You are on page 1of 3

SYSTEMS PLUS COLLEGE FOUNDATION

Balibago, Angeles City


COLLEGE OF COMPUTING AND INFORMATION SCIENCES
MIDTERM EXAMINATION
1st Semester S.Y. 2014-2015
OS_L - Operating Systems
Name: _________________________________
Score: ________________________
Section: ________________________________
Date: _________________________
General Directions: Read and understand the instructions carefully. Avoid making erasures or
superimpositions on your answers. Any forms of cheating will be dealt with accordingly based on
your student manual.

Test 1 Multiple Choice. Encircle the best answer.


SCENARIO 1: Holly Holt is a systems administrator for Lucerne Publishing, a highly recognized
publishing company that specializes in barbecue cookbooks. One of the editors was having
difficulty printing several chapters of a recent cookbook and contacted Holly to find out what can
be done to get the printer to work. This editor also has informed Holly that he is continually
getting warnings when he starts his computer in the morning, indicating that his firewall has failed
to start, and he is concerned that his computer may be compromised. Holly examines his computer
and when she looks at the System Event Log, she notices a Service Control Manager error
indicating that the firewall service has failed to start. Holly opens the Services console and starts
the Windows Firewall Service without any problem.
1.What can Holly do to ensure that the Windows Firewall Service starts as expected?
a. Visit the editors office every morning and manually start the service after the machine has
booted.
b.Configure the service to have a delayed start temporarily and research why the service isnt
starting automatically.
c. Ask the editor not to plug into the network until she gets the issue resolved
2. What should Holly do first to troubleshoot the editors printing issues?
a. Verify that the Print Spooler status indicates that it is running.
b.Check to be sure the printer has paper.
c. Ask the editor to email the chapters to her so she can print a copy.
3.After some investigation, Holly notices that the editor attempted to print the same job 20
times after it failed the first time. She cannot delete the print jobs because the queue states
that it is Not Responding. What should Holly do to clear the print queue and correct the print
issues?
a. Reboot the workstation.
b. Restart the Print Spooler service from the Services console.
c. Unplug the printer, wait several minutes, and plug it back in.
SCENARIO 2: Woodgrove Bank is a small community bank with five branch offices. Their loan
officers rotate to each branch as needed. They each have laptops running Windows 7 Professional
and also have external mobile drives for data storage and backups. Due to the sensitive nature of
banking, it is of high importance to Woodgrove Bank to ensure that their customers information is
secure. Woodgrove Bank has hired Jeff Price, a security consultant, to perform a security audit and
submit his findings and recommendations to the board of directors. This information is vital
because the bank will be undergoing a security audit from their governing regulatory agency.
4. Jeffs initial recommendation is to have the laptops secured with BitLocker. What must be
done first to make this change?
a.Purchase BitLocker because Woodgrove Bank does not have licensing for it.
b.Upgrade the laptops to Windows7 Enterprise or Ultimate edition because BitLocker is not
available with Windows 7 Professional.
c. The bank doesnt have to do anything ;it is ready.
5. What recommendation can Jeff make for securing the removable storage drives?
Page 1 of 3

SYSTEMS PLUS COLLEGE FOUNDATION


Balibago, Angeles City
a. Secure the drives with Encrypting File System(EFS).
b. Secure the drives with BitLockerToGo.
c. Make sure that the drives are locked to the desks when they arrive.
6.What hardware must the laptops have to provide better security through BitLocker?
a.Security locks on the outside of the laptops, so the loan officers can secure the machine physically.
b.Trusted Platform Module (TPM)can be used in addition to BitLocker.
c.Smart card readers for authentication.
7.Where can you find the program to help you use a projector connected to your computer?
a.The All Programs Accessories folder
b.Computer Management console
c.Administrative Tools folder
d.Windows Media Player
8. Which of the following is not a security or privacy feature of Internet Explorer 9?
a.InPrivate Browsing
b.Pinned site
c.ActiveX Filtering
d.Domain highlighting
9.You want to use the Run command, however, the program requires elevated or administrative privileges. When you right-click the program to run it, which command do you select
from the shortcut menu?
a. Run elevated
b. Run protected
c. Run with permission
d. Run as administrator
10.Where do you configure security zones in Internet Explorer 9?
a.Internet Options Security tab
b.Internet Options Privacy tab
c.Safety menu
d.Tracking Protection window
11.Which of the following can you do with the Snipping Tool?
a.Annotate an image with the pen tool
b.Change the color of a captured image
c.Add typed callouts
d.Save in PDF format
12.Which of the following is an option in Windows Media Center but not in Windows Media
Player?
a.Record TV programming
b.Watch recorded TV
c.Share files over a network
d.Create playlists
13.After you compress a folder, in what color does it display in Windows Explorer?
a. Blue
b. Green
c. Black
d. Red
14.WhichofthefollowingdoyouaccesstoenterSafeModethenexttimethecomputerstarts?
a.The General tab
b.The Boot tab
c.The Startup tab
d.Services console
15.Which of the following can you do in the Programs and Features applet in Control Panel?
a.Install an application
b.Uninstall an application
c.Encrypt an applications files
Page 2 of 3

SYSTEMS PLUS COLLEGE FOUNDATION


Balibago, Angeles City
d.Compress an applications files
Test II. Identification. Identify the term being referred in the sentence.
___________________1. It is also known as the System Configuration utility, lets you enable or disable
startup services, set boot options such as booting into Safe Mode, access tools like Action Center
and Event Viewer, and more.
___________________2. What blocks ActiveX controls, which are created for interactivity on the Web and
commonly used on sites that display animations or offer multimedia such as videos?
___________________3. What helps you control which Web sites can track your online browsing activity
and receive that information?
___________________4. What is used to detect threats on Web sites, such as phishing attacks and
malware downloads, and prevents them from running?
___________________5. What is used to prevent cross-site scripting attack when you visit a
compromised Web site that runs a script that installs a key logger program on your computer?
___________________6. What allows you to write and correct free-hand math equations using your
mouse or other pointing device?
___________________7. What is the overall structure your computer uses to name, store, and organize
files and folders on a hard disk or partition?
___________________8. What is a virtual folder that can display content from different locations (folders,
for example) on your computer or an external drive?
___________________9. What is a popular snap-in that includes several tools such as Disk Management
for configuring hard disks and their partitions and Event Viewer, which allows you to view
computer event information such as program starting and stopping (including program crashes)
and security problems?
___________________10. What allows you to sync any folder in your computer with a folder on an
external drive connected to your computers or a network drive?
___________________11. What allows you to control many different computer settings, such as screen
brightness, volume, power/battery, WiFi, Bluetooth, sound, and so on?
___________________12.What opens a command window useful for IT professionals?
___________________13.What gives you access to Control Panel, Disk Cleanup, Disk Defragmenter,
Resource Monitor, System Restore, and much more ?
___________________14. What is used to prevent some Web sites use deceptive Web addresses, making
you think youre visiting a legitimate site when youre actually on a phishing site or another
dangerous site?
___________________15. What is a multi-faceted program that provides a complete entertainment
system for your computer?
___________________16. What is the process of decreasing the size of files or folders without affecting
the files content?
___________________17. What automatically prevents pop-up windows from appearing?
___________________18. What helps prevent personal information and browsing history from being
stored by Internet Explorer 9?
___________________19. What is a program that runs on top of the operating system or from a server,
and helps a user perform a specific task, such as word processing, appointment scheduling, or
accounting? An application
___________________20. What is used to protect the contents of files and folders from unauthorized
access?
TEST III ENUMERATION. ENUMERATE THE FOLLOWING
1.
2.

List the six (6) parts of Windows Media Player


List at least four (4) parts of Internet Explorer 9

Prepared by:

Reviewed by:

Approved by:

Jennifer R. Espanol
Instructor

Melissa M. Pantig
Program Chair

Grace F. Tyler Ph.D.


College Dean

Page 3 of 3