MCQs > IT & Programming > Computer Science MCQs > Operating Systems MCQs

Operating Systems MCQ

An address generated by a cpu is referred to as a ____.

Answer

Correct Answer: Logical address

Note: This Question is unanswered, help us to find answer for this one

A software utility designed to clean up after a failed software installation is ____.

Answer

Correct Answer: An uninstaller utility

Note: This Question is unanswered, help us to find answer for this one

The primary advantage of storing programs in noncontiguous locations is that ____.

Answer

Correct Answer: Multiple programs can run at the same time

Note: This Question is unanswered, help us to find answer for this one

Total productive maintenance (tpm) seeks to do all of the following except ____.

Answer

Correct Answer: Maximize equipment effectiveness

Note: This Question is unanswered, help us to find answer for this one

With ____ connections, polling is not necessary because there is only one terminal per line.

Answer

Correct Answer: Point-to-point

Note: This Question is unanswered, help us to find answer for this one

The program segment that catches a possible by zero is known as a(n) ______.

Answer

Correct Answer: Error trap

Note: This Question is unanswered, help us to find answer for this one

The smallest amount of memory the vm can use at any time is called _______.

Answer

Correct Answer: Minimum RAM

Note: This Question is unanswered, help us to find answer for this one

The linux page replacement algorithm is an expanded version of the ____ replacement policy.

Answer

Correct Answer: Clock page

Note: This Question is unanswered, help us to find answer for this one

One approach to performing compaction is to do it when a certain ____ of memory becomes busy.

Answer

Correct Answer: Percentage

Note: This Question is unanswered, help us to find answer for this one

No movement between queues is a very simple policy that rewards those who have ____ jobs.

Answer

Correct Answer: High-priority

Note: This Question is unanswered, help us to find answer for this one

A utility tool that can change the software that is launched automatically during start-up is ____.

Answer

Correct Answer: An autoruns utility

Note: This Question is unanswered, help us to find answer for this one

Mac os x includes a backup utility called ________.

Answer

Correct Answer: Time Machine

Note: This Question is unanswered, help us to find answer for this one

A(n) _______ refers to where a process is accessing/updating shared data.

Answer

Correct Answer: Critical section

Note: This Question is unanswered, help us to find answer for this one

In unix/linux, text files and binary files are considered to be ____ files.

Answer

Correct Answer: Regular

Note: This Question is unanswered, help us to find answer for this one

Cortana stores personalized information about you in a local database called the __________.

Answer

Correct Answer: Notebook

Note: This Question is unanswered, help us to find answer for this one

The three standard classes of devices supported by linux are ____.

Answer

Correct Answer: Character devices, block devices, and network devices

Note: This Question is unanswered, help us to find answer for this one

________ refers to the leasing of hardware with pre-installed operating systems.

Answer

Correct Answer: Platform as a Service (PaaS)

Note: This Question is unanswered, help us to find answer for this one

Bing, google, and yahoo! are all examples of web ____________________.

Answer

Correct Answer: Search engine

Note: This Question is unanswered, help us to find answer for this one

Remote access to a user's pc can be implemented with a ____.

Answer

Correct Answer: Virtual Private Network

Note: This Question is unanswered, help us to find answer for this one

The ________ operating system(s) treat uppercase and lowercase letters differently.

Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

____ is processing that involves performing the same tasks with many records, one after the other.

Answer

Correct Answer: Volume processing.

Note: This Question is unanswered, help us to find answer for this one

A(n) ______ key is a special key programmed to issue commands to a computer.

Answer

Correct Answer: Function

Note: This Question is unanswered, help us to find answer for this one

Virtual sans allow you to _______.

Answer

Correct Answer: Make distant storage accessible to VMs

Note: This Question is unanswered, help us to find answer for this one

All of the following word groups show parallelism except __________.

Answer

Correct Answer: Smiling at my mother, when I cleaned my room, to ask my parents for a favor

Note: This Question is unanswered, help us to find answer for this one

All of the following are categories of a computer security threat except ____.

Answer

Correct Answer: ​subterfuge

Note: This Question is unanswered, help us to find answer for this one

The internal part of an operating system is called the ______.

Answer

Correct Answer: Kernel

Note: This Question is unanswered, help us to find answer for this one

The first personal computer operating system was named ___________.

Answer

Correct Answer: DOS (Disk Operating System)

Note: This Question is unanswered, help us to find answer for this one

The cpu stores the results of computations in ________.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

The ________ software makes the computer run.

Answer

Correct Answer: System

Note: This Question is unanswered, help us to find answer for this one

Placing data in a buffer so it can be retrieved later is called _______.

Answer

Correct Answer: Spooling

Note: This Question is unanswered, help us to find answer for this one

Deadlock can occur on a printer when ____.

Answer

Correct Answer: The printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output

Note: This Question is unanswered, help us to find answer for this one

Software for pcs contains a _________ program that guides you through the installation process.

Answer

Correct Answer: ​setup

Note: This Question is unanswered, help us to find answer for this one

Of the following, the ____ operating system was developed the earliest.

Answer

Correct Answer: UNIX

Note: This Question is unanswered, help us to find answer for this one

Microsoft _____ is the new microsoft web browser that lets you display and interact with webpages.

Answer

Correct Answer: Edge

Note: This Question is unanswered, help us to find answer for this one

If a user turns on a computer that is currently turned off, it is referred to as a __________.

Answer

Correct Answer: Cold boot

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.

Answer

Correct Answer: Graphics table

Note: This Question is unanswered, help us to find answer for this one

____ are utility programs that search for documents and other files on a users hard drives.

Answer

Correct Answer: Search tools

Note: This Question is unanswered, help us to find answer for this one

Running the disk cleanup utility is a quick way to ________.

Answer

Correct Answer: Clear out unnecessary files

Note: This Question is unanswered, help us to find answer for this one

Ronald runs both windows 7 and linux on his desktop computer. this process is called ________.

Answer

Correct Answer: PC virtualization

Note: This Question is unanswered, help us to find answer for this one

One advantage of proprietary software versus off-the-shelf software is that _____.

Answer

Correct Answer: The software provides a company a competitive advantage by solving problems in a unique manner

Note: This Question is unanswered, help us to find answer for this one

If a pc fails its initial nac health assessment, it may be ________.

Answer

Correct Answer: Refused access

Note: This Question is unanswered, help us to find answer for this one

Disk cleanup, file history, and disk defragmenter are all examples of _____ programs.

Answer

Correct Answer: Utility

Note: This Question is unanswered, help us to find answer for this one

Disk ________ realigns separated data so that related file pieces are unified.

Answer

Correct Answer: Defrafmentation

Note: This Question is unanswered, help us to find answer for this one

C: denotes a ________ directory that is at the top of the filing structure of a computer.

Answer

Correct Answer: Root.

Note: This Question is unanswered, help us to find answer for this one

Use the windows ________ to check on a nonresponsive program.

Answer

Correct Answer: Task Manager

Note: This Question is unanswered, help us to find answer for this one

The vast majority of smartphones use the ________ or ________ operating systems.

Answer

Correct Answer: Android, iOS

Note: This Question is unanswered, help us to find answer for this one

Freebsd is a(n) _____-based operating system.

Answer

Correct Answer: UNIX

Note: This Question is unanswered, help us to find answer for this one

The small circuit boards that hold a series of ram chips are called ________.

Answer

Correct Answer: Memory modules

Note: This Question is unanswered, help us to find answer for this one

The means by which you interact with any program on a computer is called the user ____.

Answer

Correct Answer: User interface

Note: This Question is unanswered, help us to find answer for this one

The main directory on a storage device is referred to as the ________ directory.

Answer

Correct Answer: Root

Note: This Question is unanswered, help us to find answer for this one

The ____ shows the name and location of the item you have open.

Answer

Correct Answer: Address bar

Note: This Question is unanswered, help us to find answer for this one

Smartphone operating systems are a type of _____ operating system.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

The ________ statement can cause other program statements to execute only under certain conditions.

Answer

Correct Answer: If

Note: This Question is unanswered, help us to find answer for this one

To develop software you need all these except ________.

Answer

Correct Answer: Personal application software

Note: This Question is unanswered, help us to find answer for this one

The root of a file system is denoted by the ____.

Answer

Correct Answer: Forward slash (/)

Note: This Question is unanswered, help us to find answer for this one

The process that launched a given process is known as the ________ process.

Answer

Correct Answer: Parent

Note: This Question is unanswered, help us to find answer for this one

All of the following are examples of someone using personal productivity software except _________.

Answer

Correct Answer: Callie entering a customer's order into a restaurant's ordering system

Note: This Question is unanswered, help us to find answer for this one

All of the following are examples of activities performed by an operating system except ________.

Answer

Correct Answer: Allowing a user to do word processing

Note: This Question is unanswered, help us to find answer for this one

A ___________ is any known starting point.

Answer

Correct Answer: Baseline

Note: This Question is unanswered, help us to find answer for this one

A _________ is a mobile device that typically ranges from seven to ten inches in size.

Answer

Correct Answer: Tablet

Note: This Question is unanswered, help us to find answer for this one

A(n) _______________ is a fix for a single problem within an operating system.

Answer

Correct Answer: Patch

Note: This Question is unanswered, help us to find answer for this one

____ manage the system resources of a computer so programs can run properly.

Answer

Correct Answer: Operating systems

Note: This Question is unanswered, help us to find answer for this one

Buttons act as ____, which instruct windows to perform tasks.

Answer

Correct Answer: Commands

Note: This Question is unanswered, help us to find answer for this one

Compressed files sometimes are called ______ files.

Answer

Correct Answer: Zipped

Note: This Question is unanswered, help us to find answer for this one

Clicking a _____ name opens a drop-down list of commands and options.

Answer

Correct Answer: Menu

Note: This Question is unanswered, help us to find answer for this one

An icon on your desktop is a component of a ____ interface.

Answer

Correct Answer: Graphical user

Note: This Question is unanswered, help us to find answer for this one

A(n) ______ expands the capability of a portable computer.

Answer

Correct Answer: Docking station

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ view of data is the way a user thinks about data.

Answer

Correct Answer: Logical

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ operating system is required to perform a command within a certain time frame.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is system software

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is a set of instructions or statements to the computer.

Answer

Correct Answer: Computer Program

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ file consists of several time entries, each marked with a time stamp.

Answer

Correct Answer: WebVTT

Note: This Question is unanswered, help us to find answer for this one

A printer requires a ____ installed on the computer in order to operate.

Answer

Correct Answer: Device driver

Note: This Question is unanswered, help us to find answer for this one

A disadvantage of software monitoring tools is that they ____.

Answer

Correct Answer: Become part of the system and can distort analysis results

Note: This Question is unanswered, help us to find answer for this one

A ______ is a program that runs in the background.

Answer

Correct Answer: Process

Note: This Question is unanswered, help us to find answer for this one

A _____ is a link between devices connected to a computer.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

A ____ chip holds software that is used to start the computer.

Answer

Correct Answer: ROM

Note: This Question is unanswered, help us to find answer for this one

_____ provide(s) an interface to the services provided by an operating system.

Answer

Correct Answer: System calls

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is a computer program that coordinates all the activities of computer hardware.

Answer

Correct Answer: Operating system (OS)

Note: This Question is unanswered, help us to find answer for this one

______ is a set of applications that manages the activities and resources of a computer.

Answer

Correct Answer: System software

Note: This Question is unanswered, help us to find answer for this one

Some important touch gestures begin at the _______________ of the screen.

Answer

Correct Answer: Corners

Note: This Question is unanswered, help us to find answer for this one

Memory is said to be ________ if contents are lost when power is off.

Answer

Correct Answer: Volatile

Note: This Question is unanswered, help us to find answer for this one

A _____ provides content that is accessible on the world wide web.

Answer

Correct Answer: Web server

Note: This Question is unanswered, help us to find answer for this one

Software can be divided into two major categories: ____ and ____.

Answer

Correct Answer: Application, system

Note: This Question is unanswered, help us to find answer for this one

By default, all print jobs have a priority of ____.

Answer

Correct Answer: 50

Note: This Question is unanswered, help us to find answer for this one

The ________ of the operating system enables users to communicate with the computer system

Answer

Correct Answer: User interface

Note: This Question is unanswered, help us to find answer for this one

Clicking or tapping on a(n) ____ file will start up a program.

Answer

Correct Answer: Executable

Note: This Question is unanswered, help us to find answer for this one

You cannot boot a computer from ____________.

Answer

Correct Answer: A wireless network

Note: This Question is unanswered, help us to find answer for this one

Microsoft windows and mac os use a ________ interface

Answer

Correct Answer: Graphical user

Note: This Question is unanswered, help us to find answer for this one

In most cases, the word "software" is interchangeable with the word _______.

Answer

Correct Answer: Program

Note: This Question is unanswered, help us to find answer for this one

In linux, the three levels of file access are ____, ____, and ____.

Answer

Correct Answer: Owner; group; others

Note: This Question is unanswered, help us to find answer for this one

Current versions of windows support file names up to ____ characters long.

Answer

Correct Answer: 257

Note: This Question is unanswered, help us to find answer for this one

All of the following are examples of desktop operating systems except ______.

Answer

Correct Answer: Android

Note: This Question is unanswered, help us to find answer for this one

A file ____ shows the location of a file or folder.

Answer

Correct Answer: Path

Note: This Question is unanswered, help us to find answer for this one

A ____ allows the operating system to store and organize files on a hard disk.

Answer

Correct Answer: File system

Note: This Question is unanswered, help us to find answer for this one

To clean up the registry in windows, you should ______________.

Answer

Correct Answer: Acquire the right third-party tool

Note: This Question is unanswered, help us to find answer for this one

Cd-roms typically use the ____ filesystem type.

Answer

Correct Answer: Iso9660

Note: This Question is unanswered, help us to find answer for this one

In a linux script, the line ____ is important because it identifies the file as a script.

Answer

Correct Answer: #!/bin/sh

Note: This Question is unanswered, help us to find answer for this one

Chrome os is the first ____.

Answer

Correct Answer: Cloud operating system

Note: This Question is unanswered, help us to find answer for this one

Odbc works on the _____ operating system.

Answer

Correct Answer: Windows

Note: This Question is unanswered, help us to find answer for this one

Processes are started with a nice value of ____ by default.

Answer

Correct Answer: &

Note: This Question is unanswered, help us to find answer for this one

A system process that is not associated with a terminal is called a(n) ____ process.

Answer

Correct Answer: Daemon

Note: This Question is unanswered, help us to find answer for this one

If your computer is thrashing, increase ________ to solve the problem.

Answer

Correct Answer: RAM

Note: This Question is unanswered, help us to find answer for this one

The maximum number of bytes that can be allocated to a single file in unix is ____.

Answer

Correct Answer: 1,082,201,088

Note: This Question is unanswered, help us to find answer for this one

The ____ command creates a subdirectory under a directory

Answer

Correct Answer: MD

Note: This Question is unanswered, help us to find answer for this one

A process or program that divides itself into multiple threads is said to be ____.

Answer

Correct Answer: Multi-headed

Note: This Question is unanswered, help us to find answer for this one

The job scheduler seeks to ____ when scheduling jobs.

Answer

Correct Answer: Balance CPU and I/O intensive jobs

Note: This Question is unanswered, help us to find answer for this one

Raid level ____ requires two different parity calculations.

Answer

Correct Answer: 7

Note: This Question is unanswered, help us to find answer for this one

A ____ can be used to prevent a user program from never returning control to the operating system.

Answer

Correct Answer: Timer

Note: This Question is unanswered, help us to find answer for this one

The first-come, first-served (fcfs) algorithm is fine for most ____ systems.

Answer

Correct Answer: Batch

Note: This Question is unanswered, help us to find answer for this one

One example of a popular communication app is ________.

Answer

Correct Answer: Skype

Note: This Question is unanswered, help us to find answer for this one

Thread-local storage is data that ____.

Answer

Correct Answer: Is unique to each thread

Note: This Question is unanswered, help us to find answer for this one

The ____ is also called a high-level scheduler.

Answer

Correct Answer: Job Scheduler

Note: This Question is unanswered, help us to find answer for this one

Mobile software is almost always ____

Answer

Correct Answer: Downloaded from the Internet

Note: This Question is unanswered, help us to find answer for this one

The _________ domain connects remote users to the organization?s it infrastructure.

Answer

Correct Answer: Remote Access

Note: This Question is unanswered, help us to find answer for this one

With the ____, the statements in the loop are repeated as long as a certain condition is false.

Answer

Correct Answer: Do until structure

Note: This Question is unanswered, help us to find answer for this one

Video cards have their own _____.

Answer

Correct Answer: Memory

Note: This Question is unanswered, help us to find answer for this one

The windows ________ utility rearranges files on a hard drive in order to improve efficiency.

Answer

Correct Answer: Optimizing Drives

Note: This Question is unanswered, help us to find answer for this one

Under direct memory access, a device called a ____ is attached to the bus and to main memory.

Answer

Correct Answer: DMA controller

Note: This Question is unanswered, help us to find answer for this one

A thin-client application is designed to run within a program such as ________.

Answer

Correct Answer: Internet Explorer

Note: This Question is unanswered, help us to find answer for this one

A client-server application that requires nothing more than a browser is called ________.

Answer

Correct Answer: Thin-client application

Note: This Question is unanswered, help us to find answer for this one

________ is the process whereby multiple operating systems share the same hardware.

Answer

Correct Answer: Virtualization

Note: This Question is unanswered, help us to find answer for this one

All of the following are examples of network operating systems except ________.

Answer

Correct Answer: MS-DOS

Note: This Question is unanswered, help us to find answer for this one

____ uses multiple sources of information and provides multidimensional analysis.

Answer

Correct Answer: OLAP

Note: This Question is unanswered, help us to find answer for this one

____ technique is also known as disk mirroring.

Answer

Correct Answer: Disk mirroring

Note: This Question is unanswered, help us to find answer for this one

____ storage is not lost when a computer loses power.

Answer

Correct Answer: Permanent.

Note: This Question is unanswered, help us to find answer for this one

____ storage allocation allows files to use any storage space available on the disk.

Answer

Correct Answer: Noncontiguous storage

Note: This Question is unanswered, help us to find answer for this one

Magnetic disks are a _____ access storage medium

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

In linux, the command _________________________ displays currently logged-in users.

Answer

Correct Answer: Who

Note: This Question is unanswered, help us to find answer for this one

In linux, runlevel ____ is also known as multiuser mode.

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

Access is a ____.

Answer

Correct Answer: Database management system

Note: This Question is unanswered, help us to find answer for this one

A(n)________ is an example of storage hardware in computers.

Answer

Correct Answer: Magnetic disk

Note: This Question is unanswered, help us to find answer for this one

Embedded systems can be found in all of the following except _____.

Answer

Correct Answer: Cloud computers

Note: This Question is unanswered, help us to find answer for this one

In ____ systems, deadlocks can cause critical situations.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

Ultraportables conforming to intel's standards can be marketed as ____.

Answer

Correct Answer: Ultrabooks

Note: This Question is unanswered, help us to find answer for this one

Windows server is an example of a(n) _____ operating system.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

The overall responsibility of keeping an organization’s software up to date ____.

Answer

Correct Answer: Depends upon the organization

Note: This Question is unanswered, help us to find answer for this one

Primitive types serve as the building blocks for more complex data types, called ____ types.

Answer

Correct Answer: Reference

Note: This Question is unanswered, help us to find answer for this one

Optimal page replacement ____.

Answer

Correct Answer: Is used mostly for comparison with other page-replacement schemes

Note: This Question is unanswered, help us to find answer for this one

Operating systems used with personal computers are typically referred to as ____ operating systems.

Answer

Correct Answer: Desktop

Note: This Question is unanswered, help us to find answer for this one

Operating systems provide file organization tools called ___________.

Answer

Correct Answer: File management utilities

Note: This Question is unanswered, help us to find answer for this one

Operating systems installed on a single computer are called __________ operating systems.

Answer

Correct Answer: Personal or desktop

Note: This Question is unanswered, help us to find answer for this one

Operating system software, also called a(n) _____, manages computer hardware and software.

Answer

Correct Answer: Platform

Note: This Question is unanswered, help us to find answer for this one

One of the disadvantages of proprietary software is that ______________.

Answer

Correct Answer: It can take a long time and significant resources to develop the required software features

Note: This Question is unanswered, help us to find answer for this one

One major disadvantage of encryption is that ____.

Answer

Correct Answer: It increases the system's overhead

Note: This Question is unanswered, help us to find answer for this one

Ms-dos first used a(n) ________ interface.

Answer

Correct Answer: Command-driven

Note: This Question is unanswered, help us to find answer for this one

Most smartphones use operating systems developed by ________.

Answer

Correct Answer: Google and Apple

Note: This Question is unanswered, help us to find answer for this one

Most operating systems today primarily use a ____.

Answer

Correct Answer: GUI

Note: This Question is unanswered, help us to find answer for this one

Most operating systems are now distributed on ____.

Answer

Correct Answer: CD or DVD disks

Note: This Question is unanswered, help us to find answer for this one

Microsoft’s share of the total personal computer operating system market is about ____.

Answer

Correct Answer: 90% *

Note: This Question is unanswered, help us to find answer for this one

Memory compaction is also referred to as ____.

Answer

Correct Answer: Defragmentation

Note: This Question is unanswered, help us to find answer for this one

Mac os and ios applications are constructed using ________ programming language.

Answer

Correct Answer: Objective C

Note: This Question is unanswered, help us to find answer for this one

Lock and key synchronization must take place within a single ____.

Answer

Correct Answer: Machine cycle

Note: This Question is unanswered, help us to find answer for this one

In linux, ____ devices cannot host a file system.

Answer

Correct Answer: Char

Note: This Question is unanswered, help us to find answer for this one

In game theory, strategies include _______.

Answer

Correct Answer: All possible actions of each player

Note: This Question is unanswered, help us to find answer for this one

In dos, the command ____ displays the files and folders in the current location.

Answer

Correct Answer: DIR

Note: This Question is unanswered, help us to find answer for this one

In demand paging, pages are ____ between main memory and secondary storage.

Answer

Correct Answer: Swapped

Note: This Question is unanswered, help us to find answer for this one

In common usage, the term “pc” refers to computers that ____.

Answer

Correct Answer: Use external keyboards

Note: This Question is unanswered, help us to find answer for this one

In a network operating system (nos), ____.

Answer

Correct Answer: Resources are owned by local nodes

Note: This Question is unanswered, help us to find answer for this one

In a multitasking operating system, ______ programs are running but not in use.

Answer

Correct Answer: Background

Note: This Question is unanswered, help us to find answer for this one

In ________ process, a server hosts many versions of desktop operating systems.

Answer

Correct Answer: Desktop virtualization

Note: This Question is unanswered, help us to find answer for this one

If you are using a touch screen _____ pointer appears on the screen.

Answer

Correct Answer: No

Note: This Question is unanswered, help us to find answer for this one

For multiprogramming systems, most unix operating systems use either ____ management techniques.

Answer

Correct Answer: Swapping or demand paging memory

Note: This Question is unanswered, help us to find answer for this one

File management capabilities available from application software include ____ files.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

Failure to lock database records before updating them may result in a ____ between processes.

Answer

Correct Answer: Race

Note: This Question is unanswered, help us to find answer for this one

Electronic devices such as card readers use ___________ operating systems.

Answer

Correct Answer: Embedded

Note: This Question is unanswered, help us to find answer for this one

Each memory page in virtual memory management is called a ____.

Answer

Correct Answer: Page frame

Note: This Question is unanswered, help us to find answer for this one

Desktop apps are also known as ____ apps

Answer

Correct Answer: Traditional

Note: This Question is unanswered, help us to find answer for this one

Deployment software falls into two groups: ____ software.

Answer

Correct Answer: Agent-based and agentless

Note: This Question is unanswered, help us to find answer for this one

Computers represent data using binary digits, called ________.

Answer

Correct Answer: Bits

Note: This Question is unanswered, help us to find answer for this one

Cloud computing provides _____, which matches resources to needs at any given time.

Answer

Correct Answer: Scaling

Note: This Question is unanswered, help us to find answer for this one

Cloud computing is not possible without _____.

Answer

Correct Answer: An Internet connection

Note: This Question is unanswered, help us to find answer for this one

Clicking and double-clicking are two of the five _____.

Answer

Correct Answer: Pointing device actions

Note: This Question is unanswered, help us to find answer for this one

Chapter 4 describes the utilities included in an operating system package as _____ but not _____.

Answer

Correct Answer: Useful; essential

Note: This Question is unanswered, help us to find answer for this one

By default, windows creates a ___________ every time new software is installed.

Answer

Correct Answer: Restore point

Note: This Question is unanswered, help us to find answer for this one

A ____ dynamic volume can only be created with three or more dynamic disks.

Answer

Correct Answer: RAID 5

Note: This Question is unanswered, help us to find answer for this one

Automated driver updates on a mac are accomplished by the _____ feature.

Answer

Correct Answer: Software Update

Note: This Question is unanswered, help us to find answer for this one

As with other popular mobile operating systems, android is designed for _______ processors.

Answer

Correct Answer: ARM

Note: This Question is unanswered, help us to find answer for this one

An optional file identifier that is separated from a main file name by a period is a ____.

Answer

Correct Answer: File extension

Note: This Question is unanswered, help us to find answer for this one

An industrial operating system works with a large computer system requiring a(n) ____.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

A process control block ____.

Answer

Correct Answer: Includes information on the process's state

Note: This Question is unanswered, help us to find answer for this one

A file’s ____ filename includes all path information for that file.

Answer

Correct Answer: Absolute

Note: This Question is unanswered, help us to find answer for this one

A file that stays in memory after it executes is a(n) _____________.

Answer

Correct Answer: Terminate and Stay Resident program

Note: This Question is unanswered, help us to find answer for this one

A file containing data or programs belonging to users is known as a(n) ____.

Answer

Correct Answer: Ordinary file

Note: This Question is unanswered, help us to find answer for this one

A disadvantage of segmented memory allocation is ____.

Answer

Correct Answer: External fragmentation

Note: This Question is unanswered, help us to find answer for this one

A computer with a domain name is called a ________.

Answer

Correct Answer: Website

Note: This Question is unanswered, help us to find answer for this one

A computer cannot function without a(n) _____.

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

A clustered system ____.

Answer

Correct Answer: Gathers together multiple CPUs to accomplish computational work

Note: This Question is unanswered, help us to find answer for this one

A _________ is a program that is written to use a particular operating system.

Answer

Correct Answer: Native application

Note: This Question is unanswered, help us to find answer for this one

A ______ controls how computer hardware communicates with the operating system.

Answer

Correct Answer: Device driver

Note: This Question is unanswered, help us to find answer for this one

A _____ is an example of a systems program.

Answer

Correct Answer: Command interpreter

Note: This Question is unanswered, help us to find answer for this one

A ____ of processing must be handled as a single unit.

Answer

Correct Answer: Critical region

Note: This Question is unanswered, help us to find answer for this one

__________ was the first operating system to integrate security as its core functions.

Answer

Correct Answer: MULTICS

Note: This Question is unanswered, help us to find answer for this one

________ is necessary to protect the host against attacks.

Answer

Correct Answer: Host hardening

Note: This Question is unanswered, help us to find answer for this one

______ allows a thread to run on only one processor.

Answer

Correct Answer: Processor affinity

Note: This Question is unanswered, help us to find answer for this one

_____ is free storage space provided on microsoft’s server.

Answer

Correct Answer: SkyDrive

Note: This Question is unanswered, help us to find answer for this one

____ set the original standard for graphical user interfaces.

Answer

Correct Answer: Mac OS

Note: This Question is unanswered, help us to find answer for this one

____ peripheral devices are assigned to only one job at a time.

Answer

Correct Answer: Dedicated

Note: This Question is unanswered, help us to find answer for this one

____ memory allows you to use more memory than is physically available on your computer.

Answer

Correct Answer: Virtual

Note: This Question is unanswered, help us to find answer for this one

____ is where the data and instructions of a computer must reside to be processed.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

____ is the policy of allowing only one process to have access to a dedicated resource.

Answer

Correct Answer: Mutual exclusion

Note: This Question is unanswered, help us to find answer for this one

____ is one of the most widely-used versions of linux.

Answer

Correct Answer: Ubuntu

Note: This Question is unanswered, help us to find answer for this one

____ is an open-platform mobile operating system.

Answer

Correct Answer: Android

Note: This Question is unanswered, help us to find answer for this one

____ is a term for software that is run directly from the internet.

Answer

Correct Answer: SaaS (software as a service)

Note: This Question is unanswered, help us to find answer for this one

____ has gained popularity as an open-source operating system.

Answer

Correct Answer: Linux

Note: This Question is unanswered, help us to find answer for this one

____ describes how instances of one entity relate to instances of another entity.

Answer

Correct Answer: Scalability

Note: This Question is unanswered, help us to find answer for this one

____ disks are commonly used with sun solaris systems.

Answer

Correct Answer: SPARC

Note: This Question is unanswered, help us to find answer for this one

____ development is the systematic process of transforming an idea into functional software.

Answer

Correct Answer: Software

Note: This Question is unanswered, help us to find answer for this one

____ can protect against someone accessing your pc via the internet.

Answer

Correct Answer: Firewalls

Note: This Question is unanswered, help us to find answer for this one

____ are software applications that run automated tasks over the internet.

Answer

Correct Answer: Bots

Note: This Question is unanswered, help us to find answer for this one

____ a data item means you override incorrect data by setting the variable to a specific value.

Answer

Correct Answer: Forcing

Note: This Question is unanswered, help us to find answer for this one

The ______________ imaging tool produces three proprietary formats:

Answer

Correct Answer: Ilookix

Note: This Question is unanswered, help us to find answer for this one

Questionnaires can be used to ask questions that _______.

Answer

Correct Answer: Determine user opinions

Note: This Question is unanswered, help us to find answer for this one

Google play is an example of a(n) ______.

Answer

Correct Answer: App Store

Note: This Question is unanswered, help us to find answer for this one

Another term for a zombie is a(n) ____.

Answer

Correct Answer: Bot

Note: This Question is unanswered, help us to find answer for this one