Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

3D052 CDC V2 Pt. 1

Non-URE related study questions.

QuestionAnswer
The memory storage of both data and programs is known as the stored program concept.
This is a blank ROM chip on which you can place items permanently. Programmable ROM (PROM)
This is a type of nonvolatile memory that can be erased electronically and reprogrammed. Flash memory or flash ROM
______ chips must be refreshed constantly or they lose their contents. Dynamic RAM (DRAM)
______ chips are much faster than DRAM chips because they are synchronized to the system clock. Synchronous DRAM (SDRAM)
______ chips are faster than SDRAM chips because they transfer data twice for each clock cycle, instead of just once. Double data rate SDRAM (DDR SDRAM)
DDR2 SDRAM transfers ____ times as much data Four
DDR3 SDRAM transfers data up to ____ times as much data per each clock cycle. Eight
These chips, hold their data without needing to be refreshed as long as power is supplied, thus are faster and more reliable than any variation of DRAM chips. Static RAM (SRAM)
This is a collection of data duplicating original values stored elsewhere or computed earlier, where the original data is expensive to fetch (time consuming data retrieval) or to compute. Cache memory
Memory in a PC is broken into four basic divisions: conventional, upper, high, and extended
This is the time it takes for memory to make data available. Memory access time
This is a system by which an operating system waits and monitors a device until the device is ready to read. Polled I/O
This refers to actively sampling the status of an external device by a client program as a synchronous activity. Polling
_____ systems don’t perform data integrity checks; however, parity systems will not accept ______ memory. Nonparity
_________ is a data integrity method that is used in high-end PCs and file servers. Error correction code memory (ECC)
With a ______ the application is shared between two users and would normally be located on the hard drive. Thin Client
This works directly on top of Ethernet and does not interface with higher level protocols such as transmission control protocol/internet protocol (TCP/IP). ATA over Ethernet (AoE)
This is an open source network protocol designed to connect storage devices and servers in a storage area network (SAN). ATA over Ethernet (AoE)
This carries the SCSI commands using TCP/IP. Internet Small Computer System Interface (iSCSI)
This is a gigabit network technology primarily used for storage networking. Fibre channel
This concept means that any single piece of data is stored in more than one location in the array. Mirroring
This concept means splitting data amongst more than one disk, so that it can be retrieved more quickly than if all the data had to be read from one disk. Striping
This uses striping to spread data, across several hard drives in an array. It has no redundancy and no error correction. RAID 0
In this RAID configuration, data is mirrored amongst the drives. It requires a minimum of two hard drives. RAID 1
This uses disk striping and error correction is achieved through Hamming Code parity checks to ensure that data is not corrupted. RAID 2
In this RAID level, each data byte is striped and written on several data disks. The stripe parity is generated when the data is written and placed on a parity disk, which is then checked when the data is read. RAID 3
This is identical to RAID 3, with the exception that data is striped a the block level, so that a complete block is kept together and written on one hard drive, then the next block of data would be written to another drive, and so on. RAID 4
In RAID __ data is striped with the parity information distributed amongst the drives, as opposed to all the parity information being located on one drive, so if one drive should go down, the array will continue to function and no data will be lost. RAID 5
RAID __ is similar to RAID 5, with the exception that it can tolerate up to two hard drive failures. RAID 6
In this hybrid RAID combination the data is mirrored across two drives, then it is striped onto two more drives. It is more expensive to implement, because for one drives worth of data, you are using four drives. RAID 1+0 or RAID 10
In this hybrid RAID concept the data is first striped, then it is mirrored. It provides high read and write performance, and is a good choice for those who seek high performance, but are not concerned with maximizing error correction. RAID 0+1
This hybrid RAID concept incorporates the byte striping and mirroring to increase fault tolerance. RAID 3+0 or RAID 30
This is the language used for number crunching. It is a scientific language with great capacity for precise numeric equations. It isn’t used very much because it is difficult to manipulate characters. FORmula TRANslation (FORTRAN)
This has been used for years in both the military and civilian communities. It is based on a well-defined restricted form of English and provides a convenient method of designing programs for commercial data processing applications. COmmon Business-Oriented Language (COBOL)
This was originally a programming language used to teach programming logic, but it quickly developed into an easy-to-use and very powerful programming language. Pascal
Modeled after the Pascal language, this HOL was intended to reduce maintenance costs of software. It uses reusable software components, meaning once you write a software routine, that routine is entered into a software library. Ada
These programming languages are one step easier for the computer to translate than HOLs. Instead of writing English-like statements, the programmer writes mnemonics. Assembler Languages
This language gives the programmer direct control over computer hardware, memory access, and processor actions. Machine Code
From the computer standpoint, this language is the most efficient because it doesn’t have to be translated. Machine Code
In these types of languages, no permanent object code is produced although the programmer writes the source code. Interpreter languages
This is the address of a file or resource accessible on the Internet. The type of file or resource depends on the Internet application protocol. A uniform resource locator (URL)
This is not a language; it is actually a set of syntax rules for creating semantically rich markup languages in a particular domain. In other words, you apply this to make new languages. The Extensible Markup Language (XML)
This enforces a strict separation between content or structure and the manner in which it is displayed because some HTML tags have no place in an XML document. Extensible HyperText Markup Language (XHML)
This is a meta-language in which one can define markup languages for documents. It provides a variety of markup syntaxes that can be used for many applications. Standard generalized markup language (SGML)
This is a multi-language environment for building, deploying, and running XML Web services and applications. .NET
This is an evolution of distributed computing and modular programming. It builds applications out of software services. Service oriented architecture (SOA)
This is the process of keeping track of a user’s activity across sessions of interaction with the computer system, be it local to that computer, or through a Web browser over the internet. Session Management
This is also known as the base. The base indicates the number of digits used in a particular numbering system. Radix
In the decimal numbering system, the _______ point is also called the decimal point. Fractional Point
These types of threats include hurricane, tornado, flood, and fire. Natural
These types of threats include operator error, sabotage, implant of malicious code, and terrorist attacks. Human
These types of threats include equipment failure, software error, telecommunications network outage, and electric power failure. Environmental
This establishes procedures to address cyber attacks against an organization’s IT system(s). The Cyber Incident Response Plan
This applies to major, usually catastrophic events that deny access to the normal facility for an extended period. Disaster Recovery Plan (DRP)
This provides the response procedures for occupants of a facility in the event of a situation posing a potential threat to the health and safety of personnel, the environment, or property. EAP
When selecting an offsite storage facility and vendor, what criteria you should consider? Geographic Area, Accessibility, Security, Environment, Cost
This type of backup backs up all selected files and folders. Full or normal backup
In this backup, only selected files and folders that have changed (have the archive flag set) are backed up. Differential backup
These backups only backup selected files and folders that have the archive flag set and then clears the archive flag. Incremental Backup
Created by: eeds6126