CHAPTER 2: An Introduction to System Concepts Flashcards

1
Q

From a systems perspective, how would you classify a computer operating system?

a) A tangible system
b) A physical system
c) A conceptual system
d) A perceptible system

A

c) A conceptual system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anything outside the system boundary represents the _____________ that the system operates.

a) interface
b) subsystem
c) environment
d) super system

A

c) environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A large organization’s IT system might have specific programs such as marketing, manufacturing, purchasing, inventory, finance, and accounting. These are considered ____________ to the larger IT system.

a) interfaces
b) subsystems
c) the environment
d) super systems

A

b) subsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The division of a system or subsystem into its components and linkages is called

a) itemization
b) reconstruction
c) decomposition
d) categorization

A

c) decomposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is not part of an abstract description of system architecture?

a) system constraints
b) system interconnections
c) linkages among the components
d) physical location of the servers

A

d) physical location of the servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are not input devices?

a) stylus
b) headphones
c) touch screen
d) mouse and keyboard

A

b) headphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The system architecture representation of the flow and processing of data within an organization is called

a) three-tier architecture
b) application architecture
c) flow control architecture
d) customer oriented architecture

A

b) application architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scalability is the ability of a system to

a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.

A

a) handle a growing amount of work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information availability is the ability of a system to

a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.

A

b) allow access to information when it is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data security is the ability of a system to

a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.

A

c) protect data against unauthorized access or modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System administration is the ability of a system to

a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.

A

d) allow configuration, monitoring, and maintaining operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a client-server architecture, the only limitations to running multiple applications on a single server are the potential slowdowns that may result from the load on the server computer and

a) traffic on the Internet.
b) load on client computer.
c) users who open many web browsers.
d) the traffic on the network to that server.

A

d) the traffic on the network to that server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A two-tier architecture simply means that there are ________ computers involved in the service.

a) one
b) two
c) two to five
d) two or more

A

b) two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A web-browser connected to a web-server is an example of

a) multiprocessing
b) cluster computing
c) n-tier architecture
d) client-server technology

A

d) client-server technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Because response time is considered an important measure by most Web users, it is often more practical to separate the database and page processing into a third computer system. This is an example of

a) multiprocessing
b) cluster computing
c) n-tier architecture
d) three-tier architecture

A

d) three-tier architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The protocol that makes communication between a Web server and a database application possible is called

a) SQL
b) HTTP
c) Database Control Language
d) Common Gateway Interface

A

d) Common Gateway Interface

17
Q

The organization’s internal network, isbcommonly called a(n)

a) intranet
b) employee network
c) corporation network
d) organizational network

A

a) intranet

18
Q

Internet standards such as _______ allow the easy identification of relevant data within data streams between interconnected systems, making these applications possible and practical.

a) XML
b) FTP
c) SSH
d) HTTPS

A

a) XML

19
Q

What is not a benefit of cloud services?

a) Backup and offsite storage
b) Additional computing capability when and where it is needed
c) Lower hardware and software investments
d) Added security

A

d) Added security

20
Q

______________ is software designed to handle potential incompatibilities between the application software that resides on different equipment.

a) Middleware
b) Versioning software
c) Compatibility software
d) Application interface software

A

a) Middleware