Anda di halaman 1dari 5

Arab Academy for Science & Technology College of Engineering & Technology - Cairo Computer Engineering Department Course

Code: CC111 Course Title : Int. To Computers Examiner : Prof. Dr. ALAA Abd El-Raheem AHMED. Spec. : First Year Students The 12th Wweek Review Sheet 2 ( Chap 5) Reg. #: Name: Class:

Which of the following sentences is (True) or (False):


In practice, the difference between system and application software is not always clear cut. T Most operating systems today use a text-based user interface. F As you work on your computer, the operating system is in charge of managing system resources and making them available to devices and programs when they are needed. T Filename rules are the same in all operating systems. F File extensions should not be changed by the user because the operating system uses them to identify the program that should be used to open the file. T Using virtual memory is faster than just using RAM. F There are two primary forms of DOS: PC-DOS and MS-DOS. T There is still a large installed base of Windows XP users and Microsoft plans to support Windows XP until 2014. T Windows 98 was built from the ground up using a different kernel than the other versions of Windows. F Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical user interface. T Large computer systemssuch as high-end servers, mainframes, and supercomputers sometimes use operating systems designed solely for that type of system. T Linux is increasingly being used with both mainframes and supercomputers. T There are many stand-alone utility programs available as an alternative to the operating systems utility programs. T Stand-alone utility programs are often available in a suite of related programs. T Once a file management program is open, you can look at the folders and files stored on your PC. T Files and folders deleted from removable media cannot be restored by any method. F Using the Save As option of the File menu before editing a document is a good idea, so you can return to the original version, if needed. T

Choice the correct answer


System software is usually divided into two categories: operating system software and ____ programs. B a. planning systemc. FAT system b. utility d. background ____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer. D a. Background c. Application b. Front-end d. System

____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter. C a. System software c. Application software b. Utility programs d. Background programs The ____ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion. B a. startup c. driver b. operating system d. registry The means by which an operating system or any other program interacts with the user is called the ____. D a. user login c. program front-end b. programming interface d. user interface Filenames typically include a ____ at the end of the filename. A a. file extension c. file subname b. file subscript d. file attachment Most operating systems have security features available, such as an integrated ____ to protect against unauthorized access via the Internet. B a. router c. hub b. firewall d. modem Most operating systems have security features available, such as an option to automatically download and install ____ from the operating systems manufacturer on a regular basis. C a. security walls c. security patches b. device patches d. device drivers All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used. C a. pies c. pages b. sectors d. cylinders ____ memory allows you to use more memory than is physically available on your computer. a. Shared c. Multithreading B b. Virtual d. Buffer A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the system. B a. segment c. page b. buffer d. sector One of the most obvious initial changes in Windows Vista is the ____ interface. C a. Leopard c. Aero b. Android d. Symbian The most recent version of Windows is Windows ____. C a. Leopard c. 7 b. XP d. Vista ____ is the proprietary operating system for computers made by Apple Corporation. C a. Linux c. Mac OS b. Solaris d. Unix ____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers. B a. Linux c. Solaris b. UNIX d. Mac OS X In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____. A a. embedded operating systems c. virtual operating systems

b. high-performance operating systems d. storage operating systems ____ is a family of operating systems based on Windows that is designed primarily for consumer and industrial devices that are not personal computers. B a. Windows Vista c. Windows Server 2003 b. Windows Embedded d. Windows Mobile ____ is the current version of Windows Phone. C a. Windows Phone 9 c. Windows Phone 7 b. Windows Phone 5 d. Windows Server 2011 ____ is the most widely used mobile operating system worldwide. D a. Mac OS c. Windows Mobile b. Palm OS d. Symbian OS The file management program incorporated into Windows is ____. C a. StuffIt c. Windows Explorer b. WinZip d. Disk Cleanup To restore a file or folder deleted from your computers hard drive, open your computers ____ and restore the file to its original location. A a. Recycle Bin c. System Restore program b. Windows Explorer d. Recycle Menu ____ are utility programs that search for documents and other files on a users hard drives. A a. Search tools c. Search engines b. Tool boxes d. Tool programs Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy. B a. mirror c. index b. backup d. hidden file A ____ is a software program that is designed to cause damage to the computer system or perform some other malicious act. D a. firewall c. spyware b. utility program d. computer virus

Complete the following statements One of the principal roles of every _____OS_______ is to translate user instructions into a form the computer can understand. During the boot process, the essential portion, or core, of the operating system (called the ___Kernel_______) is loaded into memory. In Windows, certain system configuration information is stored in the ___registry_______ files. ____Scheduling_____ routines in the operating system determine the order in which jobs are carried out, as well as which commands get executed first if the user is working with more than one program at one time or if the computer supports multiple users. Device drivers usually need to be updated or reinstalled after you ___upgrade_______ your operating system to a newer version or after you buy a new computer. One memory management technique frequently used by operating systems is _____virtual memory_____, which uses a portion of the computers hard drive as additional RAM. The process of placing items in a buffer so they can be retrieved by the appropriate device when needed is called ______spooling____. DOS traditionally used a command line interface, although newer versions of DOS support a(n) ____menu-driven____ interface. As shown in the accompanying figure, Windows users can still issue ______DOS______ commands via the Command Prompt.

To make it easier to use and manage all of your connected devices, Windows 7 includes a new _____Device Stage______. ____Mac OS_____ is based on the UNIX operating system and originally set the standard for graphical user interfaces. _____Linux______ is an operating system developed by Linus Torvalds in 1991 when he was a student at the University of Helsinki in Finland. In the past few years, ____ Linux _____ has grown from an operating system used primarily by computer techies who disliked Microsoft to a widely accepted operating system with strong support from mainstream companies. The latest MAC operating system is MAC OS X ______Lion______. _____iOS_____ is the operating system designed for Apple mobile phones and mobile devices. A(n) _____utility program______ is a type of software program that performs a specific task, usually related to managing or maintaining the computer system. With Windows Explorer, click a drive or ______Folder______ icon in the left pane to display its contents in the right pane. ____Search tools______ are utility programs that search for documents and other files on a users hard drives. _____Spyware______ is a software program installed without the users knowledge that secretly collects information and sends it to an outside party via the users Internet connection.

Answer the following questions Q. Describe the functionality of an operating system. A computers operating system is a collection of programs that manage and coordinate the activities taking place within the computer and it is the most critical piece of software installed on the computer. The operating system boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion. For example, when you issue the command for your computer to store a document on your hard drive, the operating system must perform the following steps: 1) make sure that the specified hard drive exists, 2) verify that there is adequate space on the hard drive to store the document and then store the document in that location, and 3) update the hard drives directory with the filename and disk location for that file so that the document can be retrieved again when needed. In addition to managing all of the resources associated with your local computer, the operating system also facilitates connections to the Internet and other networks. Q. Explain multitasking with reference to an operating system. Multitasking refers to the ability of an operating system to have more than one program (also called a task) open at one time. Without the ability to multitask, an operating system would require the user to close one program before opening another program. Virtually all of todays operating systems support multitasking. Although multitasking enables a user to work with multiple programs at one time, a single CPU core cannot execute more than one task at one time (unless Intels Hyper-Threading Technology or another technology that allows a single core to function as two cores is used). Consequently, the CPU rotates between processing tasks, but it works so quickly that to the user it appears as though all programs are executing at the same time. Q Explain multithreading. A thread is a sequence of instructions within a program that is independent of other threads. Examples might include spell checking, printing, and opening documents in a word processing program. Operating systems that support multithreading have the ability to rotate between multiple threads (similar to the way multitasking can rotate between multiple programs) so that processing is completed faster and more efficiently, even though only one thread is executed by a single core at one time. Most current operating systems support multithreading.

Q Compare graphical user interfaces (GUIs) with command line interfaces. Most PC operating systems today use a graphical user interface (GUI). The older DOS operating system and some versions of the UNIX and Linux operating systems use a command line interface, although graphical versions of UNIX and Linux are available. With a command line interface, commands to the computer are typed using the keyboard; graphical user interfaces allow the user to issue commands by selecting icons, buttons, menu items, and other graphical objects with a mouse or other pointing device. Q What is the purpose of uninstall utilities? As programs are used, temporary data is often created. When programs are uninstalled (removed from the hard drive), this data and other remnants of that program can be left behind on the hard drive or in system files unless an uninstall utility is used. If a user removes programs by deleting the programs folder (which is not the recommended method for removing programs), the extraneous data is left behind, using up valuable disk space and, sometimes, slowing down the computer. Uninstall utilities remove the programs along with related extraneous data, such as references to those programs in your system files.

Anda mungkin juga menyukai