Multiple Choice

typoweheeElectronics - Devices

Nov 8, 2013 (3 years and 9 months ago)

302 views

Multiple Choice


1.

Which of the following is
not

an operating system function?

a.

starting the computer

b.

managing programs

c.

word processing

d.

establishing an Internet connection


2.

The operating system typically resides on the computer’s ____.

a.

floppy d
isk

b.

hard disk

c.

CD
-
ROM

d.

ROM chip


3.

The operating system a computer uses is called the ____.

a.

platform

b.

driver

c.

kernel

d.

buffer


4.

When turning on a computer that has been powered off completely, you are
performing a ____.

a.

hot boot

b.

reboot

c.

warm boot

d
.

cold boot

Note:

If you are preparing an examination using your own word processor, for
Multiple Choice question 5 you must insert
Figure13.bmp
. Students
reference this figure to answer the question. To insert Figure13.bmp, use the
Picture command on the
Insert menu. When the Insert Picture dialog box
displays, select Figure13.bmp from the Printed Test Bank folder in the Test
Bank & Test Engine main menu item and make sure the Link to File check
box is not checked.


5.

As shown in the accompanying figure, to
perform a warm boot,
click

the
____

button on the Windows desktop.

a.

Stand By

b.

Turn Off

c.

Restart

d.

Cancel


6.

A(n) ____ computer continues to operate when one of its components fails.

a.

fail
-
safe

b.

fault
-
tolerant

c.

faulty

d.

always
-
on


7.

____ is a conc
ept in which the operating system allocates a portion of a storage
medium to function as additional RAM.

a.

Fault
-
tolerant memory

b.

Redundant memory

c.

Logical memory

d.

Virtual memory


8.

The operating system technique of swapping items between memory and s
torage
is called ____.

a.

paging

b.

spooling

c.

swapping

d.

thrashing


9.

When an operating system spends much of its time paging, instead of executing
application software, it is said to be ____.

a.

idling

b.

ripping

c.

spooling

d.

thrashing


10.

The process cal
led ____ sends print jobs to a buffer instead of sending them
immediately to the printer.

a.

paging

b.

spooling

c.

swapping

d.

waiting


11.

Multiple print jobs line up in a ____ within a buffer.

a.

queue

b.

row

c.

page

d.

virtual

page


12.

To protect sensitive dat
a and information as it travels over a network, a network
operating system often ____ it.

a.

encrypts

b.

decrypts

c.

deletes

d.

monitors


13.

Which of the following is
not

a utility function?

a.

managing files

b.

viewing graphics files

c.

controlling the keybo
ard

d.

uninstalling programs


14.

A(n) ____ is a utility that allows users to display, copy, and print the contents of a
graphics file.

a.

video card

b.

video driver

c.

scanner

d.

image viewer


15.

To
defragment

a disk means to ____.

a.

slow it down

b.

diagnose pr
oblems with it

c.

reorganize it

d.

repair it


16.

New versions of an operating system usually are ____ compatible.

a.

upward

b.

downward

c.

reverse

d.

pre
-


17.

Which of the following is
not

a type of operating system?

a.

wireless

b.

stand
-
alone

c.

network

d.

embe
dded


18.

DOS was developed in the early ____.

a.

1960s

b.

1970s

c.

1980s

d.

1990s


19.

Windows XP 64
-
bit Edition is designed for workstations that use a(n) ____
processor.

a.

Pentium 4

b.

Itanium 2

c.

Titanium 3

d.

Motorola 4


20.

Linux is ____ software, which means
its code is available to the public for use,
modification, and redistribution.

a.

open source

b.

free source

c.

proprietary

d.

embedded


21.

Novell’s Netware is a(n) ____ operating system.

a.

stand
-
alone

b.

open source

c.

network

d.

embedded


22.

UNIX and Linux often are call
ed ____ operating systems because they are both
stand
-
alone and network operating systems.

a.

multipurpose

b.

multiprocessing

c.

multithreaded

d.

multiprogramming


23.

A ____ hides within or looks like a legitimate program such as a screen saver.

a.

virus

b.

w
orm

c.

spyware

d.

Trojan horse


24.

____ is a program placed on a computer without the user’s knowledge that
secretly collects information about the user.

a.

A virus

b.

A worm

c.

Spyware

d.

A Trojan horse


25.

Compressed files sometimes are called ____ files.

a.

zapped

b.

zip
ped

c.

reduced

d.

encrypted


True/False

T

F

1.

Application software serves as the interface between the user and the computer
hardware.

T

F

2.

There are two types of system software.

T

F

3.

Utility programs are considered to be application software.

T

F

4.

Some ope
rating systems allow users to control a network and administer security.

T

F

5.

On mobile devices, the operating system may reside on a RAM chip.

T

F

6.

An operating system handles many functions automatically, without requiring any
instructions from a user.

T

F

7.

A mainframe computer often will use the same operating system as a PC.

T

F

8.

Although many operating systems exist, most perform similar functions.

T

F

9.

When you purchase application software, it normally identifies the platform needed.

T

F

10.

When you in
stall new software you must perform a cold boot.

T

F

11.

When you are finished using the computer it is acceptable simply to turn it off.

T

F

12.

Command
-
line interfaces are difficult to use because they require exact spelling,
grammar, and punctuation.

T

F

13.

A s
ingle user/multitasking operating system allows a single user to work with only
one program at a time.

T

F

14.

How an operating system handles programs directly affects users’ productivity.

T

F

15.

PDAs, smart phones, and other small computing devices often use
a single
user/single tasking operating system.

T

F

16.

In a multitasking environment, many programs run in the foreground, while one
program remains in the background.

T

F

17.

The program in the background is the active program.

T

F

18.

One drawback of multiprocess
ing is that it tends to reduce a computer’s processing
speed.

T

F

19.

Because virtual memory is faster than RAM, users may notice the computer
speeding up while it uses virtual memory.

T

F

20.

Multiuser operating systems always process jobs on a first
-
come, firs
t
-
served basis.

T

F

21.

Fault
-
tolerant computers have

duplicate components such as processors, memory,
and disk drives.

T

F

22.

While waiting for devices to become idle, the operating system places items in
buffers.

T

F

23.

Virtual memory is faster than RAM.

T

F

24.

T
he operating system determines the order in which jobs are processed.

T

F

25.

If you attach a new device to a computer, its driver must be installed before you can
use the device.

T

F

26.

Plug and Play means that the operating system automatically configures new

devices as you install them.

T

F

27.

All operating systems have network features built into them.

T

F

28.

A network administrator is a program that monitors network performance.

T

F

29.

The operating system records successful and unsuccessful logon attempts in a f
ile.

T

F

30.

Encryption is the process of encoding data and information into an unreadable form.

T

F

31.

Most floppy and hard disk manufacturers do not preformat their disks.

T

F

32.

A personal firewall constantly monitors all transmissions to and from a computer.

T

F

33.

A disk scanner is a utility that removes a program from system files.

T

F

34.

An uninstaller detects and corrects physical and logical problems on a hard disk.

T

F

35.

Users with broadband Internet connections are less susceptible to intrusions or
attacks b
y hackers.

T

F

36.

Screen savers originally were developed to prevent a problem called etching, in
which images could be permanently etched on a monitor’s screen.

T

F

37.

Fragmentation slows down disk access and the performance of the entire computer.

T

F

38.

Palm
OS is an example of a stand
-
alone operating system.

T

F

39.

DOS hardly is used today because it does not offer a graphical user interface and
cannot take full advantage of 32
-
bit personal computer processors.

T

F

40.

UNIX is available only with a command
-
line in
terface.

T

F

41.

Linux is an example of proprietary software, which means that its code is available
to the public.

T

F

42.

Symbian OS is an example of an embedded operating system.

T

F

43.

Windows CE is designed for use on computing devices with limited functional
ity.

T

F

44.

Most antivirus programs also protect against worms and Trojan horses.

T

F

45.

An anti
-
spam program restricts access to certain material on the Web.

T

F

46.

An Internet filter removes or blocks certain items from being displayed.

T

F

47.

Some schools, libr
aries, and parents use spyware removers to restrict access to
minors.

T

F

48.

Uncompressing a file is the same as zipping a file.

T

F

49.

CD/DVD burning software usually includes photo editing, audio editing, and video
editing capabilities.

T

F

50.

A pop
-
up ad is a
n unsolicited e
-
mail message or newsgroup posting sent to many
recipients or newsgroups at once.