Study Guides (400,000)
CA (150,000)
York (10,000)
ITEC (100)
Final

ITEC 1000 Lecture Notes - Lecture 2: John Wiley & Sons, Data Security, MultiprocessingExam


Department
Information Technology
Course Code
ITEC 1000
Professor
Peter Khaiter
Study Guide
Final

This preview shows pages 1-2. to view the full 8 pages of the document.
Copyright © 2013 John Wiley & Sons, Inc.
Chapter 2 An Introduction to System Concepts
1) From a systems perspective, how would you classify a computer operating system?
a) A tangible system
b) A physical system
c) A conceptual system
d) A perceptible system
Section 2.1 The General Concept of Systems
2) Anything outside the system boundary represents the _____________ that the system
operates.
a) interface
b) subsystem
c) environment
d) super system
Section 2.1 The General Concept of Systems
3) A large organization’s IT system might have specific programs such as marketing,
manufacturing, purchasing, inventory, finance, and accounting. These are considered
____________ to the larger IT system.
a) interfaces
b) subsystems
c) the environment
d) super systems
Section 2.1 The General Concept of Systems
4) The division of a system or subsystem into its components and linkages is called
a) itemization
b) reconstruction
c) decomposition
d) categorization
Section 2.1 The General Concept of Systems
5) What is not part of an abstract description of system architecture?
a) system constraints
b) system interconnections
c) linkages among the components
d) physical location of the servers

Only pages 1-2 are available for preview. Some parts have been intentionally blurred.

Copyright © 2013 John Wiley & Sons, Inc.
Section 2.1 The General Concept of Systems
6) Which of the following are not input devices?
a) stylus
b) headphones
c) touch screen
d) mouse and keyboard
Section 2.2 IT System Architectures
7) The system architecture representation of the flow and processing of data within an
organization is called
a) three-tier architecture
b) application architecture
c) flow control architecture
d) customer oriented architecture
Section 2.2 IT System Architectures
8) Scalability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
Section 2.2 IT System Architectures
9) Information availability is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
Section 2.2 IT System Architectures
10) Data security is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
You're Reading a Preview

Unlock to view full version

Only pages 1-2 are available for preview. Some parts have been intentionally blurred.

Copyright © 2013 John Wiley & Sons, Inc.
Section 2.2 IT System Architectures
11) System administration is the ability of a system to
a) handle a growing amount of work.
b) allow access to information when it is needed.
c) protect data against unauthorized access or modification.
d) allow configuration, monitoring, and maintaining operation.
Section 2.2 IT System Architectures
12) In a client-server architecture, the only limitations to running multiple applications on a
single server are the potential slowdowns that may result from the load on the server computer
and
a) traffic on the Internet.
b) load on client computer.
c) users who open many web browsers.
d) the traffic on the network to that server.
Section 2.2 IT System Architectures
13) A two-tier architecture simply means that there are ________ computers involved in the
service.
a) one
b) two
c) two to five
d) two or more
Section 2.2 IT System Architectures
14) A web-browser connected to a web-server is an example of
a) multiprocessing
b) cluster computing
c) n-tier architecture
d) client-server technology
Section 2.2 IT System Architectures
You're Reading a Preview

Unlock to view full version