Tutorial 6 Computer App

17
This is the html version of the file http://uogonline.com/drlee/CS200/Homework/Hwk7- Solutions.rtf . CS200-Chapter7-Homework Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Which of the following is not an operating system function? a. starting the computer c. word processing b. managing programs d. establishing an Internet connection ____ 2. A(n) ____ boot is the process of using the operating system to restart a computer. a. warm c. start b. cold d. new ____ 3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Lock button menu. a. Stand By c. Restart b. Turn Off d. Cancel

Transcript of Tutorial 6 Computer App

Page 1: Tutorial 6 Computer App

This is the html version of the file http://uogonline.com/drlee/CS200/Homework/Hwk7-Solutions.rtf.

CS200-Chapter7-Homework

Multiple Choice

Identify the choice that best completes the statement or answers the question.

____ 1. Which of the following is not an operating system function?

a. starting the computer c. word processing

b. managing programs d. establishing an Internet connection

____ 2. A(n) ____ boot is the process of using the operating system to restart a computer.

a. warm c. start

b. cold d. new

____ 3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Lock button menu.

a. Stand By c. Restart

b. Turn Off d. Cancel

____ 4. A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen.

a. control c. user

b. utility d. management

____ 5. In a(n) ____, the user types commands or presses special keys on the keyboard to enter data and instructions.

Page 2: Tutorial 6 Computer App

a. command-line interface c. performance-monitor interface

b. menu-driven interface d. graphical user interface (GUI)

____ 6. With a(n) ____ interface, users interact with menus and visual images such as buttons and other graphical objects to issue commands.

a. command-line interface c. performance-monitor interface

b. menu-driven interface d. graphical user interface (GUI)

____ 7. The purpose of memory ____ is to optimize the use of RAM.

a. performance c. throttling

b. management d. integration

____ 8. A(n) ____ is an operation the processor manages.

a. buffer c. task

b. spool d. event

____ 9. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.

a. paging c. swapping

b. spooling d. waiting

____ 10. Multiple print jobs line up in a ____ within a buffer as shown in the accompanying figure.

Page 3: Tutorial 6 Computer App

a. queue c. page

b. row d. virtual page

____ 11. ____ means the operating system automatically configures new devices as you install them.

a. Virtual memory c. Page logging

b. Operational buffering d. Plug and Play

____ 12. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.

a. client c. integrated

b. multitasking d. server

____ 13. A network ____, the person overseeing network operations, uses the network operating system to add and remove users, computers, and other devices to and from the network.

a. administrator c. client

b. owner d. master

____ 14. A(n) ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

a. user name c. client

b. password d. cycle

Page 4: Tutorial 6 Computer App

____ 15. A performance ____ is a program that assesses and reports information about various computer resources and devices.

a. monitor c. reporter

b. manager d. roster

____ 16. A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources.

a. folder c. user name

b. password d. cipher

____ 17. Which of the following is not a utility function like the ones shown in the accompanying figure?

a. managing files c. controlling the keyboard

b. viewing images d. uninstalling programs

____ 18. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file.

a. video card c. scanner

b. video driver d. image viewer

____ 19. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____, is a utility that performs functions related to file management.

a. monitor c. scanner

Page 5: Tutorial 6 Computer App

b. manager d. controller

____ 20. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.

a. application remover c. uninstaller

b. application purger d. antiapp utility

____ 21. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk ____ utility searches for and removes unnecessary files.

a. diagnostic c. operator

b. uninstaller d. cleanup

____ 22. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a screen ____, is a utility that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

a. manager c. utility

b. saver d. protector

____ 23. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions.

a. firewall c. threat neutralizer

b. antihacker d. protection utility

Page 6: Tutorial 6 Computer App

____ 24. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____ utility identifies computer problems but does not repair them.

a. troubleshooting c. operational

b. executional d. diagnostic

____ 25. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____ utility, shrinks the size of a file.

a. scanner c. defragmenter

b. compression d. archiver

____ 26. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance.

a. maintenance c. functional

b. multitasking d. proprietary

____ 27. Which of the following is not a type of operating system?

a. wireless c. server

b. stand-alone d. embedded

____ 28. The first version of Windows was developed in the early ____.

a. 1960s c. 1980s

b. 1970s d. 1990s

Page 7: Tutorial 6 Computer App

____ 29. A(n) ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.

a. multitasking c. single-user

b. media-based d. stand-alone

____ 30. Which of the following is NOT an edition of Windows Vista?

a. Enterprise c. Home Premium

b. Ultimate d. Business

____ 31. Apple’s latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.

a. Safari c. OS X

b. OS IX d. OS XI

____ 32. To defragment a disk means to ____.

a. slow it down c. reorganize it

b. diagnose problems with it d. repair it

____ 33. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.

a. firewall c. virus

b. agent d. spyware

Page 8: Tutorial 6 Computer App

____ 34. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.

a. Compression software c. Resident software

b. Symbianware d. Adware

____ 35. To ____ a file, you restore a zipped file to its original form.

a. restore c. zip

b. archive d. uncompress

____ 36. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.

a. blocker c. stopper

b. driver d. monitor

____ 37. Compressed files sometimes are called ____ files.

a. skipped c. zipped

b. controlled d. defragmented

____ 38. ____ is a popular stand-alone file compression utility.

a. Smasher c. CompUtil

b. PKZIP d. All of the above

Page 9: Tutorial 6 Computer App

____ 39. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.

a. Phishing c. Pharming

b. Zipping d. Authenticating

____ 40. A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

a. operating c. zipping

b. phishing d. antispam

True/False

Indicate whether the statement is true or false.

____ 41. On mobile devices, the operating system may reside on a RAM chip.

____ 42. The boot process is similar for large and small computers.

____ 43. In a multitasking environment, many programs run in the foreground, while one program remains in the background.

____ 44. One drawback of multiprocessing is that it tends to reduce a computer’s processing speed.

____ 45. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory.

____ 46. Multiuser operating systems always process jobs on a first-come, first-served basis.

____ 47. While waiting for devices to become idle, the operating system places items in buffers.

____ 48. If a printer does not have its own internal memory or if its memory is full, the operating system’s buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed.

____ 49. Virtual memory is faster than RAM.

____ 50. The operating system determines the order in which tasks are processed.

____ 51. If you attach a new device to a computer, its driver must be installed before you can use the device.

____ 52. A network administrator is a program that monitors network performance.

____ 53. Encryption is the process of encoding data and information into an unreadable form.

Page 10: Tutorial 6 Computer App

____ 54. Windows Vista is available in several editions, which are grouped in two general categories: Embedded and Personal.

____ 55. Linux is an example of proprietary software, which means that its code is available to the public.

____ 56. Windows CE is designed for use on computing devices with limited functionality.

____ 57. Palm OS is an example of a stand-alone operating system.

____ 58. Utility programs like those shown in the accompanying figure are considered to be application software.

____ 59. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk scanner, is a utility that removes a program from system files.

____ 60. Fragmentation slows down disk access and the performance of the entire computer.

____ 61. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions.

____ 62. Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor’s screen.

____ 63. Most antivirus programs also protect against worms and Trojan horses.

____ 64. An anti-spam program restricts access to certain material on the Web.

____ 65. Uncompressing a file is the same as zipping a file.

CS200-Chapter7-Homework

Answer Section

MULTIPLE CHOICE

1. ANS: C PTS: 1 DIF: P REF: 271

OBJ: 2

2. ANS: A PTS: 1 DIF: P REF: 272

OBJ: 2

3. ANS: C PTS: 1 DIF: P REF: 272

OBJ: 2

4. ANS: C PTS: 1 DIF: P REF: 272

OBJ: 2

5. ANS: A PTS: 1 DIF: P REF: 273

OBJ: 2

6. ANS: D PTS: 1 DIF: P REF: 273

OBJ: 2

7. ANS: B PTS: 1 DIF: P REF: 275

OBJ: 2

Page 11: Tutorial 6 Computer App

8. ANS: C PTS: 1 DIF: P REF: 275

OBJ: 2

9. ANS: B PTS: 1 DIF: P REF: 275

OBJ: 3

10. ANS: A PTS: 1 DIF: P REF: 276

OBJ: 2

11. ANS: D PTS: 1 DIF: P REF: 276

OBJ: 2

12. ANS: D PTS: 1 DIF: P REF: 277

OBJ: 2

13. ANS: A PTS: 1 DIF: P REF: 278

OBJ: 2

14. ANS: A PTS: 1 DIF: P REF: 278

OBJ: 2

15. ANS: A PTS: 1 DIF: P REF: 277

OBJ: 2

16. ANS: B PTS: 1 DIF: P REF: 278

OBJ: 2

17. ANS: C PTS: 1 DIF: P REF: 277

OBJ: 2

18. ANS: D PTS: 1 DIF: P REF: 285

OBJ: 6

19. ANS: B PTS: 1 DIF: P REF: 285

OBJ: 6

20. ANS: C PTS: 1 DIF: P REF: 285

OBJ: 6

21. ANS: D PTS: 1 DIF: P REF: 286

OBJ: 6

22. ANS: B PTS: 1 DIF: P REF: 287

OBJ: 6

23. ANS: A PTS: 1 DIF: P REF: 287

OBJ: 6

24. ANS: D PTS: 1 DIF: P REF: 291

OBJ: 6

25. ANS: B PTS: 1 DIF: P REF: 290

OBJ: 6

26. ANS: A PTS: 1 DIF: P REF: 291

Page 12: Tutorial 6 Computer App

OBJ: 6

27. ANS: A PTS: 1 DIF: P REF: 279

OBJ: 2

28. ANS: C PTS: 1 DIF: P REF: 280

OBJ: 4

29. ANS: D PTS: 1 DIF: P REF: 280

OBJ: 3

30. ANS: A PTS: 1 DIF: P REF: 280

OBJ: 3

31. ANS: C PTS: 1 DIF: P REF: 281

OBJ: 3

32. ANS: C PTS: 1 DIF: P REF: 286

OBJ: 6

33. ANS: C PTS: 1 DIF: P REF: 288

OBJ: 6

34. ANS: D PTS: 1 DIF: P REF: 289

OBJ: 6

35. ANS: D PTS: 1 DIF: P REF: 290

OBJ: 6

36. ANS: A PTS: 1 DIF: P REF: 290

OBJ: 6

37. ANS: C PTS: 1 DIF: P REF: 290

OBJ: 6

38. ANS: B PTS: 1 DIF: P REF: 290

OBJ: 6

39. ANS: A PTS: 1 DIF: P REF: 290

OBJ: 6

40. ANS: B PTS: 1 DIF: P REF: 290

OBJ: 6

TRUE/FALSE

41. ANS: F PTS: 1 DIF: P REF: 271

OBJ: 1

42. ANS: T PTS: 1 DIF: P REF: 272

OBJ: 2

43. ANS: F PTS: 1 DIF: P REF: 273

OBJ: 2

44. ANS: F PTS: 1 DIF: P REF: 275

Page 13: Tutorial 6 Computer App

OBJ: 2

45. ANS: F PTS: 1 DIF: P REF: 275

OBJ: 2

46. ANS: F PTS: 1 DIF: P REF: 275

OBJ: 2

47. ANS: T PTS: 1 DIF: P REF: 275

OBJ: 2

48. ANS: T PTS: 1 DIF: P REF: 275

OBJ: 2

49. ANS: F PTS: 1 DIF: S REF: 275

OBJ: 2

50. ANS: T PTS: 1 DIF: P REF: 275

OBJ: 2

51. ANS: T PTS: 1 DIF: P REF: 276

OBJ: 2

52. ANS: F PTS: 1 DIF: P REF: 278

OBJ: 2

53. ANS: T PTS: 1 DIF: P REF: 278

OBJ: 2

54. ANS: F PTS: 1 DIF: P REF: 280

OBJ: 3

55. ANS: F PTS: 1 DIF: P REF: 282

OBJ: 3

56. ANS: T PTS: 1 DIF: S REF: 283

OBJ: 3

57. ANS: F PTS: 1 DIF: S REF: 283

OBJ: 5

58. ANS: F PTS: 1 DIF: S REF: 284

OBJ: 6

59. ANS: F PTS: 1 DIF: P REF: 285

OBJ: 6

60. ANS: T PTS: 1 DIF: P REF: 286

OBJ: 6

61. ANS: T PTS: 1 DIF: P REF: 287

OBJ: 6

62. ANS: F PTS: 1 DIF: P REF: 287

OBJ: 6

Page 14: Tutorial 6 Computer App

63. ANS: T PTS: 1 DIF: P REF: 288

OBJ: 6

64. ANS: F PTS: 1 DIF: P REF: 289

OBJ: 6

65. ANS: F PTS: 1 DIF: P REF: 290

OBJ: 6