16 Jan


(F) 1. All sizes of computers typically use the same operating system because operating systems generally are written to
run on any type of computer.

(F) 2. Booting is the process of permanently removing a computer from operation.

(T) 3. Permissions define who can access certain resources and when they can access those resources.

(T) 4. A device-independent program is one that runs only on a specific type or make of computer.

(T) 5. Users can control and customize a variety of gadgets on the Windows desktop.

(T) 6. Linux is open source software, which means its code can be modified and redistributed.

(T) 7. BlackBerry devices provide PIM capabilities such as managing schedules, contacts, and appointments, as well as
phone capabilities.

(T) 8. Windows allows you to manage your documents, pictures, music, and other files using Windows Explorer.

(F) 9. An adware remover is a program that de tects and deletes spam.

(T) 10. Phishing is a scam in which a perpetrator attempts to obtain your personal and/or financial information.

Multiple Choice

1. The (C) chip, which uses battery power, stores
configuration information about the computer.
c. POST d. RAM

2. Windows users can increase the size of memory
through (B), which can allocate available storage
space on removable flash memory devices as additional
memory cache.
a. Windows Aero b. Windows ReadyBoost
c. Plug and Play d. a disk defragmenter

3. A (C) is a mini-program with minimal functionality
that connects to another program or provides information.
a. service pack b. search utility
c. gadget d. swap file

4. When you enter search criteria, instead of looking through
every file and folder on the storage medium, the search
utility looks through the (A) first to find a match.
a. index b. buffer
c. file manager d. driver

5. Defragmenting reorganizes the files on a disk so that
they are located in (C) access time.
a. noncontiguous sectors, which slows b. contiguous sectors, which slows
c. contiguous sectors, which speeds d. noncontiguous sectors, which speeds

6. (D) is a utility that detects and protects a personal
computer from unauthorized intrusions.
a. Automatic updates b. Sleep mode
c. Windows Explorer d. Windows Firewall

7. (C) is a program that displays an online
advertisement in a banner or pop-up window on
Web pages, e-mail, or other Internet services.
a. Spyware b. A Trojan horse
c. Adware d. Spam

8. A(n) (A) is a program that warns or blocks you from
potentially fraudulent or suspicious Web sites. (427)
a. phishing filter b. Web filter
c. adware remover d. Trojan horse


1. sleep mode _ f. saves any open documents and programs to RAM, turns off all unneeded functions, and
then places the computer in a low-power state

2. hibernate _ c. saves any open documents and programs to a hard disk before removing power from the

3. page _ g. with virtual memory, the amount of data and program instructions that can be swapped at
a given time

4. user name _ d. unique combination of characters that identifies one specific user

5. Aero Flip 3D _ e. works with the mouse to flip through windows by rolling the wheel on the mouse

6. UNIX _ h. multitasking operating system developed in the early 1970s by scientists at Bell Laboratories

7. virtualization _ a. the practice of sharing or pooling computing resources, such as servers

8. NetWare _ b. server operating system designed for client/server networks

9. Google Andriod _ i. operating system for mobile devices

10. shortcut _ j. an icon on the desktop or in a folder that provides a user with immediate access to a
program or file

Short Answer

1. How is a cold boot different from a warm boot? Cold boot is turning on a computer that has been powered off completely.
Warm boot is using the operating system to restart a computer.

How is a memory-resident part of an operating system
different from a nonresident part of an operating system? memory-resident is a part that remain in memory while the computer is running.
non-resident is a part that remain in a storage medium until needed.

2. What is a user interface? user interface determine how you put the input and how the output is displayed on the screen.

How are graphical and command-line user interfaces different? to input command(s), graphical user interface use
visual images, such as buttons and more.
command-line user interface on the other hand, use
combination of characters and symbols.

3. What is the purpose of an automatic update feature? the purpose of automatic update system is to automaticly provide update for a
program or system. update(s) fix bugs, enhance performance and security.

Why and when might a user receive a service pack? software makers sometimes provide free downloadable updates for user
that have register and/or has activated their software.

4. What happens during a backup? A backup utility allows users to copy, or back up, selected files or an entire hard disk to
another storage medium such as another hard Figure 8-33 A backup utility allows
users to copy files or an entire hard disk to another storage medium.
During the back up process, the utility monitors progress and alerts you if it needs additional
media. Many backup programs compress, or shrink the size of, files during the backup process.

What is the purpose of a restore utility? because backup file is usually compressed form of the actual file. the backup file can’t
be used right away. restore utility convert the compressed file back to the actual file.

5. Describe four embedded operating systems. -Palm OS
-iPhone OS
-Google Android
-Symbian OS

What are the uses for each of the four types?
Palm OS |iPhone OS |Google Android |Symbian OS
| | |
manage schedules and contacts, |manage contacts and notes, |maps and obtain directions, |maintain contact lists; save
phone messages, notes, task and |send and receive e-mail and text messages, |listen to music, watch |appointments; browse the Web;
address lists, and appointments.|take pictures, record videos, record voice |movies and videos, and |and send and receive text and
|messages, view a compass, connect to the Internet |display photos. |picture messages, e-mail,
|wirelessly and browse the Web, check stocks, access|allows programmers to design |and fax using a smart phone.
|maps and obtain directions, listen to music, watch |programs specifically for devices|
|movies and videos, and display photos. |supporting this operating system.|


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: