The Case for Reexamining Integrated File System Design
- 格式:pdf
- 大小:33.75 KB
- 文档页数:4
mis12-信息系统复习参考5Management Information Systems, 12e (Laudon)Chapter 5 IT Infrastructure and Emerging Technologies1) IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.Answer: FALSEDiff: 1 Page Ref: 165AACSB: Use of ITCASE: ContentObjective: 5.12) Client/server computing is a widely used form of centralized processing.Answer: FALSEDiff: 2 Page Ref: 168AACSB: Use of ITCASE: ContentObjective: 5.13) In green computing, reducing computer power consumption is a top priority. Answer: TRUEDiff: 1 Page Ref: 184AACSB: Use of ITCASE: ContentObjective: 5.34) N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user.Answer: TRUEDiff: 3 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.15) Application server software is responsible for locating and managing stored Web pages. Answer: FALSEDiff: 2 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.126) An application server may reside on the same computer as a Web server or on its own dedicated computer.Answer: TRUEDiff: 2 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.17) Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.Answer: TRUEDiff: 2 Page Ref: 169-170AACSB: Use of ITCASE: ContentObjective: 5.28) The mainframe market has grown steadily over the past decade.Answer: TRUEDiff: 2 Page Ref: 177AACSB: Use of ITCASE: ContentObjective: 5.29) The operating system is used to manage the computer's activities.Answer: TRUEDiff: 1 Page Ref: 177AACSB: Use of ITCASE: ContentObjective: 5.110) Like an ASP, a Web hosting service provides shared applications to subscribed users, but does this through a Web portal.Answer: FALSEDiff: 2 Page Ref: 180AACSB: Use of ITCASE: ContentObjective: 5.111) SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.Answer: TRUEDiff: 2 Page Ref: 180AACSB: Use of ITCASE: ContentObjective: 5.1312) Autonomic computing is implemented primarily with enterprise or ISP servers. Answer: FALSEDiff: 2 Page Ref: 185AACSB: Use of ITCASE: ContentObjective: 5.313) Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses.Answer: TRUEDiff: 1 Page Ref: 188AACSB: Use of ITCASE: ContentObjective: 5.414) Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.Answer: TRUEDiff: 2 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.415) Whereas XML is limited to describing how data should be presented in the form of Web pages, HTML can perform presentation, communication, and data storage tasks. Answer: FALSEDiff: 1 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.416) Hypertext markup language specifies how text, graphics, video, and sound are placed ona Web page document.Answer: TRUEDiff: 1 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.417) The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.Answer: TRUEDiff: 2 Page Ref: 190AACSB: Use of ITCASE: ContentObjective: 5.4418) Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software.Answer: FALSEDiff: 2 Page Ref: 191AACSB: Use of ITCASE: ContentObjective: 5.419) Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.Answer: TRUEDiff: 1 Page Ref: 194AACSB: Use of ITCASE: ContentObjective: 5.520) TCO refers to the original cost of purchased technology: both hardware and software. Answer: FALSEDiff: 1 Page Ref: 195AACSB: Use of ITCASE: ContentObjective: 5.521) Which of the following is NOT an IT infrastructure service component?A) operating system softwareB) computing platforms to provide a coherent digital environmentC) physical facility management to manage the facilities housing physical componentsD) IT management services to plan and develop the infrastructure and provide project managementAnswer: ADiff: 1 Page Ref: 165-166AACSB: Use of ITCASE: ContentObjective: 5.122) Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers?A) networkingB) telephoneC) VOIPD) telecommunicationsAnswer: DDiff: 1 Page Ref: 164AACSB: Use of ITCASE: ContentObjective: 5.1523) Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) Cloud Computing Era (2) Client/Server, (3) Enterprise Era, (4) Personal Computer, and (5) Mainframe and Minicomputer.A) 4, 5, 3, 2, 1B) 5, 4, 2, 3, 1C) 4, 5, 2, 3, 1D) 5, 4, 2, 1, 3Answer: ADiff: 2 Page Ref: 166-170AACSB: Analytic SkillsCASE: SynthesisObjective: 5.224) The introduction of the minicomputerA) allowed computers to be customized to the specific needs of departments or business units.B) enabled decentralized computing.C) offered new, powerful machines at lower prices than mainframes.D) all of the above.Answer: DDiff: 2 Page Ref: 168AACSB: Use of ITCASE: ContentObjective: 5.225) A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)A) service-oriented architecture.B) on-demand architecture.C) multi-tiered client/server architecture.D) two-tiered client/server architecture.Answer: DDiff: 1 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.226) In a multi-tiered networkA) the work of the entire network is centralized.B) the work of the entire network is balanced over several levels of servers.C) processing is split between clients and servers.D) processing is handled by multiple, geographically remote clients.Answer: BDiff: 1 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.2627) Interpretations of Moore's law assert thatA) computing power doubles every 18 months.B) transistors decrease in size 50% every two years.C) data storage costs decrease by 50% every 18 months.D) none of the above.Answer: ADiff: 2 Page Ref: 169-171AACSB: Use of ITCASE: ContentObjective: 5.228) Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades?A) network economicsB) law of mass digital storage and Moore's lawC) declining communications costs, universal standards, and the InternetD) all of the aboveAnswer: DDiff: 2 Page Ref: 170-174AACSB: Use of ITCASE: ContentObjective: 5.529) Today's nanotechnology-produced computer transistors are roughly equivalent in size toA) the width of a fingernail.B) a human hair.C) a virus.D) an atom.Answer: CDiff: 2 Page Ref: 171AACSB: Reflective ThinkingCASE: ContentObjective: 5.230) Specifications that establish the compatibility of products and the ability to communicate in a network are calledA) network standards.B) telecommunications standards.C) technology standards.D) Internet standards.Answer: CDiff: 2 Page Ref: 174AACSB: Use of ITCASE: ContentObjective: 5.17831) ________ unleash powerful economies of scale and result in declines in manufactured computer products.A) Internet and web technologiesB) Technology standardsC) Linux and open-source softwareD) Client/server technologiesAnswer: BDiff: 2 Page Ref: 174AACSB: Use of ITCASE: ContentObjective: 5.232) The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms isA) Unix.B) Linux.C) OS X.D) COBOL.Answer: ADiff: 3 Page Ref: 175AACSB: Use of ITCASE: ContentObjective: 5.233) The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers isA) TCP/IPB) COBOLC) EthernetD) ASCIIAnswer: CDiff: 2 Page Ref: 175AACSB: Use of ITCASE: ContentObjective: 5.234) Software that manages the resources of the computer is calledA) operating system software.B) application software.C) data management software.D) network software.Answer: ADiff: 1 Page Ref: 177AACSB: Use of ITCASE: ContentObjective: 5.1935) A SAN is a ________ network.A) server areaB) storage areaC) scalable architectureD) service-oriented architectureAnswer: BDiff: 1 Page Ref: 180AACSB: Use of ITCASE: ContentObjective: 5.136) The leading networking hardware providers includeA) Dell, HP/Compaq, and IBM.B) Cisco, Alcatel-Lucent, and Nortel.C) Seagate, Maxtor, and Western Digital.D) IBM, Oracle, and Sun.Answer: BDiff: 1 Page Ref: 177AACSB: Use of ITCASE: ContentObjective: 5.137) As referred to in the text, legacy systems areA) traditional mainframe-based business information systems.B) electronic spreadsheets used on a PC.C) any pre-1990 Wintel systems.D) systems found on older ASPs.Answer: ADiff: 1 Page Ref: 181AACSB: Use of ITCASE: ContentObjective: 5.138) Legacy systems are still used because theyA) can only be run on the older mainframe computers.B) are too expensive to redesign.C) integrate well using new Web services technologies.D) contain valuable data that would be lost during redesign. Answer: BDiff: 1 Page Ref: 181AACSB: Use of ITCASE: ContentObjective: 5.11039) Which of the following is NOT an example of the emerging mobile computing platforms?A) netbooksB) the KindleC) cell phonesD) CRMAnswer: DDiff: 1 Page Ref: 181AACSB: Use of ITCASE: ContentObjective: 5.340) Connecting geographically remote computers in a single network to create a "virtual supercomputer" is calledA) co-location.B) edge computing.C) grid computing.D) utility computing.Answer: CDiff: 1 Page Ref: 182AACSB: Use of ITCASE: ContentObjective: 5.341) The business case for using grid computing involves all of the following EXCEPTA) cost savings.B) increased accuracy.C) speed of computation.D) agility.Answer: BDiff: 2 Page Ref: 182AACSB: Analytic SkillsCASE: AnalysisObjective: 5.342) Which of the following does grid computing utilize to create enormous supercomputing power?A) massive unused data centersB) underutilized mainframe computersC) networked computers with idle resourcesD) networks with low usageAnswer: CDiff: 2 Page Ref: 182AACSB: Use of ITCASE: ContentObjective: 5.343) The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is calledA) cloud computing.B) autonomic computing.C) virtualization.D) multicore processing.Answer: ADiff: 2 Page Ref: 183AACSB: Use of ITCASE: ContentObjective: 5.344) Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?A) on-demandB) gridC) edgeD) autonomicAnswer: ADiff: 2 Page Ref: 184AACSB: Use of ITCASE: ContentObjective: 5.345) An example of autonomic computing isA) spyware protection software that runs and updates itself automatically.B) software programmed to run on any hardware platform.C) cell phones taking on the functions of handheld computers.D) programming languages that allow non-programmers to create custom applications. Answer: ADiff: 2 Page Ref: 185AACSB: Analytic SkillsCASE: AnalysisObjective: 5.346) An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is calledA) grid computing.B) utility computing.C) virtualization.D) autonomic computing.Answer: DDiff: 2 Page Ref: 185AACSB: Use of ITCASE: ContentObjective: 5.347) Which type of software is created and updated by a worldwide community of programmers and available for free?A) software packagesB) mashupsC) outsourcedD) open sourceAnswer: DDiff: 1 Page Ref: 187AACSB: Use of ITCASE: ContentObjective: 5.448) Linux isA) primarily concerned with the tasks of end users.B) designed for specific machines and specific microprocessors.C) an example of open-source software.D) especially useful for processing numeric data.Answer: CDiff: 2 Page Ref: 188AACSB: Use of ITCASE: ContentObjective: 5.449) Which of the following statements about Linux is NOT true?A) It plays a major role in the back office running local area networks.B) It is available in free versions downloadable from the Internet.C) It has garnered 80 percent of the server operating system market.D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices.Answer: CDiff: 2 Page Ref: 188AACSB: Use of ITCASE: ContentObjective: 5.450) Running a Java program on a computer requiresA) a Java Virtual Machine to be installed on the computer.B) a Java Virtual Machine to be installed on the server hosting the Java applet.C) a miniature program to be downloaded to the user's computer.D) no specialized software, as Java is platform-independent.Answer: ADiff: 2 Page Ref: 188AACSB: Use of ITCASE: ContentObjective: 5.451) A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a WebA) service.B) client.C) browser.D) app.Answer: CDiff: 1 Page Ref: 188AACSB: Use of ITCASE: ContentObjective: 5.452) Which of the following is a technique used to allow users to interact with a Web page without having to wait for the Web server to reload the Web page?A) UDDIB) widgetsC) AjaxD) JavaAnswer: CDiff: 2 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.453) Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to asA) Web services.B) EAI software.C) SOA.D) SOAP.Answer: ADiff: 2 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.454) What is the foundation technology for Web services?A) XMLB) HTMLC) SOAPD) UDDIAnswer: ADiff: 2 Page Ref: 189AACSB: Use of ITCASE: ContentObjective: 5.455) A set of self-contained services that communicate with each other to create a working software application is calledA) Web services.B) EAI software.C) SOA.D) SOAP.Answer: CDiff: 2 Page Ref: 190AACSB: Use of ITCASE: ContentObjective: 5.456) Which of the following is NOT one of the current software platform trends?A) grid computingB) open source softwareC) mashups and appsD) software outsourcingAnswer: ADiff: 2 Page Ref: 187-194AACSB: Analytic SkillsCASE: AnalysisObjective: 5.457) All of the following are contemporary and growing hardware platform trends exceptA) green computing.B) virtualization.C) cloud computing.D) Unix.Answer: DDiff: 1 Page Ref: 181-185AACSB: Use of ITCASE: ContentObjective: 5.358) ________ are created by combining and customizing components from different online software applications.A) AppsB) MashupsC) SaaSD) Web servicesAnswer: BDiff: 1 Page Ref: 193AACSB: Use of ITCASE: ContentObjective: 5.459) Prewritten, commercially available sets of software programs that eliminate the need fora firm to write its own software programs for certain functions, are referred to asA) software packages.B) mashups.C) outsourced software.D) open source software.Answer: ADiff: 1 Page Ref: 191AACSB: Use of ITCASE: ContentObjective: 5.460) Your firm needs to implement electronic timesheet software and needs to keep within a small budget. Which of the following would be the most costly method of implementing this new software?A) purchasing a software packageB) programming the new software in-houseC) leasing the software over the InternetD) outsourcing the software programming to an overseas vendorAnswer: BDiff: 2 Page Ref: 191-193AACSB: Analytic SkillsCASE: AnalysisObjective: 5.461) The practice of contracting custom software development to an outside firm is commonly referred to asA) outsourcing.B) scaling.C) service-oriented architecture.D) application integration.Answer: ADiff: 1 Page Ref: 192AACSB: Use of ITCASE: ContentObjective: 5.462) A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n)A) SOA.B) SLA.C) TCO.D) RFQ.Answer: BDiff: 1 Page Ref: 193AACSB: Use of ITCASE: ContentObjective: 5.463) SaaS refers toA) supplying online access over networks to storage devices and storage area network technology.B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet.C) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.D) none of the above.Answer: CDiff: 2 Page Ref: 193AACSB: Use of ITCASE: ContentObjective: 5.464) Which of the following is NOT a challenge being faced by , as discussed in the chapter case?A) increased competition from traditional industry leaders such as Microsoft and SAPB) continuing to differentiate its product and develop complementary new products and servicesC) maintaining 24/7 availability for clientsD) moving into a more scalable, on-demand environmentAnswer: DDiff: 2 Page Ref: 203-204AACSB: Use of ITCASE: ContentObjective: 5.465) Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?A) modalityB) scalabilityC) expandabilityD) disintermediationAnswer: BDiff: 1 Page Ref: 194AACSB: Use of ITCASE: ContentObjective: 5.566) How would you determine the market demand for your firm's IT services?A) Perform a TCO analysis.B) Benchmark your services.C) Hold focus groups to assess your services.D) Analyze sales returns on key investments.Answer: CDiff: 1 Page Ref: 196AACSB: Use of ITCASE: ContentObjective: 5.567) Which of the following is NOT one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?A) your firm's business strategyB) the IT investments made by competitor firmsC) market demand for your firm's servicesD) your firm's organizational cultureAnswer: DDiff: 2 Page Ref: 196-197AACSB: Use of ITCASE: ContentObjective: 5.568) Your firm, an auto parts manufacturer, has just merged with an automobile engine manufacturer, and the two companies have different SCM systems. Which of the following strategies would be the most likely course to help to reduce the TCO of the merged firms' technology investments?A) Use Web services to join the two systems.B) Move one firm into using the other's system in order to centralize management and support services.C) Develop a single ERP system that encompasses the information needs and business processes of both firms.D) Purchase a hosted, on-demand ERP system that encompasses the needs and processes of both firms.Answer: BDiff: 3 Page Ref: 195-197AACSB: Analytic SkillsCASE: EvaluationObjective: 5.569) Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?A) total cost of ownershipB) return on investmentC) breakeven pointD) cost benefit analysisAnswer: ADiff: 1 Page Ref: 195AACSB: Use of ITCASE: ContentObjective: 5.570) Hardware and software acquisition costs account for about ________ percent of TCO.A) 20B) 40C) 60D) 80Answer: ADiff: 2 Page Ref: 195AACSB: Use of ITCASE: ContentObjective: 5.571) The ________ PC is a computer using the Windows operating system software on a computer with an Intel microprocessor which became the standard PC in the Personal Computer Era.Answer: WintelDiff: 2 Page Ref: 168AACSB: Use of ITCASE: ContentObjective: 5.272) ________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.Answer: NanotechnologyDiff: 1 Page Ref: 171AACSB: Use of ITCASE: ContentObjective: 5.273) ________ states that the value or power of a network grows exponentially as a function of the number of network members.Answer: Metcalfe's LawDiff: 3 Page Ref: 173AACSB: Use of ITCASE: ContentObjective: 5.274) ________ are ultrathin computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.Answer: Blade serversDiff: 2 Page Ref: 176AACSB: Use of ITCASE: ContentObjective: 5.175) ________ surfaces allow users to gesture on a screen with several fingers to execute commands.Answer: MultitouchDiff: 2 Page Ref: 177AACSB: Use of ITCASE: ContentObjective: 5.276) A(n)________ server is used to communicate between a Web server and an organization's back-end systems.Answer: applicationDiff: 1 Page Ref: 169AACSB: Use of ITCASE: ContentObjective: 5.177) A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.Answer: multicore processorDiff: 2 Page Ref: 185AACSB: Use of ITCASE: ContentObjective: 5.378) ________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.Answer: VirtualizationDiff: 2 Page Ref: 182AACSB: Use of ITCASE: ContentObjective: 5.379) ________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.Answer: XMLDiff: 2 Page Ref: 187AACSB: Use of ITCASE: ContentObjective: 5.480) ________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms.Answer: OutsourcingDiff: 1 Page Ref: 192AACSB: Use of ITCASE: ContentObjective: 5.481) List and describe the seven major components of IT infrastructure.Answer: Computer hardware platforms: consists of technology for computer processing and includes client and server machines and mainframes.Computer software platforms: includes system software, application software, and enterprise applications.Data management and storage includes database management software and hardware for storage, such as disk arrays, tape libraries, and SANs.Networking and telecommunications platforms include telecommunication services for voice lines and Internet access, as well as cellular phone services.Internet platforms: includes hardware, software, and management services for maintaining Web sites, intranets, and extranets.Consulting and system integration services: includes consulting services and staff for maintaining legacy systems and integrating older systems with new infrastructure technologies.Diff: 2 Page Ref: 175-181AACSB: Analytic SkillsCASE: AnalysisObjective: 5.182) Explain why standards are so important in information technology? What standards have been important for the growth of Internet technologies?Answer: Standards are important because they result in different manufacturer's creating products that can be used either with each other or to communicate with each other. For example, without standards, each light-bulb manufacturer would have to also create specific light-bulb sockets for use with their light-bulbs. In the same way, computers and computer technology have been enabled through standards. Standards have allowed many different manufacturers to contribute to the same, standardized definitions of a technological application. For example, the ASCII data standards made it possible for computer machines from different manufacturers to exchange data, and standardized software languages have enabled programmers to write programs that can be used on different machines.The standards that have been important for the growth of the Internet include TCP/IP, as a networking standard, and WWW standards for displaying information as Web pages, including HTML.Diff: 3 Page Ref: 174-175AACSB: Analytic SkillsCASE: SynthesisObjective: 5.283) Distinguish between grid computing, cloud computing, and utility computing. Answer: Grid computing involves connecting geographically remote computers into a single network to create a computational grid that combines the computing power of all the computers on the network with which to attack large computing problems. In cloud computing, technology services are provided over a network, primarily the Internet. These may be infrastructure services, such as storage or networking, or platform services, such as IBM's application development and test service, or software services, such as . On-demand computing occurs when firms pay subscription fees or pay only for their usage of a vendor's cloud computing services.Diff: 2 Page Ref: 182-184AACSB: Analytic SkillsCASE: AnalysisObjective: 5.384) An ad-hoc group of oceanographers needs to set up a system to analyze massive amounts of data on ocean temperatures. The technology and hardware for gathering the data and transmitting the data to a central computer is in place. What additional hardware might they need? What techniques might they use to make their research more efficient and lower costs?Answer: To store their data they may want to use a SAN. To process their data, they will need a supercomputer or grid computing. To lower costs, they could look at on-demand or utility computing as well as virtualization and implementing multicore processors.Diff: 3 Page Ref: 181-185AACSB: Analytic SkillsCASE: SynthesisObjective: 5.385) Briefly explain why corporations are increasingly interested in using Unix or Linux for their operating system.Answer: Linux is an inexpensive and robust open-source relative of Unix. Unix and Linux constitute the backbone of corporate infrastructure throughout much of the world because they are scalable, reliable, and much less expensive than mainframe operating systems. They can also run on many different types of processors. The major providers of Unix operating systems are IBM, HP, and Sun with slightly different and partially incompatible versions.Although Windows continues to dominate the client marketplace, many corporations have begun to explore Linux as a low-cost desktop operating system provided by commercial vendors such as RedHat Linux and Linux-based desktop productivity suites such as Sun's StarOffice. Linux is also available in free versions downloadable from the Internet as open-source software. The rise of open-source software, particularly Linux and the applications it supports at the client and server level, has profound implications for corporate software platforms: cost, reduction, reliability and resilience, and integration, because Linux works on all the major hardware platforms from mainframes to servers to clients. Linux has the potential to break Microsoft's monopoly on the desktop. Sun's StarOffice has an inexpensive Linux-based version that competes with Microsoft's Office productivity suite.Diff: 2 Page Ref: 187-188AACSB: Analytic Skills。
Unit 5 Into the unknown 学案1.There is a profound charm in mystery. —Chatfield神秘事物具有深奥的魅力。
2.Nature is not governed except by obeying her. —Bacon自然不可驾驭,除非顺从她。
3.To be beautiful and to be calm is the ideal of nature. —Richard Jefferies美与宁静是自然的理想。
4.Mix a little mystery with everything,and the very mystery arouses veneration.任何事都掺一点神秘性,唯其神秘才引起崇拜。
5.He had lived long enough to know it is unwise to wish everything explained.长时期的生活经历足以使他懂得要想把一切都解释清楚是不明智的。
6.Man masters nature not by force but by understanding. —Bronwski人征服大自然不是凭力量,而是凭对它的认识。
The “Monster of Lake Tianchi” in the Changbai Mountains in Jilin Province,northeast China,is back in the news after several recent sightings.The director of a local tourist office,Meng Fanying,said the monster,which seemed to be black in color,was ten meters from the edge of the lake during the most recent sighting.“It jumped out of the water like a seal—about 200 people on Changbai's western peak saw it,”he said.“Although no one really got a clear look at the mysterious creature,Xue Junlin,a local photographer,claimed that its head looked like a horse.”In another recent sighting,a group of soldiers claim they saw an animal moving on the surface of the water.“It was greenishblack and had a round head with 10centimeter horns”,one of the soldiers said.Mike Taylor,a university student in the study of prehistoric life forms for his Ph.D.,discovered a brandnew species of dinosaur,while conducting research at the Natural History Museum in the United Kingdom.This new species was identified as part of the sauropod family of dinosaurs.The sauropods were four-legged,vegetarian dinosaurs,with very long necks and tails,and relatively small skulls and brains.One of their most unusual characteristics was their nostrils,which were higher up in their head,almost near the eyes.So far,the sauropod bones have been found in every continent except Antarctica,and they are one of the longest living group of dinosaurs,spanning over 100 million years.This new species,named Xenoposeidon proneneukos,which means forward sloping,lived about 140 million years ago.Mike Taylor,who has spent five years studying sauropod vertebrae,immediately knew that this was the backbone of a sauropod.However,he had never seen one like this before.Further research proved this was indeed a new kind of sauropod.The bone,which had been discovered in the 1890s,had never been examined.[探究发现]1.Find out the main idea of the passage.Mike Taylor discovered a brand-new species of dinosaur.2.Find out the new dinosaur's most obvious characteristic.Nostril.3.Find out the time that the bone was discovered.In the 1890s.Ⅰ.匹配词义A.单词匹配()1.intrigue A.n.气旋;旋风()2.pyramid B.n.金字塔()3.astronomy C.n.衰败()4.tropical D.adj.来自热带的;产于热带的()5.cyclone E.v.(因奇特或神秘而)激起……的兴()6.downfall F.n.天文学()7.megadrought G.n.超级干旱[答案]1-5EBFDA6-7CGB.短语匹配()1.fall into ruin A.相当于()2.make a discovery B.收回()3.correspond to C.做出发现;发现()4.take back D.将……应用于……()5.apply...to... E.(因无人照料而)衰落,败落[答案]1-5ECABDⅡ.默写单词1.civilisation n.文明(社会)2.bury v. 将……埋在下面3.canal n. 运河4.ruin n. 残垣断壁,废墟5.abandon v. 离弃,逃离6.dismiss v. 拒绝考虑,否定7.expansion n. 扩大;增加Ⅰ.语境填词astronomy;dismiss;expansion;abandon;civilisation;was buried;canal;ruin The Victorians regarded the railways as bringing progress and civilisation.2.The truth has been buried in her memory since then.3.Astronomy is the scientific study of the sun,moon,stars,planets,etc. 4.A canal is a passage dug in the ground for boats and ships to travel along. 5.The old mill is now little more than a ruin.6.The cold weather forced us to abandon going out.7.I think we can safely dismiss their objections.8.Despite the difficulties the company is confident of further expansion.Ⅱ.语法填空之派生词1.Hunger and drought led to the collapse of Mayan civilisation(civilise)a millennium ago.2.The child was found abandoned(abandon)but unharmed.3.The buildings were in a ruinous (ruin)condition.4.Expansionism(expansion)was advocated by many British politicians in the late 19th century.5.There are no previous statistics for comparison(compare).6.They questioned the accuracy(accurate)of the information in the file.7.The test can accurately (accurate)predict what a bigger explosion would do.8.Her dismissal(dismiss)of the threats seemed irresponsible.1.Although his theory has been dismissed by scholars,it shows how powerful the secrets of Ancient Maya civilisation are among people.虽然他的理论已经被学者们所否定,但它显示了古代玛雅文明的奥秘在人们心中是多么的有影响力。
关于出国辅修学生办理成绩证明有关流程1)自己对照中文成绩单将各学期所修课程英文名称和成绩一一对应输入《东华大学英文成绩单》(模板)对应的学期内,并用A3纸进行正反面打印;需办理在读证明的按附件格式修改并打印。
2)将完整填写各学期课程英文名称和成绩并打印的成绩单、在读证明交教务处教务科进行审核;3)教务处审核加盖章后,到延安路校区第三教学大楼13楼档案馆办理,档案馆每周四全天受理。
附件:1.《东华大学辅修英文成绩单》(模板)2.《东华大学辅修教学课程中英文对照表》3.《东华大学辅修在读证明》教务处2010年10月20日College:Minor:Student’s Official Academic Record(Credit Hours)Student’s ID No.Name:Gender:Enrollment Date:Graduation Date:Notes: *, reelecting; #, reexamining; !, cheating.Grade Scale System:A(excellent)85-100 B(good)75-84 C(average)67-74 D(pass)60-66 E(fail)0-59 P(pass)60-100东华大学辅修教学课程中英文对照表在读证明____同学,___,__年__月__日出生,__年9月始修读辅修专业学士学位______,学制3年,学号____。
修满规定的60个学分,达到要求的将颁发辅修专业学士学位证书。
特此证明。
东华大学教务处___年 ___月__日CertificateThis is to certify that_____,male,born in , began to take the minor programme in (3 years) since September . Student’s ID is No. . will gain the minor bachelor's degree when he gets the stated sixty school credits and meets interrelated demand.Academic Affairs OfficeDonghua University. ,。
CHAPTER 9 Virtual Memory Practice Exercises9.1 Under what circumstances do page faults occur? Describe the actions taken by the operating system when a page fault occurs.Answer:A page fault occurs when an access to a page that has not beenbrought into main memory takes place. The operating system verifiesthe memory access, aborting the program if it is invalid. If it is valid, a free frame is located and I/O is requested to read the needed page into the free frame. Upon completion of I/O, the process table and page table are updated and the instruction is restarted.9.2 Assume that you have a page-reference string for a process with m frames (initially all empty). The page-reference string has length p;n distinct page numbers occur in it. Answer these questions for any page-replacement algorithms:a. What is a lower bound on the number of page faults?b. What is an upper bound on the number of page faults?Answer:a. nb. p9.3 Consider the page table shown in Figure 9.30 for a system with 12-bit virtual and physical addresses and with 256-byte pages. The list of freepage frames is D, E, F (that is, D is at the head of the list, E is second, and F is last).Convert the following virtual addresses to their equivalent physical addresses in hexadecimal. All numbers are given in hexadecimal. (A dash for a page frame indicates that the page is not in memory.)• 9EF• 1112930 Chapter 9 Virtual Memory• 700• 0FFAnswer:• 9E F - 0E F• 111 - 211• 700 - D00• 0F F - EFF9.4 Consider the following page-replacement algorithms. Rank these algorithms on a five-point scale from “bad” to “perfect” according to their page-fault rate. Separate those algorithms that suffer from Belady’s anomaly from those that do not.a. LRU replacementb. FIFO replacementc. Optimal replacementd. Second-chance replacementAnswer:Rank Algorithm Suffer from Belady’s anomaly1 Optimal no2 LRU no3 Second-chance yes4 FIFO yes9.5 Discuss the hardware support required to support demand paging. Answer:For every memory-access operation, the page table needs to be consulted to check whether the corresponding page is resident or not and whether the program has read or write privileges for accessing the page. These checks have to be performed in hardware. A TLB could serve as a cache and improve the performance of the lookup operation.9.6 An operating system supports a paged virtual memory, using a central processor with a cycle time of 1 microsecond. It costs an additional 1 microsecond to access a page other than the current one. Pages have 1000 words, and the paging device is a drum that rotates at 3000 revolutions per minute and transfers 1 million words per second. The following statistical measurements were obtained from the system:• 1 percent of all instructions executed accessed a page other than the current page.•Of the instructions that accessed another page, 80 percent accesseda page already in memory.Practice Exercises 31•When a new page was required, the replaced page was modified 50 percent of the time.Calculate the effective instruction time on this system, assuming that the system is running one process only and that the processor is idle during drum transfers.Answer:effective access time = 0.99 × (1 sec + 0.008 × (2 sec)+ 0.002 × (10,000 sec + 1,000 sec)+ 0.001 × (10,000 sec + 1,000 sec)= (0.99 + 0.016 + 22.0 + 11.0) sec= 34.0 sec9.7 Consider the two-dimensional array A:int A[][] = new int[100][100];where A[0][0] is at location 200 in a paged memory system with pages of size 200. A small process that manipulates the matrix resides in page 0 (locations 0 to 199). Thus, every instruction fetch will be from page 0. For three page frames, how many page faults are generated bythe following array-initialization loops, using LRU replacement andassuming that page frame 1 contains the process and the other twoare initially empty?a. for (int j = 0; j < 100; j++)for (int i = 0; i < 100; i++)A[i][j] = 0;b. for (int i = 0; i < 100; i++)for (int j = 0; j < 100; j++)A[i][j] = 0;Answer:a. 5,000b. 509.8 Consider the following page reference string:1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6.How many page faults would occur for the following replacement algorithms, assuming one, two, three, four, five, six, or seven frames? Remember all frames are initially empty, so your first unique pages will all cost one fault each.•LRU replacement• FIFO replacement•Optimal replacement32 Chapter 9 Virtual MemoryAnswer:Number of frames LRU FIFO Optimal1 20 20 202 18 18 153 15 16 114 10 14 85 8 10 76 7 10 77 77 79.9 Suppose that you want to use a paging algorithm that requires a referencebit (such as second-chance replacement or working-set model), butthe hardware does not provide one. Sketch how you could simulate a reference bit even if one were not provided by the hardware, or explain why it is not possible to do so. If it is possible, calculate what the cost would be.Answer:You can use the valid/invalid bit supported in hardware to simulate the reference bit. Initially set the bit to invalid. O n first reference a trap to the operating system is generated. The operating system will set a software bit to 1 and reset the valid/invalid bit to valid.9.10 You have devised a new page-replacement algorithm that you thinkmaybe optimal. In some contorte d test cases, Belady’s anomaly occurs. Is the new algorithm optimal? Explain your answer.Answer:No. An optimal algorithm will not suffer from Belady’s anomaly because —by definition—an optimal algorithm replaces the page that will notbe used for the long est time. Belady’s anomaly occurs when a pagereplacement algorithm evicts a page that will be needed in the immediatefuture. An optimal algorithm would not have selected such a page.9.11 Segmentation is similar to paging but uses variable-sized“pages.”Definetwo segment-replacement algorithms based on FIFO and LRU pagereplacement schemes. Remember that since segments are not the samesize, the segment that is chosen to be replaced may not be big enoughto leave enough consecutive locations for the needed segment. Consider strategies for systems where segments cannot be relocated, and thosefor systems where they can.Answer:a. FIFO. Find the first segment large enough to accommodate the incoming segment. If relocation is not possible and no one segmentis large enough, select a combination of segments whose memoriesare contiguous, which are “closest to the first of the list” andwhich can accommodate the new segment. If relocation is possible, rearrange the memory so that the firstNsegments large enough forthe incoming segment are contiguous in memory. Add any leftover space to the free-space list in both cases.Practice Exercises 33b. LRU. Select the segment that has not been used for the longestperiod of time and that is large enough, adding any leftover spaceto the free space list. If no one segment is large enough, selecta combination of the “oldest” segments that are contiguous inmemory (if relocation is not available) and that are large enough.If relocation is available, rearrange the oldest N segments to be contiguous in memory and replace those with the new segment.9.12 Consider a demand-paged computer system where the degree of multiprogramming is currently fixed at four. The system was recently measured to determine utilization of CPU and the paging disk. The results are one of the following alternatives. For each case, what is happening? Can the degree of multiprogramming be increased to increase the CPU utilization? Is the paging helping?a. CPU utilization 13 percent; disk utilization 97 percentb. CPU utilization 87 percent; disk utilization 3 percentc. CPU utilization 13 percent; disk utilization 3 percentAnswer:a. Thrashing is occurring.b. CPU utilization is sufficiently high to leave things alone, and increase degree of multiprogramming.c. Increase the degree of multiprogramming.9.13 We have an operating system for a machine that uses base and limit registers, but we have modified the ma chine to provide a page table.Can the page tables be set up to simulate base and limit registers? How can they be, or why can they not be?Answer:The page table can be set up to simulate base and limit registers provided that the memory is allocated in fixed-size segments. In this way, the base of a segment can be entered into the page table and the valid/invalid bit used to indicate that portion of the segment as resident in the memory. There will be some problem with internal fragmentation.9.27.Consider a demand-paging system with the following time-measured utilizations:CPU utilization 20%Paging disk 97.7%Other I/O devices 5%Which (if any) of the following will (probably) improve CPU utilization? Explain your answer.a. Install a faster CPU.b. Install a bigger paging disk.c. Increase the degree of multiprogramming.d. Decrease the degree of multiprogramming.e. Install more main memory.f. Install a faster hard disk or multiple controllers with multiple hard disks.g. Add prepaging to the page fetch algorithms.h. Increase the page size.Answer: The system obviously is spending most of its time paging, indicating over-allocationof memory. If the level of multiprogramming is reduced resident processeswould page fault less frequently and the CPU utilization would improve. Another way toimprove performance would be to get more physical memory or a faster paging drum.a. Get a faster CPU—No.b. Get a bigger paging drum—No.c. Increase the degree of multiprogramming—No.d. Decrease the degree of multiprogramming—Yes.e. Install more main memory—Likely to improve CPU utilization as more pages canremain resident and not require paging to or from the disks.f. Install a faster hard disk, or multiple controllers with multiple hard disks—Also animprovement, for as the disk bottleneck is removed by faster response and morethroughput to the disks, the CPU will get more data more quickly.g. Add prepaging to the page fetch algorithms—Again, the CPU will get more datafaster, so it will be more in use. This is only the case if the paging action is amenableto prefetching (i.e., some of the access is sequential).h. Increase the page size—Increasing the page size will result in fewer page faults ifdata is being accessed sequentially. If data access is more or less random, morepaging action could ensue because fewer pages can be kept in memory and moredata is transferred per page fault. So this change is as likely to decrease utilizationas it is to increase it.10.1、Is disk scheduling, other than FCFS scheduling, useful in asingle-userenvironment? Explain your answer.Answer: In a single-user environment, the I/O queue usually is empty. Requests generally arrive from a single process for one block or for a sequence of consecutive blocks. In these cases, FCFS is an economical method of disk scheduling. But LOOK is nearly as easy to program and will give much better performance when multiple processes are performing concurrent I/O, such as when aWeb browser retrieves data in the background while the operating system is paging and another application is active in the foreground.10.2.Explain why SSTF scheduling tends to favor middle cylindersover theinnermost and outermost cylinders.The center of the disk is the location having the smallest average distance to all other tracks.Thus the disk head tends to move away from the edges of the disk.Here is another way to think of it.The current location of the head divides the cylinders into two groups.If the head is not in the center of the disk and a new request arrives,the new request is more likely to be in the group that includes the center of the disk;thus,the head is more likely to move in that direction.10.11、Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125. The queue of pending requests, in FIFO order, is86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests, for each of the following disk-scheduling algorithms?a. FCFSb. SSTFc. SCANd. LOOKe. C-SCANAnswer:a. The FCFS schedule is 143, 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130. The total seek distance is 7081.b. The SSTF schedule is 143, 130, 86, 913, 948, 1022, 1470, 1509, 1750, 1774. The total seek distance is 1745.c. The SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 4999, 130, 86. The total seek distance is 9769.d. The LOOK schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 130, 86. The total seek distance is 3319.e. The C-SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 4999, 86, 130. The total seek distance is 9813.f. (Bonus.) The C-LOOK schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 86, 130. The total seek distance is 3363.12CHAPTERFile-SystemImplementationPractice Exercises12.1 Consider a file currently consisting of 100 blocks. Assume that the filecontrol block (and the index block, in the case of indexed allocation)is already in memory. Calculate how many disk I/O operations are required for contiguous, linked, and indexed (single-level) allocation strategies, if, for one block, the following conditions hold. In the contiguous-allocation case, assume that there is no room to grow atthe beginning but there is room to grow at the end. Also assume thatthe block information to be added is stored in memory.a. The block is added at the beginning.b. The block is added in the middle.c. The block is added at the end.d. The block is removed from the beginning.e. The block is removed from the middle.f. The block is removed from the end.Answer:The results are:Contiguous Linked Indexeda. 201 1 1b. 101 52 1c. 1 3 1d. 198 1 0e. 98 52 0f. 0 100 012.2 What problems could occur if a system allowed a file system to be mounted simultaneously at more than one location?Answer:4344 Chapter 12 File-System ImplementationThere would be multiple paths to the same file, which could confuse users or encourage mistakes (deleting a file with one path deletes thefile in all the other paths).12.3 Why must the bit map for file allocation be kept on mass storage, ratherthan in main memory?Answer:In case of system crash (memory failure) the free-space list would notbe lost as it would be if the bit map had been stored in main memory.12.4 Consider a system that supports the strategies of contiguous, linked, and indexed allocation. What criteria should be used in deciding which strategy is best utilized for a particular file?Answer:•Contiguous—if file is usually accessed sequentially, if file isrelatively small.•Linked—if file is large and usually accessed sequentially.• Indexed—if file is large and usually accessed randomly.12.5 One problem with contiguous allocation is that the user must preallocate enough space for each file. If the file grows to be larger than thespace allocated for it, special actions must be taken. One solution to this problem is to define a file structure consisting of an initial contiguous area (of a specified size). If this area is filled, the operating system automatically defines an overflow area that is linked to the initialc ontiguous area. If the overflow area is filled, another overflow areais allocated. Compare this implementation of a file with the standard contiguous and linked implementations.Answer:This method requires more overhead then the standard contiguousallocation. It requires less overheadthan the standard linked allocation. 12.6 How do caches help improve performance? Why do systems not use more or larger caches if they are so useful?Answer:Caches allow components of differing speeds to communicate moreefficie ntly by storing data from the slower device, temporarily, ina faster device (the cache). Caches are, almost by definition, more expensive than the device they are caching for, so increasing the number or size of caches would increase system cost.12.7 Why is it advantageous for the user for an operating system to dynamically allocate its internal tables? What are the penalties to the operating system for doing so?Answer:Dynamic tables allow more flexibility in system use growth — tablesare never exceeded, avoiding artificial use limits. Unfortunately, kernel structures and code are more complicated, so there is more potentialfor bugs. The use of one resource can take away more system resources (by growing to accommodate the requests) than with static tables.Practice Exercises 4512.8 Explain how the VFS layer allows an operating system to support multiple types of file systems easily.Answer:VFS introduces a layer of indirection in the file system implementation. In many ways, it is similar to object-oriented programming techniques. System calls can be made generically (independent of file system type). Each file system type provides its function calls and data structuresto the VFS layer. A system call is translated into the proper specific functions for the ta rget file system at the VFS layer. The calling program has no file-system-specific code, and the upper levels of the system call structures likewise are file system-independent. The translation at the VFS layer turns these generic calls into file-system-specific operations.。
文章编号:1007-757X(2021)01-0107-04安卓取证系统的设计与实现王德广,倪怀乾(大连交通大学软件学院,辽宁大连116028)摘要:为了取证人员快速提取分析安卓系统的数据信息,利用ADB和Python等工具在Windows系统中开发针对于安卓系统取证的桌面应用程序°并利用数据挖掘技术获取嫌疑人的微信好友信息,通过时间序列图、网络拓扑图的方式显示联系人之间的亲密度,使用词云显示浏览文本,获得重要信息°此程序具有较高的可行性和普适性,为取证人员提供较大的便利°关键词:安卓系统;手机取证;数据分析中图分类号:TP391文献标志码:ADesignandImplemen)a)ionofAndroidForensicsSys)emWANG Deguang,NI Huaiqian(College of software,Dalian Jiaotong University,Dalian116028,China)Abstract:In order to quickly extract and analyze data information of forensic system,this paper uses ADB and Python to develop deskGop applicaGions for Android forensics,uses daGa miningGechnologyGo obGainGhe WeChaGfriend informa ion ofGhe sus-pecG,displaysinimacybeGweenconGacGsbymeansofimeseriesgraphsandneGworkGopologymaps,useswordcloudGodisplay browsing text and obtain important information.The program has high feasibility and universality,and provides greater con-veniencefortheforensicpersonnel.Key words:Android system;mobile forensics;data analysis0引言智能手机已不止于通讯,而具备了一台电脑的重要功能&与此同时,不少犯罪分子也利用智能手机进行犯罪活动。
完型填空:Many modern operating systems consider files 1 a collection of bytes. At a higher level, where the content of the file is being 2 , these 3 digits may represent integer values or text characters, or anything else. It is 4 to the program using the file to understand the meaning and internal layout of information in the file and present it to a user as 5 meaningful information ( like text, images, sounds).At any instant 6 time, a file might have a size, normally expressed in bytes, that indicates how much storage is 7 with the file. In most modern 8 systems the size can be any whole number up to a system limit. However, the general 9 of a file does not require that its instant size has any real meaning, unless the data within the file happens to 10 to data within a pool of persistent storage. Given Words: more as associated lenght considered operating binary correspond up in definition move1.as2.considered3.binary4.up5.more6.in7.associated8.operating9.definition10correspond每个阅读理解的下方都有答案大家主要看答案问的什么答案选哪个就行,到时有个印象能选出来就行!阅读理解A microcomputer is a desktop or notebook size computing device that uses a microprocessor as its Central Processing Unit, or CPU. Microcomputers are also called Personal Computers (PCs), home computers, small business computers, and micros. The smallest, most compact are called laptops. When they first appeared, they were considered single user devices, and they were capable of handling only four, eight, or 16 bits of information at one time. More recently the distinction between microcomputers and large, mainframe computers (as well as the smaller mainframe type systems called minicomputers) has become blurred, as newer microcomputer models have increased the speed and data handling capabilities of their CPUs into the 32 bit, or even 64 bit multiuser range.Microcomputers are designed for use in homes, schools, and office settings. Within the home, they can serve both as a tool for home management (balancing the family checkbook, structuring the family budget, indexing recipes) and as a recreational device (playing computer games, cataloging records and books) School children can use microcomputers for doing their homework, and in fact many public schools now employ the devices for programmed learning and computer literacy courses. Small businesses may purchase microcomputers for word processing, bookkeeping, and the storage and handling of mailing lists.A minicomputer is a mid-level computer built to perform complex computationswhile dealing efficiently with a high level of input and output from users connected via terminals. Minicomputers also frequently connect to other minicomputers on a network and distribute processing among all the attached machines. Minicomputers are used heavily in transaction processing applications and as interfaces between mainframe computer systems and wide area networks.A mainframe computer is a high level computer designed for the most intensive computational tasks. Mainframe computers are often shared by multiple users connected to the computer via terminals. The most powerful mainframes, called supercomputers, perform highly complex and applied research by scientists, large businesses, and the military.In computer science, supercomputers are large, extremely fast, and expensive computers used for complex or sophisticated calculations, typically, machines capable of pipelining instruction execution and providing vector instructions. A supercomputer can, for example, perform the enormous number of calculations required to draw and animate a moving spaceship in a motion picture. Supercomputers are also used for weather forecasting, large scale scientific modeling, and oil exploration.1. We can see from the text that a computer can _______. ( )A. only be used as a calculating deviceB. not be used in the homeC. find uses almost everywhereD. not be made very small2. How many types of regular computers are introduced in this text? ( )A. 1B. 2C. 3D. 43. Which of the following is the smallest? ( )A. A laptop.B. A desktop.C. A minicomputer.D. A supercomputer.4. Which of the following is not true? ( )A. Pupils can use computers to do their homework.B. A CPU can not be a microprocessor.C. The distinction between micros and mainframes has become blurred.D. A PC can be a laptop or a desktop.5. We can infer that _______. ( )A. there will be no distinction between micros and mainframes in the futureB. it is unimaginable to do research nowadays without the help of a computerC. the fifth generation computer will be produced within 2 yearsD. electronic computers will soon be out of dataC D A B BComputer programs, which are also called software, are instructions that cause the hardware —the machine —to do work. Software as a whole can be divided into a number of categories based on the types of work done by programs. The two primary software categories are operating systems (system software), which controls the working of the computer, and application software, which addresses the multitude of tasks for which people use computers. System software, thus handle such essential, but often invisible, chores as maintaining disk files and managing the screen, whereas application software perform word processing, database management, and the like. Two additional categories that are neither system nor application software , although they contain elements of both, are network software , which enables groups of computers to communicate, and language software, which provides programmers with the tools they need to write programs. In addition to these task based categories, several types of software are described based on their method of distribution. These include the so-called canned programs or packaged software, developed and sold primarily through retail outlets; freeware and public domain software, which is made available without cost by its developer; shareware, which is similar to freeware but usually carries a small fee for those who like the program; and the infamous vaporware, which is software that either does not reach the market or appears, which is software that either does not reach the market or appears much later than promised.1. Computer programs in the text ______. ( )A. differ a great deal from softwareB. control the working of a computerC. handle invisible chores only such as managing the screen and maintaining disk filesD. can not perform word processing, database and the like2. The two categories of software that are neither system or application software, but contain elements of both are ________. ( )A. system and language softwareB. network and application softwareC. system and packaged softwareD. language and network software3. The so-called canned programs are so described depending on ________. ( )A. the tasks they performB. the way they are obtainedC. the developer who creates themD. the user who uses them4. Which of the following is true? ( )A. Software never carries a fee for those who like the program.B. Vaporware is made free by its developer.C. Freeware and public domain software is a task based software.D. Packaged software may be available at the market from a retailer.5. Which of the following about the language software is true? ( )A. It is free of charge.B. It helps programmers write programs.C. It is a kind of infamous software.D. It reaches the market at the time it’s promised.B D B D BHigh level languages often use English like words-for example, LIST, PRINT, OPEN, and so on-as commands that might stand for a sequence of tens or hundreds of machine language instructions. The commands are entered from the keyboard or from a program in memory or in a storage device, and they are interpreted by a program that translates them into machine language instructions.Translator programs are of two kinds: interpreters and compilers. with an interpreter, programs that loop back to re-execute part of their instructions reinterpret the same instructions each time it appears, so interpreted programs run much more slowly than machine language programs. Compilers, by contrast, translate an entire program into machine language prior to execution, so such programs run as rapidly as though they were written directly in machine language.American computer scientist Grace Hopper is credited with implementing the first commercially oriented computer language. After programming an experimental computer at Harvard University, she worked on the UNIV AC I and II computers and developed a commercially usable high level programming language called FLOW MATIC to facilitate computer use in scientific applications, IBM then developed a language that would simplify work involving complicated mathematical formulas. Begun in 1954 and completed in 1957, FORTRAN (FORmula TRANslator) was the first comprehensive high level programming language that was widely used. In 1957, the Association for Computer Machinery set out to develop a universal language that would correct some of FORREAN’s perceived faults. A year later, they released ALGOL (ALGOLrithmic language), another scientifically oriented language; widely used in Europe in the 1960s and 1970s, it has since been superseded by newer language, while FORTRAN continues to be used because of the huge investment in existing programs. COBOL (Common Business Oriented Language), a commercial and business programming language, concentrated on data organization and file handling and is widely used today in business.BASIC (Beginners All-purpose Symbolic Instruction Code) was developed at Dartmouth College in the early 1960s for use by nonprofessional computer users. The language came into almost universal use with the microcomputer explosion of the1970s and 1980s. condemned as slow, inefficient, and inelegant by its detractors, BASIC is nevertheless simple to learn and easy to use. Because many early microcomputers were sold with BASIC built into widespread use. As a very simple example of a BASIC program, consider the addition of the numbers 1 and 2, and the display of the result. This is written as follows (the numerals 10—40 are line numbers):10 A=120 B=230 C=A+B40 PRINT Calthough hundreds of different computer languages and variants exist, several others deserve mention. PASCAL, originally designed as a teaching tool, is now one of the most popular microcomputer languages. LOGO was developed to introduce children to computers. C, a language Bell Laboratories designed in the 1970s, is widely used in developing systems programs, such as language translators. LISP and PROLOG are widely used in artificial intelligence.1. Which of the following are high-level language? ( )A. COBOL, FORTRAN, ASSEMBLER, PASCAL.B. MACHINELANGUAGE, LIST, BASIC, PROLOGC. COMPILER, FLOW MATIC, ALGOL, LOGO.D. None of the above.2. Which of the following is not a characteristic of a high-level language? ( )A. It uses English-like words.B. A command may stand for a sequence of many machine language instructions.C. A keyboard can serve as an input device.D. Machine language instructions are no longer required.3. Which is not true of BASIC? ( )A. It was developed at Bell Laboratories in the early in 1960s.B. With the explosion of microcomputers, it found wide use in the 1970s.C. It was thought of as a slow, inefficient programming language.D. It was built into the hardware of many early microcomputers.4. From this passage, we can infer that ________. ( )A. FORTRAN was the first commercially oriented computer languageB. COBOL is a scientifically oriented languageC. because ALGOL was released later than FORTRAN, it has fewer faultsD.IBM was known for its commercially oriented computer language FLOW MATIC5. Which of the following is true? ( )A. PASCAL was designed to introduce children to computers.B. LOGO was originally created a teaching tool.C. PROLOG is widely used in developing system programs.D. LISP plays a very important part in artificial intelligence.C D A C DThe techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm are called computer security. Such harm includes destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.Data may be protected by such basic methods as locking up(锁上) terminals and replicating data in other storage facilities. More sophisticated methods include limiting data access by requiring the user to have an encoded card or to supply an identification number or password. Such procedures can apply to the computer data system as a whole or may be pinpointed for particular information banks or programs. Data are frequently ranked in computer files according to degree of confidentiality.(机密性)Operating systems and programs may also incorporate built in safeguards, and data may be encoded in various ways to prevent unauthorized persons from interpreting or even copying the material. The encoding system most widely used in the United States is the Data Encryption Standard (DES), designed by IBM and approved for use by the National Institute of standards and Technology in 1976. DES involves a number of basic encrypting procedures that are then repeated several times. Very large scale computer systems, for example, the U.S. military Advanced Research Project Agency Network (ARPANET), may be broken up into smaller subsystems for security purposes, but smaller systems in government and industry are more prone to system-wide invasions. At the level of personal computers, security possibilities are fairly minimal.Most invasions of computer systems are for international or corporate spying or sabotage, but computer backers may take the penetration of protected databanks as a challenge, often with no object in mind other than accomplishing a technological feat. Of growing concern is the deliberate implantation in computer programs of worms or viruses that, if undetected, may progressively destroy databases and other software. Such infected programs have appeared in the electronic bulletin boards available to computer users. Other viruses have been incorporated into computer software sold commercially. No real protection is available against such bugs except the vigilance of manufacturer and user.1. According to the author, computer security is _________. ( )A. a programB. a techniqueC. a computer systemD. a method2. Which of the following is not a data protecting method? ( )A. Locking up terminals.B. Replacing data in other storage facilities.C. Supplying a password before data access.D. Ranking data frequently in computer files.3. The word “incorporate” in the first sentence of the third paragraph may best mean _______.( )A. makeB. joinC. work well withD. come into4. Which of the following statements may not be true? ( )A. People break their large scale computer systems up into smaller subsystems for security purposes.B. Personal computers are most likely to be invaded by unauthorized persons.C. All of the people invading computer systems are trying to spy or sabotage.D. Some people penetrated databanks in order to prove their technical worth.5. From Paragraph 4, we know that ________. ( )A. the electronic bulletin boards are a popular source of computer virusesB. most viruses come from software sellersC. whatever measures are taken, it is impossible for people to protect their system against computer virusesD. some viruses are data-destroying onesB D AC DWe live in a world today where software is pervasive. Software touches nearly every aspect of our lives, from software-controlled subways, air traffic control systems, nuclear power plants, and medical equipment to more mundane everyday examples, such as software-controlled microwave ovens, gas burners, elevators, automated teller machines, the family car, and the local 911 service. In the past, many of these items relied upon established safety and reliability principles from electrical, mechanical, and/or civil engineering, which developed over several decades, if not longer. Today items like these are controlled by software.When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability andits importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.We hear a lot about the global economy today. Technology has less respect for state or national borders than do market forces. The software safety and reliability challenge is a global challenge. Products, such as cars and medical devices, are built in one jurisdiction and sold worldwide. Air traffic control systems must interoperate safely and reliably among multiple countries, for example along the long borders between the U.S., Canada, and Mexico.1. In the first paragraph, the author tries to tell us mainly that _______. ( )A. software is pervasiveB. software controls subways and power plantsC. automated teller machines are very convenientD. mechanically-controlled items are not reliable2. The word “it” in the first line of the second paragraph refers to _______. ( )A. softwareB. reliabilityC. safetyD. challenge3. According to the author, ________. ( )A. people should remain content with the present situation of software securityB. Y2K is one of the most threatening problems facing usC. People should give more attention to software security than they used to doD. Few people realize the importance of software security problems4. The sentence “Technology has less respect for state or national borders than do market force” means ___________. ( )A. market force are stronger than technologyB. technology is easier to spreadC. market force show more respect for a nationD. technology is more difficult to acquire5. What is true about the software? ( )A. It is becoming more expensive.B. It is being made simpler.C. It is finding a wider application.D. It is controlling more equipment.A A CB CThe Internet has exploded into the consciousness of every country in the world. Nothing in the computer and communications industries ever came onto the scene with more momentum than the World Wide Web. The Clinton/Gore administration had been touting the “information superhighway” for some time and had pointed to the Internet as a model for such a future system, but the excitement over the World Wide Web turned the Internet into the superhighway whether it was ready for it or not. The simplicity of the Web’s hypertext link, an address that points to another Web page on the same server or on any server in the world, spread like wildfire.As a result, there is hardly a single software product that hasn’t been affected. Every application is being reworked to deal with the Internet in some manner. This Encyclopedia now contains hundreds of Web terms and products that were not here a couple of years ago.Even with its growing pains, which grow larger each day, the Internet has managed to become the global superhighway, which has changed the lives of millions. That it works as well as it does is indeed quite miraculous. With less than 500 Web sites in 1994 to more than two million today, the Web has become the information melting pot for the planet. It provides a marketplace and meeting ground for every subject known to the human race.The real superhighway was meant to modernize the telecommunications infrastructure in the U.S. so that everyone had access to information and educational materials no matter what their station in life. Right now, there is a monthly service fee for the Internet, and you have to have a personal computer or set-top box. Although Internet access is available in libraries and other public venues, the Internet is still not a service for everyone at home.In addition, “surfing the Net” via modem is often an exp eriment in patience. High-speed access is necessary to keep up this extraordinary momentum. The delivery of the superhighway is now in the hands of the telephone and cable companies, because they are already wired into every home and office and are capable of delivering content at much higher speed with communications technologies such as ISDN, ADSL and cable modems. Internet backbone providers, regional providers and local Internet service providers (ISPs) are upgrading their facilities at an furious pace. The information superhighway is transfiguring itself almost daily.The frenzy has died a little, because the Internet has already become mainstream. But, making it profitable is another story. One thing is certain. Organizations are making huge investments hoping they know what the business world as well as mom, pop and the kids want to see and purchase, and perhaps more to the point, how much they will pay for it.1. The main idea of the first two paragraphs is that ______. ( )A. Bill Clinton benefits a lot from the InternetB. the WWW develops rapidly during the Clinton’s administrationC. the Internet has a great effectD. many new words come into being with each passing day2. What is true in the third paragraph about the Internet? ( )A. It is painfulB. It is changeableC. It is wonderfulD. It is a melting pot3. The real purpose of the Superhighway was ________. ( )A. to make the U.S. telecommunications infrastructure modernB. to make money for the U.S. governmentC. to provide information service for everyone at homeD. to compete with the WWW4. The word “mainstream” in the last paragraph can be best replaced by _______. ( )A. big riverB. dominant trendC. investmentD. business5. ________access is necessary to keep up this extraordinary momentum? ( )A. High-speedB. Low-speedC. RegularityD. ShiftA A CB CMany people are watching spellbound as the Internet grows exponentially. What they often do not realize is that the Internet is not only a fascinating new interaction medium, but that it will completely dominate our society.Previous generations knew books, newspapers, telephones and televisions. The first three were essential aids to life, two text-based, the third speech-based. Anyone who was denied access to them was disadvantaged in our society. The picture-based medium, television, helped to bring the world closer to home. But it condemned the viewer to passivity and has been more a hindrance than a help in aiding individuals todevelop new skills and capabilities.The Internet will unite all the traditional media and push them further. Most significantly, this is the first time that pictures will be used interactively for information, communication and development of skills. Even today, everyone who uses the web is able to catch a glimpse of the potential of the medium in this direction. Our children will grow into a web generation. They won’t log onto the Internet occasionally, but will be online all the time. Fortunately they will be significantly more active than the TV-dominated baby boom generation. Those who are denied access to the Internet completely or partially will be enormously disadvantaged. They will be lost in our digital society.Obviously access will not be as it is today: slow, unstructured, available only through the computer. We will have intelligent tools for tapping undreamt-of possibilities. We can glimpse the beginning of these developments in many places. Shopping over the Internet of the future will be the obvious thing to do, regardless of whether the goods are ultimately delivered or fetched in person. Both the time-short and time-rich will love using the web in this way.Regardless of whether you agree with our views, you should read on. It is important for every e-tailing and electronic-shopping strategy to understand in detail what dramatic changes the Internet will undergo in the few years.1. What is true about the Internet According to the text? ( )A. People now have realize that the Internet will dominate our society completely.B. The Internet increases by 50% every year.C. The Internet will combine all the traditional media such as books, televisions and push them further.D. The Internet prevents individuals from developing new skills.2. In the 4th paragraph, the phrase “be lost ” means “______”. ( )A. be Internet-dependentB. be denied interactive mediumC. be TV-controlledD. be deprived of opportunities3. The author believes_______. ( )A. access to the Internet will be as it is todayB. people will spend a lot of time on the InternetC. the present generation spent most of their free time in front of the TVD. shopping over the Internet will occur but now we can’t imagine what it will be like4. Our children will grow into a ________ generation. ( )A. webB. painfulC. movementD. dummy5. The word “undreamt-of” in the fifth paragraph means________. ( )A. unthinkableB. utopianC. cloud-castleD. incomparableA A CB CComputer office systems are computers and their peripheral equipment are used to create, store, process, or communicate information in a business environment. This information can be electronically produced, duplicated, and transmitted.The rapid growth of the service sector of the United States economy beginning in the mid 1970s has furnished a new market for sophisticated office automation. With the increasing incorporation of microchips and microcircuitry into office equipment, the line between the computer and other equipment has blurred.At the same time, computers either stand alone or as part of a network and specialized software programs are taking over tasks such as facsimile transmission—or FAX, voice mail, and telecommunications that were once performed by separate pieces of equipment. In fact, the computer has virtually taken the place of typewriters, calculators, and manual accounting techniques and is rapidly taking over graphics design, production scheduling, and engineering design as well.During the first half of the 20th century, financial and other numerical record keeping tasks were performed manually or by bookkeeping machines, billing machines, tabulation equipment, and other types of electromechanical accounting devices. In the 1950s, such machines were increasingly replaced by mainframe computers—large, very expensive, high speed machines that required operators as well as a special temperature regulated facility to prevent overheating. Use of these machines today is limited to large organizations with heavy volume data processing requirements. Time sharing, allowing more than one company to use the same mainframe for a fee, was instituted to divide the cost of the equipment among several users while ensuring that the equipment is utilized to the maximum extent.Mainframes with remote terminals, each with its own monitor, became available in the mid 1970s and allowed for simultaneous input by many users. With the advent of the minicomputer, however, a far less expensive alternative became available. The transistor and microelectronics made manufacture of these smaller, less complex machines practicable. Minicomputer, the first of which entered general business use in。
Essentials of Management Information Systems, 9e (Laudon/Laudon)Chapter 1 Business Information Systems in Your Career1) Internet advertising is growing at a rate of more than 30 percent a year.Answer: FALSEDiff: 3 Page Ref: 6AACSB: Reflective ThinkingCASE: Comprehension2) A business model describes how a company produces, delivers, and sells a product or service to create wealth.Answer: TRUEDiff: 1 Page Ref: 11AACSB: Reflective ThinkingCASE: Comprehension3) Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the hardware and software needed.Answer: FALSEDiff: 2 Page Ref: 13AACSB: Use of ITCASE: Comprehension4) Computers are only part of an information system.Answer: TRUEDiff: 1 Page Ref: 14AACSB: Use of ITCASE: Comprehension5) Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.Answer: FALSEDiff: 1 Page Ref: 15AACSB: Use of ITCASE: Comprehension6) The dimensions of information systems are people, organizations, and information technology.Answer: TRUEDiff: 1 Page Ref: 15AACSB: Use of ITCASE: Comprehension7) In order to understand how a specific business firm uses information systems, you need to know something about the history and culture of the company.Answer: TRUEDiff: 1 Page Ref: 15AACSB: Use of ITCASE: Comprehension8) Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.Answer: TRUEDiff: 1 Page Ref: 16AACSB: Reflective ThinkingCASE: Comprehension9) Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.Answer: FALSEDiff: 2 Page Ref: 16AACSB: Reflective ThinkingCASE: Comprehension10) Employee attitudes about their jobs, employers, or technology can have a powerful effect on their abilities to use information systems productively.Answer: TRUEDiff: 1 Page Ref: 16AACSB: Use of ITCASE: Comprehension11) A network requires at least three computers and a shared resource.Answer: FALSEDiff: 2 Page Ref: 17AACSB: Use of ITCASE: Comprehension12) An IT infrastructure provides the platform on which the firm can build its information systems.Answer: TRUEDiff: 1 Page Ref: 17AACSB: Use of ITCASE: Comprehension13) UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.Answer: TRUEDiff: 3 Page Ref: 18AACSB: Analytic SkillsCASE: Comprehension14) Identifying a problem includes agreeing that a problem exists.Answer: TRUEDiff: 1 Page Ref: 21AACSB: Reflective ThinkingCASE: Comprehension15) Political conflict is an example of the people dimension of business problems.Answer: FALSEDiff: 3 Page Ref: 22AACSB: Reflective ThinkingCASE: Comprehension16) As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.Answer: TRUEDiff: 2 Page Ref: 25AACSB: Use of ITCASE: Comprehension17) Forensic accounting is used to investigate bankruptcies and contract disputes.Answer: TRUEDiff: 2 Page Ref: 25AACSB: Reflective ThinkingCASE: Comprehension18) An understanding of enterprise-wide systems for customer relationship management is one of the skills relevant to careers in marketing.Answer: TRUEDiff: 2 Page Ref: 26AACSB: Use of ITCASE: Comprehension19) Whereas marketing and financial careers have been transformed by the growth in information systems, management has–so far–remained relatively unaffected.Answer: FALSEDiff: 2 Page Ref: 26AACSB: Use of ITCASE: Comprehension20) There are two types of outsourcing: offshore outsourcing and foreign outsourcing. Answer: FALSEDiff: 2 Page Ref: 28AACSB: Reflective ThinkingCASE: Comprehension21) As discussed in the chapter opening case, the Yankees' use of information systems in their new stadium can be seen as an effort to achieve which of the primary business objectives?A) Operational excellenceB) SurvivalC) Customer and supplier intimacyD) Improved decision makingAnswer: ADiff: 3 Page Ref: 3-4AACSB: Analytic SkillsCASE: Analysis in terms of categorize22) Journalist Thomas Friedman's description of the world as "flat" referred to:A) the flattening of economic and cultural advantages of developed countries.B) the use of the Internet and technology for instantaneous communication.C) the reduction in travel times and the ubiquity of global exchange and travel.D) the growth of globalization.Answer: ADiff: 2 Page Ref: 9AACSB: Reflective ThinkingCASE: Comprehension23) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and:A) flexibility.B) survival.C) improved business practices.D) improved efficiency.Answer: BDiff: 2 Page Ref: 10AACSB: Use of ITCASE: Comprehension24) The use of information systems because of necessity describes the business objective of:A) survival.B) improved business practices.C) competitive advantage.D) improved flexibility.Answer: ADiff: 2 Page Ref: 12AACSB: Use of ITCASE: Comprehension25) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time?A) 1 onlyB) 1 and 2C) 2 and 3D) 1, 2, and 3Answer: DDiff: 3 Page Ref: 12AACSB: Analytic SkillsCASE: Analysis in terms of compare26) Verizon's implementation of a Web-based digital dashboard to provide managers withreal-time information such as customer complaints is an example of:A) improved flexibility.B) improved decision-making.C) improved efficiency.D) customer and supplier intimacy.Answer: BDiff: 2 Page Ref: 12AACSB: Use of ITCASE: Analysis in terms of categorize27) The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the information system business objective of:A) improved efficiency.B) customer and supplier intimacy.C) survival.D) competitive advantage.Answer: CDiff: 2 Page Ref: 12AACSB: Use of ITCASE: Analysis in terms of categorize28) An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support:A) decision making and control in an organization.B) communications and data flow.C) managers analyzing the organization's raw data.D) the creation of new products and services.Answer: ADiff: 2 Page Ref: 13AACSB: Use of ITCASE: Comprehension29) The three activities in an information system that produce the information organizations use to control operations are:A) information retrieval, research, and analysis.B) input, output, and feedback.C) input, processing, and output.D) data analysis, processing, and feedback.Answer: CDiff: 1 Page Ref: 14AACSB: Use of ITCASE: Comprehension30) Order data for baseball tickets and bar code data are examples of:A) raw input.B) raw output.C) customer and product data.D) sales information.Answer: ADiff: 1 Page Ref: 14AACSB: Analytic SkillsCASE: Analysis in terms of categorize31) The average number of tickets sold daily online is an example of:A) input.B) raw data.C) meaningful information.D) output.Answer: CDiff: 1 Page Ref: 14AACSB: Analytic SkillsCASE: Analysis in terms of categorize32) Output:A) is feedback that has been processed to create meaningful information.B) is information that is returned to appropriate members of the organization to help them evaluate the input stage.C) transfers raw data to the people who will use it or to the activities for which it will be used.D) transfers processed information to the people who will use it or to the activities for which it will be used.Answer: DDiff: 1 Page Ref: 14AACSB: Reflective ThinkingCASE: Comprehension33) Converting raw data into a more meaningful form is called:A) capturing.B) processing.C) organizing.D) feedback.Answer: BDiff: 1 Page Ref: 14AACSB: Reflective ThinkingCASE: Comprehension34) An example of raw data from a national chain of automobile stores would be:A) average of 13 Toyotas sold daily in Kentucky in 2007.B) 300 Toyota RAV4s sold during fourth quarter 2007 in Kentucky.C) 1 Toyota RAV4 sold January 7, 2008 in Louisville, Kentucky - $28000.D) annual sales of Toyota RAV4s increased 2.4 percent.Answer: CDiff: 3 Page Ref: 14AACSB: Analytic SkillsCASE: Analysis in terms of categorize35) Electronic computers and related software programs are the technical foundation, the tools and materials, of:A) all business procedures.B) information accumulation.C) modern information systems.D) all industrialized countries.Answer: CDiff: 2 Page Ref: 14-15AACSB: Reflective ThinkingCASE: Comprehension36) The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called:A) information systems literacy.B) information systems architecture.C) management information systems.D) information technology infrastructure.Answer: CDiff: 2 Page Ref: 15AACSB: Reflective ThinkingCASE: Comprehension37) A hierarchy:A) results in a clear-cut division of labor.B) is composed primarily of experts trained for different functions.C) is a pyramid structure of rising authority and responsibility.D) is used primarily in large organizations to define job roles.Answer: CDiff: 1 Page Ref: 15AACSB: Reflective ThinkingCASE: Comprehension38) In a hierarchical organization, the upper levels consist of:A) managerial and professional workers.B) managerial, professional, and technical workers.C) professional and operational workers.D) managerial, professional, and operational workers.Answer: BDiff: 2 Page Ref: 15-16AACSB: Reflective ThinkingCASE: Comprehension39) The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its:A) culture.B) environment.C) atmosphere.D) values.Answer: ADiff: 1 Page Ref: 16AACSB: Reflective ThinkingCASE: Comprehension40) Business processes:A) include informal work practices.B) are used primarily for sales and accounting functions.C) are governed by information technology.D) are logically related tasks used primarily by operational personnel.Answer: ADiff: 1 Page Ref: 16AACSB: Reflective ThinkingCASE: Comprehension41) Data management technology consists of:A) the physical hardware and media used by an organization for storing data.B) the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.C) the software governing the organization of data on physical storage media.D) the hardware and software used to transfer data.Answer: CDiff: 2 Page Ref: 17AACSB: Use of ITCASE: Comprehension42) The hardware and software used to transfer data in an organization is called:A) data management technology.B) networking and data management technology.C) data and telecommunications technology.D) networking and telecommunications technology.Answer: DDiff: 2 Page Ref: 17AACSB: Use of ITCASE: Comprehension43) An intranet uses:A) mainframe technology.B) infrared telecommunications systems.C) the telecommunications capacities of fiber optic networks.D) Internet technology within the boundaries of the firm.Answer: DDiff: 2 Page Ref: 17AACSB: Use of ITCASE: Comprehension44) The first step in the four-step model of business problem solving is:A) agreeing that a problem exists.B) identifying the problem.C) outlining the problem's causes.D) assigning the problem to a problem solver.Answer: BDiff: 1 Page Ref: 21AACSB: Reflective ThinkingCASE: Comprehension45) Inadequate database capacity is an example of the ________ dimension of business problems.A) technologyB) organizationalC) peopleD) managementAnswer: ADiff: 2 Page Ref: 20AACSB: Analytic SkillsCASE: Analysis in terms of categorize46) Legal and regulatory compliance is an example of the ________ dimension of business problems.A) managementB) organizationalC) peopleD) technologyAnswer: CDiff: 3 Page Ref: 22AACSB: Analytic SkillsCASE: Analysis in terms of categorize47) Aging hardware and outdated software are examples of the ________ dimension of business problems.A) technologyB) managementC) information systemsD) organizationalAnswer: ADiff: 1 Page Ref: 22AACSB: Analytic SkillsCASE: Analysis in terms of categorize48) Poor business processes and unsupportive culture are examples of the ________ dimension of business problems.A) managementB) organizationalC) peopleD) infrastructureAnswer: BDiff: 2 Page Ref: 22AACSB: Analytic SkillsCASE: Analysis in terms of categorize49) The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once they have left the office. This is a business problem that falls into the:A) management dimension.B) people dimension.C) organizational dimension.D) technology dimension.Answer: BDiff: 3 Page Ref: 20AACSB: Analytic SkillsCASE: Analysis in terms of categorize50) Flapjack Flats, a new pancake chain, is having difficulty finding pancake chefs. This is a business problem that falls into the:A) management dimension.B) people dimension.C) organizational dimension.D) technical dimension.Answer: CDiff: 3 Page Ref: 22AACSB: Reflective ThinkingCASE: Analysis in terms of categorize51) In choosing the best solution for a business problem, one of the most important considerations is:A) change management.B) existing resources and skills.C) employee training.D) outcome measurement.Answer: BDiff: 3 Page Ref: 22AACSB: Analytic SkillsCASE: Synthesis in terms of predicting52) The final step in the four-step model of business problem solving is:A) outcome.B) implementation.C) change management.D) feedback.Answer: BDiff: 1 Page Ref: 22AACSB: Reflective ThinkingCASE: Comprehension53) Which of the following would not be considered part of the implementation phase of problem solving?A) change managementB) purchasing hardware for an information systems solutionC) training an employee on new systems softwareD) evaluating a selection of software packages for implementing a new business process Answer: DDiff: 2 Page Ref: 22-23AACSB: Analytic SkillsCASE: Analysis in terms of categorize54) The failure of NASA's initial solution to preventing the space shuttle shedding foam illustrates:A) the importance of training employees on new business processes.B) the need to prepare for measuring outcomes of a business solution.C) the continuous nature of problem solving.D) the need to quickly adapt to new technological innovations.Answer: CDiff: 2 Page Ref: 23AACSB: Analytic SkillsCASE: Analysis in terms of compare55) One of the most frequent errors in problem solving is:A) rushing to judgment.B) not being aware of personal limitations.C) being too doubtful.D) following a rote pattern of decision making.Answer: ADiff: 2 Page Ref: 23AACSB: Reflective ThinkingCASE: Comprehension56) A major criterion in deciding the most important perspectives of a business problem is:A) implementation.B) change management.C) usefulness.D) organizational needs.Answer: CDiff: 3 Page Ref: 24AACSB: Reflective ThinkingCASE: Comprehension57) Which of the following is an example of a business using information systems to create new products and services?A) Apple's creation of the iPodB) JC Penney's information system that allows its contract manufacturers to see what garments have been sold and need to be replacedC) Toyota's legendary TPS that has created superlative efficiencies and enabled Toyota to become the world's largest auto makerD) Verizon's Web-based digital dashboard providing real-time company information for managersAnswer: ADiff: 2 Page Ref: 11AACSB: Analytic SkillsCASE: Analysis in terms of categorize58) An example of a business using information systems to attain competitive advantage is:A) Apple's creation of the iPod.B) JC Penney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.C) Toyota's legendary TPS that has created superlative efficiencies and enabled Toyota to become the world's largest auto maker.D) Verizon's Web-based digital dashboard providing real-time company information for managers.Answer: CDiff: 2 Page Ref: 12AACSB: Use of ITCASE: Analysis in terms of categorize59) An example of a business using information systems for customer and supplier intimacy is:A) Apple's creation of the iPod.B) JC Penney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.C) Toyota's legendary TPS that has created superlative efficiencies and enabled Toyota to become the world's largest auto maker.D) Verizon's Web-based digital dashboard providing real-time company information for managers.Answer: BDiff: 2 Page Ref: 11AACSB: Analytic SkillsCASE: Analysis in terms of categorize60) An information skill important for an accounting major would be:A) an understanding of system and network security issues.B) an understanding of product management enterprise systems.C) an understanding of supplier management enterprise systems.D) an understanding of enterprise systems that enhance leadership.Answer: ADiff: 3 Page Ref: 25AACSB: Reflective ThinkingCASE: Comprehension61) An information skill important for a marketing major would be:A) an understanding of system and network security issues.B) an understanding of product management enterprise systems.C) an understanding of supplier management enterprise systems.D) an understanding of enterprise systems that enhance leadership.Answer: BDiff: 2 Page Ref: 26AACSB: Reflective ThinkingCASE: Comprehension62) Maintaining the organization's financial records is a business function of:A) accounting.B) financeC) salesD) marketing.Answer: ADiff: 1 Page Ref: 25AACSB: Reflective ThinkingCASE: Comprehension63) Branding products is a business function of:A) manufacturing and production.B) finance and accounting.C) human resources.D) marketing.Answer: DDiff: 1 Page Ref: 26AACSB: Reflective ThinkingCASE: Comprehension64) To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. This is an example of using information systems to support a business strategy of:A) new products, services, and business models.B) survival.C) customer and supplier intimacy.D) improved decision making.Answer: CDiff: 2 Page Ref: 11AACSB: Analytic SkillsCASE: Analysis in terms of categorize65) Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals.A) operations managersB) senior managersC) marketing managersD) accounting managersAnswer: BDiff: 2 Page Ref: 26AACSB: Reflective ThinkingCASE: Comprehension66) Operations management as a discipline is directly relevant to three occupational categories:A) industrial production managers, operations analysts, and administrative service managers.B) project managers, production managers, and administrative service managers.C) project managers, production managers, and industrial production managers.D) finance, accounting, and management.Answer: ADiff: 2 Page Ref: 26-27AACSB: Reflective ThinkingCASE: Comprehension67) Assume you work for a package delivery service in a major metropolitan area, and that the business has been losing customers for several years. You have been asked to find a solution to this problem, perhaps one which uses modern information technologies. What is the correct way to proceed?A) Look for solutions, evaluate the solutions, identify the problem more clearly, and then implement the solution.B) Think about what solutions can be implemented, look for solution designs, evaluate the designs, and then implement the solution.C) Identify the problem, design alternative solutions, choose the best solution, and then implement the solution.D) Design solutions, evaluate and identify the problems, choose the best solution, and then implement the solution.Answer: CDiff: 2 Page Ref: 20-21AACSB: Analytic SkillsCASE: Analysis in terms of organizing68) Which of the following statements is not true?A) The most common and successful offshore outsourcing projects involve production programming and system maintenance programming work, along with call center work.B) Inflation in Indian wages for technology work is leading to a counter movement of jobs back to the United States.C) The fear that offshore outsourcing will reduce demand for new information system hires in the U.S. is mitigated by the fact that reduced IT expenditures results in increased IT investments and the creation of domestic jobs.D) The impact of domestic IT outsourcing has been very disruptive to some regional areas of the U.S.Answer: DDiff: 2 Page Ref: 28AACSB: Reflective ThinkingCASE: Comprehension69) The culture of UPS places service to the customer among the company's highest business objectives, which is reflected in their use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems?A) Business culture has to be synchronized with new technology.B) The business culture provides the vision and inspiration for information system solutions.C) People are a company's most important asset.D) Businesses without culture do not understand new technology.Answer: BDiff: 3 Page Ref: 15-16AACSB: Analytic SkillsCASE: Evaluation in terms of assess70) Based on your reading of the case discussing mobile handhelds, Doylestown Hospital's use of iPhones is an example of using information systems to enhance which of the following generic business objectives?A) SurvivalB) New products, services, and business modelsC) Improved decision makingD) Customer and supplier intimacyAnswer: CDiff: 3 Page Ref: 8AACSB: Analytic SkillsCASE: Evaluation in terms of categorize71) ________ is data that has been shaped into a form that is meaningful to human beings. Answer: InformationDiff: 1 Page Ref: 13AACSB: Reflective ThinkingCASE: Comprehension72) ________ is output returned to appropriate members of the organization to help them evaluate or correct the input stage.Answer: FeedbackDiff: 2 Page Ref: 14AACSB: Reflective ThinkingCASE: Comprehension73) The world's largest and most widely used network is ________.Answer: the InternetDiff: 1 Page Ref: 17AACSB: Reflective ThinkingCASE: Comprehension74) ________ consists of the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.Answer: Computer software/softwareDiff: 1 Page Ref: 17AACSB: Reflective ThinkingCASE: Comprehension75) The ________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format.Answer: World Wide Web/Web/WWWDiff: 1 Page Ref: 17AACSB: Reflective ThinkingCASE: Comprehension76) ________ are private corporate networks extended to authorized users outside the organization.Answer: ExtranetsDiff: 1 Page Ref: 17AACSB: Reflective ThinkingCASE: Comprehension77) In business problem solving, the three major categories of factors are organization, technology, and ________.Answer: peopleDiff: 2 Page Ref: 20AACSB: Reflective ThinkingCASE: Comprehension78) Having inadequate resources is a business problem that falls into the ________ dimension. Answer: organizationalDiff: 3 Page Ref: 22AACSB: Reflective ThinkingCASE: Comprehension79) Encouraging employees to adapt to new business processes is one factor of ________. Answer: change managementDiff: 3 Page Ref: 23AACSB: Reflective ThinkingCASE: Comprehension80) Being aware of organizational and personal limitations is one of the four elements of________.Answer: critical thinking.Diff: 2 Page Ref: 23AACSB: Reflective ThinkingCASE: Comprehension81) Define operational excellence. How can information systems help achieve it?Answer: Operational excellence is the achievement of higher levels of productivity and efficiency. Information systems can help achieve operational excellence by improving communications to supplier and optimizing the supply chain. Information systems could help managers communicate with workers more efficiently, enable technological innovation in products, minimize warehouse overhead, streamline distribution.Diff: 2 Page Ref: 10-11AACSB: Use of ITCASE: Synthesis in terms of devising82) You work for an auto manufacturer and distributor. How could you use information systems to achieve greater customer intimacy?Answer: You could create a web site that allows customers to customize cars, communicate with support personnel and other car owners. You could create an automated e-mail service reminding car owners to take their car in for periodic check ups. You could have an information system that tracks customer preferences in local areas, so you can provide cars that reflect local customer needs and desires.Diff: 2 Page Ref: 11-12AACSB: Reflective ThinkingCASE: Synthesis in terms of applying83) What important managerial function is impaired by not having access to timely and accurate information? What is the effect of this lack of data?Answer: The managerial function is decision-making. Without access to timely and accurate information business managers rely on forecasts, best guesses, and luck. The result is over- or underproduction of goods and services, misallocation of resources, and poor response times. These poor outcomes raise costs and lose customers.Diff: 2 Page Ref: 12AACSB: Use of ITCASE: Evaluation in terms of justify84) What is the difference between information technology and information systems? Describe some of the functions of information systems.Answer: Information technology (IT) consists of all the hardware and software that a firm needs to use in order to achieve its business objectives. Information systems are more complex. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization.The functions of an information system are to support decision making, coordination, and control; help employees analyze problems; help employees visualize complex subjects; and help create new products.Diff: 2 Page Ref: 13AACSB: Use of ITCASE: Synthesis in terms of applying, generalizing85) You are a marketing manager for a national movie theater chain. Give an example of data that your department could use for creating meaningful information. What type of information could that data produce?Answer: Movie ticket sales from individual theaters would be an example of raw data. Meaningful information from this would be: average number of tickets sold to seniors on certain days of the week.Diff: 1 Page Ref: 13-14AACSB: Use of ITCASE: Synthesis in terms of devising。
TheCaseforLogStructuringinDatabaseSystemsDavidB.LometMicrosoftResearchOneMicrosoftWay,Bldg.9Redmond,WA98055
1IntroductionandBackgroundThenotionofalogstructuredfilesystem(LFS)[6,9]evolvedfromearliereffortsusingsimilartechniques[8,2]asameanstoimprovewriteperformanceoffilesystems.Otherbenefitsincludefastermetadataoperations,e.g.filecreateanddelete.ButthereiscontroversyaboutthetheutilityofLFSfordatabasesystems,especiallyinlightofthecritiquein[10].ThispositionpaperarguesthatLFShaswonderfulpotentialastheunderpinningofadatabasesystem,solvinganumberofproblemsthatareknowntobequitevexing,andprovidingsomeadditionalimportantbenefits.Theseincludeatomicwrites,systemmanagementandscalability,storageefficiency,andrecoverysystemperformance.Therearethreeinter-relatedideasinLFS.
LFSvirtualizestheplacementoffilesondisk.Everywritetoafiledynamicallyrelocatesthedatabeingwritten.Thus,awritemustalsoupdatethedatastructuresinvolvedinthisrelocationmapping.
TheCaseforReexaminingIntegratedFileSystemDesignPrashantShenoyDepartmentofComputerScience,UniversityofMassachusettsatAmherstshenoy@cs.umass.edu
Abstract—Researchinintegratedfilesystems—filesys-temsthatsupportdifferenttypesofdataandapplica-tionswithdiverseperformancerequirements—hasstag-natedsincethecommercialfailureofvideo-on-demandsys-temsinthe1990s.However,thepasttwoyearshaveseenanaccelerationinthedevelopmentanddeploymentofsev-eralnewtechnologiesaimedatweb-basedmultimediaap-plications.Thesetechnologieshaveopenedupafertilere-searchgroundfornewfilesystemoptimizationsandrekin-dledinterestinintegratedfilesystems.Inthispaper,wede-scribesomeofthesetechnologytrends,examinetheirim-plicationsonfilesystemdesign,andpresentasamplingofthenewresearchproblemsthatariseduetothesetechno-logicalchanges.Basedontheseobservations,weargueforarenewedeffortindesigningnext-generationintegratedfilesystems.
I.TECHNOLOGYTRENDS
Anintegratedfilesystemisageneral-purposefilesys-temthatsupportsapplicationswithdiverseperformancerequirements(e.g.,interactive,throughput-intensive,softreal-time)accessingdatawithdifferentcharacteristics(text,images,streamingmedia).Whileintegratedfilesys-temshaveevolvedfromcontinuousmediaservers,theyareinherentlydifferentandmorecomplexthanavideo-on-demandserver.Specifically,acontinuousmediaserverisaspecial-purposefilesystemoptimizedforasingledatatype,namelystreamingmedia,whileanintegratedfilesys-temsupportsadiversesetofapplicationsanddatatypesfoundingeneral-purposecomputingenvironments.Anin-tegratedfilesystemisalsodifferentfromaconventionalfilesystem—theformerisawareofthesemanticsofthestoreddataandemploysmechanismsthatexploitthesese-manticstocatertodifferenttypesofapplications,whilethelatteristypicallyobliviousofsemanticsoffilesandprovidesasimplebest-effortservicetoallapplications.Whereasseveralintegratedfilesystemsweredesignedinthemid1990s[4],[5],[6],[11],researchinintegratedfilesystemshasstagnatedintherecentpast.However,thedevelopmentanddeploymentofseveralnewtechnologiesforemergingweb-basedmultimediaapplicationshasne-
ThisresearchwassupportedinpartbyanNSFCAREERawardCCR-9984030,NSFgrantsANI-9977635,CDA-9502639,Intel,Sprint,andtheUniversityofMassachusetts.
TABLEIPROJECTEDGROWTHINNUMBEROFUSERSWITH
HIGH-SPEEDINTERNETACCESS
YearCableModemDSLWirelessbroadband20001.6million0.78million52,00020013.1million1.7million160,00020025.3million3.1million337,00020038.3million5.0million445,000
cessitatedarethinkingofthedesignofsuchfilesystems.Considerthefollowingtechnologytrendsthatarefuelingthegrowthofweb-basedmultimediaapplications.Proliferationofstreamingmediacontent:Althoughen-visagedintheearly1990sinthecontextofvideo-on-demandservers,itisonlyinthepasttwoyearsthatstream-ingmediahasgainedwidespreaduse.ArecentsurveyhasfoundthatthenumberofInternetusersaccessingstream-ingmediacontenthasexceeded50millionandisgrowing.Tocatertothisclientele,anincreasingfractionofwebsitestodayprovidecontentinRealAudio/Video,Quicktime,orWindowsMediaformats.AudiofilesinMP3formatareimmenselypopular(althoughillegal)onmostuniversitycampuses.ThistrendisonlylikelytoacceleratewiththeadventofinexpensivemultimediaPCsandwidelyavail-able,freesoftwaredecoders.Broadbandtothehome:Concurrenttothegrowinguseofstreamingmedia,technologiessuchascablemodemsanddigitalsubscriberlines(DSL)haveemerged,whichpromisehigh-speedInternetaccesstohomeusers.Incon-trasttotheslow56Kbpsanalogmodemspeeds,thesetechnologiesprovideeithera10Mbpssharedconnection(incaseofcablemodems)ora384Kbpsdedicatedcon-nection(incaseofDSLmodems).TableIdepictsthepro-jectedgrowthofuserswithhigh-speedInternetaccess[7].Thewideavailabilityofhigherbandwidthconnectionsisresultinginincreasinguseofbandwidth-starvedapplica-tionssuchas3Dmulti-playergames,onlinevirtualworlds,andhigh-qualitycontinuousmedia.Proliferationofnetworkeddevices:Thepastfewyearshaveseenasubstantialincreaseintheuseofnetworkedpersonaldigitalassistants(PDAs).PopularPDAs,suchasPalmVII,comeequippedwithalowbandwidthwire-lessconnectionthatenablethemtoinstantlyaccessinfor-mationontheInternet.Moreover,manycellularphoneprovidersnowofferwirelessdataservicesthatenableausertoaccesstheInternetviaamobilecomputeroracus-tombrowserbuiltintothephone.Akeycharacteristicofthesenetworkeddevicesisthattheyareresource-scarce—theyhavesignificantlysmallerprocessinganddisplayca-pacitiesascomparedtoatypicaldesktopaswellasalowerbandwidthnetworkconnection(seeTableII)Emergenceofstorageareanetworks:Traditionally,stor-ageservershaveemployedtheserver-attacheddiskar-chitecture,inwhichdisksarelocallyattachedtoserversandclientsaccessdataondisksviatheserver(seeFig-ure1(a)).Recently,anewstoragearchitecturehasevolvedthatenvisionsaseparationofstoragedevicesfromservers[1],[2],[9],[12].Thisarchitectureconsistsofastorageareanetwork(SAN)towhichstoragedevicessuchasdisksareattached;serversaccessthesedevicesviathestorageareanetwork(seeFigure1(b)).Suchanetwork-attacheddiskarchitectureismarkedlydifferentfromthetraditionalserver-attacheddiskarchitecture:(i)itallowsclientstodi-rectlyaccessdatafromdiskswithouttheserverinthedatapath;(ii)itismoreresilienttofailures,sinceaserverfail-urecanbehandledbyemployinganotherservertomanagethesetofdisks.Webelievethatthesetechnologytrendswillprofoundlyimpacthowfilesystemswillbedesignedandusedinthenextdecade.Inwhatfollows,weexaminetheimpactofthesetrendsonfilesystemdesign.II.TECHNOLOGYIMPLICATIONSThefirsttwotechnologytrends—thegrowinguseofcontinuousmediafilesandtheavailabilityofhigh-speedInternetaccess—argueforfilesystemsthatcanefficientlyhandlestreamingmediadata.However,special-purposefilesystemsthatsupportonlystreamingmediadatabutnototherdatatypes(e.g.,video-on-demandservers)areunsuitableforthispurpose.Thisisbecauseemergingap-plicationsaccessadiversesetofdatatypesandnotjuststreamingmedia.Toillustrate,atypicaldistancelearningapplicationaccessesclassmaterialsconsistingoftextualandimagedataandclasslecturesconsistingofstream-ingmedia;evencommonlyusedpresentationpackagessuchasPowerPointuseacombinationoftext,imagesandstreamingmediadataformultimediapresentations.Thisarguesforthedesignofasinglefilesystemthatintegratesthestorageofdifferenttypesofdataandefficientlyser-vicesdifferenttypesofapplications(e.g.,streamingap-plications,traditionalinteractiveandthroughput-intensiveapplications).Werefertosuchafilesystemasaninte-gratedfilesystem.Integratedfilesystemssimplifysys-temadministrationtaskssincetheyreducethenumberofdisparatesystemsthatneedtobemaintained;ithasbeenarguedthatsystemadministrationisoftenthedominantcostincomputingenvironments[3].Integratedfilesys-temsalsoincreaseutilitytousesbyeliminatingtheneedtostoreandmanagedifferenttypesoffilesondifferentservers(e.g.,storetextualfilesonaconventionalfilesys-tem,audioandvideofilesonastreamingmediaserver).Furthermore,performancestudieshaveshownthatshar-ingofresourcesinintegratedfilesystemsyieldssignificantperformancebenefitsoverapartitionedarchitectureem-ployingseparateservers[10].Whilethesebenefitscomeattheexpenseofincreasedfilesystemcomplexity,anum-berofconventionalfilesystemsareneverthelessmovingtowardsanintegratedarchitecturebyprovidingnativesup-portfordatatypessuchasaudioandvideo[4],[5].