Professional Documents
Culture Documents
Chapter 4 System Software: Computers Are Your Future, 10e (Coyle)
Chapter 4 System Software: Computers Are Your Future, 10e (Coyle)
3) Memory that is very fast but is erased when the power goes off is:
A) non-volatile.
B) secondary.
C) volatile.
D) high capacity.
1
5) Starting a computer that is not already on is called a:
A) cold boot.
B) warm boot.
C) fast load.
D) cold load.
7) Which is the correct sequence for what happens when you turn on a computer?
A) Authentication, BIOS, POST, loading the OS, system configuration, and loading the system
utilities
B) BIOS, POST, system configuration, loading the OS, loading the system utilities, and
authentication
C) BIOS, POST, loading the OS, system configuration, loading the system utilities, and
authentication
D) POST, BIOS, system configuration, loading the OS, loading the system utilities, and
authentication
8) One way to initiate a warm boot is to press which of the following keys?
A) Ctrl+Alt+Ins
B) Ctrl+Boot
C) Restart
D) Ctrl+Alt+Del
2
9) The central part of the OS that starts applications, manages devices and memory, and
performs other essential functions is the:
A) kernel.
B) core module.
C) critical data set.
D) BIOS.
10) Portions of the OS that are stored on the hard disk and retrieved as needed are called:
A) optional.
B) nonresident.
C) class B OS.
D) virtual OS.
12) The OS is most often found on a hard disk, although on some small handheld computers it is
on a(n):
A) secondary device.
B) memory chip.
C) offline disk.
D) tape cartridge.
3
14) The BIOS:
A) contains the instructions the computer needs to perform keyboard input and display screen
output.
B) is temporarily written in the computer's ROM.
C) is permanently written in the computer's RAM.
D) displays input and output information on a graphical screen.
15) When you first turn on or reset a PC, the ________ resets itself and searches for the BIOS.
A) entire motherboard
B) CPU
C) hard drive
D) monitor
16) While the BIOS information is displayed on the screen, you can press a special key such as
F8 to access the:
A) operating system source code.
B) kernel.
C) setup program.
D) list of software application programs.
17) Which of the following statements about the setup program is NOT true?
A) You can access the setup program by pressing a special key when the BIOS information is
displayed.
B) Any alterations to the setup program should be done by a technical support person.
C) The setup program includes the settings the computer needs to use the hardware.
D) The registry settings can be modified by using the setup program.
4
18) Which of the following checks to see that the hardware is operating appropriately?
A) BIOS
B) RAM
C) POST
D) ROM
19) On most computers what happens after the operating system's kernel is loaded into the
computer's memory?
A) The BIOS determines where the operating system is stored.
B) The setup program displays to allow the user to make changes.
C) The system configuration information loads.
D) The computer reboots.
20) All of the following are involved in loading the operating system EXCEPT:
A) searching for the operating system.
B) loading the kernel into the computer memory.
C) loading system configuration information.
D) adjusting the setup program in the BIOS.
5
22) PnP is an abbreviation for which of the following terms?
A) Package-and-Protect
B) Plug-and-Play
C) Peripheral-and-Plugin
D) Passive-and-Predictive
23) An operating system with PnP capabilities means that the system:
A) recognizes new peripherals that were attached before you turned the computer power on and
then installs the appropriate drivers and checks for driver compatibility.
B) automatically downloads drivers from the Internet for new peripherals that you installed.
C) can record and play sound files.
D) can install the appropriate driver for a newly attached piece of hardware as long as the
operating system was released before the hardware model was first produced.
26) To accommodate the computer personal preferences for more than one user, you can:
A) set up a profile for each person.
B) change the registry to specify how many users are using the computer.
C) adjust the setup program to accommodate different preferences.
D) interrupt the power-on self-test so that users can make their own choices.
6
27) All of the following are needed to access your computer in a multiuser environment
EXCEPT a(n):
A) user name.
B) home directory.
C) password.
D) Internet address.
28) An operating system that requires you to quit one program before starting a different
program is referred to as a ________ operating system.
A) single-tasking
B) multitasking
C) foreground
D) background
7
31) The operating system function that most dramatically affects an operating system's overall
quality is:
A) the boot process.
B) fragmenting.
C) managing applications.
D) real-time bug detection.
32) If one running application invades another's memory space, one or both will:
A) become unstable.
B) crash.
C) Both A and B.
D) Neither A nor B.
33) Virtual memory is an enhanced way to utilize the main memory by:
A) using a part of ROM as an extension of RAM to conserve the main memory.
B) using a hard disk swap file when memory is full.
C) dividing data and instructions into multitasking units.
D) creating pages of variable size to use when the swap file is full.
35) In virtual memory, program instructions and data are divided into units of fixed size called:
A) blocks.
B) segments.
C) pages.
D) modules.
8
36) Although virtual memory enables users to work with more memory than the amount installed
on the computer, ________ slows the computer down.
A) the operating system
B) segmentation
C) memory-scrubbing
D) paging
37) The best way to improve the performance of your computer is to:
A) increase the use of virtual memory because the paging technique increases the speed of the
memory.
B) increase the size of the swap file so that you can use variable pages.
C) install more RAM in the computer because the random access memory works faster than the
hard disk.
D) install a larger hard disk in the computer so that you can store more swap files.
38) Drivers for frequently used input and output devices are:
A) often included with the operating system provided the device was on the market before the
operating system was created.
B) programs that enable the user to install the system utilities faster.
C) no longer needed if the computer has Plug-and-Play capability.
D) interchangeable because input and output devices can now use the same information to enable
them to work.
39) Printers, scanners, monitors, speakers, and the mouse all need ________ to operate.
A) drivers
B) interrupt handlers
C) USB ports
D) battery backup
9
40) Most personal computers have how many interrupt request lines?
A) 2
B) 8
C) 16
D) 25
41) Signals that inform the OS that something has happened are:
A) operating system diversions.
B) drivers.
C) interrupts.
D) program defects.
42) If two devices are configured to use the same IRQ but aren't designed to share an IRQ line,
the result is a failure called:
A) IRQ mis-configuration
B) IRQ defect
C) interrupt conflict
D) IRQ conflict
43) Miniprograms that immediately kick in when an interrupt occurs are called:
A) program exits.
B) interrupt diverters.
C) interrupt swappers.
D) interrupt handlers.
10
45) User interfaces enable you to do all of the following EXCEPT:
A) start applications programs.
B) process operating system interrupts.
C) manage storage devices.
D) shut down the computer.
11
50) Windows Vista was released to the public in what year?
A) 2006
B) 2007
C) 2008
D) It has not been released yet.
53) Microsoft Windows Server 2008 is designed to support what type of computing in a
corporate environment?
A) Wireless
B) Centralized
C) Mobile
D) Client/server
54) Windows Server 2008 shares many similarities with which other operating system?
A) Windows Vista
B) Windows XP
C) UNIX
D) Linux
12
55) Which of the following is NOT a benefit of Windows Server 2008?
A) Security
B) Interoperability with Linux and UNIX
C) Administration
D) Virtualization
56) Which Microsoft operating system is designed for smartphones and PDAs?
A) Windows XP
B) Windows Lite
C) Windows Mobile
D) All of the above
57) Which operating system first introduced the graphical user interface?
A) Windows 95
B) Linux
C) UNIX
D) Mac OS
Reference: Mac OS
Reference: Linux
Reference: Linux
13
60) Who created Linux?
A) Steve Jobs
B) Bill Gates
C) Linus Torvalds
D) Paul Allen
Reference: Linux
Reference: Linux
Reference: MS-DOS
63) Which operating system first offered preemptive multitasking to the user?
A) Microsoft Windows 2000
B) Linux
C) Macintosh OS X
D) UNIX
Reference: UNIX
Reference: UNIX
14
65) What is considered a major advantage of UNIX?
A) The various versions of UNIX are compatible with each other.
B) It is easy to use.
C) It doesn't allow preemptive multitasking.
D) It works efficiently in secure computer networks.
Reference: UNIX
66) System utilities are used for all of the following purposes EXCEPT to:
A) protect your computer from viruses.
B) organize and find files on your computer.
C) create backups of system and application files.
D) serve as an Internet interface with your Internet browser.
67) Programs that are used to keep the computer system running smoothly are called:
A) system utilities.
B) housekeeping programs.
C) operating system add-ons.
D) file managers.
15
69) Backup software is classified as a(n) ________ program.
A) application
B) utility
C) antivirus
D) operating system
70) In Windows Vista the ________ option allows users to schedule the time and backup
location in advance.
A) Complete Backup
B) Incremental Backup
C) Fail Safe Backup
D) Automatic Backup
71) Drive imaging software creates a(n) ________ of the hard disk.
A) mirror image
B) full backup
C) incremental backup
D) snapshot
16
73) Which of the following statements regarding viruses is NOT true?
A) A virus is able to cause destruction as soon as it is copied to your computer disk.
B) A virus can remain inactive on your computer disk until a designated time to perform its
action.
C) Viruses are slow to replicate.
D) A virus that has not been identified in your antivirus software database will remain
undetected unless the antivirus software includes a program that monitors system functions.
74) Antivirus software uses ________ to examine files for virus signatures.
A) imaging
B) destruction-detection
C) pattern-matching
D) security tools
75) A file manager utility program allows you to perform all of the following EXCEPT:
A) manage how files are stored.
B) delete files you no longer want to keep.
C) create a backup file of the entire contents of your computer.
D) make copies of files.
76) The search utility program in Microsoft Windows helps you to locate a file by using which
of the following methods?
A) Specifying the name of the file and letting the software locate the file for you
B) Manually scrolling through the list of file names until you locate the one you need
C) Grouping the files by file size and then manually scrolling through the list until you locate the
one you need
D) Arranging the files by date so that you can locate the file by the date you think you created it
17
77) A disk scanning program is used to:
A) reduce the size of a file when the computer disk is full.
B) locate files by the date they were last saved.
C) detect and resolve problems that may occur when files are stored on a disk.
D) move files into logical folders.
78) The system utility that locates and marks bad sectors on a computer disk is a(n):
A) disk scanner.
B) file compression.
C) search utility.
D) antivirus software.
80) What system utility should be used to correct disk performance problems caused by scattered
portions of files on the computer disk?
A) Search
B) File manager
C) Disk defragmentation
D) Disk scanning
18
82) Compression enables faster downloads, but then you have to ________ the files after
downloading.
A) encrypt
B) decrypt
C) decompress
D) zip
83) Compression utilities are able to store several hundred individual files in a special format
into one file known as a(n):
A) folder.
B) container.
C) library.
D) archive.
Reference: Troubleshooting
19
86) Which is the Windows Vista tool that can be used to diagnose the cause of system
slowdowns?
A) Performance Tracking
B) Systems Diagnostics
C) Response-Time Tracker
D) Reliability and Performance Monitor
87) You can locate devices that are not working properly by starting a Windows computer in
________ mode.
A) safe
B) reduced
C) open
D) active
Reference: Troubleshooting
88) An alternative to completely shutting down your system is to put it in ________ mode.
A) locked
B) power-save
C) sleep
D) safe
Reference: Troubleshooting
89) Which of the following should NOT cause a change in the system performance?
A) Computer viruses
B) Installation of additional memory
C) Fragmented files
D) Storing files on a Zip disk
Reference: Troubleshooting
90) System software includes the operating system and the ________.
20
91) The term ________ means to transfer data from a storage device to memory.
92) The computer is performing a(n) ________ when you start a computer that is NOT already
on.
93) The ________ program contains settings that manage computer hardware.
94) A special type of memory that stores configurations such as the amount of memory on the
computer is called ________.
95) The registry stores configuration information on installed peripherals and software in a(n)
________.
96) An operating system with ________ capability can immediately detect a newly added
peripheral and provide the appropriate device driver.
97) The process of entering a user name and password is called authentication or ________.
98) ________ allows you to switch between programs without having to close one of the
programs.
21
99) Virtual memory involves the use of a(n) ________ file on the hard disk to store copies of
pages when the memory is full.
100) ________ enables users to work with more memory than is actually installed on the
computer.
101) In virtual memory, programs and data are divided into fixed size units called ________.
102) A(n) ________ is a program that contains information about a specific device and how the
operating system communicates with it.
103) Input and output devices communicate with the central processing unit (CPU) through the
use of ________ lines.
104) The small picture on a desktop that represents a computer resource is called a(n) ________.
106) The ________ operating system was released in 1984 and contained the first graphical user
interface.
Reference: Mac OS
22
107) The open source operating system created to work on PCs is called ________.
inux
Reference: Linux
Reference: MS-DOS
109) A(n) ________ is determined by the combination of microprocessor chip and OS used by a
distinct type of computer.
110) Previously, Macs used a Motorola or IBM chip, but they have switched to the ________
chip.
111) A(n) ________ backup includes all the files and data on the hard disk.
112) A(n) ________ backup only copies those files that have been created or changed since the
last backup.
113) Drive imaging software creates a(n) ________ of the entire hard disk.
114) Full backups should be made at least one time each ________.
23
115) ________ should be stored away from the computer system in case of a fire or flood.
117) Antivirus software uses pattern-matching technique to examine files for telltale virus code
________.
119) The system utility that you would use to organize the data stored on your computer is called
a(n) ________.
120) The utility program that deletes unneeded files is called a(n) ________ utility.
121) To reorganize data stored on a computer disk so that all portions of each file are stored
together, you should use a(n) ________ program.
122) A(n) ________ is a file that can contain hundreds of other files saved in a special format.
24
123) You should use an emergency or ________ disk if your computer fails to start normally.
Reference: Troubleshooting
124) Starting your computer in ________ mode lets you check to see what computer devices are
in conflict.
Reference: Troubleshooting
125) A helpful place to look for troubleshooting guidance in Microsoft Windows is the
________ utility.
Reference: Troubleshooting
127) To diagnose problems associated with system slowdown, use the ________ Monitor.
Reference: Troubleshooting
129) Menu-driven interfaces enable you to avoid memorizing keywords and symbols.
131) Mac OS
132)MS-DOS
25
Reference: Exploring Operating Systems
133) UNIX
134) Linux
135) Boot
138) Kernel
139) Nonresident
26
Match the following terms to their meanings:
140) PnP
141) Registry
142) Authentication
143) Crash
144) POST
27
Match the following terms to their meanings:
145) Single-tasking operating system
A) Ensures that all applications have access to the CPU in case a program stops working
B) Allows more than one program to run at a time
C) Allows you to have only one program running at a time
D) The open application program that is currently active
E) The open application program that is currently inactive
150) Interrupt
28
Reference: Handling Input and Output
155) Archive
Reference: Various
Reference: Various
Reference: Various
158) Account
Reference: Various
159) Profile
Reference: Various
A) A record of the user's preferences that is associated with the user's name and password
B) An area on the disk surface that is damaged
C) A file that contains two or more files
D) Used to start the computer in an emergency
E) Contains the user's name, password, and home directory location
29
Match the following terms to their meanings:
Reference: Various
Reference: Various
Reference: Various
Reference: Various
Reference: Various
30