ITF

studied byStudied by 44 people
5.0(1)
get a hint
hint

As an IT person, one should be someone who enjoys learning on your own.

1 / 308

Tags and Description

Galvin u better study bud

309 Terms

1

As an IT person, one should be someone who enjoys learning on your own.

True

New cards
2

Computers today are more easily identifiable than computers in the past.

False

New cards
3

The concept of translating a program from a more readable language like Python or Java into the computer's native machine language is called ...

compilation

New cards
4

An IT person in general would not be expected to handle which of the following tasks?

- Train other employees
- Monitor employees' files and web browsing behavior to ensure compliance with organizational IT policies
- Be on call 24/7
- Make recommendations on computer purchases
- All of the above are tasks that an IT person might be asked to perform.

Monitor employees' files and web browsing behavior to ensure compliance with organizational IT policies

New cards
5

An IT person would probably be expected to study each of the following topics except for ...
... operating systems.
... programming.
... The IT person would be expected to study them all.
... networking.
... ethics.

The IT person would be expected to study them all.

New cards
6

T/F - You can store a number between 0 and 255 in 1 bit.

False (0 or 1)

New cards
7

Volatility is a property of which of the following?
- Hard disk storage
- All of the above
- Users
- Processors
- Memory

memory

New cards
8

T/F - System administrators will be expected to provide support in the form of documentation and training to the organization's users.

True

New cards
9

Which of the following is the largest storage capacity?
100 Megabytes
3,000,000 bytes
1,000,000 bits
4 Gigabytes
10,000 Kilobytes

4 Gigabytes

New cards
10

As computer technology has improved and thus become more complex, the ability to use the computer has been made easier.
True
False

True

New cards
11

System administrators should know more than one operating system.

True

New cards
12

The system administrator of a company would not be responsible for installing software on individual employee's computers.

False

New cards
13

If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this ...

... promotes computer security.

New cards
14

Which of the following could be called a peripheral device?
Printer
Memory chips
Power supply unit
Memory
CPU

Printer

New cards
15

A computer system consists of the hardware, software and ...

... users

New cards
16

The only difference between a handheld unit such as a tablet device or a smart phone differs from a laptop or desktop computer is that the laptop/desktop has full sized peripheral devices and the handheld unit uses touch screens.

False

New cards
17

Web developers and web administrators share most of the same tasks.

False

New cards
18

Organizations typically only have one system administrator who will be responsible for all aspects of administering the computer systems.

False

New cards
19

Although an IT student may not learn a variety of programming languages, it is likely that the IT student will learn to program.

True

New cards
20

If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.

True

New cards
21

It is the user who initiates when and what a computer should do.

True

New cards
22

A security administrator would be responsible for administering which of the following?
A website
A web server
A database server
A firewall
An operating system

A firewall

New cards
23

Which of the following behaviors might be considered as unethical from the position of a system administrator?
All of the above
Accessing other people's files
Reading employees' emails
Changing data files in the organization's system for one's own gain
Setting up backdoor accounts

All of the above

New cards
24

Which of the following types of files would come closest to about 1 MByte in size?
A small black and white image file
A highly compressed movie
An uncompressed movie
A long song stored in an mp3 file
A textfile with 1 page of text

A small black and white image file

New cards
25

A smart phone should not be considered a computer.

False

New cards
26

Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill?
Software installation
System security
System-level programming
Troubleshooting
Knowledge of operating systems

Troubleshooting

New cards
27

Most people who work in IT have 4-year IT degrees.

False

New cards
28

The system administrator is responsible for each of the following tasks except...
... updating the operating system.
... installing software.
... training users.
... troubleshooting hardware
... securing a website.

... securing a website.

New cards
29

Which of the following skills would an IT person employ to find and fix a problem with the operating system?
System troubleshooting
System level programming
System security
Soft skills
Hardware troubleshooting

System troubleshooting

New cards
30

The system unit houses the CPU and memory chips, all placed on ...
None of the above, the system unit houses the CPU but not memory.
... an expansion slot.
... a monitor.
... ROM.
... a motherboard.

... a motherboard.

New cards
31

The GUI is both easier to use and provides the user with greater flexibility in issuing instructions while the command line provides the user with the opportunity to write more detailed commands and so is more powerful.

False

New cards
32

The operating system is software.

True

New cards
33

Where is swap space located?

hard disk

New cards
34

While any device can issue an interrupt, it is the operate system that handles interrupts.

True

New cards
35

With virtual memory, only portions of the running program are stored in memory.

True

New cards
36

Which form of processing would run one process at a time, but when that process requires I/O, the CPU would switch temporarily to another process?

Multitasking

New cards
37

GRUB is an example of ...

... a boot loader program.

New cards
38

Which of these hardware devices can force the processor to move from one process to another in multitasking?
program counter
stack pointer
redy queue
timer
status flags

program counter

New cards
39

A multithreaded operating system is more efficient than a multitasking operating system when executing threads.

True

New cards
40

A virtual machine is hardware.

False

New cards
41

. If two processes are deadlocked, what is your best move to free them from deadlock?

Kill one of the processes

New cards
42

Bourne is an example of a Linux ...

... shell

New cards
43

If an entry in a page table is listed as not valid, then accessing that page will cause ...

... a page fault.

New cards
44

To determine where a given page is stored in memory, the operating system uses ...

... the page table.

New cards
45

What does an interrupt interrupt?

the CPU during its fetch-execute cycle

New cards
46

Concurrent processing means that the operating system executes processes in an overlapped fashion, which of the following is not a form of concurrent processing?

multiprogramming
batch processing
multitasking
All of the above are forms of concurrent processing.
multiprocessing

batch processing

New cards
47

The use of permissions to control who/what can and who/what cannot access and use system resources is part of which of these operating system roles?

Protection

New cards
48

During a context switch, what is being switched?
one process' pages for another
one process' register values for another
one process' data for another
one process' priority for another
all of the above

all of the above

New cards
49

In a batch processing system, the operating system would have to schedule the next process to execute.

True

New cards
50

The foreground process is the one that the user can directly interact with.

True

New cards
51

Which of the following forms of scheduling will cause processes to wait the minimum amount of time?

First come first serve
Longest job first
Round robin
Priority
Shortest job first

Shortest job first

New cards
52

The process and the program are the same; the two terms can be used interchangeably.

False

New cards
53

Which portion of the operating system can be personalized by the user.

the shell

New cards
54

Cooperative multitasking and competitive multitasking are the same thing.

false

New cards
55

When the CPU moves from one process to another in multitasking, this is known as ...

a context switch

New cards
56

Two threads will always share the same ...

... program code.

New cards
57

In Linux, the administrator account is called ...

root

New cards
58

Which of the following is true in competitive multitasking?

None of the above: the CPU does not switch between processes during multitasking.
The CPU switches between processes at the user's request.
The CPU switches between processes when a timer forces a context switch.
The CPU switches between processes randomly.
The CPU switches between processes only when a process needs I/O.

The CPU switches between processes when a timer forces a context switch.

New cards
59

When two threads need to "meet up" in order to share data, this is known as ...

... rendezvous.

New cards
60

If a process generates an address that is part of another process' area of memory, this is known as ...

... a memory violation.

New cards
61

Which of the following forms of processing does not provide any form of interaction with the user but instead requires I/O be handled before/after program execution?

Multiprogramming

New cards
62

The process of swapping is triggered under which circumstance?

a page fault

New cards
63

Which of the following forms or process management did MS-DOS use?

Single tasking

New cards
64

The portion of the operating system that must be resident in memory at all times is ...

... the kernel.

New cards
65

In order for the operating system to be able to communicate with a specific piece of hardware, one must install the appropriate ...

... device driver.

New cards
66

. To create a directory, both Linux and DOS use mkdir.

True

New cards
67

Files are broken into fixed sized units called ...

blocks

New cards
68

Which of the following tasks would not be possible for a system administrator to do on the file system?
Add remote storage to be accessed over network
Encrypt portions of the file system
Mount and unmount specific partitions
All of the above are possible.
Establish disk quotas

All of the above are possible.

New cards
69

The /proc top level directory is different from most other Linux top level directories because it ...

... is not stored on disk but instead stored in memory.

New cards
70

In order to determine which directory you are currently in, which commands would you use respectively in Windows and Linux?

nothing in Windows, and pwd in Linux

New cards
71

Mounting ...

... makes a partition available.

New cards
72

In a linked list, to reach the 5th block, how many links do you have to follow?

4

New cards
73

A hard link in a file system points at the file while a soft link points at a file's directory entry.

True

New cards
74

In Linux, every top-level directory is located on its own partition whereas in Windows, all of the top-level directories are on the same partition.

False

New cards
75

If a hard disk contains 4 platters, how many read/write heads will the hard disk contain?

8

New cards
76

In Linux, devices like the disk drives, USB drives, network devices and monitor are treated as files. These "files" are stored under which directory?

/dev

New cards
77

In Linux, you have one inode for every file and directory in your file system.

True

New cards
78

In DOS, which of the following symbols is used to denote a directory in a path?

\

New cards
79

Under which Linux top-level directory would you find the user directories?

/home

New cards
80

In Linux, a soft link is called ...

symbolic link

New cards
81

In both Windows and Linux, partitions are denoted by using different letters as in C: and D:.

false

New cards
82

The zip and tar programs can be used to create ...

archives

New cards
83

The surface of a hard disk is broken into which types of regions?

tracks and sectors

New cards
84

The time it takes the read/write head to move across the disk to the proper track is called ...

seek time

New cards
85

In Linux, you would expect to find many of the system administrator programs stored under ...

/sbin

New cards
86

We view the file system from a physical perspective while the operating system manipulates it from a logical perspective.

false

New cards
87

Which of the following files stores user account information?

/etc/passwd

New cards
88

With file blocks distributed across the file system instead of being stored in consecutive disk blocks, accessing the file requires traversing the blocks creating what one might call a ...

linked list

New cards
89

File name extensions are primarily used ...

... by the operating system to know what software to use to open the file.

New cards
90

In file compression, lossy compression ...

... reduces the file size by discarding some of the data.

New cards
91

Which of the following Linux commands is like the DOS command dir?

ls

New cards
92

Which of the following files stores the currently mounted file systems (partitions) in Linux?

/ect/mtab

New cards
93

You can separately mount and unmount each individual partition.

True

New cards
94

Disk access time is slower than memory access time.

True

New cards
95

User passwords are not actually stored in the /etc/passwd file.

True

New cards
96

Under which Linux top-level directory would you find most of the configuration files?

/etc

New cards
97

In Windows, the Programs top level directory stores applications software. In Linux, the equivalent directory is ...

/usr

New cards
98

All files have names although the extension is not required.

true

New cards
99

The file system for Windows and Linux are “shapes” like a ...

Tree

New cards
100

In Linux, the system administrator’s home directory is stored under ...

root

New cards

Explore top notes

note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 80 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard75 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard179 terms
studied byStudied by 108 people
Updated ... ago
4.0 Stars(4)
flashcards Flashcard25 terms
studied byStudied by 199 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard82 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)