Module 1 Flashcards
For which of the following are operating systems responsible.
A) providing a safe and secure environment for program execution
B) providing word processing
C) controlling the hardware
D) providing email capability
E) providing an interface to users
A)
C)
E)
Which of the following accurately describe people involved in the development of systems?
A) A system builder is a stakeholder.
B) All stakeholders are users of the system and have the same view of the system.
C) The system owner is the team leader among the stakeholders.
D) Application Programmers choose the technology for a new system.
E) A systems analyst should be good at getting everyone to work together on the project.
A) E)
There are many different stakeholders of a system, including a system builder, all of whom have different roles and views of the system. Some stakeholders never use the system being developed. The systems analyst is considered the team leader of the stakeholders during a development project and should have both good problem solving skills as well as good interpersonal skills for managing everyone working together on the project. System designers choose the technology for the new system as part of their work of the development of the system.
Which of the following are true about a class diagram?
A) Aggregation relationships in a class diagram are represented by a diamond shape on the relationship line and document a relationship that exists between two classes who are known as a superclass and subclass.
B) The bottom section of the class rectangle contains behaviors or actions the class can have in the system.
C) A multiplicity of 1..* on a relationship line between two classes indicates a many-to-many relationship between classes.
D) A class diagram depicts data stored about an object in the system as well as the behaviors the object has in the system.
E) Attributes for a class are shown in the middle section of the class rectangle and describe data that will be stored about the class in the system.
B) D) E)
Which of the following are types of tests performed on application systems?
A) converse testing
B) unit testing
C) integration testing
D) performance testing
E) regression testing
B) C) D) E)
Which of the following statements are true regarding machine language and data representation in a computer system?
A) Machine language instructions are only used to run the operating system.
B) It takes 8 bits to represent a character using the Unicode data encoding scheme.
C) Numbers of bits or bytes are used to measure the storage capacity of a hard drive.
D) Bits are based on the binary number system and have a value of either -1 or 1.
E) There are 8 bytes in a bit.
C)
The processor executes machine language instructions continuously. Machine language instructions are used to process data, execute operating system functions and run application software. Inside the processor, data and instructions are represented by the on and off positions of micro-sized switches called transistors. We represent these on and off positions of the transistors in machine language using the binary number system, i.e. zeros and ones. Every instruction and piece of data can be represented by a series of these zeros and ones. A bit is used to represent the on or off position of one transistor. A byte is comprised of 8 bits and it takes one byte to represent a character in the English language. Numbers of bits or bytes are also used to measure the storage capacity of memory and storage devices such as hard drives.
The normal flow of sequential instruction execution within a program can be altered as a result of which of the following?
A) An exception
B) Fetching the next instruction in the program
C) An interrupt
D) pipelining
E) multi-core processing
A) C)
Cache memory does which of the following?
A) Slows down the processor
B) Keeps track of the address of the next instruction to execute
C) Contains a subset of main memory
D) Speeds up effective access to main memory for the processor.
E) Reduces the number of accesses to main memory
C) D) E)
Which of the following are part of the instruction cycle?
A) Load the program into memory
B) Advance the Program Counter to the next instruction
C) Clear the registers
D) Fetch the instruction from main memory
E) Decode the instruction (determine what the instruction will do.
B) D) E)
Which of the following are fields (parts) of a machine language instruction?
A) Instruction register
B) Program Counter
C) Function code
D) Operand specifier
E) Op-code
D) E)
Instructions consist of multiple parts, and the exact number depends on the instruction. All instructions have an operation code (op code) which describes what operation the instruction will perform. Optionally there may be one or more operand specifiers.
Information Technology is the practice of using computer hardware and software to provide __________.
A) pensions
B) inventory for a business
C) solutions to business oriented problems
D) technologies for business support
C) D)
Solutions, technologies and conversions are all products of IT efforts.
What type of memory is non-volatile, read-only memory?
A) RAM
B) PROM
C) Flash memory
D) ROM
E) EEPROM
B) D)
Which of the following statements are true regarding machine language and data representation in a computer system?
A) The binary number system is used to represent data and instructions in machine language.
B) It takes 32 bits to represent a character using the ASCII data encoding scheme.
C) There are 8 bits in a byte.
D) Transistors are switches that control the flow of electricity through the processor.
E) The processor executes machine language instructions continuously.
A) C) D) E)
The processor executes machine language instructions continuously. Inside the processor, data and instructions are represented by the on and off positions of micro-sized switches called transistors. We represent these on and off positions of the transistors in machine language using the binary number system, i.e. zeros and ones. Every instruction and piece of data can be represented by a series of these zeros and ones. A bit is used to represent the on or off position of one transistor. A byte is comprised of 8 bits and it takes one byte to represent a character in ASCII.
Which of the following are properties of a system?
A) May have input(s)
B) Consist of independent parts
C) Produce output(s)
D) Consist of interdependent parts
E) Accomplish a specific function
A) C) D) E)
Which of the following are true about a state transition diagram?
A) In a student information system, if a possible student account state is “past-due”, a triggering transition event into this account state could be a student paying their account in full before the due date.
B) A state can transition back to itself if the event triggering the transition leaves the object in the same state as before the transition was triggered.
C) The initial state and end state for an object are depicted in the same way in the state transition diagram.
D) State transitions are depicted inside the rounded rectangle labeled with the state name.
E) State transitions can be triggered by events that happen inside the information system.
B) E)
State transitions are depicted by arrows pointing from one state to another with the arrows labeled with a description of the triggering event. Only the state names are inside the rounded rectangles. An initial state is depicted by a small solid black circle. The final state is depicted by a small solid black circle with another circle surrounding it. In a student information system, a likely event to trigger a past-due account would be failing to make a payment before the due date, not making an on-time payment.
Which of the following would be classified as non-functional requirements for a proposed student information system?
A) The new system should be written in Java.
B) A student can lookup their current GPA.
C) User passwords must contain a letter, number and symbol.
D) An instructor can lookup the transcript of the students they advise during registration.
E) It should take no longer than 5 seconds for a student to pull up their class schedule.
A) C) E)*
Functionality that would be completed by a user in the system such as a student or instructor would be considered functional requirements of the system, not non-functional requirements.