Read Carefully Name ____________________________ ITEC 1050 Exam 2 (100 points) September 24, 2007 Multiple Choice (2 points each) 1. What term describes the specification for how internal components, such as the motherboard, are mounted in the system unit? a. Form factor b. Footprint c. Component spec d. Form footprint 2. Unicode is a universal coding standard code that: a. Includes character representations for many of the world’s languages b. Provides 256 different combinations to represent characters c. Uses only one binary digit d. Uses eight-bit code 3. Which of the following is not a type of memory? a. RAM b. Cache c. ROM d. ALU 4. What do you call the ability of a computer to run more than one processor at a time? a. Multiple processing b. Serial processing c. Dual processing d. Parallel processing 5. Which of the following is a WAN connection point that enables users to access the WAN through a local phone call? a. Permanent virtual circuit (PVC) b. Point of presence (POP) c. Leased line d. Frame relay Name: _____________________________ 6. Which of the following components would you not find inside the system unit? a. Motherboard b. Power supply c. Keyboard d. Cooling fan 7. This is the name given to an electronic circuit that carries data from one computer component to another. a. Data lead b. Bus c. Trace d. Chip 8. Which of the following is not a computer network? a. Local area network (LAN) b. Wide area network (WAN) c. Peer-to-peer network (P2PN) d. Leased-line area network (L2AN) 9. Which term describes the phenomenon of more than one computer trying to use the network at the same time? a. Contention b. Competition c. Communication d. Congestion 10. Which of the following is not a true statement about packet switching technology? a. Packet switching is quite reliable, as alternative routes for a packet will be pursued if a portion of the network is down. b. Packet switching is cheaper than circuit switching, as it does not require the expense of high-speed electronic switches to establish and maintain the endto-end circuit. c. Packet switching makes use of routers to examine packet addresses and move them along toward their destination. d. If one packet is received out of sequence, the entire message must be retransmitted to ensure it is correct at the destination computer. Page 2 of 8 Name: _____________________________ 11. When storing data about a single employee, the name, street, and telephone number are each entered in: a. Fields b. Keys c. Records d. Tables 12. Which of the following would be the BEST choice for the primary key in a student record? a. Date of birth b. Year in college c. Last name d. Social Security number 13. Which switching method is used to communicate over the Internet? a. Token b. Packet c. Circuit d. Distributed 14. Which of the following extracts instructions from memory and then decodes and executes them? a. Control unit b. RAM c. ROM d. Data bus 15. Referring to the levels in a database, which group of terms is in the correct order (lowest to highest)? a. Character, field, record b. Character, record, field c. Field, record, character d. Record, field, character Page 3 of 8 Name: _____________________________ 16. One or more of these make up a data file. a. Characters b. Fields c. Records d. BLOBs 17. This technology allows CDs to be rewritten. a. CD-R b. CD-ROM c. CD-RW d. CD-ROM 18. The term “network topology” refers to the: a. Type of Internet connections available to users of the network. b. Type of network operating system used on the file server c. Physical layout of network components, including workstations and cables d. Contention management strategy utilized to resolve collisions 19. What is the name for the boxlike case that houses the computer’s main hardware components? a. Computer unit b. System unit c. Expansion unit d. Computer processing unit 20. To connect to a LAN, a computer must be equipped with which of the following? a. Network interface card (NIC) or Ethernet port b. Backbone c. Both a and b d. None of the above Page 4 of 8 Name: _____________________________ 21. If a ZIP code is entered in a field intended for a phone number, which principle of good database design has been violated? a. Data independence b. Data redundancy c. Data integrity d. Data security 22. If a database contains the same information (e.g. address, phone number) more than once, what is this an example of? a. Data independence b. Data security c. Data integrity d. Data redundancy 23. What term describes a technique that is used to discover previously unknown patterns within data? a. Data mining b. Data redundancy reduction c. Relational database d. Decision support system 24. Assume a company stores a customer’s address in two separate tables. When a change of address card is received, data in both tables must be modified. This database suffers from _______________ problems. a. Integrity b. Dependence c. Redundancy d. Security 25. Which term is used to describe the validity of data stored in a database? a. Data independence b. Data integrity c. Data redundancy d. Data security Page 5 of 8 Name: _____________________________ 26. Provide two examples of applications you have used that use databases. This is not referring to applications we have used in class. Instead, this should be applications that you interact with as a user/customer. Provide examples of the type of data you would expect to see in these databases. (4 points) a. Bank website or ATM – username, password, pin, account numbers, customer name, customer address, balances, transactions b. Amazon – username, password, shopping cart, purchases, addresses c. EBay – username, password, auctions, purchases 27. List some differences between the ASCII and Unicode character standards? (6 points) ASCII Unicode Size 8 bits 16 bits Number of characters 256 65, 536 Languages English and additional keyboard characters (numbers, symbols, return, tab, etc.) with additional characters for some European alphabets Most of the world’s alphabets including complex alphabets like Chinese, Japanese, Arabic あきがずぬ áçéñ キザダホポ ößü غرذج 28. While discussing the four steps of the fetch/execute cycle we talked about the concept of pipelining as it relates to this cycle. Describe what pipelining means in this context. Drawing a diagram might be helpful. (6 points) a. As one process completes the first step of the fetch/execute cycle and moves on to the second step a new process begins the first step. This continues so that during each clock cycle it is possible for four processes to be in the fetch/execute cycle at the same time, with each process at a different step in the cycle. Page 6 of 8 Name: _____________________________ 29. What are the differences between a LAN and a WAN? (4 points) LAN WAN Distance Local geographic area. Normally in the same room, floor, or building. Large geographic area, usually covering several miles up to thousands of miles. Media Direct cabling, localized wireless radio, or infrared signals. Long-distance transmission media, such as phone lines, microwave transmissions, or even satellites. 30. Provide a definition of each of these five advantages of database management systems, describing their importance to a good database. (10 points) a. Data Integrity – ensures data are valid. b. Data Independence – Input data are kept separate from program data. This means that the same database can be used with multiple applications or the application or data can change without changing the other. (e.g. bank database being accessed by the teller applications, ATM application, and web application) c. Avoiding data redundancy – repetition of input data is avoided. Instead of repeating data in multiple tables you can simply store the data that needs to be repeated in one table and then relate that table to the other tables. d. Data Security – Data are not accessible to unauthorized users. The hardware storing the data are physically secured, using backups, multiple locations, UPS devices, etc. e. Data Maintenance – Set procedures for adding, updating, and deleting records are in place. Page 7 of 8 Name: _____________________________ 31. Matching (20 points) K 1. I 2. O bit Speech recognition 3. sector b. clients 5. Form factor d. M H 4. B 6. Q E 7. N 9. S 10. Seek time byte 8. token Data validation R Executive information system 11. footprint P 12. C 13. Expansion card T Parallel processing 14. Key field G 15. J F A D L a. c. e. f. g. h. i. j. A pressure-sensitive device that responds to a finger’s movement over its surface. The time it takes the read/write head to locate data before reading or writing begins A technique that uses many processors running at the same time. A network in which all of the computers are equal. A special unit of data that travels around a ring in a ring topology. An area in a database that accepts and stores a certain type of data. A system that gathers and processes data periodically. The specification for mounting internal components such as the motherboard. A type of input in which the computer recognizes spoken words A large database capable of storing all the information that a corporation possesses. The smallest unit of information that a computer can work with. l. A section of a disk set aside as if it were a physically separate disk m. All of the computers that access the server. k. Used to define an acceptable input range for each field in a record. o. A pie-shaped wedge used to divide the tracks of a disk n. Batch processing 16. Data warehouse p. A plug-in adapter used to connect peripherals to the computer. 17. field q. Consists of eight bits and represents one unit or character of storage. 18. Touch pad r. The amount of space taken up by the case on the desk. 19. Peer-to-peer s. Supports management’s strategic-planning function. network 20. Partition t. A part of a record that uniquely identifies that record in its database table. Page 8 of 8