CHAPTER 2: An Introduction to System Concepts Flashcards
From a systems perspective, how would you classify a computer operating system?
a) A tangible system
b) A physical system
c) A conceptual system
d) A perceptible system
c) A conceptual system
Anything outside the system boundary represents the _____________ that the system operates.
a) interface
b) subsystem
c) environment
d) super system
c) environment
A large organization’s IT system might have specific programs such as marketing, manufacturing, purchasing, inventory, finance, and accounting. These are considered ____________ to the larger IT system.
a) interfaces
b) subsystems
c) the environment
d) super systems
b) subsystems
The division of a system or subsystem into its components and linkages is called
a) itemization
b) reconstruction
c) decomposition
d) categorization
c) decomposition
What is not part of an abstract description of system architecture?
a) system constraints
b) system interconnections
c) linkages among the components
d) physical location of the servers
d) physical location of the servers
Which of the following are not input devices?
a) stylus
b) headphones
c) touch screen
d) mouse and keyboard
b) headphones
The system architecture representation of the flow and processing of data within an organization is called
a) three-tier architecture
b) application architecture
c) flow control architecture
d) customer oriented architecture
b) application architecture
Scalability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
a) handle a growing amount of work.
Information availability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
b) allow access to information when it is needed.
Data security is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
c) protect data against unauthorized access or modification.
System administration is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
d) allow configuration, monitoring, and maintaining operation.
In a client-server architecture, the only limitations to running multiple applications on a single server are the potential slowdowns that may result from the load on the server computer and
a) traffic on the Internet.
b) load on client computer.
c) users who open many web browsers.
d) the traffic on the network to that server.
d) the traffic on the network to that server.
A two-tier architecture simply means that there are ________ computers involved in the service.
a) one
b) two
c) two to five
d) two or more
b) two
A web-browser connected to a web-server is an example of
a) multiprocessing
b) cluster computing
c) n-tier architecture
d) client-server technology
d) client-server technology
Because response time is considered an important measure by most Web users, it is often more practical to separate the database and page processing into a third computer system. This is an example of
a) multiprocessing
b) cluster computing
c) n-tier architecture
d) three-tier architecture
d) three-tier architecture
The protocol that makes communication between a Web server and a database application possible is called
a) SQL
b) HTTP
c) Database Control Language
d) Common Gateway Interface
d) Common Gateway Interface
The organization’s internal network, isbcommonly called a(n)
a) intranet
b) employee network
c) corporation network
d) organizational network
a) intranet
Internet standards such as _______ allow the easy identification of relevant data within data streams between interconnected systems, making these applications possible and practical.
a) XML
b) FTP
c) SSH
d) HTTPS
a) XML
What is not a benefit of cloud services?
a) Backup and offsite storage
b) Additional computing capability when and where it is needed
c) Lower hardware and software investments
d) Added security
d) Added security
______________ is software designed to handle potential incompatibilities between the application software that resides on different equipment.
a) Middleware
b) Versioning software
c) Compatibility software
d) Application interface software
a) Middleware