CIT-120-CH-05 – Flashcards
Unlock all answers in this set
Unlock answersquestion
All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.
answer
Pages
question
____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer.
answer
System
question
During the 1980s and the early 1990s, ____ was the dominant operating system for microcomputers.
answer
DOS (Disk Operating System)
question
The ____ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
answer
Operating System
question
With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are selected with the mouse to issue commands to the PC.
answer
Graphical User Interface
question
____ is the most widely used mobile operating system worldwide.
answer
Android
question
Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
answer
Disk Defragmentation
question
Andrea tells Dean that it is very important for him to ____ all of his important data on a regular basis to protect against data loss in the case of a problem with the computer, He can also use a backup utility to do this.
answer
Backup
question
Andrea advises Dean to remove unnecessary programs from his computer by using an ____ utility
answer
Uninstall
question
In DOS, the command ____ displays the files and folders in the current location.
answer
DIR
question
Small programs called ____ are used to communicate with peripheral devices, such as monitors printers, and scanners.
answer
Drivers
question
System software is usually divided into two categories: operating system software and ____ programs.
answer
Utility
question
____ is a Linux-based operating system developed by the Open Handset Alliance.
answer
Android
question
The file management program incorporated into Windows 8 is ____.
answer
File Explorer
question
____ can protect against someone accessing your PC via the internet.
answer
Firewalls
question
Most operating systems have security features available, such as integrated ____ to protect against unauthorized access via the internet.
answer
Firewall
question
____ memory allows you to use more memory than is physically available on your computer.
answer
Virtual
question
A ____ is an area in RAM or on the hard drive designed to hold input and output on their way in or out of the system.
answer
Buffer
question
____ is one of the most widely-used versions of Linux.
answer
Ubuntu
question
One of the most obvious initial changes in Windows Vista is the ____ interface.
answer
Aero
question
The most recent version of Windows is Windows ____.
answer
8
question
Filenames typically include a ____ at the end of the filename.
answer
File Extension
question
____ is the proprietary operating system for computers made by the Apple Corporation.
answer
Mac OS
question
____ are utility programs that search for documents and other files on a user's hard drives.
answer
Search Tools
question
The means by which an operating system or any other program interacts with the user is called the ____.
answer
User Interface
question
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
answer
File Management
question
____ is the current version of Windows Phone.
answer
Windows Phone 8
question
Janet has an Apple computer at home. The operating system of that computer is ____.
answer
Mac OS
question
All the computers in Janet's school computer lab have the newest version of Windows installed, which is ____.
answer
Windows 8
question
____ refers to the ability of an operating system to work with more than one program at a time.
answer
Multitasking
question
To restore the file or folder deleted from your computer's hard drive, open your computer's ____ and restore the file to its original location.
answer
Recycle Bin
question
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ___.
answer
Disk Defragmentation
question
A ____ is a program that is designed to cause damage to the computer system or perform some other malicious act.
answer
Computer Virus
question
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system's manufacturer on a regular basis.
answer
Security Patches
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy.
answer
Backup
question
____ is a family of operating systems based on Windows that is designed primarily for consumer and industrial devices that are not personal computers.
answer
Windows Embedded
question
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.
answer
UNIX
question
In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____.
answer
Embedded Operating Systems
question
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within a computer system.
answer
Operating System
question
____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter.
answer
Application Software