Académique Documents
Professionnel Documents
Culture Documents
TRUE/FALSE
1. When you issue the command for your computer to store a document on your hard drive, the
application software must make sure that such a drive exists.
2. In practice, the difference between system and application software is not always clear cut.
4. You press Ctrl+Alt+Insert to bring up the screen shown in the accompanying figure.
5. As you work on your computer, the operating system is in charge of managing system resources and
making them available to devices and programs when they are needed.
7. File extensions should not be changed by the user because the operating system uses them to identify
the program that should be used to open the file.
10. There is still a large installed base of Windows XP users and Microsoft plans to support Windows XP
until 2014.
11. Windows 98 was built from the ground up using a different kernel than the other versions of Windows.
12. Although Linux originally used a command line interface, most recent versions of Linux programs use
a graphical user interface.
13. Large computer systems—such as high-end servers, mainframes, and supercomputers— sometimes
use operating systems designed solely for that type of system.
14. Linux is increasingly being used with both mainframes and supercomputers.
15. There are many stand-alone utility programs available as an alternative to the operating system’s utility
programs.
16. Stand-alone utility programs are often available in a suite of related programs.
17. Once a file management program is open, you can look at the folders and files stored on your PC.
18. Files and folders deleted from removable media cannot be restored by any method.
19. File compression programs reduce the size of files so they take up less storage space on a storage
medium or can be transmitted faster over the Internet.
20. Using the Save As option of the File menu before editing a document is a good idea, so you can return
to the original version, if needed.
ANS: T PTS: 1 REF: 203
MODIFIED TRUE/FALSE
1. Application software runs in the background at all times, making it possible for you to use your
computer. _________________________
2. In general, the operating system serves as an intermediary between the user and the computer.
_________________________
3. Most application systems today include the drivers needed for the most commonly used peripheral
devices. _________________________
4. If a device driver file is deleted, becomes corrupted, or has a conflict with another piece of software,
then the device will no longer work. _________________________
5. Folders can contain both files and other folders (called subfolders). _________________________
6. Memory leaping can cause your computer to run out of memory temporarily.
_________________________
7. The documents waiting to be printed are said to be in a(n) print queue, which designates the order the
documents will be printed. _________________________
8. The older DOS operating system and some versions of the UNIX and Linux operating systems use
a(n) graphical user interface. _________________________
9. Most operating systems today are designed for either 16-bit or 32-bit CPUs.
_________________________
ANS: F, 32-bit or 64-bit
10. There have been many different versions of the Microsoft Windows operating system over the last
several years. _________________________
11. In 1994, Microsoft announced that all versions of Windows after 3.11 would be full-fledged operating
systems instead of just application programs. _________________________
12. With Windows Explorer, use the Views button to change how the items in the right pane are displayed.
_________________________
13. Cleanup programs evaluate your system, looking for problems and making recommendations for
fixing any errors that are discovered. _________________________
ANS: F, Diagnostic
14. Disk management programs diagnose and repair problems related to your hard drive.
_________________________
15. Uninstall utilities are designed to delete temporary files (such as deleted files still in the Recycle Bin,
temporary Internet files, installation files, and so forth) in order to free up disk space.
_________________________
ANS: F, Cleanup
MULTIPLE CHOICE
1. System software is usually divided into two categories: operating system software and ____ programs.
a. planning system c. FAT system
b. utility d. background
ANS: B PTS: 1 REF: 177
2. ____ software consists of the operating system and utility programs that control a computer system
and allow you to use your computer.
a. Background c. Application
b. Front-end d. System
ANS: D PTS: 1 REF: 177
3. ____ includes all the programs that allow a user to perform specific tasks on a computer, such as
writing a letter.
a. System software c. Application software
b. Utility programs d. Background programs
ANS: C PTS: 1 REF: 177
4. The ____ boots the computer, launches application software programs, and ensures that all actions
requested by a user are valid and processed in an orderly fashion.
a. startup c. driver
b. operating system d. registry
ANS: B PTS: 1 REF: 178
5. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place
within a computer system.
a. database system c. application system
b. storage system d. operating system
ANS: D PTS: 1 REF: 178
6. The means by which an operating system or any other program interacts with the user is called the
____.
a. user login c. program front-end
b. programming interface d. user interface
ANS: D PTS: 1 REF: 179
7. Small programs called ____ are used to communicate with peripheral devices, such as monitors,
printers, and scanners.
a. interfaces c. drivers
b. utilities d. managers
ANS: C PTS: 1 REF: 180
8. An important task that the operating system performs is ____, which keeps track of the files stored on
a computer so that they can be retrieved when needed.
a. disk management c. file listing
b. file management d. file recovery
ANS: B PTS: 1 REF: 180
10. Most operating systems have security features available, such as an integrated ____ to protect against
unauthorized access via the Internet.
a. router c. hub
b. firewall d. modem
ANS: B PTS: 1 REF: 182
11. Most operating systems have security features available, such as an option to automatically download
and install ____ from the operating system’s manufacturer on a regular basis.
a. security walls c. security patches
b. device patches d. device drivers
ANS: C PTS: 1 REF: 182
12. ____ refers to the ability of an operating system to work with more than one program at one time.
a. Multidimensional c. Polyprogramming
b. Multiprogramming d. Multitasking
ANS: D PTS: 1 REF: 182
13. All programs and data located in RAM are divided into fixed-length ____ or variable-length segments,
depending on the operating system being used.
a. pies c. pages
b. sectors d. cylinders
ANS: C PTS: 1 REF: 183
14. ____ memory allows you to use more memory than is physically available on your computer.
a. Shared c. Multithreading
b. Virtual d. Buffer
ANS: B PTS: 1 REF: 184
15. A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or
out of the system.
a. segment c. page
b. buffer d. sector
ANS: B PTS: 1 REF: 184
16. With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are
selected with the mouse to issue commands to the PC.
a. graphical user interface c. desktop
b. command line interface d. command-driven interface
ANS: A PTS: 1 REF: 185
17. During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
a. Mac OS c. Linux
b. DOS (Disk Operating System) d. desktop operating system
ANS: B PTS: 1 REF: 188
18. In DOS, the command ____ displays the files and folders in the current location.
a. CD c. DIR
b. FORMAT d. COPY
ANS: C PTS: 1 REF: 188
19. One of the most obvious initial changes in Windows Vista is the ____ interface.
a. Leopard c. Aero
b. Android d. Symbian
ANS: C PTS: 1 REF: 189
21. ____ is the proprietary operating system for computers made by Apple Corporation.
a. Linux c. Mac OS
b. Solaris d. Unix
ANS: C PTS: 1 REF: 192
22. ____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for
midrange servers.
a. Linux c. Solaris
b. UNIX d. Mac OS X
ANS: B PTS: 1 REF: 193
23. In addition to personal operating systems and server operating systems, there are also mobile operating
systems and ____.
a. embedded operating systems c. virtual operating systems
b. high-performance operating systems d. storage operating systems
ANS: A PTS: 1 REF: 194
24. Commercial Linux distributions, such as those available from ____ and Novell, come with
maintenance and support materials.
a. Red Hat c. Cisco
b. .NET Framework d. Adobe
ANS: A PTS: 1 REF: 194
25. ____ is a family of operating systems based on Windows that is designed primarily for consumer and
industrial devices that are not personal computers.
a. Windows Vista c. Windows Server 2003
b. Windows Embedded d. Windows Mobile
ANS: B PTS: 1 REF: 196
26. ____ is a Linux-based operating system developed by the Open Handset Alliance.
a. Android c. Mac OS X
b. UNIX d. Vista
ANS: A PTS: 1 REF: 196
28. ____ is the most widely used mobile operating system worldwide.
a. Mac OS c. Windows Mobile
b. Palm OS d. Symbian OS
ANS: D PTS: 1 REF: 197
30. To restore a file or folder deleted from your computer’s hard drive, open your computer’s ____ and
restore the file to its original location.
a. Recycle Bin c. System Restore program
b. Windows Explorer d. Recycle Menu
ANS: A PTS: 1 REF: 201
31. ____ are utility programs that search for documents and other files on a user’s hard drives.
a. Search tools c. Search engines
b. Tool boxes d. Tool programs
ANS: A PTS: 1 REF: 201
32. Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
a. disk defragmentation c. disk backup
b. file compression d. disk cleanup
ANS: A PTS: 1 REF: 202
33. Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs,
you can restore those files using the backup copy.
a. mirror c. index
b. backup d. hidden file
ANS: B PTS: 1 REF: 203
34. ____ can protect against someone accessing your PC via the Internet.
a. Mirrors c. Firewalls
b. Antispam software d. Modems
ANS: C PTS: 1 REF: 204
35. A ____ is a software program that is designed to cause damage to the computer system or perform
some other malicious act.
a. firewall c. spyware
b. utility program d. computer virus
ANS: D PTS: 1 REF: 204
Case 5-1
Janet is studying operating systems as part of her Understanding Computers 101 class. After learning
about the different types of operating systems, she realizes that she uses a number of them in her daily
life.
36. All the computers in Janet’s school computer lab have the newest version of Windows installed, which
is ____.
a. Windows Vista c. Windows XP
b. Windows Solaris d. Windows 7
ANS: D PTS: 1 REF: 190 TOP: Critical Thinking
37. Janet has an Apple computer at home. The operating system of that computer is ____.
a. Windows Vista c. Windows Embedded
b. Solaris d. Mac OS
ANS: D PTS: 1 REF: 192 TOP: Critical Thinking
Case 5-2
Dean has been using computers for some time now, but he is unfamiliar with a number of utility
programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice
on basic utility programs.
38. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive
so that it works more efficiently. This process works by rearranging the data on the hard drive so all
files are stored in contiguous locations.
a. disk defragmentation c. disk cleanup
b. file compression d. backup
ANS: A PTS: 1 REF: 202 TOP: Critical Thinking
39. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.
a. delete c. remove
b. uninstall d. cleanup
ANS: B PTS: 1 REF: 202 TOP: Critical Thinking
40. Another thing that Andrea tells Dean is that it is very important for him to ____ all of his important
data on a regular basis to protect against data loss in the case of a problem with the computer. He can
use a(n) ____ utility to do this.
a. cleanup c. compress
b. defragment d. backup
ANS: D PTS: 1 REF: 203 TOP: Critical Thinking
COMPLETION
1. One of the principal roles of every ____________________ is to translate user instructions into a form
the computer can understand.
2. During the boot process, the essential portion, or core, of the operating system (called the
____________________) is loaded into memory.
ANS: kernel
ANS: registry
4. ____________________ routines in the operating system determine the order in which jobs are carried
out, as well as which commands get executed first if the user is working with more than one program
at one time or if the computer supports multiple users.
ANS: Scheduling
5. Device drivers usually need to be updated or reinstalled after you ____________________ your
operating system to a newer version or after you buy a new computer.
ANS: upgrade
7. The process of placing items in a buffer so they can be retrieved by the appropriate device when
needed is called ____________________.
ANS: spooling
8. DOS traditionally used a command line interface, although newer versions of DOS support a(n)
____________________ interface.
ANS: menu-driven
PTS: 1 REF: 188
9. As shown in the accompanying figure, Windows users can still issue ____________________
commands via the Command Prompt.
ANS: DOS
10. To make it easier to use and manage all of your connected devices, Windows 7 includes a new
____________________.
11. ____________________ is based on the UNIX operating system and originally set the standard for
graphical user interfaces.
ANS: Mac OS
12. ____________________ is an operating system developed by Linus Torvalds in 1991 when he was a
student at the University of Helsinki in Finland.
ANS: Linux
13. In the past few years, ____________________ has grown from an operating system used primarily by
computer techies who disliked Microsoft to a widely accepted operating system with strong support
from mainstream companies.
ANS: Linux
14. The mobile operating system designed for Apple mobile phones and mobile devices, such as the
iPhone 3G and the iPod Touch, is ____________________.
ANS: iPhone OS
ANS: Palm OS
16. A(n) ____________________ is a type of software program that performs a specific task, usually
related to managing or maintaining the computer system.
17. With Windows Explorer, click a drive or ____________________ icon in the left pane to display its
contents in the right pane.
ANS: folder
18. There are special utility programs available to recover deleted files from ____________________
cards and drives, as long as you have not written anything to the card or drive since the files were
deleted.
ANS:
flash memory
USB flash
19. ____________________ programs, such as the one shown in the accompanying figure, can be used
with both image and text files, though image files generally compress more efficiently.
20. ____________________ is a software program installed without the user’s knowledge that secretly
collects information and sends it to an outside party via the user’s Internet connection.
ANS: Spyware
ANS:
A computer’s operating system is a collection of programs that manage and coordinate the activities
taking place within the computer and it is the most critical piece of software installed on the computer.
The operating system boots the computer, launches application software, and ensures that all actions
requested by a user are valid and processed in an orderly fashion. For example, when you issue the
command for your computer to store a document on your hard drive, the operating system must
perform the following steps: 1) make sure that the specified hard drive exists, 2) verify that there is
adequate space on the hard drive to store the document and then store the document in that location,
and 3) update the hard drive’s directory with the filename and disk location for that file so that the
document can be retrieved again when needed. In addition to managing all of the resources associated
with your local computer, the operating system also facilitates connections to the Internet and other
networks.
ANS:
Multitasking refers to the ability of an operating system to have more than one program (also called a
task) open at one time. Without the ability to multitask, an operating system would require the user to
close one program before opening another program. Virtually all of today’s operating systems support
multitasking. Although multitasking enables a user to work with multiple programs at one time, a
single CPU core cannot execute more than one task at one time (unless Intel’s Hyper-Threading
Technology or another technology that allows a single core to function as two cores is used).
Consequently, the CPU rotates between processing tasks, but it works so quickly that to the user it
appears as though all programs are executing at the same time.
3. Explain multithreading.
ANS:
A thread is a sequence of instructions within a program that is independent of other threads. Examples
might include spell checking, printing, and opening documents in a word processing program.
Operating systems that support multithreading have the ability to rotate between multiple threads
(similar to the way multitasking can rotate between multiple programs) so that processing is completed
faster and more efficiently, even though only one thread is executed by a single core at one time. An
exception to this is computers using Intel’s Hyper-Threading Technology, which allows more than one
thread to be executed by a single CPU core at one time. Most current operating systems support
multithreading.
ANS:
Most PC operating systems today use a graphical user interface (GUI). The older DOS operating
system and some versions of the UNIX and Linux operating systems use a command line interface,
although graphical versions of UNIX and Linux are available. With a command line interface,
commands to the computer are typed using the keyboard; graphical user interfaces allow the user to
issue commands by selecting icons, buttons, menu items, and other graphical objects with a mouse or
other pointing device.
ANS:
As programs are used, temporary data is often created. When programs are uninstalled (removed from
the hard drive), this data and other remnants of that program can be left behind on the hard drive or in
system files unless an uninstall utility is used. If a user removes programs by deleting the program’s
folder (which is not the recommended method for removing programs), the extraneous data is left
behind, using up valuable disk space and, sometimes, slowing down the computer. Uninstall utilities
remove the programs along with related extraneous data, such as references to those programs in your
system files.