Tutorial 6 Computer App
Transcript of Tutorial 6 Computer App
This is the html version of the file http://uogonline.com/drlee/CS200/Homework/Hwk7-Solutions.rtf.
CS200-Chapter7-Homework
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 1. Which of the following is not an operating system function?
a. starting the computer c. word processing
b. managing programs d. establishing an Internet connection
____ 2. A(n) ____ boot is the process of using the operating system to restart a computer.
a. warm c. start
b. cold d. new
____ 3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Lock button menu.
a. Stand By c. Restart
b. Turn Off d. Cancel
____ 4. A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen.
a. control c. user
b. utility d. management
____ 5. In a(n) ____, the user types commands or presses special keys on the keyboard to enter data and instructions.
a. command-line interface c. performance-monitor interface
b. menu-driven interface d. graphical user interface (GUI)
____ 6. With a(n) ____ interface, users interact with menus and visual images such as buttons and other graphical objects to issue commands.
a. command-line interface c. performance-monitor interface
b. menu-driven interface d. graphical user interface (GUI)
____ 7. The purpose of memory ____ is to optimize the use of RAM.
a. performance c. throttling
b. management d. integration
____ 8. A(n) ____ is an operation the processor manages.
a. buffer c. task
b. spool d. event
____ 9. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.
a. paging c. swapping
b. spooling d. waiting
____ 10. Multiple print jobs line up in a ____ within a buffer as shown in the accompanying figure.
a. queue c. page
b. row d. virtual page
____ 11. ____ means the operating system automatically configures new devices as you install them.
a. Virtual memory c. Page logging
b. Operational buffering d. Plug and Play
____ 12. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.
a. client c. integrated
b. multitasking d. server
____ 13. A network ____, the person overseeing network operations, uses the network operating system to add and remove users, computers, and other devices to and from the network.
a. administrator c. client
b. owner d. master
____ 14. A(n) ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
a. user name c. client
b. password d. cycle
____ 15. A performance ____ is a program that assesses and reports information about various computer resources and devices.
a. monitor c. reporter
b. manager d. roster
____ 16. A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources.
a. folder c. user name
b. password d. cipher
____ 17. Which of the following is not a utility function like the ones shown in the accompanying figure?
a. managing files c. controlling the keyboard
b. viewing images d. uninstalling programs
____ 18. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file.
a. video card c. scanner
b. video driver d. image viewer
____ 19. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____, is a utility that performs functions related to file management.
a. monitor c. scanner
b. manager d. controller
____ 20. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.
a. application remover c. uninstaller
b. application purger d. antiapp utility
____ 21. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk ____ utility searches for and removes unnecessary files.
a. diagnostic c. operator
b. uninstaller d. cleanup
____ 22. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a screen ____, is a utility that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.
a. manager c. utility
b. saver d. protector
____ 23. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions.
a. firewall c. threat neutralizer
b. antihacker d. protection utility
____ 24. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____ utility identifies computer problems but does not repair them.
a. troubleshooting c. operational
b. executional d. diagnostic
____ 25. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____ utility, shrinks the size of a file.
a. scanner c. defragmenter
b. compression d. archiver
____ 26. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance.
a. maintenance c. functional
b. multitasking d. proprietary
____ 27. Which of the following is not a type of operating system?
a. wireless c. server
b. stand-alone d. embedded
____ 28. The first version of Windows was developed in the early ____.
a. 1960s c. 1980s
b. 1970s d. 1990s
____ 29. A(n) ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.
a. multitasking c. single-user
b. media-based d. stand-alone
____ 30. Which of the following is NOT an edition of Windows Vista?
a. Enterprise c. Home Premium
b. Ultimate d. Business
____ 31. Apple’s latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
a. Safari c. OS X
b. OS IX d. OS XI
____ 32. To defragment a disk means to ____.
a. slow it down c. reorganize it
b. diagnose problems with it d. repair it
____ 33. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
a. firewall c. virus
b. agent d. spyware
____ 34. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
a. Compression software c. Resident software
b. Symbianware d. Adware
____ 35. To ____ a file, you restore a zipped file to its original form.
a. restore c. zip
b. archive d. uncompress
____ 36. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
a. blocker c. stopper
b. driver d. monitor
____ 37. Compressed files sometimes are called ____ files.
a. skipped c. zipped
b. controlled d. defragmented
____ 38. ____ is a popular stand-alone file compression utility.
a. Smasher c. CompUtil
b. PKZIP d. All of the above
____ 39. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.
a. Phishing c. Pharming
b. Zipping d. Authenticating
____ 40. A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.
a. operating c. zipping
b. phishing d. antispam
True/False
Indicate whether the statement is true or false.
____ 41. On mobile devices, the operating system may reside on a RAM chip.
____ 42. The boot process is similar for large and small computers.
____ 43. In a multitasking environment, many programs run in the foreground, while one program remains in the background.
____ 44. One drawback of multiprocessing is that it tends to reduce a computer’s processing speed.
____ 45. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory.
____ 46. Multiuser operating systems always process jobs on a first-come, first-served basis.
____ 47. While waiting for devices to become idle, the operating system places items in buffers.
____ 48. If a printer does not have its own internal memory or if its memory is full, the operating system’s buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed.
____ 49. Virtual memory is faster than RAM.
____ 50. The operating system determines the order in which tasks are processed.
____ 51. If you attach a new device to a computer, its driver must be installed before you can use the device.
____ 52. A network administrator is a program that monitors network performance.
____ 53. Encryption is the process of encoding data and information into an unreadable form.
____ 54. Windows Vista is available in several editions, which are grouped in two general categories: Embedded and Personal.
____ 55. Linux is an example of proprietary software, which means that its code is available to the public.
____ 56. Windows CE is designed for use on computing devices with limited functionality.
____ 57. Palm OS is an example of a stand-alone operating system.
____ 58. Utility programs like those shown in the accompanying figure are considered to be application software.
____ 59. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk scanner, is a utility that removes a program from system files.
____ 60. Fragmentation slows down disk access and the performance of the entire computer.
____ 61. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions.
____ 62. Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor’s screen.
____ 63. Most antivirus programs also protect against worms and Trojan horses.
____ 64. An anti-spam program restricts access to certain material on the Web.
____ 65. Uncompressing a file is the same as zipping a file.
CS200-Chapter7-Homework
Answer Section
MULTIPLE CHOICE
1. ANS: C PTS: 1 DIF: P REF: 271
OBJ: 2
2. ANS: A PTS: 1 DIF: P REF: 272
OBJ: 2
3. ANS: C PTS: 1 DIF: P REF: 272
OBJ: 2
4. ANS: C PTS: 1 DIF: P REF: 272
OBJ: 2
5. ANS: A PTS: 1 DIF: P REF: 273
OBJ: 2
6. ANS: D PTS: 1 DIF: P REF: 273
OBJ: 2
7. ANS: B PTS: 1 DIF: P REF: 275
OBJ: 2
8. ANS: C PTS: 1 DIF: P REF: 275
OBJ: 2
9. ANS: B PTS: 1 DIF: P REF: 275
OBJ: 3
10. ANS: A PTS: 1 DIF: P REF: 276
OBJ: 2
11. ANS: D PTS: 1 DIF: P REF: 276
OBJ: 2
12. ANS: D PTS: 1 DIF: P REF: 277
OBJ: 2
13. ANS: A PTS: 1 DIF: P REF: 278
OBJ: 2
14. ANS: A PTS: 1 DIF: P REF: 278
OBJ: 2
15. ANS: A PTS: 1 DIF: P REF: 277
OBJ: 2
16. ANS: B PTS: 1 DIF: P REF: 278
OBJ: 2
17. ANS: C PTS: 1 DIF: P REF: 277
OBJ: 2
18. ANS: D PTS: 1 DIF: P REF: 285
OBJ: 6
19. ANS: B PTS: 1 DIF: P REF: 285
OBJ: 6
20. ANS: C PTS: 1 DIF: P REF: 285
OBJ: 6
21. ANS: D PTS: 1 DIF: P REF: 286
OBJ: 6
22. ANS: B PTS: 1 DIF: P REF: 287
OBJ: 6
23. ANS: A PTS: 1 DIF: P REF: 287
OBJ: 6
24. ANS: D PTS: 1 DIF: P REF: 291
OBJ: 6
25. ANS: B PTS: 1 DIF: P REF: 290
OBJ: 6
26. ANS: A PTS: 1 DIF: P REF: 291
OBJ: 6
27. ANS: A PTS: 1 DIF: P REF: 279
OBJ: 2
28. ANS: C PTS: 1 DIF: P REF: 280
OBJ: 4
29. ANS: D PTS: 1 DIF: P REF: 280
OBJ: 3
30. ANS: A PTS: 1 DIF: P REF: 280
OBJ: 3
31. ANS: C PTS: 1 DIF: P REF: 281
OBJ: 3
32. ANS: C PTS: 1 DIF: P REF: 286
OBJ: 6
33. ANS: C PTS: 1 DIF: P REF: 288
OBJ: 6
34. ANS: D PTS: 1 DIF: P REF: 289
OBJ: 6
35. ANS: D PTS: 1 DIF: P REF: 290
OBJ: 6
36. ANS: A PTS: 1 DIF: P REF: 290
OBJ: 6
37. ANS: C PTS: 1 DIF: P REF: 290
OBJ: 6
38. ANS: B PTS: 1 DIF: P REF: 290
OBJ: 6
39. ANS: A PTS: 1 DIF: P REF: 290
OBJ: 6
40. ANS: B PTS: 1 DIF: P REF: 290
OBJ: 6
TRUE/FALSE
41. ANS: F PTS: 1 DIF: P REF: 271
OBJ: 1
42. ANS: T PTS: 1 DIF: P REF: 272
OBJ: 2
43. ANS: F PTS: 1 DIF: P REF: 273
OBJ: 2
44. ANS: F PTS: 1 DIF: P REF: 275
OBJ: 2
45. ANS: F PTS: 1 DIF: P REF: 275
OBJ: 2
46. ANS: F PTS: 1 DIF: P REF: 275
OBJ: 2
47. ANS: T PTS: 1 DIF: P REF: 275
OBJ: 2
48. ANS: T PTS: 1 DIF: P REF: 275
OBJ: 2
49. ANS: F PTS: 1 DIF: S REF: 275
OBJ: 2
50. ANS: T PTS: 1 DIF: P REF: 275
OBJ: 2
51. ANS: T PTS: 1 DIF: P REF: 276
OBJ: 2
52. ANS: F PTS: 1 DIF: P REF: 278
OBJ: 2
53. ANS: T PTS: 1 DIF: P REF: 278
OBJ: 2
54. ANS: F PTS: 1 DIF: P REF: 280
OBJ: 3
55. ANS: F PTS: 1 DIF: P REF: 282
OBJ: 3
56. ANS: T PTS: 1 DIF: S REF: 283
OBJ: 3
57. ANS: F PTS: 1 DIF: S REF: 283
OBJ: 5
58. ANS: F PTS: 1 DIF: S REF: 284
OBJ: 6
59. ANS: F PTS: 1 DIF: P REF: 285
OBJ: 6
60. ANS: T PTS: 1 DIF: P REF: 286
OBJ: 6
61. ANS: T PTS: 1 DIF: P REF: 287
OBJ: 6
62. ANS: F PTS: 1 DIF: P REF: 287
OBJ: 6
63. ANS: T PTS: 1 DIF: P REF: 288
OBJ: 6
64. ANS: F PTS: 1 DIF: P REF: 289
OBJ: 6
65. ANS: F PTS: 1 DIF: P REF: 290
OBJ: 6