CIT-120-CH-05 – Flashcards
40 test answers
Unlock all answers in this set
Unlock answers 40question
With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are selected with the mouse to issue commands to the PC.
answer
Graphical User Interface
Unlock the answer
question
____ is the most widely used mobile operating system worldwide.
answer
Android
Unlock the answer
question
Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
answer
Disk Defragmentation
Unlock the answer
question
Andrea tells Dean that it is very important for him to ____ all of his important data on a regular basis to protect against data loss in the case of a problem with the computer, He can also use a backup utility to do this.
answer
Backup
Unlock the answer
question
Andrea advises Dean to remove unnecessary programs from his computer by using an ____ utility
answer
Uninstall
Unlock the answer
question
In DOS, the command ____ displays the files and folders in the current location.
answer
DIR
Unlock the answer
question
Small programs called ____ are used to communicate with peripheral devices, such as monitors printers, and scanners.
answer
Drivers
Unlock the answer
question
System software is usually divided into two categories: operating system software and ____ programs.
answer
Utility
Unlock the answer
question
____ is a Linux-based operating system developed by the Open Handset Alliance.
answer
Android
Unlock the answer
question
The file management program incorporated into Windows 8 is ____.
answer
File Explorer
Unlock the answer
question
____ can protect against someone accessing your PC via the internet.
answer
Firewalls
Unlock the answer
question
Most operating systems have security features available, such as integrated ____ to protect against unauthorized access via the internet.
answer
Firewall
Unlock the answer
question
____ memory allows you to use more memory than is physically available on your computer.
answer
Virtual
Unlock the answer
question
A ____ is an area in RAM or on the hard drive designed to hold input and output on their way in or out of the system.
answer
Buffer
Unlock the answer
question
____ is one of the most widely-used versions of Linux.
answer
Ubuntu
Unlock the answer
question
One of the most obvious initial changes in Windows Vista is the ____ interface.
answer
Aero
Unlock the answer
question
The most recent version of Windows is Windows ____.
answer
8
Unlock the answer
question
Filenames typically include a ____ at the end of the filename.
answer
File Extension
Unlock the answer
question
____ is the proprietary operating system for computers made by the Apple Corporation.
answer
Mac OS
Unlock the answer
question
____ are utility programs that search for documents and other files on a user's hard drives.
answer
Search Tools
Unlock the answer
question
The means by which an operating system or any other program interacts with the user is called the ____.
answer
User Interface
Unlock the answer
question
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
answer
File Management
Unlock the answer
question
____ is the current version of Windows Phone.
answer
Windows Phone 8
Unlock the answer
question
Janet has an Apple computer at home. The operating system of that computer is ____.
answer
Mac OS
Unlock the answer
question
All the computers in Janet's school computer lab have the newest version of Windows installed, which is ____.
answer
Windows 8
Unlock the answer
question
____ refers to the ability of an operating system to work with more than one program at a time.
answer
Multitasking
Unlock the answer
question
To restore the file or folder deleted from your computer's hard drive, open your computer's ____ and restore the file to its original location.
answer
Recycle Bin
Unlock the answer
question
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ___.
answer
Disk Defragmentation
Unlock the answer
question
A ____ is a program that is designed to cause damage to the computer system or perform some other malicious act.
answer
Computer Virus
Unlock the answer
question
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system's manufacturer on a regular basis.
answer
Security Patches
Unlock the answer
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy.
answer
Backup
Unlock the answer
question
____ is a family of operating systems based on Windows that is designed primarily for consumer and industrial devices that are not personal computers.
answer
Windows Embedded
Unlock the answer
question
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.
answer
UNIX
Unlock the answer
question
In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____.
answer
Embedded Operating Systems
Unlock the answer
question
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within a computer system.
answer
Operating System
Unlock the answer
question
____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter.
answer
Application Software
Unlock the answer