Deck 11: Foundations of Information Systems Infrastructure

ملء الشاشة (f)
exit full mode
سؤال
Which of the following specialized scanners is used to scan human body characteristics for identification and security purposes?

A) biometric scanner
B) optical scanner
C) bar code scanner
D) smart card scanner
E) port scanner
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ is located on the motherboard and is used to store the data and programs currently in use.

A) Primary storage
B) A cache
C) A flash drive
D) A smart card
E) A port
سؤال
Which of the following is an input device used to enter information into computers?

A) microprocessor
B) keyboard
C) inkjet printer
D) e-paper
E) monitor
سؤال
Which of the following speech recognition-based technologies is used for telephone surveys and to guide customers through the various menu options when calling a company's customer service line?

A) transcription
B) telemetrics
C) speaker diarization
D) interactive voice response
E) computer-aided translation
سؤال
________ is used by text recognition software to convert typed,printed,or handwritten text into the computer-based characters that form the original letters and words.

A) Natural language processing
B) Optical character recognition
C) Speech recognition
D) Autonomous automation
E) Computer vision software
سؤال
The ________ is an innovative pointing device developed primarily for the disabled for help with computer operating.

A) eye-tracking device
B) graphics tablet
C) optical mouse
D) joystick
E) touch screen
سؤال
Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________.

A) inter-processor communication
B) batch processing
C) chain loading
D) context switching
E) process control block
سؤال
________ are data streams transmitted using specific protocols that are available for immediate playback on the recipient's computer.

A) Direct connect
B) Parallel data rendering
C) Streaming media
D) Stream ciphers
E) Digital data
سؤال
________ is used to store programs and instructions that are automatically loaded when the computer is turned on.

A) Random access memory
B) Cache memory
C) Read-only memory
D) Flash memory
E) Virtual memory
سؤال
Which of the following scanning technologies is used by the banking industry to read data,account numbers,bank codes,and check numbers on preprinted checks?

A) optical mark recognition
B) bar code reading
C) magnetic ink character recognition
D) biometric scanning
E) optical character recognition
سؤال
Which of the following is an example of secondary storage?

A) cache memory
B) read-only memory
C) hard drives
D) random access memory
E) process register
سؤال
________ is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost.

A) JBOD
B) RAID
C) SLED
D) BIOS
E) SPAN
سؤال
A ________ occurs if a read/write head for some reason touches one of the disks in a hard drive,leading to a loss of data.

A) head crash
B) click of death
C) bad sector
D) disk compression
E) base isolation
سؤال
Which of the following character encoding formats,based on the English alphabet,represents symbols in binary form?

A) MIME
B) ASCII
C) UTF
D) UCS
E) MAC OS X
سؤال
The ________,the main component of a computing device that is connected to the power supply,primary and secondary storage,as well as to various peripherals.

A) hard drive
B) monitor
C) microprocessor
D) input device
E) optical mark recognition
سؤال
The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the ________.

A) peripheral port
B) motherboard
C) system clock
D) universal serial bus
E) solid state drive
سؤال
________ are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU)of a computer.

A) Binary codes
B) Morse codes
C) Source codes
D) Block codes
E) Unicodes
سؤال
Which of the following is measured in hertz in a microcomputer?

A) clock speed
B) hard drive
C) random access memory
D) virtual memory
E) screen resolution
سؤال
Which of the following types of specialized scanners is used to scan questionnaires and test answer forms where answer choices are indicated by filling in circles using pencils or pens?

A) optical mark recognition
B) biometric scanner
C) bar code reader
D) magnetic ink character recognition
E) optical character recognition
سؤال
________ is a small block of memory used by processors to store those instructions most recently or most often used.

A) A solid state drive
B) BIOS
C) A cache
D) Read-only memory
E) Flash memory
سؤال
Data stored on disks is easier and faster to locate than data on magnetic tapes because ________.

A) the data on disks is stored in binary form
B) disks have larger and more efficient storage capacities as there are more than three levels of cache
C) disks have both mechanical and electronic parts
D) magnetic tapes store data in tiny magnetic spots with smaller wavelengths
E) computers do not have to scan an entire tape to find a specific data file
سؤال
A(n)________ takes an entire program's source code written in a programming language and converts it into an executable,that is,a program in machine language that can be read and executed directly by the computer.

A) ethernet port
B) serial port
C) flash memory stick
D) interpreter
E) compiler
سؤال
Which of the following statements accurately reflects a difference between compilers and interpreters?

A) Interpreters translate assembly language to machine language,while compilers translate machine language to assembly language.
B) Compilers convert a program's entire source code into an executable,while interpreters translate source code on the fly,i.e.,one statement at a time.
C) Compiled programs run much slower than interpreted programs.
D) Compiling programs is a slower process and errors are often not prompted whereas with interpreters,the translation and error-correction happens concurrently.
E) Compared to interpreters,it is easier to quickly evaluate the effects of any changes made to a program's source code when using a compiler.
سؤال
A(n)________ provides a hardware interface,such as plugs and sockets,for connecting to computers.

A) input device
B) primary storage device
C) removable storage device
D) motherboard
E) port
سؤال
Which of the following types of ports is used to transfer one bit at a time and hence,has the slowest data transfer rates?

A) USB port
B) parallel port
C) IEEE 1394 port
D) serial port
E) ethernet port
سؤال
Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?

A) spam blockers
B) antivirus
C) spyware detection and removal
D) disk and data recovery
E) data compression
سؤال
Which of the following is a secondary storage technology that uses microchips to store information?

A) cache memory
B) virtual memory
C) redundant array of independent disks
D) solid state drive
E) read-only memory
سؤال
Which of the following types of computer software utilities allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data,allowing more data to be stored on a disk?

A) file defragmentation
B) data compression
C) device drivers
D) file conversion
E) disk and data recovery
سؤال
Which of the following types of computer software utilities is used to archive files from hard disks to tapes,flash drives,or other storage devices?

A) data compression
B) file defragmentation
C) disk and data recovery
D) backup
E) device drivers
سؤال
Which of the following types of computer software utilities translates a file from one format to another so that it can be used by an application other than the one used to create it?

A) file conversion
B) data compression
C) backup
D) file defragmentation
E) device driver
سؤال
Which of the following types of ports used to connect networks is the most common standard for local area networks?

A) ethernet port
B) VGA port
C) serial port
D) parallel port
E) USB port
سؤال
Which of the following is a multiuser,multitasking operating system that is available for a wide variety of computer platforms,and is commonly used because of its superior security?

A) Android
B) iOS
C) Windows
D) Unix
E) z/OS
سؤال
A(n)________ is an output device that produces a paper copy of alphanumeric or graphic data from a computer.

A) scanner
B) monitor
C) printer
D) e-paper
E) eye-tracking device
سؤال
Google's Linux-based operating system for mobile devices is known as ________.

A) iOS
B) Symbian
C) Java
D) Bada
E) Android
سؤال
LISP is a programming language that finds application in ________.

A) business
B) scientific research
C) artificial intelligence
D) teaching structured programming
E) developing Web pages
سؤال
Which of the following operating systems was the first commercial graphical-based operating system,which made its debut in 1984?

A) Mac OS
B) Linux
C) Windows
D) Unix
E) z/OS
سؤال
Which of the following types of ports are used to connect printers to computers?

A) serial ports
B) HDMI ports
C) parallel ports
D) ethernet ports
E) VGA ports
سؤال
Which of the following is a valid observation regarding the difference between solid state drives and hard disk-based drives?

A) Hard disk drives are typically faster than solid state drives.
B) Solid state drives have no moving parts,while hard disk drives have moving mechanical parts.
C) Solid state drives are louder and less reliable than hard disk drives.
D) Hard disk drives are more expensive than solid state drives.
E) Hard disk drives use microchips to store data,while solid state drives use magnetic disks.
سؤال
Which of the following is an output technology that delivers information in a usable format?

A) scanner
B) keyboard
C) computer monitor
D) optical mouse
E) eye-tracking device
سؤال
A(n)________ is a type of program that translates a program's source code into machine language and executes one statement at a time.

A) compiler
B) disassembler
C) interpreter
D) executable
E) linker
سؤال
In ________,data and behavior of a class are hidden from other classes and are thus protected from unexpected changes.

A) event-driven program execution
B) encapsulation
C) object
D) class
E) inheritance
سؤال
Which of the following HTML tags creates the bold tag?

A)

...


B) ...
C) ...
D) ...
E) ...
سؤال
Which of the following computer-aided software engineering (CASE)tools enable system process,data,and control structures to be represented graphically?

A) repositories
B) code generators
C) diagramming tools
D) screen and report generators
E) analysis tools
سؤال
Which of the following statements reflects the difference between Java and JavaScript most accurately?

A) Java can be used across multiple platforms and operating systems,while JavaScript cannot be used similarly.
B) JavaScript is used to check accuracy of user-entered information,which Java does not support.
C) Java is used to supply interactive components to Web pages,while JavaScript is not.
D) JavaScript can be used as a useful component tool for creating Web pages,while Java is used to create word files.
E) Java allows users to create or add applets that lend dynamic content to Web pages,while JavaScript does not.
سؤال
Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code?

A) object-oriented language
B) Web development language
C) visual programming language
D) scripting language
E) prototype-based programming language
سؤال
________ are small programs that are executed within another application,such as a Web page.

A) Caches
B) Packets
C) Applets
D) Flashes
E) Basics
سؤال
________ languages use common modules which combine properties and behaviors to define the relevant system components.

A) Object-oriented
B) Markup
C) Structured query
D) Metaprogramming
E) Synchronous
سؤال
Which of the following is an example of a visual programming language?

A) Visual Basic.NET
B) XML
C) HTML
D) Microsoft.NET
E) CSS
سؤال
________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices.

A) Adobe Dreamweaver
B) Microsoft Expression Web
C) HTML
D) PHP
E) Microsoft.NET
سؤال
Which of the following is an open source tool for designing dynamic Web content?

A) PHP
B) LISP
C) BASIC
D) MySQL
E) Microsoft Access
سؤال
Which of the following HTML tags is used to create a new paragraph?

A) ...
B) ...
C) ...
D) ...
E)

...

سؤال
________,a programming language developed by Sun Microsystems in the early 1990s,is used to add dynamic content to Web pages.

A) HTML
B) Visual Basic
C) Java
D) LISP
E) Basic
سؤال
Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking?

A) inheritance
B) event-driven program execution
C) encapsulation
D) class
E) delegation
سؤال
Which of the following functions do scripting languages perform?

A) creating Web pages that load quickly compared to HTML-developed Web pages
B) developing applications in high-speed arcade graphics
C) checking the accuracy of user-entered information on Web pages
D) automating or supporting activities throughout the information systems development process
E) laying out or formatting Web pages
سؤال
Which of the following object-oriented programming concepts allows programmers to group objects of the same properties and behavior together?

A) encapsulation
B) inheritance
C) class
D) polymorphism
E) abstraction
سؤال
Which of the following is an example of an HTML editor?

A) Microsoft Expression Web
B) Adobe Acrobat Reader
C) Apple Keynote
D) OpenOffice Word
E) Harvard Graphics
سؤال
What is the function of markup languages such as HTML?

A) adding dynamic content to Web pages
B) developing applications in high-speed arcade graphics
C) checking the accuracy of user-entered information on Web pages
D) performing arithmetic operations on Web pages
E) laying out or formatting Web pages
سؤال
Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds?

A) Adobe Flash
B) MySQL
C) CSS
D) HTML
E) XML
سؤال
________ refers to the use of automated software tools by systems developers to design and implement information systems.

A) Computer aided software engineering (CASE)
B) American Standard Code for Information Interchange (ASCII)
C) Arithmetic logic unit (ALU)
D) Redundant array of independent disks (RAID)
E) Carrier sense multiple access (CSMA)
سؤال
Which of the following matches the description of screen and report generators?

A) tools that enable system process,data,and control structures to be represented graphically
B) tools that automatically check for incomplete,inconsistent,or incorrect specifications in diagrams,screens,and reports
C) tools that help produce both technical and user documentation in standard formats
D) tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users
E) tools that enable the automatic generation of program and database definition code directly from the design documents,diagrams,screens,and reports
سؤال
Which of the following is a characteristic of terrestrial microwave communication?

A) high penetration capability through obstacles such as wind,trees,hills etc.
B) speeds up to 16 Mbps
C) low expense
D) high susceptibility to eavesdropping
E) low electromagnetic interference
سؤال
________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the network concurrently.

A) Unicode
B) Batch processing
C) Packet switching
D) JavaScript
E) An interexchange carrier
سؤال
________ is a synergistic form of distributed computing in which two or more networked computers are used to accomplish a common processing task.

A) Serial computing
B) Collaborative computing
C) Centralized computing
D) Mobile computing
E) Parallel computing
سؤال
In which of the following network topologies are all the nodes or workstations connected to a central hub through which all messages pass?

A) square network
B) mesh network
C) star network
D) ring network
E) bus network
سؤال
A ________ network is configured in the shape of a closed loop or circle with each node connecting to the next node.

A) square
B) mesh
C) star
D) ring
E) bus
سؤال
________ is a LAN protocol using packet switching developed by the Xerox Corporation in 1976.

A) JavaScript
B) Flash memory
C) Ethernet
D) Compiler
E) Primary key
سؤال
A(n)________ is a wide area network (WAN)connecting disparate local area networks of a single organization into a single network.

A) value-added network
B) global network
C) enterprise network
D) overlay network
E) personal area network
سؤال
In ________ networks,messages move in one direction around a circle.

A) star
B) bus
C) ring
D) mesh
E) square
سؤال
Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes?

A) Bluetooth
B) wireless LAN
C) high-frequency radio
D) infrared line of sight
E) microwaves
سؤال
________ are CASE tools that enable the integrated storage of specifications,diagrams,reports,and project management information.

A) Repositories
B) Analysis tools
C) Code generators
D) Diagramming tools
E) Documentation generators
سؤال
________ are CASE tools that automatically check for incomplete,inconsistent,or incorrect specifications in diagrams,screens,and reports.

A) Documentation generators
B) Code generators
C) Diagramming tools
D) Repositories
E) Analysis tools
سؤال
________ are private,third-party-managed WANs typically used for B2B communications.

A) Value-added networks
B) Enterprise networks
C) Global networks
D) Local area networks
E) Personal area networks
سؤال
The ________ model represents a group of specific tasks as successive layers that enable computers to communicate data.

A) redundant array of independent disks (RAID)
B) arithmetic logic unit (ALU)
C) Open Systems Interconnection (OSI)
D) Internet exchange point (IXP)
E) integrated services digital network (ISDN)
سؤال
WLANs based on a family of standards called 802.11 are also referred to as ________.

A) Bluetooth
B) wireless fidelity
C) ethernet
D) personal area networks
E) infrared line of sight
سؤال
________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data.

A) Packet switching
B) Authentication service
C) Source code
D) Object oriented language
E) Media access control
سؤال
A(n)________ is a computer network that spans a relatively small area,allowing all computer users to connect with each other to share data and peripheral devices,such as printers.

A) enterprise network
B) wide area network
C) campus area network
D) local area network
E) value-added network
سؤال
A ________ network consists of computers and other devices that are either fully or partially connected to each other.

A) square
B) mesh
C) star
D) ring
E) bus
سؤال
________ is a computing model in which multiple types of computers are networked together to share data and services.

A) Centralized computing
B) Mainframe computing
C) Task computing
D) Distributed computing
E) Serial computing
سؤال
________ is a commonly used method of random access control,in which each workstation "listens" to traffic on the transmission medium to determine whether a message is being transmitted.

A) Code division multiple access
B) Carrier sense multiple access
C) Hybrid coordination function
D) Group packet radio service
E) Point coordination function
سؤال
A(n)________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication,typically within an area of 10 meters.

A) value-added network
B) local area network
C) personal area network
D) enterprise network
E) campus area network
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/124
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Foundations of Information Systems Infrastructure
1
Which of the following specialized scanners is used to scan human body characteristics for identification and security purposes?

A) biometric scanner
B) optical scanner
C) bar code scanner
D) smart card scanner
E) port scanner
A
2
________ is located on the motherboard and is used to store the data and programs currently in use.

A) Primary storage
B) A cache
C) A flash drive
D) A smart card
E) A port
A
3
Which of the following is an input device used to enter information into computers?

A) microprocessor
B) keyboard
C) inkjet printer
D) e-paper
E) monitor
B
4
Which of the following speech recognition-based technologies is used for telephone surveys and to guide customers through the various menu options when calling a company's customer service line?

A) transcription
B) telemetrics
C) speaker diarization
D) interactive voice response
E) computer-aided translation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
5
________ is used by text recognition software to convert typed,printed,or handwritten text into the computer-based characters that form the original letters and words.

A) Natural language processing
B) Optical character recognition
C) Speech recognition
D) Autonomous automation
E) Computer vision software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ________ is an innovative pointing device developed primarily for the disabled for help with computer operating.

A) eye-tracking device
B) graphics tablet
C) optical mouse
D) joystick
E) touch screen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
7
Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________.

A) inter-processor communication
B) batch processing
C) chain loading
D) context switching
E) process control block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
8
________ are data streams transmitted using specific protocols that are available for immediate playback on the recipient's computer.

A) Direct connect
B) Parallel data rendering
C) Streaming media
D) Stream ciphers
E) Digital data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is used to store programs and instructions that are automatically loaded when the computer is turned on.

A) Random access memory
B) Cache memory
C) Read-only memory
D) Flash memory
E) Virtual memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following scanning technologies is used by the banking industry to read data,account numbers,bank codes,and check numbers on preprinted checks?

A) optical mark recognition
B) bar code reading
C) magnetic ink character recognition
D) biometric scanning
E) optical character recognition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is an example of secondary storage?

A) cache memory
B) read-only memory
C) hard drives
D) random access memory
E) process register
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost.

A) JBOD
B) RAID
C) SLED
D) BIOS
E) SPAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ________ occurs if a read/write head for some reason touches one of the disks in a hard drive,leading to a loss of data.

A) head crash
B) click of death
C) bad sector
D) disk compression
E) base isolation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following character encoding formats,based on the English alphabet,represents symbols in binary form?

A) MIME
B) ASCII
C) UTF
D) UCS
E) MAC OS X
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ________,the main component of a computing device that is connected to the power supply,primary and secondary storage,as well as to various peripherals.

A) hard drive
B) monitor
C) microprocessor
D) input device
E) optical mark recognition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
16
The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the ________.

A) peripheral port
B) motherboard
C) system clock
D) universal serial bus
E) solid state drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
17
________ are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU)of a computer.

A) Binary codes
B) Morse codes
C) Source codes
D) Block codes
E) Unicodes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is measured in hertz in a microcomputer?

A) clock speed
B) hard drive
C) random access memory
D) virtual memory
E) screen resolution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following types of specialized scanners is used to scan questionnaires and test answer forms where answer choices are indicated by filling in circles using pencils or pens?

A) optical mark recognition
B) biometric scanner
C) bar code reader
D) magnetic ink character recognition
E) optical character recognition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
20
________ is a small block of memory used by processors to store those instructions most recently or most often used.

A) A solid state drive
B) BIOS
C) A cache
D) Read-only memory
E) Flash memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
21
Data stored on disks is easier and faster to locate than data on magnetic tapes because ________.

A) the data on disks is stored in binary form
B) disks have larger and more efficient storage capacities as there are more than three levels of cache
C) disks have both mechanical and electronic parts
D) magnetic tapes store data in tiny magnetic spots with smaller wavelengths
E) computers do not have to scan an entire tape to find a specific data file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n)________ takes an entire program's source code written in a programming language and converts it into an executable,that is,a program in machine language that can be read and executed directly by the computer.

A) ethernet port
B) serial port
C) flash memory stick
D) interpreter
E) compiler
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following statements accurately reflects a difference between compilers and interpreters?

A) Interpreters translate assembly language to machine language,while compilers translate machine language to assembly language.
B) Compilers convert a program's entire source code into an executable,while interpreters translate source code on the fly,i.e.,one statement at a time.
C) Compiled programs run much slower than interpreted programs.
D) Compiling programs is a slower process and errors are often not prompted whereas with interpreters,the translation and error-correction happens concurrently.
E) Compared to interpreters,it is easier to quickly evaluate the effects of any changes made to a program's source code when using a compiler.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n)________ provides a hardware interface,such as plugs and sockets,for connecting to computers.

A) input device
B) primary storage device
C) removable storage device
D) motherboard
E) port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following types of ports is used to transfer one bit at a time and hence,has the slowest data transfer rates?

A) USB port
B) parallel port
C) IEEE 1394 port
D) serial port
E) ethernet port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?

A) spam blockers
B) antivirus
C) spyware detection and removal
D) disk and data recovery
E) data compression
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is a secondary storage technology that uses microchips to store information?

A) cache memory
B) virtual memory
C) redundant array of independent disks
D) solid state drive
E) read-only memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following types of computer software utilities allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data,allowing more data to be stored on a disk?

A) file defragmentation
B) data compression
C) device drivers
D) file conversion
E) disk and data recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following types of computer software utilities is used to archive files from hard disks to tapes,flash drives,or other storage devices?

A) data compression
B) file defragmentation
C) disk and data recovery
D) backup
E) device drivers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following types of computer software utilities translates a file from one format to another so that it can be used by an application other than the one used to create it?

A) file conversion
B) data compression
C) backup
D) file defragmentation
E) device driver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following types of ports used to connect networks is the most common standard for local area networks?

A) ethernet port
B) VGA port
C) serial port
D) parallel port
E) USB port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a multiuser,multitasking operating system that is available for a wide variety of computer platforms,and is commonly used because of its superior security?

A) Android
B) iOS
C) Windows
D) Unix
E) z/OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)________ is an output device that produces a paper copy of alphanumeric or graphic data from a computer.

A) scanner
B) monitor
C) printer
D) e-paper
E) eye-tracking device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
34
Google's Linux-based operating system for mobile devices is known as ________.

A) iOS
B) Symbian
C) Java
D) Bada
E) Android
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
35
LISP is a programming language that finds application in ________.

A) business
B) scientific research
C) artificial intelligence
D) teaching structured programming
E) developing Web pages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following operating systems was the first commercial graphical-based operating system,which made its debut in 1984?

A) Mac OS
B) Linux
C) Windows
D) Unix
E) z/OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following types of ports are used to connect printers to computers?

A) serial ports
B) HDMI ports
C) parallel ports
D) ethernet ports
E) VGA ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is a valid observation regarding the difference between solid state drives and hard disk-based drives?

A) Hard disk drives are typically faster than solid state drives.
B) Solid state drives have no moving parts,while hard disk drives have moving mechanical parts.
C) Solid state drives are louder and less reliable than hard disk drives.
D) Hard disk drives are more expensive than solid state drives.
E) Hard disk drives use microchips to store data,while solid state drives use magnetic disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is an output technology that delivers information in a usable format?

A) scanner
B) keyboard
C) computer monitor
D) optical mouse
E) eye-tracking device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n)________ is a type of program that translates a program's source code into machine language and executes one statement at a time.

A) compiler
B) disassembler
C) interpreter
D) executable
E) linker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
41
In ________,data and behavior of a class are hidden from other classes and are thus protected from unexpected changes.

A) event-driven program execution
B) encapsulation
C) object
D) class
E) inheritance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following HTML tags creates the bold tag?

A)

...


B) ...
C) ...
D) ...
E) ...
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following computer-aided software engineering (CASE)tools enable system process,data,and control structures to be represented graphically?

A) repositories
B) code generators
C) diagramming tools
D) screen and report generators
E) analysis tools
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following statements reflects the difference between Java and JavaScript most accurately?

A) Java can be used across multiple platforms and operating systems,while JavaScript cannot be used similarly.
B) JavaScript is used to check accuracy of user-entered information,which Java does not support.
C) Java is used to supply interactive components to Web pages,while JavaScript is not.
D) JavaScript can be used as a useful component tool for creating Web pages,while Java is used to create word files.
E) Java allows users to create or add applets that lend dynamic content to Web pages,while JavaScript does not.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code?

A) object-oriented language
B) Web development language
C) visual programming language
D) scripting language
E) prototype-based programming language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ are small programs that are executed within another application,such as a Web page.

A) Caches
B) Packets
C) Applets
D) Flashes
E) Basics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
47
________ languages use common modules which combine properties and behaviors to define the relevant system components.

A) Object-oriented
B) Markup
C) Structured query
D) Metaprogramming
E) Synchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is an example of a visual programming language?

A) Visual Basic.NET
B) XML
C) HTML
D) Microsoft.NET
E) CSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
49
________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices.

A) Adobe Dreamweaver
B) Microsoft Expression Web
C) HTML
D) PHP
E) Microsoft.NET
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is an open source tool for designing dynamic Web content?

A) PHP
B) LISP
C) BASIC
D) MySQL
E) Microsoft Access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following HTML tags is used to create a new paragraph?

A) ...
B) ...
C) ...
D) ...
E)

...

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
52
________,a programming language developed by Sun Microsystems in the early 1990s,is used to add dynamic content to Web pages.

A) HTML
B) Visual Basic
C) Java
D) LISP
E) Basic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking?

A) inheritance
B) event-driven program execution
C) encapsulation
D) class
E) delegation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following functions do scripting languages perform?

A) creating Web pages that load quickly compared to HTML-developed Web pages
B) developing applications in high-speed arcade graphics
C) checking the accuracy of user-entered information on Web pages
D) automating or supporting activities throughout the information systems development process
E) laying out or formatting Web pages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following object-oriented programming concepts allows programmers to group objects of the same properties and behavior together?

A) encapsulation
B) inheritance
C) class
D) polymorphism
E) abstraction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following is an example of an HTML editor?

A) Microsoft Expression Web
B) Adobe Acrobat Reader
C) Apple Keynote
D) OpenOffice Word
E) Harvard Graphics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the function of markup languages such as HTML?

A) adding dynamic content to Web pages
B) developing applications in high-speed arcade graphics
C) checking the accuracy of user-entered information on Web pages
D) performing arithmetic operations on Web pages
E) laying out or formatting Web pages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds?

A) Adobe Flash
B) MySQL
C) CSS
D) HTML
E) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
59
________ refers to the use of automated software tools by systems developers to design and implement information systems.

A) Computer aided software engineering (CASE)
B) American Standard Code for Information Interchange (ASCII)
C) Arithmetic logic unit (ALU)
D) Redundant array of independent disks (RAID)
E) Carrier sense multiple access (CSMA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following matches the description of screen and report generators?

A) tools that enable system process,data,and control structures to be represented graphically
B) tools that automatically check for incomplete,inconsistent,or incorrect specifications in diagrams,screens,and reports
C) tools that help produce both technical and user documentation in standard formats
D) tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users
E) tools that enable the automatic generation of program and database definition code directly from the design documents,diagrams,screens,and reports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is a characteristic of terrestrial microwave communication?

A) high penetration capability through obstacles such as wind,trees,hills etc.
B) speeds up to 16 Mbps
C) low expense
D) high susceptibility to eavesdropping
E) low electromagnetic interference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
62
________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the network concurrently.

A) Unicode
B) Batch processing
C) Packet switching
D) JavaScript
E) An interexchange carrier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
63
________ is a synergistic form of distributed computing in which two or more networked computers are used to accomplish a common processing task.

A) Serial computing
B) Collaborative computing
C) Centralized computing
D) Mobile computing
E) Parallel computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
64
In which of the following network topologies are all the nodes or workstations connected to a central hub through which all messages pass?

A) square network
B) mesh network
C) star network
D) ring network
E) bus network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
65
A ________ network is configured in the shape of a closed loop or circle with each node connecting to the next node.

A) square
B) mesh
C) star
D) ring
E) bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
66
________ is a LAN protocol using packet switching developed by the Xerox Corporation in 1976.

A) JavaScript
B) Flash memory
C) Ethernet
D) Compiler
E) Primary key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n)________ is a wide area network (WAN)connecting disparate local area networks of a single organization into a single network.

A) value-added network
B) global network
C) enterprise network
D) overlay network
E) personal area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
68
In ________ networks,messages move in one direction around a circle.

A) star
B) bus
C) ring
D) mesh
E) square
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes?

A) Bluetooth
B) wireless LAN
C) high-frequency radio
D) infrared line of sight
E) microwaves
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
70
________ are CASE tools that enable the integrated storage of specifications,diagrams,reports,and project management information.

A) Repositories
B) Analysis tools
C) Code generators
D) Diagramming tools
E) Documentation generators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ are CASE tools that automatically check for incomplete,inconsistent,or incorrect specifications in diagrams,screens,and reports.

A) Documentation generators
B) Code generators
C) Diagramming tools
D) Repositories
E) Analysis tools
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
72
________ are private,third-party-managed WANs typically used for B2B communications.

A) Value-added networks
B) Enterprise networks
C) Global networks
D) Local area networks
E) Personal area networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
73
The ________ model represents a group of specific tasks as successive layers that enable computers to communicate data.

A) redundant array of independent disks (RAID)
B) arithmetic logic unit (ALU)
C) Open Systems Interconnection (OSI)
D) Internet exchange point (IXP)
E) integrated services digital network (ISDN)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
74
WLANs based on a family of standards called 802.11 are also referred to as ________.

A) Bluetooth
B) wireless fidelity
C) ethernet
D) personal area networks
E) infrared line of sight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
75
________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data.

A) Packet switching
B) Authentication service
C) Source code
D) Object oriented language
E) Media access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
76
A(n)________ is a computer network that spans a relatively small area,allowing all computer users to connect with each other to share data and peripheral devices,such as printers.

A) enterprise network
B) wide area network
C) campus area network
D) local area network
E) value-added network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
77
A ________ network consists of computers and other devices that are either fully or partially connected to each other.

A) square
B) mesh
C) star
D) ring
E) bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
78
________ is a computing model in which multiple types of computers are networked together to share data and services.

A) Centralized computing
B) Mainframe computing
C) Task computing
D) Distributed computing
E) Serial computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
79
________ is a commonly used method of random access control,in which each workstation "listens" to traffic on the transmission medium to determine whether a message is being transmitted.

A) Code division multiple access
B) Carrier sense multiple access
C) Hybrid coordination function
D) Group packet radio service
E) Point coordination function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
80
A(n)________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication,typically within an area of 10 meters.

A) value-added network
B) local area network
C) personal area network
D) enterprise network
E) campus area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.