Filters
Question type

Study Flashcards

____ can protect against someone accessing your PC via the Internet.


A) Mirrors
B) Antispam software
C) Firewalls
D) Modems

Correct Answer

verifed

verified

File compression programs reduce the size of files so they take up less storage space on a storage medium or can be transmitted faster over the Internet.

Correct Answer

verifed

verified

The means by which an operating system or any other program interacts with the user is called the ____.


A) user login
B) programming interface
C) program front-end
D) user interface

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the newest version of Windows installed, which is ____.


A) Windows Vista
B) Windows Solaris
C) Windows XP
D) Windows 7

Correct Answer

verifed

verified

A(n) ____________________ is a type of software program that performs a specific task, usually related to managing or maintaining the computer system.

Correct Answer

verifed

verified

Most operating systems today are designed for either 16 -bit or 32-bit CPUs.

Correct Answer

verifed

verified

____ memory allows you to use more memory than is physically available on your computer.


A) Shared
B) Virtual
C) Multithreading
D) Buffer

Correct Answer

verifed

verified

To restore a file or folder deleted from your computer's hard drive, open your computer's ____ and restore the file to its original location.


A) Recycle Bin
B) Windows Explorer
C) System Restore program
D) Recycle Menu

Correct Answer

verifed

verified

Uninstall utilities are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, installation files, and so forth) in order to free up disk space.

Correct Answer

verifed

verified

____________________ is a software program installed without the user's knowledge that secretly collects information and sends it to an outside party via the user's Internet connection.

Correct Answer

verifed

verified

All Programs and data located in RAM are divided into fixed-length pages or variable-length files .

Correct Answer

verifed

verified

To make it easier to use and manage all of your connected devices, Windows 7 includes a new ____________________.

Correct Answer

verifed

verified

Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.


A) disk defragmentation
B) file compression
C) disk backup
D) disk cleanup

Correct Answer

verifed

verified

Using virtual memory is faster than just using RAM.

Correct Answer

verifed

verified

Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system's manufacturer on a regular basis.


A) security walls
B) device patches
C) security patches
D) device drivers

Correct Answer

verifed

verified

An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.


A) disk management
B) file management
C) file listing
D) file recovery

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.


A) delete
B) uninstall
C) remove
D) cleanup

Correct Answer

verifed

verified

Describe the functionality of an operating system.

Correct Answer

verifed

verified

A computer's operating system is a colle...

View Answer

Application software runs in the background at all times, making it possible for you to use your computer.

Correct Answer

verifed

verified

Explain multithreading.

Correct Answer

verifed

verified

A thread is a sequence of instructions w...

View Answer

Showing 61 - 80 of 100

Related Exams

Show Answer