Chapter Review

In: Computers and Technology

Submitted By TAntonich90
Words 253
Pages 2
1. Which of the following is true about 1 bit? . Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? . Terabyte b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? . 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) . Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable . Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? . The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. d. The CPU must first find the file in the file system before reading the…...

Similar Documents

Chapter Review

...CHAPTER 8 through 10 REVIEW The "hierarchical" fief-holding system in which vassals in turn had vassals owing them services was known as subinfeudation. The VIKINGS used iron weapons, had superior shipbuilding skills, did raids onto continent (they came from Scandinavia) , established settlements, aided growth of fief-holding., and in time - Christianity assimilated them into European civilization. In Western Europe, the chief political repercussion of frequent Viking raids was .an increase in the power of local aristocrats to whom threatened populations turned for effective protection. Feudalism of medieval Europe was primarily a complex system of vassalage by which the weak sought protection and sustenance from powerful local nobles. Feudalism in England under William I differed from feudalism in most other countries in that he required sub-vassals to swear allegiance to him. William of Normandy's survey of his new royal possessions in England was recorded in the Doomesday Book. By the thirteenth century, a previous acceptance of homosexuality by church and society had been replaced by Christian persecution of homosexuals due to all of the following: the writings of Thomas Aquinas; a rising tide of intolerance in Europe; the identification of homosexuals with other detested minority groups in society. The "agricultural revolution" of the High Middle Ages was in part brought about by a change from the two-field to the three-field system. The Magyars......

Words: 774 - Pages: 4

Chapter 6 Review Questions

...Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule by identifying dependencies, sequencing, and timing of activities. 2. How are WBS and project networks linked? Project networks are developed from the WBS. Work packages from the WBS are used to build the activities found in the project network. The network uses the time estimates from the WBS to generate dates for the project. Integration of the WBS and project network is crucial to effective project management. 3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS? Project networks depend on the WBS because work packages from the WBS are used to develop the project network. A network activity can include one or more work packages but all activity time estimates are derived from the task times in the work package. Unlike the project network, the WBS defines all the elements of the project in a hierarchical framework and establishes their relationships to project deliverables. 4. Why is slack important to the project......

Words: 541 - Pages: 3

Chapter Review

...End of Chapter Review and Programming Exercises 10212010 LIST OF REVIEW AND PROGRAMMING EXERCISES PER CHAPTER CHAPTER 1: ASSIGNED REVIEW AND PROGRAMMING EXERCISES Please complete these end of chapter review and programming exercises. They were selected because they are relevant to the competencies you must develop to complete the performance assessment. Complete R1.6, R1.7, R1.11, R1.13, R1.14, R1.18. Complete P1.1, P1.8, P1.10 CHAPTER 2: ASSIGNED REVIEW AND PROGRAMMING EXERCISES Please complete these end of chapter review and programming exercises. They were selected because they are relevant to the competencies you must develop to complete the performance assessment. Complete R2.1, R2.3, R2.4, R2.9, R.2.14, R.2.15 Complete P2.1, P2.2, P2.4, P2.5, P2.8, P2.9, P2.12, P2.13, P2.14, P2.19 CHAPTER 3: ASSIGNED REVIEW AND PROGRAMMING EXERCISES Please complete the following end of chapter review and programming exercises. They were selected because they are relevant to the competencies you must develop to complete the performance assessment. Complete R3.2, R3.3, R3.4, R3.7, R3.8, R3.9, R3.10, R3.11, R3.13, R3.18, R.3.21 Complete P3.1, P3.2, P3.3, P3.4, P3.5, P3.6, P3.9, P3.10, P3.12, P3.14, P.3.17, P3.23, P3.25 End of Chapter Review and Programming Exercises 10212010 CHAPTER 4: ASSIGNED REVIEW AND PROGRAMMING EXERCISES Please complete the following end of chapter review and programming exercises. They were selected because they are relevant to the......

Words: 1463 - Pages: 6

Chapter 4 Review

...Intro to Networking Chapter 4 Review 1.) B,C 2.) A,D 3.) A,C 4.) D 5.) B 6.) B 7.) A,B 8.) C 9.) A 10.) C 11.) C 12.) D 13.) A,D 14.) C 15.) A,B 16.) B,D 17.) D 18.) A,D 19.) C 20.) B,C,D Key Terms Electrical Circuit – A complete loop of material that conducts electricity. Frequency – When describing energy that acts like waves, the number of times that the entire waveform repeats per second. Amplitude – When describing energy that acts like waves, when graphing the waveform centered on the X axis, and graphing some kind of power ( for example, voltage) on the Y axis, the amplitude is the maximum height of the curve over the X axis. Phase – when describing energy that acts like waves, in a sine wave, the specific point or place in the repeating continuous wave. Bit Time – In an encoding scheme, the time period during which the encoding scheme sends an energy signal to represent 1 bit. Encoding Scheme – A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s. Unshielded Twisted-Pair (UTP) – A type of cabling that uses pairs of copper wires, twisted together, with no additional shielding from the effects of EMI. Core – In a fiber – optic cable the glass fiber in the center of the cable over which light can pass. Cladding – In a fiber-optic cable, the material around the core that helps direct light back into the core. Radio Waves – Electromagnetic energy in a particular range of frequencies (per......

Words: 397 - Pages: 2

Chapter 3 Review

...POWER Chapter Three Review > Taking Notes There are 5 items of preparation in considering your goals and objectives for a class.  What are they?  Explain each. * Identify the instructor’s and your goals for the course: meaning that you should know what the instructor wants you to know and learn by the end of their class as well as you knowing what you want to know and learn from the course. * Complete assignments before class: you should complete assignments ahead of class periods with the expectation of the day’s lecture being based upon the thought of your work already being done. The lessons should be done beforehand to have the ability to better understand next class’ lecture. * Accept the instructor: pay attention to the information that is being given despite the fact that the lecture may be boring or not fully understandable. Not all instructors are great lecturers, so with that in mind you have to pay attention to the information and take awesome notes. * Perform a preclass warm-up: this means to review what you’ve been taking notes on so far and where last class or lecture left off. You should basically refresh your mind and information to grasp what’s going on in your current class. * Choose the seat that promotes good note taking: Sit somewhere that inspires you to pay attention and understand what’s being fed to you. Choose a seat that gives good eye contact to let them know you’re present and understanding. The book lists 8 points for......

Words: 305 - Pages: 2

Nt1210 Chapter 4 Review

...Chapter 4 Review Multiple Choice 1. B & C 2. A & C 3. C & D 4. A & D 5. B 6. B 7. A & B 8. A 9. A 10. C 11. C 12. D 13. A & C 14. B 15. B 16. A & D 17. D 18. A & D 19. C 20. B, C & D Define Key Terms 1. Electrical Circuit - A complete loop of material that conducts electricity. 2. Frequency - When describing energy that acts like waves, the number of times that the entire waveform repeats per second. 3. Amplitude - When describing energy that acts like waves, when graphing the waveform centered on the X axis, and graphing some kind of power (for example, voltage) on the Y axis, the amplitude is the maximum height of the curve over the X axis. 4. Phase - When describing energy that acts like waves, in a sine wave, the specific point or place in the repeating continuous wave. 5. Bit Time - In an encoding scheme, the time period during which the encoding scheme sends an energy signal to represent 1 bit. 6. encoding scheme - A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s. 7. unshielded twisted-pair(UTP) - A type of cabling that uses pairs of copper wires, twisted together, with no additional shielding from the effects of EMI. 8. Core - In a fiber-optic cable, the glass fiber in the center of the cable over which light can pass. 9. Cladding - In a fiber-optic cable, the material around the core that helps direct light back into the core. 10. radio waves - Electromagnetic energy in a...

Words: 412 - Pages: 2

Chapter 6 Review

...Chapter 6: Wireless LANs Chapter Review Activities: 1. B  2. A  3. B & D  4. A & D  5. A  6. C  7. A & B  8. B  9. A & B  10. C  11. D  12. A & C  13. C  14. A & D  15. B & D  16. A, B & D  17. B  18. B  19. B & D  20. B & D Define the Key Terms: Coverage area – The space in which the wireless radio signals in one wireless LAN can effectively reach and be used to send and receive data between the WLAN’s Aps and its clients. Shared Bandwidth – A term referring to how some networks must share the right to send data by taking turns, which limits the total number of bits sent by all devices (the network’s total capacity). Wi-Fi – The created by the Wi-Fi Alliance as part of its overall wireless LAN branding and marketing strategy; this term has become somewhat synonymous with wireless LAN over time. LAN edge – A reference to the part of the campus LAN with the end-user devices and the switches to which they connect, through an Ethernet switch or a wireless LAN access point, that contains the Largest number of physical links. WLAN Hotspot – A location, typically in a business like a retailer or restaurant, where customers can come and go and where the company offers a wireless LAN plus Internet access to its customers, often for free. Basic Service Set – In wireless LANs, a single wireless access point (AP) and the client devices that send data to/from that AP. Extended Service Set – A wireless...

Words: 441 - Pages: 2

Introduction to Business Chapter Reviews

...Corrie Sue Bettles Chapter One Business Now: Change Is the Only Constant Review Questions 1. What factors contribute to the rapid pace of change in business? Is the pace likely to accelerate or decrease over the next decade? Why? Industries, and technologies rise and the also fall sometimes. In the next decade most Industries and Technologies will accelerate with the common buying of things. 2. What role does entrepreneurship play in the economy? Who stands to gain from the success of individual entrepreneurs? How do other parties benefit? Entrepreneurship plays a somewhat big thing for the economy. The employees of the entrepreneurship are the ones that gain from the success of the individual entrepreneurs. Other parties benefit by this, is because they get to take credit of what entrepreneurs should be getting. 3. When did American business begin to concentrate on customer needs? Why? The relationship era is when American businesses begin to concentrate on customer needs. That way they could keep building up their businesses by word of mouth from the customers. 4. How do nonprofit organizations compare to businesses? What role do nonprofits play in the economy? How do they interact with businesses? Nonprofit organizations play a critical role in the economy, often working hand in hand with businesses to improve the quanity of life in our society. Nonprofit organizations are still businesses in every other......

Words: 658 - Pages: 3

Nt1210 Chapter 3 Review

...Chapter 3 Review 1. Which of the following is true about a TCP/IP network? * b. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. Which of the following terms is NOT a common synonym for TCP/IP model? (Choose two answers.) * c. Ethernet * d. TCP/IP mapping 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) * a. It exists as a written document. * c. it has been passed through some form of review and approval or certification process. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) * b. International standard documents have been reviewed more thoroughly. * d. International standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) * b. The data link layer sits lower in the model than the transport layer. * c. The physical layer sits just below the data link layer. * d. The network layer sits in the middle of the five layers. 6. The TCP/IP model refers to standards other than those the IETF defines in RFC’s. Which of these standards groups is typically the source of external......

Words: 1157 - Pages: 5

Ehr Chapter 7 Review

...Chapter 7 Review, Page 300 1. A problem list is an up-to-date list of the diagnoses and conditions that affect a particular patient’s care. 2. The idea of a problem list is to ensure that everyone who touches a patient knows what conditions are present. 3. Using a problem list is easy for clinicians to view active and history of problems. Most clinical information recorded in the charts are related to one or more problems. Problem lists are used to track both acute and chronic conditions. It helps clinicians remember to follow up on conditions from previous visits. They actually are required to use a problem list. Maintaining a problem list is a requirement for accreditation by JCAHO. 4. Wellness conditions on the problem list are used to generate preventative care recommendations for healthy patients. It is based on age and sex of the patient and are used in health maintenance and preventative screening programs to keep patients healthy. 5. The data that appears in the manage tab comes from previous encounters or patient visits. 6. Finding a citing means to bring a finding to the current encounter, usually as a follow up to a previous visit. 7. Lab values means to compare the change of certain test components over a period of time. 8. To graph a patient’s weight, all you need to do is click on the graph menu at the very top of the screen to the left, and click weight. 9. Anything with numerical values can be graphed. 10. A......

Words: 368 - Pages: 2

Chapter Review

...Graduate Studies Central Philippine University Jaro, Iloilo City Chapter Two and Three of Mishkin’s The Economics of Money, Banking and Financial Market Chapter Review Faculty, College of Business and Accountancy Graduate Programs Central Philippine University Iloilo City In partial fulfilment Of the Course Requirements In Philippine Financial System MBA 612a Presented by: JOYNEN A. BALDEVARONA July 24, 2015 Chapter 2: An Overview of the Financial System This chapter gives an overview of the financial markets and institutions as well as explain the concept and role of financial intermediaries in the economy. According to Mishkin, there are six basic functions the Financial system performs. These functions are as follows: 1. Borrowing and Lending Financial Market can channel funds from savers to borrowers either through direct finance, in which borrowers borrow funds directly from the lenders by selling them securities or through indirect finance which involves financial intermediaries that stand between the lender (savers) and the borrower (spenders) and help transfer funds from one to another. Mishkin also pointed out in this chapter that firms in major developed countries have traditionally relied more on indirect than direct financing in obtaining their borrowed funds. 2. Price Determination 3. Information Aggregation and Coordination 4. Risk Sharing 5. Liquidity 6. Effiency In this chapter, financial markets were also classified into four......

Words: 1796 - Pages: 8

Chapter 2 Review Question

...Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review allows the producer to......

Words: 334 - Pages: 2

Chapter 1 Review

...Chapter 1 Review Activities 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? e. Terabyte f. Megabyte g. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? e. The CPU tells the RAM which address holds the data that the CPU wants to read. f. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. g. The smallest unit of data that RAM supplies back to the CPU is 1 bit. ...

Words: 1377 - Pages: 6

Chapter Review

...FACULTY OF TECHNOLOGY MANAGEMENT AND TECHOPRENEURSHIP BACHELOR OF TECHNOLOGY MANAGEMENT (HIGH TECH MARKETING) 1BTMM SEMESTER II SESSION 1 2015/2016 BTMP 1063: HR MANANGEMENT & TECHNOLOGY CHAPTER REVIEW: EFFECTIVE DISCIPLINE AND DOMESTIC INQUIRY PROCEDURES PREPARED FOR: PUAN EDNA BINTI BUYONG PREPARED BY: NO. | NAME | MATRIX NO. | 1. | TOH HUI LING | B061510068 | DATE O,F SUBMISSION : 23RD MARCH 2016 Chapter 20: Effective Discipline and Domestic Inquiry Procedures The purpose of discipline is to encourage employees to meet established standards of job performance and behaviour. This means all employees are expected to adhere to rules and regulations. Discipline is actually a form of training. When employees get more enjoyment from their work and feel that they are part of the team they will tend to follow rules and regulations willingly. Discipline action should only be used as a last resort and employees should be encouraged to practise self-discipline. Whether an employee is terminated or dismissed, however, the Industrial Court will proceed to hear the case as a dismissal if it is referred to the Court. Termination arises out of breach of contract and an employer has the right to terminate an employee if he has breached the terms of his contract. If the employees would not be able to perform his duties and if there is no other suitable work for the employees, the employer has the right to terminate the employee’s service. The right to dismiss......

Words: 2218 - Pages: 9

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3

Vai Anitta – HD – DUB/LEG Online | The Thinning: New World Order | HD Bilal: A New Breed Of Hero