Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Science Quiz: CPU, Memory, and E-commerce, Exams of Computer Science

A series of questions covering various topics in computer science, including cpu architecture, memory systems, and e-commerce. The questions cover both multiple choice and true or false formats, and aim to test the reader's understanding of these concepts.

Typology: Exams

Pre 2010

Uploaded on 08/09/2009

koofers-user-cs8-1
koofers-user-cs8-1 🇺🇸

5

(2)

10 documents

1 / 13

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Name
CSIS-116: Exam 2
Textbook Reading (Chapter 4)
1 The five components of a computer system are hardware, software, networks, people,
and procedures.
Answer: False, information, not networks
2 The CPU interacts closely with memory, referring to it both for instructions and for data
or information.
Answer: True
3 One terabyte is equal to approximately 1 billion bytes.
Answer: False, its 1 trillion bytes
4 The hexadecimal number system uses the digits 1-10 and the letter A-E.
Answer: False
5 Hexadecimal numbers can be used to specify RED/GREEN/BLUE color codes in
HTML.
Answer: True
6 A program written for an Apple computer cannot be used with computers that use Intel
chips without making substantial changes.
Answer: True
7 The program code written for software must be re-engineered and re-compiled in order
to be used on different processor chips (Intel, Apple, Sun, etc.)
Answer: True
8 A computer’s speed is determined by the system clock, bus width, and hard drive size.
Answer: False, hard drive has nothing to do with speed
9 Memory (RAM) is much more important in determining a computer’s speed than the
hard drive capacity.
Answer: True
pf3
pf4
pf5
pf8
pf9
pfa
pfd

Partial preview of the text

Download Computer Science Quiz: CPU, Memory, and E-commerce and more Exams Computer Science in PDF only on Docsity!

Name

CSIS-116: Exam 2

Textbook Reading (Chapter 4)

1 The five components of a computer system are hardware, software, networks, people, and procedures. Answer: False, information, not networks 2 The CPU interacts closely with memory, referring to it both for instructions and for data or information. Answer: True 3 One terabyte is equal to approximately 1 billion bytes. Answer: False, its 1 trillion bytes 4 The hexadecimal number system uses the digits 1-10 and the letter A-E. Answer: False 5 Hexadecimal numbers can be used to specify RED/GREEN/BLUE color codes in HTML. Answer: True 6 A program written for an Apple computer cannot be used with computers that use Intel chips without making substantial changes. Answer: True 7 The program code written for software must be re-engineered and re-compiled in order to be used on different processor chips (Intel, Apple, Sun, etc.) Answer: True 8 A computer’s speed is determined by the system clock, bus width, and hard drive size. Answer: False, hard drive has nothing to do with speed 9 Memory (RAM) is much more important in determining a computer’s speed than the hard drive capacity. Answer: True

10 CPU stands for: a. central programming unit. b. central processing unit. c. computer programming unit. d. computer processing unit. e. None of the above. Answer: b 11 CPU is also called the: a. main memory. b. RAM. c. processor. d. controller. e. None of the above. Answer: c 12 Integrated circuits are also called: a. chips. b. transistors. c. microchips. d. Both a and b. e. Both a and c. Answer: e 13 The two parts of the CPU are: a. main memory and ALU. b. ALU and control unit. c. main memory and control unit. d. ALU and bus. e. bus and control unit. Answer: b 14 Moore’s Law states that the number of transistors of chips will double every: a. 6 months. b. 12 months. c. 18 months. d. 24 months. e. 36 months. Answer: c 15 Primary memory (RAM): a. holds data only temporarily. b. is the storage within the computer itself. c. holds data permanently. d. Both a and b. e. Both a and c. Answer: d 16 Modern personal computers have main memory capacities in the: a. 64-256 kilobyte range. b. 16-64 megabyte range. c. 128 megabyte – 2 gigabyte range. d. 2 gigabyte – 16 gigabyte range. e. None of the above. Answer: c 17 Random access means that: a. data is stored randomly on the memory chip. b. the amount of time it takes to access memory is random. c. accessing any random location in memory takes the same amount of time d. Both a and c. e. Both b and c. Answer: c 18 _____________ chips retain their contents indefinitely, without constant electronic refreshment. a. Dynamic RAM b. Dynamic ROM c. Static RAM d. Static ROM e. None of the above Answer: c

21 Which of the following is NOT an Intel Microprocessor? a. Celeron processor b. Pentium-M processor c. Xeon processor d. Itanium processor e. All of the above are Intel Microprocessors. Answer: e 22 Intel _______________ processors are designed for lower-cost, economical PC market. a. Celeron b. Pentium-M c. Xeon d. Itanium e. None of the above Answer: a 23 The clock speed of a modern PC: a. 5-20 MHz. b. 50-500MHz. c. 1-4 GHz. d. 5-10 GHz. e. None of the above. Answer: c 24 Which of the following company does NOT develop microprocessors? a. Hewlett-Packard b. MIPS Technologies c. Sun Microcomputers d. Microsoft Corporation e. AMD Answer: d 25 The USB port was created as a general purpose port that can connect up to ________ devices, all using the same connector. a. 16 b. 64 c. 128 d. 256 e. 512 Answer: c 26 The step that translates the instruction into individual commands that the computer can process is called: a. fetch. b. translate. c. decode. d. execute. e. store. Answer: c 27 The step that obtains the next instruction from memory is called: a. read. b. fetch. c. get. d. decode. e. execute. Answer: b 28 The step that performs the actions called for in the instructions is called: a. fetch. b. calculate. c. decode. d. execute. e. compile. Answer: d 29 A microsecond is: a. one thousandth of a second. b. one millionth of a second. c. one billionth of a second. d. one trillionth of a second. e. None of the above.

Answer: b 30 A nanosecond is: a. one thousandth of a second. b. one millionth of a second. c. one billionth of a second. d. one trillionth of a second. e. None of the above. Answer: c 31 A computer’s speed is determined by: a. the system clock. b. bus width. c. word size. d. available memory. e. All of the above. Answer: e 32 One MHz is: a. one thousand pulses per second. b. one million pulses per second. c. one billion pulses per second. d. one trillion pulses per second. e. None of the above. Answer: b 33 The number of bits a computer can process at one time is called a: a. packet. b. word. c. byte. d. record. e. field. Answer: b 34 ROM stands for Read Only Memory 35 USB stand for Universal Serial Bus 36 RISC stands for Reduced Instruction Set Computing 37 A special form of high-speed memory, called cache memory eliminates the need to repeatedly move data to and from main memory. 38 List at least three types of Intel microprocessors and their target markets.

  1. Intel Celeron processors—Created for the lower-cost, economical PC market.
  2. Intel Pentium-M processors—Intended for use in mobile systems, such as laptop computers.
  3. Intel Celeron-M processors—For use in mobile systems in the lower-cost, economical laptop computing segment.
  4. Xeon -For servers and other high-end workstations that need multiple processors 39 List at least three different ways to increase a computer’s speed.

Textbook Reading (Chapter 9)

1 In reverse auction, the market operator displays a high opening price for an item and asks for buyers willing to pay the price. Answer: False 2 An infomediary is a Web site that locates, retrieves, and organizes specialized information for potential users. Answer: True 3 The most prominent B2B applications are in supply chain management, online banking, and electronic exchange. Answer: False 4 Rather than being driven by forecasts of expected needs to push goods through the company’s supply chain, today’s advanced supply chain designs hope to enable buyer demand to pull goods through the supply channel. Answer: True

  1. Which is NOT a benefit of e- commerce: a. speed. b. adaptability. c. productivity. d. information sharing. e. geographic reach. Answer: b 6 The benefits of e-commerce include: a. new features. b. lower costs. c. competitive advantage. d. All of the above. e. Both a and b. Answer: d 7 Which region has the largest number of Internet users? a. Central America b. Europe c. South America d. North America e. Southeast Asia Answer: d 8 Which of the following is NOT a widely used e-commerce form in the B2C sector? a. Online retailing b. Electronic markets c. Portals d. Online services e. All of the above are widely used e- commerce forms in the B2C sector. Answer: e 9 The form of e-commerce that makes a collection of individual shops accessible through a single location on the World Wide Web is called: a. online retailing. b. electronic markets. c. portals. d. online services. e. None of the above. Answer: b 10 In a ___________ auction, the bidders list their product or service requirements and the maximum price they are willing to pay for it. a. forward

b. reverse c. backward d. Dutch e. None of the above. Answer: b 11 In a _________ auction, the market operator displays a high opening price for an item and asks for buyers willing to pay the price. a. forward b. reverse c. Yankee d. Dutch e. None of the above. Answer: d 12 An e-commerce portal that assembles information from a variety of sources, organizing the information into a form that is useful to visitors to the Web site, is called a(n): a. search engine. b. content aggregator. c. infomediary. d. home page. e. None of the above. Answer: b 13 A Web site that locates, retrieves, and organizes specialized information for potential users is called a(n): a. search engine. b. content aggregator. c. infomediary. d. home page. e. None of the above. Answer: c 14 Online customer services include: a. Electronic banking. b. personal finance and bill payment. c. securities and investments. d. travel services. e. All of the above. Answer: e 15 Which of the following is NOT an online customer service? a. electronic banking. b. Personal finance and bill payment. c. Web page development. d. Travel services. e. All of the above are online customer services. Answer: c 16 If travelers book through an online reservation site and use electronic rather than paper tickets, the cost to the airline drops by more than: a. 20 percent. b. 40 percent. c. 60 percent. d. 80 percent. e. 90 percent. Answer: d 17 Which of the following is NOT a function offered by B2C sites? a. Catalog and content management b. Supply chain management c. Shopping and checkout d. Advertising e. Back office processing Answer: b 18 Which of the following is NOT a type of back office processing? a. Processing customer payment b. Updating inventory records c. Preparing item for distribution d. Delivery of products e. All of the above are back office processing.

27 List and describe the seven principle advantages of e-commerce? E-commerce offers the following seven principal advantages:  Geographic reach — Distance is not a barrier for e-commerce participants.  Speed — The interaction between buyer and seller takes place almost instantly.  Productivity — Being able to search for and locate information online quickly increases the productivity of individuals and companies.  Information sharing — Information in electronic form - text, audio, video, graphics, or animation - can be transmitted anywhere with equal ease.  New features — E-commerce participants constantly find more product features and services that they can offer over communications networks.  Low costs — The cost of conducting business and distributing all forms of information is reduced because of the digital communications links that characterize e-commerce methods.  Competitive advantage — Those companies having effective e-commerce capabilities generally are able to compete more successfully to gain business and customers. 28 Discuss the different types of online auctions. There are three types of online auctions. In traditional forward auctions, shoppers make offers for a desired item, with the knowledge that the seller will take the highest offer. A reverse auction is the direct opposite of a traditional auction. The bidders list their product or service requirements and the maximum price they are willing to pay for it. Dutch auctions originated in the flower markets of the Netherlands. The market operator displays a high opening price for an item and asks for buyers willing to pay the price. At prespecified intervals, the price is lowered until a bidder is willing to pay the displayed price.

  1. What are the 4 widely used e-commerce forms in the B2C sector? Four common e-commerce forms are widely used in the B2C sector:  Online retailing—Shoppers visit a store over the Internet and check out the products.  Electronic markets—A collection of individual shops accessible through a single location on the World Wide Web.  Portals—A gateway or hub site, such as Yahoo!, that provides chat rooms.  Online services—Electronic banking, personal finance and bill payment, securities and investments, and travel services. 30 What are the functions of portals. Today’s portals offer four functions:  Search capability  Access to specialized functions

 Personalization of content  Communities of interest 31 What 3 steps are involved in back office processing? The back office processing deals with the final steps in the sale, including the following:  Processing customer payment  Updating inventory records  Preparing item for distribution. 32 What are the differences between Spyware, Adware, and Spam? But, how are they connected? Spyware is any software that seeks to gain information about a users Internet Browsing behavior. Adware is typically free software that is supported by imbedding advertisements in the software. Spam is unwanted mass email message that are usually advertisements, pranks, or scams. Spyware seeks to gain information about a user so that internet based advertising can be more effective and so that user can be targeted with specific adware products and spam. 33 What are the typical components of supply chain management software? Supply chain management software typically contains some or all of these components:  Capacity requirements planning  Demand planning module  Manufacturing planning module  Distribution planning module  Logistics planning module  Transportation planning module

Misc. Question

1 Even though Microsoft Word can export HTML documents, describe some of the disadvantages of creating web pages from exported Word documents? What are some of the advantages of using software such as Dreamweaver and FrontPage to create web pages Code bloat! Word creates HTML code that has a ton of extra stuff that is NOT needed to display the content on the WWW. The extra stuff is used internally by Word so that the document can be re-opened and edited using Word. Word is a WYSIWYG editor (What you see is what you get). However, when you export your document to HTML format, the entire appearance and layout of the document could change. This is because Word has formatting capabilities that HTML can not duplicate.

reduce the size of an image by combining similar colors so that less color codes have to be stored. The JPEG file format attempts to reduce the size of an image by combining groups of pixels into a single pixel. The GIF format will significantly reduce the file size of images that do not have many different colors, i.e., logos, illustrations, simple graphics, black and white photos. However, the color reduction could reduce the quality of photo-realistic images. The JPEG format will significantly reduce the file size of images that have many different colors, i.e., digital photos and high-color images. However, the compression of pixels may make the image blurry. 7 Describe 3 different machine learning methods for predicting future results from past outcomes. Simply list them with some general details. Neural Networks - seek to simulate the intelligence of the human brain by creating an artificial network of nodes that can be trained to make predictions and strategic decisions. Support-Vector Machines - Uses high-dimensional special clustering to identify patterns for making predictions and strategic decisions. Decision Trees - seek to model past outcomes in a tree-like structure so that the outcome of future scenarios can be predicted.