Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chap 4 notes

        Help!  

questions
answers
1. ____ are sequences of instructions for the computer. Computer programs Methods Platforms Result-based practices   Computer programs  
🗑
2. The term ____ describes the program functions to help the user operate the computer system. workgroup documentation single-user license user interface   documentation  
🗑
3. Since the 1950s, businesses have greatly increased their expenditures on ____ compared with ____. computer programs, system programs system programs, computer programs software, hardware hardware, software   software, hardware  
🗑
4. ____ is the set of programs designed to coordinate the activities and functions of the hardware and various programs throughout the computer system. Platform architecture Application software System architecture Systems software   Systems software  
🗑
5. ____ has the greatest potential to affect processes that add value to a business. System architecture Application software Documentation Systems software   Application software  
🗑
6. The ____ sphere of influence serves the needs of the firm in its interaction with its environment. personal workgroup enterprise global   enterprise  
🗑
7. Information systems that operate within the____ sphere of influence serve the needs of individual users. personal enterprise workgroup global   personal  
🗑
8. When two or more people work together to achieve a common goal, they form a(n) ____. personal sphere of influence workgroup enterprise sphere of influence application sphere of influence   workgroup  
🗑
9. A system with ____ is typical of a network of computers, such as a home network that has several computers ... a single computer with a single user a single computer with multiple users special-purpose computers multiple computers and multiple use   multiple computers and multiple users  
🗑
10. A(n) ____ is a set of computer programs that controls the computer hardware and acts as an interface with application programs. computer system operating system application system control system   operating system  
🗑
11. The ____ is the element of the operating system that allows individuals to access and command the computer system. user interface kernel application program interface ALU   user interface  
🗑
12. A(n) ____ requires that text commands be given to the computer to perform basic activities. graphical user interface command-based user interface workgroup utility program   command-based user interface  
🗑
13. A(n) ____ provides software developers with tools they use to build application software w/oinner workings of the OS and hardware. application program interface application service provider kernel personal productivity software   application program interface  
🗑
14. Virtual memory works by swapping programs or parts of programs between memory and one or more disk devices, a concept called ____. multitasking parallel processing paging scaling   paging  
🗑
15. The ability of the computer to handle an increasing number of concurrent users smoothly is called ____. multitasking scalability parallel processing paging   scalability  
🗑
16. ____ allows a user to run more than one application at the same time. Time-sharing Multitasking Paging Sharing   Multitasking  
🗑
17. ____ is the most recent version of Mac OS X. VirtualBox Snow Leopard Final Cut Chrome OS   Snow Leopard  
🗑
18. The ____ OS is distributed under the GNU General Public License and its source code is freely available to everyone. Linux Windows Mac OS X NetWare   Linux  
🗑
19. ____ is a Linux based operating system designed for netbooks and nettops. Snow Leopard Mac OS X Chrome OS NetWare   Chrome OS  
🗑
20. ____ environments typically have fewer virus and security problems than other OSs. Windows Mac OS X Linux Unix   Linux  
🗑
21. The ____ OS comes in four different versions: foundation, enterprise, mission critical, and technical. HP-UX MPE/iX Linux z/OS   HP-UX  
🗑
22. ____ systems are designed to perform specialized tasks. Linux z/OS Embedded HP-UX   Embedded  
🗑
23. ____ help to perform maintenance or correct problems with a computer system. Embedded systems System applications Utility programs ASPs   Utility programs  
🗑
24. ____ includes several versions that provide computing power for TV set-top boxes, automated industrial machines, media players, ...s, and business devices such as cash registers. Palm OS Windows Embedded Windows Mobile Linux   Windows Embedded  
🗑
25. ____ is software that allows different systems to communicate and transfer data back and forth. Operating system software Middleware Utility software Network software   Middleware  
🗑
26. A(n) ____ uses modular application services to allow users to interact with systems and systems to interact with each other. service-oriented architecture client-server architecture workgroup sphere of influence open-source software   service-oriented architecture  
🗑
27. ____ refers to a one-of-a-kind program that is not in the public domain. Application software Off-the-shelf software System software Proprietary software   Proprietary software  
🗑
28. ____ mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals. Proprietary software Off-the-shelf software Contract software Application software   Off-the-shelf software  
🗑
29. A(n) ____ is a company that can provide the software, support, and computer hardware on which to run the software from the user's facilities over a network. Internet service provider enterprise service provider application service provider syste   application service provider  
🗑
30. ____ provide a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. Spreadsheets Databases Graphics Word processing systems   Spreadsheets  
🗑
31. ____ applications can be used to write letters, holiday greeting cards, work reports, and term papers. Spreadsheet Word processing Database Graphics   Word processing  
🗑
32. ____ allows a spreadsheet to maximize or minimize a quantity subject to certain constraints. Optimization Paging Documentation Pipelining   Optimization  
🗑
33. After being entered into a ___, information can be manipulated and used to produce reports and documents. word processor database graphic design program spreadsheet   database  
🗑
34. ____ is designed to support teamwork, whether in one location or around the world. Personal application software Workgroup application software Enterprise application software Operating system software   Workgroup application software  
🗑
35. The term ____ refers to a set of integrated programs that manage a company's vital business operations for an entire multisite, global organization. personal application software workgroup application software enterprise resource planning software   enterprise resource planning software  
🗑
36. ____ are sets of keywords, symbols, and a system of rules for constructing statements by which humans can communicate instructions to be executed by a computer. Compilers Application service providers Programming languages Workgroups   Programming languages  
🗑
37. Assembly language is a ____ language. second generation first generation third generation fourth generation   second generation  
🗑
38. Query and database languages are ____ languages. first generation fourth generation second generation third generation   fourth generation  
🗑
39. A(n) ____ is a special software program that converts the programmer's source code into the machine-language instructions consisting of binary digits. translator compiler emulator interpreter   compiler  
🗑
40. A(n) ____ combines all the tools required for software engineering into one package translator compiler interpreter integrated development environment   integrated development environment  
🗑
41. A ___ is a defect in a computer program that keeps it from performing in the manner intended. system failure software bug Trojan Horse Virus   software bug  
🗑
42. ____ programming uses a graphical or visual interface for program development. Visual First generation Second generation Third generation   Visual  
🗑
43. C++ and Java are examples of ____ languages. procedural assembly object oriented programming machine   object oriented programming  
🗑
44. A(n) ____ is a language translator that carries out the operations called for by the source code, but does not produce a complete machine-language program. interpreter organizer compressor compiler   interpreter  
🗑
45. Many believe that open-source software is often ___ than commercial software. less reliable more reliable no different different   more reliable  
🗑
46. ____ is an example of open-source database software. Linux MySQL Mozilla Firefox Thunderbird   MySQL  
🗑
47. ____ is software that is made available to the public for free. Enterprise Application Software Freeware Application software Open-source software   Freeware  
🗑
48. The question of ____ is the biggest stumbling block to the acceptance of open-source software at the corporate level. reliability software support cost security   software support  
🗑
49. Software under the GPL is typically protected by a “____,” which requires that any copies of the work retain the same license. copyleft copyright license patent   copyleft  
🗑
50. ____ software lets one user run several programs or tasks at the same time (multitasking) and allows several users to use the same computer at the same time (time sharing). Memory management Network management Task-management File management   Task-management  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: zaltman