Вы находитесь на странице: 1из 14

Computers are Your Future, 10e (Coyle) Chapter 4 System Software 2) The set of programs designed to manage the

resources of a computer is the: A) operating system. B) resource manager. C) utility set. D) boot strap set. Answer: A Diff: 2 Reference: The Operating System 4) The process of loading the OS to memory is: A) installing. B) repudiation. C) authentication. D) booting. Answer: D Diff: 2 Reference: Starting the Computer

5) Starting a computer that is not already on is called a: A) cold boot. B) warm boot. C) fast load. D) cold load. Answer: A Diff: 2 Reference: Starting the Computer 6) Starting a computer that is already on is called a: A) cold boot. B) power on. C) warm boot. D) warm load. Answer: C Diff: 2 Reference: Starting the Computer 8) One way to initiate a warm boot is to press which of the following keys? A) Ctrl+Alt+Ins B) Ctrl+Boot C) Restart D) Ctrl+Alt+Del Answer: D Diff: 2 Reference: Starting the Computer

11) The first OS function is: A) scanning the hard disk for errors. B) loading the applications. C) starting the computer. D) prompting the user for an id and password. Answer: C Diff: 2 Reference: Starting the Computer

22) PnP is an abbreviation for which of the following terms? A) Package-and-Protect B) Plug-and-Play C) Peripheral-and-Plugin D) Passive-and-Predictive Answer: B Diff: 1 Reference: Step 4: System Configuration 23) An operating system with PnP capabilities means that the system: A) recognizes new peripherals that were attached before you turned the computer power on and then installs the appropriate drivers and checks for driver compatibility. B) automatically downloads drivers from the Internet for new peripherals that you installed. C) can record and play sound files. D) can install the appropriate driver for a newly attached piece of hardware as long as the operating system was released before the hardware model was first produced. Answer: A Diff: 2 Reference: Step 4: System Configuration 25) System utilities: A) have to be accessed through applications. B) perform functions such as protecting your computer from viruses. C) include features such as a word-processing program. D) are loaded before the operating system is loaded. Answer: B Diff: 1 Reference: Step 5: Loading System Utilities 26) To accommodate the computer personal preferences for more than one user, you can: A) set up a profile for each person. B) change the registry to specify how many users are using the computer. C) adjust the setup program to accommodate different preferences. D) interrupt the power-on self-test so that users can make their own choices. Answer: A Diff: 2 Reference: Step 6: Authenticating Users

49) Which of the following statements about Microsoft Windows is TRUE? A) It is the most commonly used operating system today. B) It is interchangeable with Linux. C) It uses a command-line interface for complex operations. D) It has the same graphical interface used in UNIX. Answer: A Diff: 1 Reference: Microsoft Windows

56) Which Microsoft operating system is designed for smartphones and PDAs? A) Windows XP B) Windows Lite C) Windows Mobile D) All of the above Answer: C Diff: 1 Reference: Microsoft Windows 58) Linux is an example of open source software, meaning: A) users can see and modify the source programming code. B) the software has not been perfected sufficiently to be of professional value. C) it has to be configured to your computer system. D) the software must be purchased from a vendor who markets products on an open commercial Web site. Answer: A Diff: 1 Reference: Linux 59) Why is the Linux operating system so popular today? A) It provides the personal computer with the strengths of UNIX. B) The Microsoft Office suite runs under Linux. C) It was developed by Microsoft as a companion to the Windows operating system. D) It is a robust, expensive operating system that people feel is well worth the money in return for its many networking features. Answer: A Diff: 2 Reference: Linux 61) Many CIOs shy away from adopting Linux because: A) it doesn't have a stable company behind it.

B) it's free. C) it's powerful. D) it has not been properly tested. Answer: A Diff: 2 Reference: Linux

65) What is considered a major advantage of UNIX? A) The various versions of UNIX are compatible with each other. B) It is easy to use. C) It doesn't allow preemptive multitasking. D) It works efficiently in secure computer networks. Answer: D Diff: 2 Reference: UNIX 68) Backup software: A) is used for the purpose of creating duplicate copies of your document files so that you can edit them without destroying the original copy. B) is used to make duplicate copies of your hard drive files for emergency purposes and stores them on the hard drive for easy accessibility. C) allows you to create and save a file containing the data and program files on your computer to another disk or storage location for the files to be used for data recovery. D) is rarely used today because operating systems and computers have increased their reliability to the point that files are seldom lost. Answer: C Diff: 2 Reference: Backup Software

69) Backup software is classified as a(n) ________ program. A) application B) utility C) antivirus D) operating system Answer: B Diff: 1 Reference: Backup Software

73) Which of the following statements regarding viruses is NOT true? A) A virus is able to cause destruction as soon as it is copied to your computer disk. B) A virus can remain inactive on your computer disk until a designated time to perform its action. C) Viruses are slow to replicate. D) A virus that has not been identified in your antivirus software database will remain undetected unless the antivirus software includes a program that monitors system functions. Answer: C Diff: 2 Reference: Antivirus Software 74) Antivirus software uses ________ to examine files for virus signatures. A) imaging B) destruction-detection C) pattern-matching D) security tools Answer: C Diff: 2 Reference: Antivirus Software 75) A file manager utility program allows you to perform all of the following EXCEPT: A) manage how files are stored. B) delete files you no longer want to keep. C) create a backup file of the entire contents of your computer. D) make copies of files. Answer: C Diff: 2 Reference: Searching for and Managing Files

79) It is important to defragment your computer disk because fragmented files: A) harm the surface of the computer disk. B) reduce disk performance. C) are not recognized by the computer's tracking system. D) cannot be opened because the fragmented portions are not linked. Answer: B Diff: 2 Reference: Searching for and Managing Files 80) What system utility should be used to correct disk performance problems caused by scattered portions of files on the computer disk? A) Search B) File manager C) Disk defragmentation D) Disk scanning Answer: C Diff: 1 Reference: Searching for and Managing Files

85) A boot disk: A) is an emergency disk that loads the entire operating system. B) provides a way to troubleshoot computer start-up problems. C) contains special files from the computer manufacturer and therefore cannot be created by the user. D) should be present when the computer starts up normally. Answer: B Diff: 1 Reference: Troubleshooting

87) You can locate devices that are not working properly by starting a Windows computer in ________ mode. A) safe B) reduced C) open D) active Answer: A Diff: 1 Reference: Troubleshooting

90) System software includes the operating system and the ________. Answer: system utilities Diff: 1 Reference: The Operating System

92) The computer is performing a(n) ________ when you start a computer that is NOT already on. Answer: cold boot Diff: 1 Reference: Starting the Computer 93) The ________ program contains settings that manage computer hardware. Answer: setup Diff: 2 Reference: Step 1: The BIOS and Setup Program

95) The registry stores configuration information on installed peripherals and software in a(n) ________. Answer: database Diff: 2 Reference: Step 4: System Configuration 96) An operating system with ________ capability can immediately detect a newly added peripheral and provide the appropriate device driver. Answer: Plug-and-Play or PnP Diff: 1 Reference: Step 4: System Configuration

98) ________ allows you to switch between programs without having to close one of the programs. Answer: Multitasking Diff: 2 Reference: Managing Applications

10

102) A(n) ________ is a program that contains information about a specific device and how the operating system communicates with it. Answer: driver Diff: 1 Reference: Handling Input and Output

11

107) The open source operating system created to work on PCs is called ________. Answer: Linux Diff: 2 Reference: Linux 108) MS-DOS stands for Microsoft ________. Answer: disk operating system Diff: 2 Reference: MS-DOS

114) Full backups should be made at least one time each ________. Answer: month Diff: 2 Reference: Backup Software

12

115) ________ should be stored away from the computer system in case of a fire or flood. Answer: Backups Diff: 2 Reference: Backup Software 116) ________ protects a computer from viruses. Answer: Antivirus software Diff: 2 Reference: Antivirus Software

121) To reorganize data stored on a computer disk so that all portions of each file are stored together, you should use a(n) ________ program. Answer: disk defragmentation Diff: 1 Reference: Searching for and Managing Files

13

123) You should use an emergency or ________ disk if your computer fails to start normally. Answer: boot Diff: 2 Reference: Troubleshooting 124) Starting your computer in ________ mode lets you check to see what computer devices are in conflict. Answer: safe Diff: 2 Reference: Troubleshooting

126) Microsoft provides an OS update service called ________. Answer: Windows update Diff: 2 Reference: System Update

14

Вам также может понравиться