click below
click below
Normal Size Small Size show me how
3D052 CDC V2 Pt. 1
Non-URE related study questions.
Question | Answer |
---|---|
The memory storage of both data and programs is known as the | stored program concept. |
This is a blank ROM chip on which you can place items permanently. | Programmable ROM (PROM) |
This is a type of nonvolatile memory that can be erased electronically and reprogrammed. | Flash memory or flash ROM |
______ chips must be refreshed constantly or they lose their contents. | Dynamic RAM (DRAM) |
______ chips are much faster than DRAM chips because they are synchronized to the system clock. | Synchronous DRAM (SDRAM) |
______ chips are faster than SDRAM chips because they transfer data twice for each clock cycle, instead of just once. | Double data rate SDRAM (DDR SDRAM) |
DDR2 SDRAM transfers ____ times as much data | Four |
DDR3 SDRAM transfers data up to ____ times as much data per each clock cycle. | Eight |
These chips, hold their data without needing to be refreshed as long as power is supplied, thus are faster and more reliable than any variation of DRAM chips. | Static RAM (SRAM) |
This is a collection of data duplicating original values stored elsewhere or computed earlier, where the original data is expensive to fetch (time consuming data retrieval) or to compute. | Cache memory |
Memory in a PC is broken into four basic divisions: | conventional, upper, high, and extended |
This is the time it takes for memory to make data available. | Memory access time |
This is a system by which an operating system waits and monitors a device until the device is ready to read. | Polled I/O |
This refers to actively sampling the status of an external device by a client program as a synchronous activity. | Polling |
_____ systems don’t perform data integrity checks; however, parity systems will not accept ______ memory. | Nonparity |
_________ is a data integrity method that is used in high-end PCs and file servers. | Error correction code memory (ECC) |
With a ______ the application is shared between two users and would normally be located on the hard drive. | Thin Client |
This works directly on top of Ethernet and does not interface with higher level protocols such as transmission control protocol/internet protocol (TCP/IP). | ATA over Ethernet (AoE) |
This is an open source network protocol designed to connect storage devices and servers in a storage area network (SAN). | ATA over Ethernet (AoE) |
This carries the SCSI commands using TCP/IP. | Internet Small Computer System Interface (iSCSI) |
This is a gigabit network technology primarily used for storage networking. | Fibre channel |
This concept means that any single piece of data is stored in more than one location in the array. | Mirroring |
This concept means splitting data amongst more than one disk, so that it can be retrieved more quickly than if all the data had to be read from one disk. | Striping |
This uses striping to spread data, across several hard drives in an array. It has no redundancy and no error correction. | RAID 0 |
In this RAID configuration, data is mirrored amongst the drives. It requires a minimum of two hard drives. | RAID 1 |
This uses disk striping and error correction is achieved through Hamming Code parity checks to ensure that data is not corrupted. | RAID 2 |
In this RAID level, each data byte is striped and written on several data disks. The stripe parity is generated when the data is written and placed on a parity disk, which is then checked when the data is read. | RAID 3 |
This is identical to RAID 3, with the exception that data is striped a the block level, so that a complete block is kept together and written on one hard drive, then the next block of data would be written to another drive, and so on. | RAID 4 |
In RAID __ data is striped with the parity information distributed amongst the drives, as opposed to all the parity information being located on one drive, so if one drive should go down, the array will continue to function and no data will be lost. | RAID 5 |
RAID __ is similar to RAID 5, with the exception that it can tolerate up to two hard drive failures. | RAID 6 |
In this hybrid RAID combination the data is mirrored across two drives, then it is striped onto two more drives. It is more expensive to implement, because for one drives worth of data, you are using four drives. | RAID 1+0 or RAID 10 |
In this hybrid RAID concept the data is first striped, then it is mirrored. It provides high read and write performance, and is a good choice for those who seek high performance, but are not concerned with maximizing error correction. | RAID 0+1 |
This hybrid RAID concept incorporates the byte striping and mirroring to increase fault tolerance. | RAID 3+0 or RAID 30 |
This is the language used for number crunching. It is a scientific language with great capacity for precise numeric equations. It isn’t used very much because it is difficult to manipulate characters. | FORmula TRANslation (FORTRAN) |
This has been used for years in both the military and civilian communities. It is based on a well-defined restricted form of English and provides a convenient method of designing programs for commercial data processing applications. | COmmon Business-Oriented Language (COBOL) |
This was originally a programming language used to teach programming logic, but it quickly developed into an easy-to-use and very powerful programming language. | Pascal |
Modeled after the Pascal language, this HOL was intended to reduce maintenance costs of software. It uses reusable software components, meaning once you write a software routine, that routine is entered into a software library. | Ada |
These programming languages are one step easier for the computer to translate than HOLs. Instead of writing English-like statements, the programmer writes mnemonics. | Assembler Languages |
This language gives the programmer direct control over computer hardware, memory access, and processor actions. | Machine Code |
From the computer standpoint, this language is the most efficient because it doesn’t have to be translated. | Machine Code |
In these types of languages, no permanent object code is produced although the programmer writes the source code. | Interpreter languages |
This is the address of a file or resource accessible on the Internet. The type of file or resource depends on the Internet application protocol. | A uniform resource locator (URL) |
This is not a language; it is actually a set of syntax rules for creating semantically rich markup languages in a particular domain. In other words, you apply this to make new languages. | The Extensible Markup Language (XML) |
This enforces a strict separation between content or structure and the manner in which it is displayed because some HTML tags have no place in an XML document. | Extensible HyperText Markup Language (XHML) |
This is a meta-language in which one can define markup languages for documents. It provides a variety of markup syntaxes that can be used for many applications. | Standard generalized markup language (SGML) |
This is a multi-language environment for building, deploying, and running XML Web services and applications. | .NET |
This is an evolution of distributed computing and modular programming. It builds applications out of software services. | Service oriented architecture (SOA) |
This is the process of keeping track of a user’s activity across sessions of interaction with the computer system, be it local to that computer, or through a Web browser over the internet. | Session Management |
This is also known as the base. The base indicates the number of digits used in a particular numbering system. | Radix |
In the decimal numbering system, the _______ point is also called the decimal point. | Fractional Point |
These types of threats include hurricane, tornado, flood, and fire. | Natural |
These types of threats include operator error, sabotage, implant of malicious code, and terrorist attacks. | Human |
These types of threats include equipment failure, software error, telecommunications network outage, and electric power failure. | Environmental |
This establishes procedures to address cyber attacks against an organization’s IT system(s). | The Cyber Incident Response Plan |
This applies to major, usually catastrophic events that deny access to the normal facility for an extended period. | Disaster Recovery Plan (DRP) |
This provides the response procedures for occupants of a facility in the event of a situation posing a potential threat to the health and safety of personnel, the environment, or property. | EAP |
When selecting an offsite storage facility and vendor, what criteria you should consider? | Geographic Area, Accessibility, Security, Environment, Cost |
This type of backup backs up all selected files and folders. | Full or normal backup |
In this backup, only selected files and folders that have changed (have the archive flag set) are backed up. | Differential backup |
These backups only backup selected files and folders that have the archive flag set and then clears the archive flag. | Incremental Backup |