Exam 9: Operating Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You want to run another operating system on your computer in addition to the one already installed. Which of the following will let you do that?

(Multiple Choice)
4.9/5
(38)

You want to shrink the size of a file. What do you use?

(Multiple Choice)
4.9/5
(35)

What is an error in a program called?

(Multiple Choice)
4.7/5
(34)

Who can establish standard user accounts that allow alterations to security settings?

(Multiple Choice)
4.9/5
(44)
Identify the letter of the choice that best matches the phrase or definition.
Android app store that provides access to apps, songs, books, and movies
sleep mode
Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state
Linux
An iOS app that provides a centralized location for coupons
SkyDrive
Correct Answer:
Verified
Premises:
Responses:
Android app store that provides access to apps, songs, books, and movies
sleep mode
Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state
Linux
An iOS app that provides a centralized location for coupons
SkyDrive
A Windows Phone app that provides a centralized location for coupons
antivirus
A popular, multitasking UNIX-based operating system
NFC
Technology that allows two devices to share information by touching
thrashing
Typically has one program running at a time, though others may be running in the background
account
When working with a command-line interface, the set of commands entered into the computer is called this
administrator account
If application software has stopped responding and the hard disk's LED blinks repeatedly, the operating system probably is doing this
Google Play
A proprietary mobile operating system
password
Saves any open documents and programs to an internal hard drive before removing power from the computer or device
Passbook
Enables you to sync mail, calendars, contacts, and other items on iOS
permissions
A private combination of characters associated with the user name that allows access to certain computer resources
user name
A unique combination of characters that identifies a specific user
mobile operating system
For each user, a network administrator establishes this, which enables the user to access, or sign in to, a computer or to a network
Blackberry
Enables user to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer, mobile device, or network
Wallet
Microsoft's cloud server
iCloud
You should run exactly one of this kind of application on your computer
command language
The practice of sharing or pooling computing resources, such as servers
virtualization
Define who can access certain resources and when they can access those resources
hibernate
(Matching)
4.8/5
(47)

If the user name and password entered match the user name and password kept on file, an operating system grants access to the user.

(True/False)
4.9/5
(36)

List six different file and disk management tools and briefly describe their functions.

(Essay)
4.8/5
(36)

Which of the following is a set of programs containing instructions that coordinate all the activities among computer hardware resources?

(Multiple Choice)
4.9/5
(41)

What is virtual memory?

(Multiple Choice)
4.8/5
(34)

A cold boot is generally faster than a warm boot.

(True/False)
4.7/5
(44)

Errors in a program are known as ____________________.

(Short Answer)
4.8/5
(34)

Which of the following is NOT a name of an Android release?

(Multiple Choice)
4.9/5
(39)

Among file and disk management tools, a(n) ____________________ tool copies selected files or the contents of an entire storage medium to another storage location.

(Short Answer)
4.9/5
(33)

You have been developing an embedded operating system for a new product at your company, but a colleague of yours has been referring to it by another name. What is that name?

(Multiple Choice)
4.8/5
(40)

   With virtual memory, which is illustrated in the accompanying figure, when an operating system spends much of its time paging, instead of executing application software, it is said to be thrashing. With virtual memory, which is illustrated in the accompanying figure, when an operating system spends much of its time paging, instead of executing application software, it is said to be thrashing.

(True/False)
4.8/5
(36)

Which of the following is a private combination of characters associated with a user name that allows access to certain computer resources?

(Multiple Choice)
5.0/5
(41)

If a computer is running extremely slowly, the performance monitor may determine that the computer's memory is being used to its maximum.

(True/False)
4.8/5
(36)

As you interact with a program, part of it may be in physical RAM, while the rest of the program is on the hard disk as virtual memory.

(True/False)
4.8/5
(39)

A(n) ____________________ is a program that assesses and reports information about various computer resources and devices.

(Short Answer)
4.8/5
(25)

List the features of the latest version of OS X.

(Essay)
4.8/5
(44)
Showing 121 - 140 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)