlling access
to the bus by all other devices in the computer system. 5. No answer given c 29. A(n) _______ is a high capacity device controller used in mainframe
computers.
1.
a 7. The _______ transmits command, timing, and status signals between devices in a
computer system. 2. b 3. The CPU is always capable of being a(n) _______, thus controlling access to the bus by all other devices in the computer system. 3. c 29. A(n) _______ is a high capacity device controller used in mainframe computers. 4.
d 5. A(n) _______ is an area of fast memory where data held in a storage device is
prefeteched in anticipation of future requests for that data. 5. e 28. _______ is used to transfer data directly between memory and secondary storage devices, without the assistance of the CPU.
1. 12. A(n) _______ is a software program that is execu ted in response to a specific interrupt.(No Answer) a.
interrupt handler
b. channel c. bus master d. interrupt 2. 11. The set of register values placed on the stack while processing an interrupt is also called the _______.(No Answer) .
cache hit a.
machine state
b. cache swap c. wait states 3. 18. The system bus can be decomposed logically into three sets of transmission lines: the _______ bus, the _______ bus, and the _______ bus. (No Answer) .
control bus a.
address bus, control bus, data bus
b. control bus, address bus, data bus c. bus master, bus slave 4. 2. A(n) _______ cache is generally implemented on the same chip as t he CPU. (No Answer)
.
L1 Cache a. cache b. stack c. algorithm
5. 30. An access to primary storage that is found wit hin a cache is called a(n) _______. (No Answer)
.
cache swap
a. L1 Cache b. cache c.
cache hit
1. logical accesses
→
2. A(n) _______ cache is generally implemented on the same chip as
the CPU. This is false false.. You gave no answer. It should be
→
27. Part of the function of a storage secondary device
controller is to translate _______ into physical accesses.. 2. stack
→
13. During interrupt processing, register values of a suspended process are
held on the ______. This is true true.. You gave no answer. 3. linear address space
→
27. Part of the function of a storage secondary device controller
is to translate _______ into physical accesses. This is false false.. You gave no answer. It should be
→
26. The operating system normally views any
storage device as a(n) _______, ignoring the device's physical storage organization.. 4. interrupt
→
12. A(n) _______ is a software program that is executed in response to a
specific interrupt. This is false false.. You gave no answer. It should be
→
14. A(n) _______ is a signal to the CPU or operating system that
some device or program requires processing services.. 5. wait states
→
11. The set of register values placed on the stack while processing an
interrupt is also called the _______. This is false false.. You gave no answer. It should be
→
17. The CPU incurs one or more _______ if it is idle pending
the completion of an I/O operation..
1. operating system program that is responsible for booting the computer system You gave no answer BIOS 2. The technology that uses cables consisting of very thin filaments of glass fibers that can conduct the light generated by lasers for high-speed telecommunications. You gave no answer fiber optics
3. (computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers You gave no answer firewall 4. steals information for identity theft and more illegal; more mischievous than criminal You gave no answer gray hat hacker 5. a unit of information equal to one billion (1,073,741,824) bytes or 1024 megabytes You gave no answer gigabyte 6. Windows utility command to delete temporary files stored on your computer You gave no answer disk cleanup 7. Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. You gave no answer white hat hacker 8. Bill Gates GUI operating system used for IBM clone computers You gave no answer Windows 9. The distance in millimeters between each like -color pixel on a display. The smaller the distance between the pixels, the sharper the image. Dot pitch is one measurement of image clarity on a CRT monitor. Also called pixel pitch You gave no answer dot pitch 10. an internet connection such as DSL or cable modem that offers high er bandwidth, and therefore faster transmission speed, than standard modem connections. You gave no answer broadband connections 11. a computer program that detects viruses and repairs files. You gave no answer antivirus 12. involves reducing the electricity consumed and environmental waste generated wh en using a computer You gave no answer green computing 13. a computer criminal You gave no answer black hat hacker 14. software that is available free of charge You gave no answer shareware 15. a low-speed service that uses a phone line. Transfer rat e a high of 56 Kbps per second. You gave no answer dial-up
1. No answer given n the address of a web page on the world wide web
2. No answer given k Word, Excel and Power Point can be classified as this type of software
3. No answer given h this generation of computers used transistors
4. No answer given e brain of your computer
5. No answer given f -exchange of comments among participants sometimes called a news group
6. No answer given i type of network which is city-wide (metropolitan)
7. No answer given b an instrument (usually driven by a computer) for drawing graphs or pictures
8. No answer given o MS Word file name extension for Office 2010
9. No answer given d a technique to gain personal information for the purpose of identity theft,
usually by means of fraudulent e-mail 10. No answer given j a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024
gigabytes 11. No answer given l citizens have the right to inspect all government records except those
containing military, intelligence, or trade secrets or revealing private personnel actions 12. No answer given a any software application in which advertising banners are displayed while
the program is running 13.
No answer given c tracking program used by internet browsers to track visited websites
14. No answer given m method of using fingerprints and retina scans for security measures
15. No answer given g most powerful and more expensive type of computer
1.
a any software application in which advertising banners are displayed while the program is
running 2. b an instrument (usually driven by a computer) for drawing graphs or pictures 3.
c tracking program used by internet browsers to track visited websites
4.
d a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent e-mail 5. e brain of your computer 6.
f -exchange of comments among participants sometimes called a news group
7.
g most powerful and more expensive type of computer
8.
h this generation of computers used transistors
9.
i type of network which is city-wide (metropolitan)
10. j a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024 gigabytes 11. k Word, Excel and Power Point can be classified as this type of software 12. l citizens have the right to inspect all government records except those containing military, intelligence, or trade secrets or revealing private personnel actions 13. m method of using fingerprints and retina scans for security measures 14. n the address of a web page on the world wide web 15. o MS Word file name extension for Office 2010
1. an open-source version of the UNIX operating system, FREE (No Answer) a. NOW b. MIN c.
Linux
d. MAN 2. term for the software program that allows you to connect to the internet (No Answer) .
BIOS a.
browser
b. cookie c. plotter 3. Excel function used if you have 2 or more possible outcomes (No Answer) .
dial-up a. b. dock c. Linux
V-lookup
4. Excel function used to insert the current date and time (No Answer) .
url a. CPN b. USB c.
NOW
5. term for illegal copying or distribution of software (No Answer) .
spyware a. dot pitch b.
software piracy
c. shareware 6. computer software that is designed to collect personal info about users without t heir informed consent(No Answer) .
spyware a. spam b. byte c. shareware
7. places on the outside of the computer where you plug in hardware (No Answer) .
byte a. dock b. RAM c.
ports
8. MS Word feature that automatically puts text at the top of a page (No Answer) .
header a. CD-R b. browser c. RAM
9. network topology where 1 computer controls everything (No Answer) .
client-server a. mail merge b. CD-R c. header
10. a semiconductor device capable of amplification (No Answer) .
BIOS a. dot pitch b. browser c.
transistor
11. is a feature that allows a user to create mass mailings of letters, mailing labels, and other documents and personalize the information in each on MS Word (No Answer) .
mail merge a. biometrics b. adware c. internet
12. a computer network consisting of a worldwide network of computer netw orks that use the TCP/IP network protocols to facilitate data transmission and exchange (No Answer) .
cookie
a.
internet
b. header c. MIN 13. Excel function which returns the smallest value in the range of selected cells (No Answer)
.
MAN a.
MIN
b. CPN c. USB 14. term for stealing fractions of cents from interest bearing financial accounts (No Answer) .
phishing a.
salami slicing
b. transistor c. mosaic 15. The main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards. (No Answer) .
terabyte a.
motherboard
b. plotter c. shareware
1. DVD
→
a digital videodisc has more storage space than CD
This is true true.. You gave no answer. 2. laptop
→
type of network which is city-wide (metropolitan)
This is false false.. You gave no answer. It should be 3. byte
→
→
a portable computer small enough to use in your lap.
a sequence of 8 bits (enough to represent one character of alphanumeric data)
processed as a single unit of information This is true true.. You gave no answer. 4. USB
→
the address of a web page on the world wide web
This is false false.. You gave no answer. It should be 5. trojan horse
→
→
the newest type of port found on most computer systems.
a semiconductor device capable of amplification
This is false false.. You gave no answer. It should be
→
a program that appears desirable but actually contains
something harmful. 6. e-commerce
→
is a feature that allows a user to create mass mailings of letters, mailing
labels, and other documents and personalize the information in each on MS Word
This is false false.. You gave no answer. It should be 7. RAM
→
→
term for conducting business on the internet.
unwanted e-mail (usually of a commercial nature sent out in bulk)
This is false false.. You gave no answer. It should be
→
8. microprocessor
→
the temporary memory on your computer system.
method of using fingerprints and retina scans for security measures
This is false false.. You gave no answer. It should be
→
integrated circuit semiconductor chip that performs the
bulk of the processing and controls the parts of a system, used in 3rd and 4th generation of computers. 9. mosaic
→
tracking program used by internet browsers to track visited websites
This is false false.. You gave no answer. It should be
→
10. signature file
→
first graphic web browser.
term for salutation that is automatically added to the end of an email
This is true true.. You gave no answer. 11. CD-R
→
a digital videodisc has more storage space than CD
This is false false.. You gave no answer. It should be
→
A compact disk on which you can write only once and thereafter is
read-only memory.. 12. ergonomics
→
The study of workplace equipment design or how to arrange and design
devices, machines, or workspace so that people and things interact safely and most efficiently. This is true true.. You gave no answer. 13. computer viruses
→
programs that "infect" your computer and cause harm to your disk
or programs This is true true.. You gave no answer. 14. legacy
→
MS Word file name extension for Office 2010
This is false false.. You gave no answer. It should be 15. spam
→
→
term for computer technology that is no longer being used.
the temporary memory on your computer system
This is false false.. You gave no answer. It should be
→
unwanted e-mail (usually of a commercial nature sent out in bulk).