Chapter 1 Review

In: Computers and Technology

Submitted By MrNoLongerAnon
Words 739
Pages 3
1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can’t find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting?
B. cat > Meeting

2. Before you make the note in Question 1, you decide to determine Friday’s date, so that you can include it in your note. What Linux command can you use to quickly determine the Friday’s date?
A. cal

3. While you are typing a command, you misspell the name of a file you want to specify with the command. Which of the following command line key combinations enables you to go back and fix your error?
A. Ctrl+b 4. You haven’t changed your user account password for several months and now decide to create a new password. Which of the following commands should you use?
D. passwd 5. You have forgotten the purpose of the –n option in the cat command. Which of the following can you enter at the Linux command line to find out what the –n option does when used with cat?
C. man cat

6. Which of the following is the UNIX distribution originally developed through AT&T Bell Labs?
D. System V

7. Which shell is used by Linux as the default command interpreter?
A. Bash shell 8. You need to type in a line of text to the end of a file called Annual_Report. Which of the following commands enables you to add the text?
C. cat >> Annual_Report

9. SSH can be used to ___________________.
B. log in remotely to another computer on a network 10. This is your first day on the job as a Linux server administrator and your boss gives you the password for root. What is root?
D. the administrative account that has complete access to a UNIX/Linux system 11. In your document files, you often put the date you created the file and the date you last modified it in the last two lines…...

Similar Documents

Chapter 10 Exercises Review Questions 1-10

...Chapter 10 Exercises Review Questions 1-10 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Then, Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is important to consider in implementing systems that are volume related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? Before selecting a system architecture, the analyst must consider the following issues: Enterprise resource planning (ERP) Initial cost and (TCO) Scalability Web integration Legacy system interface requirements Processing options Security issues 3. What is enterprise resource planning (ERP)? What is supply chain management? Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in house software and commercial packages. ERP also can extend to suppliers......

Words: 404 - Pages: 2

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Review Questions Chapter 1 and 2

...Chapter 1 Review Questions (1.1 - 1.7) 1.1 Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. a) Data: Known facts that can be recorded and that have implicit meaning. b) Database: Collection of related data. c) DBMS: Is a collection of programs that enables users to maintain a database. d) Database system: Is a compilation of the database and complete definition of the database structure and constrains. e) Database catalog: contains information such as the structure of each file, the type and storage format of each data item, and various constraints on the data f) Program-data independence: Is the structure of data files g) User view: A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored h) DBA: The Database Administrator or “DBA” is responsible for authorizing access to the database, coordinating and monitoring its use, and acquiring software and hardware resources as needed. i) End user: These are the people whose jobs require access to the database for querying, updating and generation reports. j) Canned transaction: These are standard types of querying and updates. k) Deductive database system: capabilities for defining deduction rules for inferencing new information......

Words: 3534 - Pages: 15

Chapter 1 Review Question

...Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off read data, as described in the chapter? 6. A user has opened up a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores the file to represent the text typed into the report? 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problems using this number. Which of the following determines, in part, what bits the computer stores in RAM to represents the number 123456789? 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of......

Words: 645 - Pages: 3

Intro to Business Review: Chapter 1

...1. What factors contribute to the rapid pace of change in business?  Is the pace likely to accelerate or decrease over the next decade? Why? Answer: Some key factors contributing to the rapid pace of change in business are the economy and Wall Street. The interest rates and loan terms have greatly changed businesses. It is harder to borrow money, as a small business especially. The job market has also changed businesses dramatically. I believe the pace will accelerate over the next decade. The economy is recovering from the recession of 2008 and the business are buying and selling again and the unemployment rate is declining. 2. What role does entrepreneurship play in the economy?  Who stands to gain from the success of individual entrepreneurs?  How do other parties benefit? Answer: Entrepreneurial enterprises can kick start an economy, creating great opportunity for everyone involved in the building, developing and manufacturing of the product . The downside is that it could force out competing business.     3. When did American business begin to concentrate on customer needs?  Why?   Answer: Business began to focus on the customer needs during the Marketing era. The reason was more intense competition, which gave consumers more choices. Because of this meeting customer needs became an imperative for business success.   4. How do nonprofit organizations compare to businesses?  What role do nonprofits play in the economy?  How do they......

Words: 322 - Pages: 2

Chapter 1 Review Questions

...1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet | c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte | b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word | c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) | a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable |e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. |d. The CPU must first find the file in the file system before reading the data. 6. A user has......

Words: 1372 - Pages: 6

Chapter 1 Review Psy 315

...Ch.1. Review Amber Hennrich May 26, 2014 12. Explain and give an example for each of the following types of variables: (a) equal-interval, (b) rank-order, (c) nominal, (d) ratio scale, (e) continuous. A) An equal-interval is a variable in which numbers stand for approximately equals amounts of what is being measured. Example: Grade Point Average B) A rank-order variable is numeric and the numbers stand only for the relative ranking. Example: A graduate standing in their class. Their GPA makes a big difference for instance if they stand first or second in the class. C) A nominal variable is not numeric and values are names or categories. Example: A nominal variable for gender would be female and male. D) A ratio scale is measured by equal-interval variable. An equal-interval variable has an absolute zero point on the ratio scale. An absolute zero point means there is an absence of the variable. Example: A number of cats an individual has. If one person has three and the other has six, you can say that they have three times the amount of that person. E) A continuous variable is a theory that you can have an infinite number between 2 variables. Example: An example of this would big age. You can say you are 12.5 years old. 15. Make (a) a frequency table and (b) a histogram. Then (c) describe the general shape of the distribution. A) Speeds | Frequency | Percent | 15-21 | 2 | 5% | 22-28 | 4 | 10% | 29-35 | 17 | 42.50% | 36-42 | 13 | 32.50% | ...

Words: 792 - Pages: 4

Nt1210 Chapter 1 Review Questions

...Chapter 1 Review Questions 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represent one binary digit d. Represent four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to Process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. d. The CPU must first find the file in the file system......

Words: 1374 - Pages: 6

Chapter 1-3 Computer Structure and Logic Review

...Chapter 1 review questions 1. Which of the following is an example of a PC? The 8088 processor marked the start of the home and office based PC’s given that it had a 1mb address limit making a more efficient machine. 2. Who is credited with the patent of the first computer? John V. Atanasoff was the first person accredited for the invention of the computer due to his use of modern digital switching techniques. 3. In the Von Neumann architecture, what two make up the CPU? In Von Neumann’s model of the CPU there are three components, only two are listed in this review and they are the control unit and the arithmetic unit. 4. What technology alleviates the problem of the “Von Neumann bottleneck”? in this chapter they explain the issue of bottlenecking like a highway, where the information sent and received traveled through a narrow highway on the original architecture. The solution to the problem was creating what is now referred to as Cache memory. 5. Which of the following are groups within the Von Neumann architecture? There are four groups to the basic architecture Working Storage, Permanent Storage, Output and Input devices. 6. What are the three main connections in a transistor. Transistors are made using the same architecture as a vacuum tube just in a much smaller and safer manner, these connections are called the “Gate” the “Drain” and the “conductor”. 7. MOSSFET is the most common type of what electronic component? MOSSFET (standing for......

Words: 2681 - Pages: 11

Database Solutions Chapter 1 Review Quest.

...Database Solutions by Thomas Connolly 2nd Edition Chapter 1 Introduction- Review questions 1.1 List four examples of database systems other than those listed in Section 1.1. Some examples could be: * A system that maintains component part details for a car manufacturer; * An advertising company keeping details of all clients and adverts placed with them; * A training company keeping course information and participants’ details; * An organization maintaining all sales order information. 1.2 Discuss the meaning of each of the following terms: (a) data For end users, this constitutes all the different values connected with the various objects/entities that are of concern to them. (b) database A shared collection of logically related data (and a description of this data), designed to meet the information needs of an organization. (c) database management system A software system that: enables users to define, create, and maintain the database and provides controlled access to this database. (d) application program A computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS. (e) data independence This is essentially the separation of underlying file structures from the programs that operate on them, also called program-data independence. (f) views. A virtual table that does not necessarily exist in the database but is generated by the DBMS from the......

Words: 4162 - Pages: 17

Business Management Chapter 1 Review Questions

...Chapter 1 – Subject Review Questions 1. I have worked for my current boss, Mr. Ford, in the field of youth social services for nearly a decade. Due to his leadership, I have remained with the agency throughout tumultuous periods. He has always challenged his employees to strive for quality of service at the greatest speed possible. Mr. Ford organizes employees to create a dynamic workforce capable of adapting to changes affected by the macroenvironment. In an effort to continue to win Requests for Proposal bids, Mr. Ford has consistently operated an efficient service program that is cost competitive with other service providers and fiscally sustainable. 2. One of the greatest ways that the Internet impacts my life on a daily basis involves how it has allowed knowledge to be shared instantaneously and with increasing accuracy. I am able to receive information about events and interests in real time. Instead of having to search libraries for dated information, as I did as a youth, I can find information that is relevant and current from trusted sources. Now it is possible to access peer-reviewed publications from esteemed institutions. Globalization, in conjunction with the Internet, has provided access to news and information from around the world. I enjoy reading articles from the perspectives of those of other nationalities and now, thanks to Google Translate, I can read articles that were written in foreign languages. 3. I have always admired Google for......

Words: 542 - Pages: 3

Chapter 1 Review Questions

...1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used for? A. Confidentiality: Information should only be accessible to its intended recipients. B. Integrity: Information should arrive the same as it was sent. C. Availability: Information should be available to those authorized to use it. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? A. The triangle would still be used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? A. Availability: Authorized users......

Words: 855 - Pages: 4

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Chapter 1 Review Questions

...CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services. 1-3 There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly. 1-7 Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200). Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the......

Words: 857 - Pages: 4

Chapter 1 Review

...Chapter 1 Review Activities 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? e. Terabyte f. Megabyte g. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? e. The CPU tells the RAM which address holds the data that the CPU wants to read. f. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. g. The smallest unit of data that RAM supplies back to the CPU is 1 bit. ...

Words: 1377 - Pages: 6