SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 2 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 11 Dec 2017 My Price 10.00

ITEC 625 9082 Computer Systems Architecture (2172)

I would like to check with my answer to confirm if I am right.

ITEC 625 9082 Computer Systems Architecture (2172)

Final Exam

May, 2017

 

  1. Parallel and Serial Transmissions are used to connect peripheral devices and enable us to communicate with these devices
    1. True
    2. False
  2. The serial transmission usually consists of 9 pins that connect the data in a series, thats why the name serial port. The communication the serial transmission only goes over 3 wires
    1. One neutral wire, one wire that sends, and one wire that receives
    2. The ground signal, one wire that sends,and one wire that receives
    3. Two wires that send,and one wire that receives
  3. In order to keep the signal from making errors, at the end of every transmission a partly bit is sent
    1. A Partly Bit is a bit that is sent as the last bit to make sure that the connection is not faulty
    2. A Partly Bit is a bit that is sent separately to make sure that the connection is not faulty
    3. A Partly Bit is not used to make sure that the connection is not faulty
    4. None of the above
  4. The 25 parallel connector interface consists of 17 signal lines and 8 ground lines. The signal lines are divided into
    1. 4 control lines which which are used to initiate the handshaking5 status lines which are used to communicate the state of the peripheral devices and are used to indicate errorsand 8 data lines are used to transfer the data.
    2. 4 control lines which which are used to initiate the handshaking 8 status lines which are used to communicate the state of the peripheral devices and are used to indicate errors and 5 data lines are used to transfer the data.
    3. 8 control lines which which are used to initiate the handshaking 7 status lines which are used to communicate the state of the peripheral devices and are used to indicate errors and 2 data lines are used to transfer the data.
    4. 7 control lines which which are used to initiate the handshaking 7 status lines which are used to communicate the state of the peripheral devices and are used to indicate errors and 3 data lines are used to transfer the data.
  5. port enables two devices to cloneone another       
    1. True
    2. False
  6. port allows data to enter and exit and to send it to the peripheral device
    1. True
    2. False
  7. Software Port is used to directly transfer data between two nodes.
    1. Software ports are usually used over the Internet via TCP/UDP
    2. Firewalls use ports to prevent illegal access
    3. Software ports are used together with ip address
    4. A,B, and C
    5. None of the above.

8.      Handshake is a short automated process that initiates the connection between two foreign devices.

    1. It doesn’t check if the receiving device is actually there and receiving before it sends something away.
    2. The handshake makes sure that the connection is set up before communication.
    3. Diverse hardware differences cannot be spotted through the handshake and changes can be made to convert data for the node if this is necessary.
    4. handshake does not set limitations of the communication process

9.      The fundamental conceptual unit in a computer is:

a.       CPU

b.      Hard Drive

c.       Operating System

d.      Transistor

10.  The amount of time required to read a block of data from a disk into memory is composed of seek time, rotational latency, and transfer time. Rotational latency refers to

a.       the time it takes for the platter to make a full rotation

b.      the time it takes for the read-write head to move into position over the appropriate track

c.       the time it takes for the platter to rotate the correct sector under the head

d.      none of the above

11.  If a magnetic disc has 100 cylinders, each containing 10 tracks of 10 sectors, and each sector can contain 128 bytes, what is the maximum capacity of the disk in bytes?

a.       128,000

b.      12,800,000

c.       12,800

d.      1,280,000

12.  . 12. What characteristic of RAM memory makes it not suitable for permanent storage?

a.       too slow

b.      unreliable

c.       it is volatile

d.      too bulky

13.  Part of the operating system is usually stored in ROM so that it can be used to boot up the computer. ROM is used rather than RAM because

a.       ROM chips are faster than RAM

b.      ROM chips are not volatile

c.       ROM chips are cheaper than RAM chips

d.      none of the above

14.  Floating point representation is used to store

a.       Boolean values

b.      whole numbers

c.       real numbers

d.      integers

15.  Binary numbers can be used to represent

a.       Integers only

b.      Fractions only

c.       Both fractions and integers

d.      both fractions and integers.

16.  A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory address if the smallest addressable memory unit is a word?

a.       13

b.      8

c.       10

d.      6 27.

17.  A computer’s memory is composed of 4K words of 32 bits each. How many total bits in memory?

a.       12800

b.      1280000

c.       1310720

d.      131072

18.  A computer’s memory is composed of 8K words of 32 bits each, and a byte is 8 bits. How many bytes does this memory contain?

a.       8K

b.      32K

c.       16K

d.      4K 2

19.  Virtually all computer designs are based on the von Neumann architecture. A high level view of this architecture has the following three components:

a.       Buses, memory, input/output controllers

b.      Hard disks, floppy disks, and the CPU

c.       memory, the CPU, and printers

d.      memory, input/output modules, and the CPU

20.   Which of the following started out as separate program from operating systems but usually is included as part of the OS later on?

a.       Text Editor

b.      Command processor

c.       Resource allocator

d.      Dispatcher

21.  An operating system that allows several processors to perform computation as the same time is called

a.       Single program

b.      Multitasking

c.       Multiprocessing

d.      Real time processing

22.  The kind of interface with icons and menu bars for user to point at with mouse instead of entering commands for operating system to perform certain tasks is called

a.       GUI

b.      Command line interface

c.       User friendly programming

d.      None of the above

23.  Considering the impacts computer technology has on modern society, which of the following is negative?

a.       People can communicate with each other without geographical limitations

b.      Stock brokers do not need to be in a central place for trading

c.       More people totally rely on computers when doing their works

d.      Information can reach different area and people at light speed

24.  An embedded operating system is a type of operating system that is embedded and specifically configured for a certain hardware configuration. Hardware that uses embedded operating systems is designed to be:

a.       Bulky and complex

b.      User unfriendly

c.       Lightweight and compact

d.      None of the above

25.   I/O task completion is indicated by a change in the module status bits, and the CPU must periodically poll the module to check its status. Several activities occur.

1.      The CPU then resumes its former processing.

2.      The CPU issues an I/O command to an I/O module and switches to some other useful work.

3.      The I/O module will interrupt the CPU to request service when it is ready to exchange data with the CPU. Note that the steps in the interrupt processing are handled by both software and hardware.

4.      The CPU executes the data transfer.

The right sequence is:

a.       2,3,4,and 1

b.      2,3,4,and 1

c.       4,3,2,and 1

d.      2,4,3,and 1

2.      There are two primary alternatives for I/O addressing: isolated and memory mapped. Characteristics of Isolated (standard) I/O

a)      Address space of the I/O module is isolated from memory address space

b)      I/O devices are integrated into the normal memory address space

c)      Typical control lines include read/write lines to specify direction of data transfer and IO/M lines to switch address reference between memory and I/O

d)     Address space of the I/O module is isolated from memory address space

e)      A and D

f)       A and C

3.      There are two primary alternatives for I/O addressing: : isolated and memory mapped Characteristics of Memory mapped I/O

a.       I/O devices are integrated into the normal memory address space

b.      All of the memory accessing instructions can be used to access the I/O peripherals

c.       “Cost” is the loss of “real” memory addresses (Not a big problem today with the huge address spaces in modern systems)

d.      A and c

e.       All of the above

4.      Both programmed and interrupt-driven I/O require the continued involvement of the CPU in ongoing I/O operations. Direct memory accessing (DMA) takes the CPU out of the task except for initialization of the operation. Large amounts of data can be transferred between memory and the peripheral without severely impacting the CPU performance.

a.       True

b.      False

5.      The advantages of Solid-State memory also known as Flash Memoryover the magnetic disks are:

a.       Lower prices, hight energy consiumption, and heavier in weight

b.      Light weight, fast access, less energy consumption (hence less heat), immune to physical shocks.

c.       Slow access but lighter in weight

d.      None of the above

6.      As the prices of flash memory come down, solid-state memory will replace the magnetic disk in the foreseeable future.

a.       True

b.      False

7.      RAID devices provide redundancy (in different ways) in storing data, thus offering improved performance and increased availability for systems employing these devices. Levels 0 through 6, as well as some hybrid systems, are introduced.

a.       RAID-1 is called disc copying

b.      RAID-1 is called disk mirroring

c.       RAID-1 is call disk backup

d.      RAID-1 is called disk partitioning

8.      The operating system (OS) serves as the interface between the computer's hardware and the application or "outside world." Operating systems have historically been independent of the computers on which they run.

a.       True

b.      False

9.      First Generation (1946 - 1957) OS used

a.       Transistors

b.      Optical disks

c.       Vacuum Tubes

d.      None of the above

10.  Second generation Oss used

a.       Optical hard drives

b.      Punch-cards

c.       USB Drives

d.      None of the above

11.  The OS is responsible for

a.       Task control, memory management, and I/O handling

b.      User interface and user applications

c.       Network handling and data processing

d.      None of the above

12.  A key concept in all operating systems is the process, which is a program in execution. It consists

a.       An executable program and the program’s data and stack

b.      program counter

c.       stack pointer, and register information

d.      A and C

e.       A,B, and C

13.  Files are a mechanism for hiding peculiarities of disks and other I/O devices. Most OSs organize files into

a.       Trees

b.      Lists

c.       Directories

d.      Containers

14.  Both processes and files are organized into hierarchical “trees,” but process hierarchies are generally deeper.

a.       True

b.      False

15.  In Virtual Machines

a.       Multiple copies of the machine run on their own hardware

b.      Multiple copies of the machine are simulated as a virtual machine

c.       Each virtual machine can run an arbitrary OS

d.      A,B,& C

e.       B & C

16.  Logically, files are organized in a way that our human beings can easily read and understand. However, data are stored in physical storages very differently most of the time.

a.       True

b.      False

 

17.  In an operating system,

a.       the network management system is the part that takes care of file related operations

b.      the file management system is the part that takes care of file related operations

c.       thememory management system is the part that takes care of file related operations.

d.      None of the above

18.  ____________are three commonly used methods to allocate blocks of storage for files.

a.       Fragmentation, dislocation, and consolidation

b.      Contiguous, linked, and indexed storage

c.       Contiguous, disjointed, and direct access

d.      None of the above

19.  Disk fragmentation is the main disadvantage of ______allocation, due to size changes of a certain file through its lifetime.

a.       Indexed access

b.      Direct

c.       Contiguous

d.      Disorganized

20.  Window NTFS (NT File System) was created to fixed problems with FAT. It has _______of 1kB records.

a.       File allocation Table

b.       Master File Table (MFT)

c.       Relocation Table

21.  Each file has an MFT entry, and the first record stores the MFT attributes. The first 16 records are metadata that describe the volume. NTFA supports dynamically sized volumes, and

a.       Volumes must be part of a single volume

b.      Volumes must be part of multiple volumes

c.       Volumes can be part of a physical disk, or multiple disks.

22.   File records in NTFS are made up of attributes, including

a.       Storage locate and size

b.      File name only

c.       File information and data

d.      All of the above

23.  File are organized into _______

a.       Trees

b.      Directories

c.       Sub-files

d.      None of the above

24.  Directories provides a means to hide physical structure of files, and presents a logical organization of files.

a.       True

b.      False

25.  Files can be stored on network storages and access through protocols

a.       True

b.      False

26.  The file management system of an operating system also provides file protection, including read, write and execute protection. Many OSs offers file protection based on owner, group, and everyone. Almost all modern operating systems provide

a.       Access Directory List

b.      Access Protection List

c.       Access Control List (ACL).

d.      None of the above

Attachments:

Answers

(5)
Status NEW Posted 11 Dec 2017 01:12 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)