Using MIS Chapter 4 Flashcards
Which of the following statements is true of closed source projects?
a. Programmers can alter the closed source code based on their interests and goals.
b. Only users and developers are allowed to alter the source code in closed source projects.
c. Anyone can obtain the source code for a closed source project.
d. Only trusted programmers are allowed to make changes to a closed source project.
Only trusted programmers are allowed to make changes to a closed source project.
With open source, anyone can obtain the source code from the open source project’s Web site.
True
________ occurs when users move their activities, especially long-running transactions, across devices.
a. Cloud computing
b. Key logging
c. Roaming
d. Pharming
Roaming
A 64-bit, dual processor is needed to effectively utilize more than 4 GB of main memory.
True
Bits are grouped into 8-bit chunks called ________.
a. switches
b. bytes
c. nibbles
d. strings
bytes
With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.
a. PC virtualization
b. parallel computing
c. cloud computing
d. normalization
PC virtualization
Which of the following is the operating system designed by Apple?
a. Android
b. Linux
c. Mac OS
d. Unix
Mac OS
Native applications are sometimes called thick-client applications.
True
Which of the following memory devices is volatile in nature?
a. magnetic disk
b. cache
c. hard drive
d. optical disk
cache
The ________ is sometimes called “the brain” of the computer.
a. read-only memory
b. thumb drive
c. central processing unit
d. random access memory
central processing unit