CHAPTER 2: An Introduction to System Concepts Flashcards
From a systems perspective, how would you classify a computer operating system?
a) A tangible system
b) A physical system
c) A conceptual system
d) A perceptible system
c) A conceptual system
Anything outside the system boundary represents the _____________ that the system operates.
a) interface
b) subsystem
c) environment
d) super system
c) environment
A large organization’s IT system might have specific programs such as marketing, manufacturing, purchasing, inventory, finance, and accounting. These are considered ____________ to the larger IT system.
a) interfaces
b) subsystems
c) the environment
d) super systems
b) subsystems
The division of a system or subsystem into its components and linkages is called
a) itemization
b) reconstruction
c) decomposition
d) categorization
c) decomposition
What is not part of an abstract description of system architecture?
a) system constraints
b) system interconnections
c) linkages among the components
d) physical location of the servers
d) physical location of the servers
Which of the following are not input devices?
a) stylus
b) headphones
c) touch screen
d) mouse and keyboard
b) headphones
The system architecture representation of the flow and processing of data within an organization is called
a) three-tier architecture
b) application architecture
c) flow control architecture
d) customer oriented architecture
b) application architecture
Scalability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
a) handle a growing amount of work.
Information availability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
b) allow access to information when it is needed.
Data security is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
c) protect data against unauthorized access or modification.
System administration is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
d) allow configuration, monitoring, and maintaining operation.
In a client-server architecture, the only limitations to running multiple applications on a single server are the potential slowdowns that may result from the load on the server computer and
a) traffic on the Internet.
b) load on client computer.
c) users who open many web browsers.
d) the traffic on the network to that server.
d) the traffic on the network to that server.
A two-tier architecture simply means that there are ________ computers involved in the service.
a) one
b) two
c) two to five
d) two or more
b) two
A web-browser connected to a web-server is an example of
a) multiprocessing
b) cluster computing
c) n-tier architecture
d) client-server technology
d) client-server technology
Because response time is considered an important measure by most Web users, it is often more practical to separate the database and page processing into a third computer system. This is an example of
a) multiprocessing
b) cluster computing
c) n-tier architecture
d) three-tier architecture
d) three-tier architecture