Está en la página 1de 14

This is the html version of the file http://uogonline.com/drlee/CS200/Homework/Hwk7-Solutions.rtf.

CS200-Chapter7-Homework
Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Which of the following is not an operating system function?

a. starting the computer b. managing programs

c. word processing d. establishing an Internet connection

____ 2. A(n) ____ boot is the process of using the operating system to restart a computer.

a. b.

warm cold

c. d.

start new

____ 3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Lock button menu.

a. b.

Stand By Turn Off

c. d.

Restart Cancel

____ 4. A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen.

a. b.

control utility

c. d.

user management

____ 5. In a(n) ____, the user types commands or presses special keys on the keyboard to enter data and instructions.

a. command-line interface b. menu-driven interface

c. performance-monitor interface d. graphical user interface (GUI)

____ 6. With a(n) ____ interface, users interact with menus and visual images such as buttons and other graphical objects to issue commands.

a. command-line interface b. menu-driven interface

c. performance-monitor interface d. graphical user interface (GUI)

____ 7. The purpose of memory ____ is to optimize the use of RAM.

a. b.

performance management

c. d.

throttling integration

____ 8. A(n) ____ is an operation the processor manages.

a. b.

buffer spool

c. d.

task event

____ 9. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.

a. b.

paging spooling

c. d.

swapping waiting

____ 10. Multiple print jobs line up in a ____ within a buffer as shown in the accompanying figure.

a. b.

queue row

c. d.

page virtual page

____ 11. ____ means the operating system automatically configures new devices as you install them.

a. b.

Virtual memory Operational buffering

c. d.

Page logging Plug and Play

____ 12. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.

a. b.

client multitasking

c. d.

integrated server

____ 13. A network ____, the person overseeing network operations, uses the network operating system to add and remove users, computers, and other devices to and from the network.

a. b.

administrator owner

c. d.

client master

____ 14. A(n) ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

a. b.

user name password

c. d.

client cycle

____ 15. A performance ____ is a program that assesses and reports information about various computer resources and devices.

a. b.

monitor manager

c. d.

reporter roster

____ 16. A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources.

a. b.

folder password

c. d.

user name cipher

____ 17. Which of the following is not a utility function like the ones shown in the accompanying figure?

a. b.

managing files viewing images

c. d.

controlling the keyboard uninstalling programs

____ 18. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file.

a. b.

video card video driver

c. d.

scanner image viewer

____ 19. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____, is a utility that performs functions related to file management.

a. b.

monitor manager

c. d.

scanner controller

____ 20. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.

a. b.

application remover application purger

c. d.

uninstaller antiapp utility

____ 21. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk ____ utility searches for and removes unnecessary files.

a. b.

diagnostic uninstaller

c. d.

operator cleanup

____ 22. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a screen ____, is a utility that causes a display devices screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

a. b.

manager saver

c. d.

utility protector

____ 23. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions.

a. b.

firewall antihacker

c. d.

threat neutralizer protection utility

____ 24. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a(n) ____ utility identifies computer problems but does not repair them.

a. b.

troubleshooting executional

c. d.

operational diagnostic

____ 25. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a file ____ utility, shrinks the size of a file.

a. b.

scanner compression

c. d.

defragmenter archiver

____ 26. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computers performance.

a. b.

maintenance multitasking

c. d.

functional proprietary

____ 27. Which of the following is not a type of operating system?

a. b.

wireless stand-alone

c. d.

server embedded

____ 28. The first version of Windows was developed in the early ____.

a. b.

1960s 1970s

c. d.

1980s 1990s

____ 29. A(n) ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.

a. b.

multitasking media-based

c. d.

single-user stand-alone

____ 30. Which of the following is NOT an edition of Windows Vista?

a. b.

Enterprise Ultimate

c. d.

Home Premium Business

____ 31. Apples latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.

a. b.

Safari OS IX

c. d.

OS X OS XI

____ 32. To defragment a disk means to ____.

a. b.

slow it down diagnose problems with it

c. d.

reorganize it repair it

____ 33. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the users knowledge or permission.

a. b.

firewall agent

c. d.

virus spyware

____ 34. ____ is a program that displays an online advertisement in a banner or popup window on Web pages, e-mail, or other Internet services.

a.

Compression software

c.

Resident software

b.

Symbianware

d.

Adware

____ 35. To ____ a file, you restore a zipped file to its original form.

a. b.

restore archive

c. d.

zip uncompress

____ 36. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.

a. b.

blocker driver

c. d.

stopper monitor

____ 37. Compressed files sometimes are called ____ files.

a. b.

skipped controlled

c. d.

zipped defragmented

____ 38. ____ is a popular stand-alone file compression utility.

a. b.

Smasher PKZIP

c. d.

CompUtil All of the above

____ 39. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.

a. b.

Phishing Zipping

c. d.

Pharming Authenticating

____ 40. A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

a. b.

operating phishing

c. d.

zipping antispam

True/False Indicate whether the statement is true or false. ____ 41. On mobile devices, the operating system may reside on a RAM chip. ____ 42. The boot process is similar for large and small computers. ____ 43. In a multitasking environment, many programs run in the foreground, while one program remains in the background. ____ 44. One drawback of multiprocessing is that it tends to reduce a computers processing speed. ____ 45. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. ____ 46. Multiuser operating systems always process jobs on a first-come, firstserved basis. ____ 47. While waiting for devices to become idle, the operating system places items in buffers. ____ 48. If a printer does not have its own internal memory or if its memory is full, the operating systems buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed. ____ 49. Virtual memory is faster than RAM. ____ 50. The operating system determines the order in which tasks are processed. ____ 51. If you attach a new device to a computer, its driver must be installed before you can use the device. ____ 52. A network administrator is a program that monitors network performance. ____ 53. Encryption is the process of encoding data and information into an unreadable form. ____ 54. Windows Vista is available in several editions, which are grouped in two general categories: Embedded and Personal. ____ 55. Linux is an example of proprietary software, which means that its code is available to the public. ____ 56. Windows CE is designed for use on computing devices with limited functionality.

____ 57. Palm OS is an example of a stand-alone operating system.

____ 58. Utility programs like those shown in the accompanying figure are considered to be application software. ____ 59. The accompanying figure lists a few of the utilities available in Windows Vista; one of the utilities available in Windows Vista, a disk scanner, is a utility that removes a program from system files. ____ 60. Fragmentation slows down disk access and the performance of the entire computer. ____ 61. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions. ____ 62. Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitors screen. ____ 63. Most antivirus programs also protect against worms and Trojan horses. ____ 64. An anti-spam program restricts access to certain material on the Web. ____ 65. Uncompressing a file is the same as zipping a file.

CS200-Chapter7-Homework Answer Section


MULTIPLE CHOICE 1. ANS: C PTS: 1 DIF: P REF: 271 OBJ: 2 2. ANS: A PTS: 1 DIF: P REF: 272 OBJ: 2 3. ANS: C PTS: 1 DIF: P REF: 272 OBJ: 2 4. ANS: C PTS: 1 DIF: P REF: 272 OBJ: 2 5. ANS: A PTS: 1 DIF: P REF: 273 OBJ: 2 6. ANS: D PTS: 1 DIF: P REF: 273 OBJ: 2 7. ANS: B PTS: 1 DIF: P REF: 275 OBJ: 2 8. ANS: C PTS: 1 DIF: P REF: 275 OBJ: 2 9. ANS: B PTS: 1 DIF: P REF: 275 OBJ: 3 10. ANS: A PTS: 1 DIF: P REF: 276

OBJ: 2 11. ANS: D PTS: 1 DIF: P REF: 276 OBJ: 2 12. ANS: D PTS: 1 DIF: P REF: 277 OBJ: 2 13. ANS: A PTS: 1 DIF: P REF: 278 OBJ: 2 14. ANS: A PTS: 1 DIF: P REF: 278 OBJ: 2 15. ANS: A PTS: 1 DIF: P REF: 277 OBJ: 2 16. ANS: B PTS: 1 DIF: P REF: 278 OBJ: 2 17. ANS: C PTS: 1 DIF: P REF: 277 OBJ: 2 18. ANS: D PTS: 1 DIF: P REF: 285 OBJ: 6 19. ANS: B PTS: 1 DIF: P REF: 285 OBJ: 6 20. ANS: C PTS: 1 DIF: P REF: 285 OBJ: 6 21. ANS: D PTS: 1 DIF: P REF: 286 OBJ: 6 22. ANS: B PTS: 1 DIF: P REF: 287 OBJ: 6 23. ANS: A PTS: 1 DIF: P REF: 287 OBJ: 6 24. ANS: D PTS: 1 DIF: P REF: 291 OBJ: 6 25. ANS: B PTS: 1 DIF: P REF: 290 OBJ: 6 26. ANS: A PTS: 1 DIF: P REF: 291 OBJ: 6 27. ANS: A PTS: 1 DIF: P REF: 279 OBJ: 2 28. ANS: C PTS: 1 DIF: P REF: 280 OBJ: 4

29. ANS: D PTS: 1 DIF: P REF: 280 OBJ: 3 30. ANS: A PTS: 1 DIF: P REF: 280 OBJ: 3 31. ANS: C PTS: 1 DIF: P REF: 281 OBJ: 3 32. ANS: C PTS: 1 DIF: P REF: 286 OBJ: 6 33. ANS: C PTS: 1 DIF: P REF: 288 OBJ: 6 34. ANS: D PTS: 1 DIF: P REF: 289 OBJ: 6 35. ANS: D PTS: 1 DIF: P REF: 290 OBJ: 6 36. ANS: A PTS: 1 DIF: P REF: 290 OBJ: 6 37. ANS: C PTS: 1 DIF: P REF: 290 OBJ: 6 38. ANS: B PTS: 1 DIF: P REF: 290 OBJ: 6 39. ANS: A PTS: 1 DIF: P REF: 290 OBJ: 6 40. ANS: B PTS: 1 DIF: P REF: 290 OBJ: 6 TRUE/FALSE 41. ANS: F PTS: 1 DIF: P REF: 271 OBJ: 1 42. ANS: T PTS: 1 DIF: P REF: 272 OBJ: 2 43. ANS: F PTS: 1 DIF: P REF: 273 OBJ: 2 44. ANS: F PTS: 1 DIF: P REF: 275 OBJ: 2 45. ANS: F PTS: 1 DIF: P REF: 275 OBJ: 2 46. ANS: F PTS: 1 DIF: P REF: 275 OBJ: 2

47. ANS: T PTS: 1 DIF: P REF: 275 OBJ: 2 48. ANS: T PTS: 1 DIF: P REF: 275 OBJ: 2 49. ANS: F PTS: 1 DIF: S REF: 275 OBJ: 2 50. ANS: T PTS: 1 DIF: P REF: 275 OBJ: 2 51. ANS: T PTS: 1 DIF: P REF: 276 OBJ: 2 52. ANS: F PTS: 1 DIF: P REF: 278 OBJ: 2 53. ANS: T PTS: 1 DIF: P REF: 278 OBJ: 2 54. ANS: F PTS: 1 DIF: P REF: 280 OBJ: 3 55. ANS: F PTS: 1 DIF: P REF: 282 OBJ: 3 56. ANS: T PTS: 1 DIF: S REF: 283 OBJ: 3 57. ANS: F PTS: 1 DIF: S REF: 283 OBJ: 5 58. ANS: F PTS: 1 DIF: S REF: 284 OBJ: 6 59. ANS: F PTS: 1 DIF: P REF: 285 OBJ: 6 60. ANS: T PTS: 1 DIF: P REF: 286 OBJ: 6 61. ANS: T PTS: 1 DIF: P REF: 287 OBJ: 6 62. ANS: F PTS: 1 DIF: P REF: 287 OBJ: 6 63. ANS: T PTS: 1 DIF: P REF: 288 OBJ: 6 64. ANS: F PTS: 1 DIF: P REF: 289 OBJ: 6 65. ANS: F PTS: 1 DIF: P REF: 290

OBJ: 6

También podría gustarte