IT Fundamentals Midterm

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/164

flashcard set

Earn XP

Description and Tags

Midterm flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

165 Terms

1
New cards

You can store a number between 0 and 255 in 1 bit.

False

2
New cards

An IT person would probably be expected to study each of the following topics except for ...

The IT person would be expected to study them all. (operating systems, networking, programming, and ethics

3
New cards

Which of the following is the largest storage capacity?

4 Gigabytes

4
New cards

Computers today are more easily identifiable than computers in the past.

False

5
New cards

Most people who work in IT have 4-year IT degrees.

False

6
New cards

It is the user who initiates when and what a computer should do.

True

7
New cards

System administrators will be expected to provide support in the form of documentation and training to the organization’s users.

True

8
New cards

As an IT person, one should be someone who enjoys learning on your own.

True

9
New cards

Volatility is a property of which of the following?

Memory

10
New cards

Web developers and web administrators share most of the same tasks.

False

11
New cards

Organizations typically only have one system administrator who will be responsible for all aspects of administering the computer systems.

False

12
New cards

Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill?

Troubleshooting

13
New cards

The system administrator of a company would not be responsible for installing software on individual employee’s computers.

False

14
New cards

A computer system consists of the hardware, software and ...

users

15
New cards

The system administrator is responsible for each of the following tasks except...

securing a website

16
New cards

Which of the following could be called a peripheral device?

Printer

17
New cards

The only difference between a handheld unit such as a tablet device or a smart phone differs from a laptop or desktop computer is that the laptop/desktop has full sized peripheral devices and the handheld unit uses touch screens.

False

18
New cards

As computer technology has improved and thus become more complex, the ability to use the computer has been made easier.

True

19
New cards

An IT person in general would not be expected to handle which of the following tasks?

Monitor employees’ files and web browsing behavior to ensure compliance with organizational IT policies

20
New cards

A smart phone should not be considered a computer.

False

21
New cards

Which of the following types of files would come closest to about 1 MByte in size?

A small black and white image file

22
New cards

If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.

True

23
New cards

Which of the following behaviors might be considered as unethical from the position of a system administrator?

All of the above - Setting up backdoor accounts, Changing data files in the organization's system for one's own gain, Accessing other people's files

24
New cards

System administrators should know more than one operating system.

True

25
New cards

The concept of translating a program from a more readable language like Python or Java into the computer's native machine language is called ...

compilation

26
New cards

Although an IT student may not learn a variety of programming languages, it is likely that the IT student will learn to program.

True

27
New cards

A security administrator would be responsible for administering which of the following?

  1. A web server

  2. A firewall

  3. A database server

  4. An operating system

A firewall

28
New cards

The system unit houses the CPU and memory chips, all placed on ...

a motherboard

29
New cards

If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this ...

promotes computer security

30
New cards

Which of the following skills would an IT person employ to find and fix a problem with the operating system?

System troubleshooting

31
New cards

If a process generates an address that is part of another process’ area of memory, this is known as ...

a memory violation

32
New cards

Which of the following forms or process management did MS-DOS use?

Single tasking

33
New cards

The operating system is software.

True

34
New cards

In a batch processing system, the operating system would have to schedule the next process to execute.

True

35
New cards

The process of swapping is triggered under which circumstance?

a page fault

36
New cards

Which form of processing would run one process at a time, but when that process requires I/O, the CPU would switch temporarily to another process?

Multitasking

37
New cards

Which portion of the operating system can be personalized by the user.

the shell

38
New cards

The portion of the operating system that must be resident in memory at all times is ...

the kernel

39
New cards

Cooperative multitasking and competitive multitasking are the same thing.

False

40
New cards

Which of the following forms of processing does not provide any form of interaction with the user but instead requires I/O be handled before/after program execution?

Multiprogramming

41
New cards

Where is swap space located?

hard disk

42
New cards

When two threads need to “meet up” in order to share data, this is known as ...

rendezvous

43
New cards

Which of the following forms of scheduling will cause processes to wait the minimum amount of time?

Shortest job first

44
New cards

The GUI is both easier to use and provides the user with greater flexibility in issuing instructions while the command line provides the user with the opportunity to write more detailed commands and so is more powerful.

False

45
New cards

If an entry in a page table is listed as not valid, then accessing that page will cause ...

a page fault

46
New cards

Which of the following is true in competitive multitasking?

The CPU switches between processes when a timer forces a context switch.

47
New cards

The foreground process is the one that the user can directly interact with.

True

48
New cards

. If two processes are deadlocked, what is your best move to free them from deadlock?

Kill one of the processes

49
New cards

A multithreaded operating system is more efficient than a multitasking operating system when executing threads.

True

50
New cards

Which of these hardware devices can force the processor to move from one process to another in multitasking?

program counter

51
New cards

A virtual machine is hardware.

False

52
New cards

What does an interrupt interrupt?

the CPU during its fetch-execute cycle

53
New cards

When the CPU moves from one process to another in multitasking, this is known as ...

a context switch

54
New cards

The use of permissions to control who/what can and who/what cannot access and use system resources is part of which of these operating system roles?

Protection

55
New cards

Bourne is an example of a Linux ...

shell

56
New cards

While any device can issue an interrupt, it is the operate system that handles interrupts.

True

57
New cards

During a context switch, what is being switched?

all of the above register values for another, data for another, priority for another

58
New cards

Two threads will always share the same ...

program code

59
New cards

Concurrent processing means that the operating system executes processes in an overlapped fashion, which of the following is not a form of concurrent processing?

batch processing

60
New cards

In order for the operating system to be able to communicate with a specific piece of hardware, one must install the appropriate ...

device driver

61
New cards

In Linux, the administrator account is called ...

root

62
New cards

To determine where a given page is stored in memory, the operating system uses ...

the page table

63
New cards

The process and the program are the same; the two terms can be used interchangeably.

False

64
New cards

GRUB is an example of ...

a boot loader program

65
New cards

With virtual memory, only portions of the running program are stored in memory.

True

66
New cards

To create a directory, both Linux and DOS use mkdir.

True

67
New cards

You can separately mount and unmount each individual partition.

True

68
New cards

The file system for Windows and Linux are “shapes” like a ...

tree

69
New cards

Which of the following files stores user account information?

  1. /etc/users

  2. /etc/shell

  3. /etc/passwd

  4. /etc/shadow

/etc/passwd

70
New cards

The surface of a hard disk is broken into which types of regions?

tracks and sectors

71
New cards

If a hard disk contains 4 platters, how many read/write heads will the hard disk contain?

8

72
New cards

In Linux, you would expect to find many of the system administrator programs stored under ...

/sbin

73
New cards

In Linux, a soft link is called ...

a symbolic link

74
New cards

Mounting ...

makes a partition available

75
New cards

Files are broken into fixed sized units called ...

blocks

76
New cards

User passwords are not actually stored in the /etc/passwd file.

True

77
New cards

In Linux, devices like the disk drives, USB drives, network devices and monitor are treated as files. These “files” are stored under which directory?

/dev

78
New cards

A hard link in a file system points at the file while a soft link points at a file’s directory entry.

True

79
New cards

In file compression, lossy compression ...

reduces the file size by discarding some of the data.

80
New cards

Disk access time is slower than memory access time.

True

81
New cards

In Linux, the system administrator’s home directory is stored under ...

/root

82
New cards

Which of the following tasks would not be possible for a system administrator to do on the file system?

  1. Establish disk quotas

  2. Add remote storage to be accessed over network

  3. Mount and unmount specific partitions

  4. All of the above are possible

All of the above are possible

83
New cards

Which of the following Linux commands is like the DOS command dir?

ls

84
New cards

With file blocks distributed across the file system instead of being stored in consecutive disk blocks, accessing the file requires traversing the blocks creating what one might call a ...

linked list

85
New cards

The /proc top level directory is different from most other Linux top level directories because it ...

is not stored on disk but instead stored in memory

86
New cards

The time it takes the read/write head to move across the disk to the proper track is called ...

seek time

87
New cards

We view the file system from a physical perspective while the operating system manipulates it from a logical perspective.

False

88
New cards

Under which Linux top-level directory would you find most of the configuration files?

/etc

89
New cards

The zip and tar programs can be used to create ...

archives

90
New cards

In both Windows and Linux, partitions are denoted by using different letters as in C: and D:

False

91
New cards

All files have names although the extension is not required.

True

92
New cards

In order to determine which directory you are currently in, which commands would you use respectively in Windows and Linux?

nothing in Windows, and pwd in Linux

93
New cards

Under which Linux top-level directory would you find the user directories?

/home

94
New cards

Which of the following files stores the currently mounted file systems (partitions) in Linux?

/etc/mtab

95
New cards

In Linux, every top-level directory is located on its own partition whereas in Windows, all of the top-level directories are on the same partition.

False

96
New cards

In Windows, the Programs top level directory stores applications software. In Linux, the equivalent directory is ...

/usr

97
New cards

In DOS, which of the following symbols is used to denote a directory in a path?

\

98
New cards

File name extensions are primarily used ...

by the operating system to know what software to use to open the file.

99
New cards

In a linked list, to reach the 5th block, how many links do you have to follow?

4

100
New cards

In Linux, you have one inode for every file and directory in your file system.

True