1. An address generated by a cpu is referred to as a ____.
Answer
Correct Answer:
Logical address
Note: This Question is unanswered, help us to find answer for this one
2. A software utility designed to clean up after a failed software installation is ____.
Answer
Correct Answer:
An uninstaller utility
Note: This Question is unanswered, help us to find answer for this one
3. The primary advantage of storing programs in noncontiguous locations is that ____.
Answer
Correct Answer:
Multiple programs can run at the same time
Note: This Question is unanswered, help us to find answer for this one
4. Total productive maintenance (tpm) seeks to do all of the following except ____.
Answer
Correct Answer:
Maximize equipment effectiveness
Note: This Question is unanswered, help us to find answer for this one
5. With ____ connections, polling is not necessary because there is only one terminal per line.
Answer
Correct Answer:
Point-to-point
Note: This Question is unanswered, help us to find answer for this one
6. The program segment that catches a possible by zero is known as a(n) ______.
Answer
Correct Answer:
Error trap
Note: This Question is unanswered, help us to find answer for this one
7. The smallest amount of memory the vm can use at any time is called _______.
Answer
Correct Answer:
Minimum RAM
Note: This Question is unanswered, help us to find answer for this one
8. The linux page replacement algorithm is an expanded version of the ____ replacement policy.
Answer
Correct Answer:
Clock page
Note: This Question is unanswered, help us to find answer for this one
9. One approach to performing compaction is to do it when a certain ____ of memory becomes busy.
Answer
Correct Answer:
Percentage
Note: This Question is unanswered, help us to find answer for this one
10. No movement between queues is a very simple policy that rewards those who have ____ jobs.
Answer
Correct Answer:
High-priority
Note: This Question is unanswered, help us to find answer for this one
11. A utility tool that can change the software that is launched automatically during start-up is ____.
Answer
Correct Answer:
An autoruns utility
Note: This Question is unanswered, help us to find answer for this one
12. Mac os x includes a backup utility called ________.
Answer
Correct Answer:
Time Machine
Note: This Question is unanswered, help us to find answer for this one
13. A(n) _______ refers to where a process is accessing/updating shared data.
Answer
Correct Answer:
Critical section
Note: This Question is unanswered, help us to find answer for this one
14. In unix/linux, text files and binary files are considered to be ____ files.
Answer
Correct Answer:
Regular
Note: This Question is unanswered, help us to find answer for this one
15. Cortana stores personalized information about you in a local database called the __________.
Answer
Correct Answer:
Notebook
Note: This Question is unanswered, help us to find answer for this one
16. The three standard classes of devices supported by linux are ____.
Answer
Correct Answer:
Character devices, block devices, and network devices
Note: This Question is unanswered, help us to find answer for this one
17. ________ refers to the leasing of hardware with pre-installed operating systems.
Answer
Correct Answer:
Platform as a Service (PaaS)
Note: This Question is unanswered, help us to find answer for this one
18. Bing, google, and yahoo! are all examples of web ____________________.
Answer
Correct Answer:
Search engine
Note: This Question is unanswered, help us to find answer for this one
19. Remote access to a user's pc can be implemented with a ____.
Answer
Correct Answer:
Virtual Private Network
Note: This Question is unanswered, help us to find answer for this one
20. The ________ operating system(s) treat uppercase and lowercase letters differently.
Answer
Correct Answer:
Both a and b
Note: This Question is unanswered, help us to find answer for this one
21. ____ is processing that involves performing the same tasks with many records, one after the other.
Answer
Correct Answer:
Volume processing.
Note: This Question is unanswered, help us to find answer for this one
22. A(n) ______ key is a special key programmed to issue commands to a computer.
Answer
Correct Answer:
Function
Note: This Question is unanswered, help us to find answer for this one
23. Virtual sans allow you to _______.
Answer
Correct Answer:
Make distant storage accessible to VMs
Note: This Question is unanswered, help us to find answer for this one
24. All of the following word groups show parallelism except __________.
Answer
Correct Answer:
Smiling at my mother, when I cleaned my room, to ask my parents for a favor
Note: This Question is unanswered, help us to find answer for this one
25. All of the following are categories of a computer security threat except ____.
Answer
Correct Answer:
subterfuge
Note: This Question is unanswered, help us to find answer for this one
26. The internal part of an operating system is called the ______.
Answer
Correct Answer:
Kernel
Note: This Question is unanswered, help us to find answer for this one
27. The first personal computer operating system was named ___________.
Answer
Correct Answer:
DOS (Disk Operating System)
Note: This Question is unanswered, help us to find answer for this one
28. The cpu stores the results of computations in ________.
Answer
Correct Answer:
Main memory
Note: This Question is unanswered, help us to find answer for this one
29. The ________ software makes the computer run.
Answer
Correct Answer:
System
Note: This Question is unanswered, help us to find answer for this one
30. Placing data in a buffer so it can be retrieved later is called _______.
Answer
Correct Answer:
Spooling
Note: This Question is unanswered, help us to find answer for this one
31. Deadlock can occur on a printer when ____.
Answer
Correct Answer:
The printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output
Note: This Question is unanswered, help us to find answer for this one
32. Software for pcs contains a _________ program that guides you through the installation process.
Answer
Correct Answer:
setup
Note: This Question is unanswered, help us to find answer for this one
33. Of the following, the ____ operating system was developed the earliest.
Answer
Correct Answer:
UNIX
Note: This Question is unanswered, help us to find answer for this one
34. Microsoft _____ is the new microsoft web browser that lets you display and interact with webpages.
Answer
Correct Answer:
Edge
Note: This Question is unanswered, help us to find answer for this one
35. If a user turns on a computer that is currently turned off, it is referred to as a __________.
Answer
Correct Answer:
Cold boot
Note: This Question is unanswered, help us to find answer for this one
36. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
Answer
Correct Answer:
Graphics table
Note: This Question is unanswered, help us to find answer for this one
37. ____ are utility programs that search for documents and other files on a users hard drives.
Answer
Correct Answer:
Search tools
Note: This Question is unanswered, help us to find answer for this one
38. Running the disk cleanup utility is a quick way to ________.
Answer
Correct Answer:
Clear out unnecessary files
Note: This Question is unanswered, help us to find answer for this one
39. Ronald runs both windows 7 and linux on his desktop computer. this process is called ________.
Answer
Correct Answer:
PC virtualization
Note: This Question is unanswered, help us to find answer for this one
40. One advantage of proprietary software versus off-the-shelf software is that _____.
Answer
Correct Answer:
The software provides a company a competitive advantage by solving problems in a unique manner
Note: This Question is unanswered, help us to find answer for this one
41. If a pc fails its initial nac health assessment, it may be ________.
Answer
Correct Answer:
Refused access
Note: This Question is unanswered, help us to find answer for this one
42. Disk cleanup, file history, and disk defragmenter are all examples of _____ programs.
Answer
Correct Answer:
Utility
Note: This Question is unanswered, help us to find answer for this one
43. Disk ________ realigns separated data so that related file pieces are unified.
Answer
Correct Answer:
Defrafmentation
Note: This Question is unanswered, help us to find answer for this one
44. C: denotes a ________ directory that is at the top of the filing structure of a computer.
Answer
Correct Answer:
Root.
Note: This Question is unanswered, help us to find answer for this one
45. Use the windows ________ to check on a nonresponsive program.
Answer
Correct Answer:
Task Manager
Note: This Question is unanswered, help us to find answer for this one
46. The vast majority of smartphones use the ________ or ________ operating systems.
Answer
Correct Answer:
Android, iOS
Note: This Question is unanswered, help us to find answer for this one
47. Freebsd is a(n) _____-based operating system.
Answer
Correct Answer:
UNIX
Note: This Question is unanswered, help us to find answer for this one
48. The small circuit boards that hold a series of ram chips are called ________.
Answer
Correct Answer:
Memory modules
Note: This Question is unanswered, help us to find answer for this one
49. The means by which you interact with any program on a computer is called the user ____.
Answer
Correct Answer:
User interface
Note: This Question is unanswered, help us to find answer for this one
50. The main directory on a storage device is referred to as the ________ directory.
Answer
Correct Answer:
Root
Note: This Question is unanswered, help us to find answer for this one
51. The ____ shows the name and location of the item you have open.
Answer
Correct Answer:
Address bar
Note: This Question is unanswered, help us to find answer for this one
52. Smartphone operating systems are a type of _____ operating system.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
53. The ________ statement can cause other program statements to execute only under certain conditions.
Answer
Correct Answer:
If
Note: This Question is unanswered, help us to find answer for this one
54. To develop software you need all these except ________.
Answer
Correct Answer:
Personal application software
Note: This Question is unanswered, help us to find answer for this one
55. The root of a file system is denoted by the ____.
Answer
Correct Answer:
Forward slash (/)
Note: This Question is unanswered, help us to find answer for this one
56. The process that launched a given process is known as the ________ process.
Answer
Correct Answer:
Parent
Note: This Question is unanswered, help us to find answer for this one
57. All of the following are examples of someone using personal productivity software except _________.
Answer
Correct Answer:
Callie entering a customer's order into a restaurant's ordering system
Note: This Question is unanswered, help us to find answer for this one
58. All of the following are examples of activities performed by an operating system except ________.
Answer
Correct Answer:
Allowing a user to do word processing
Note: This Question is unanswered, help us to find answer for this one
59. A ___________ is any known starting point.
Answer
Correct Answer:
Baseline
Note: This Question is unanswered, help us to find answer for this one
60. A _________ is a mobile device that typically ranges from seven to ten inches in size.
Answer
Correct Answer:
Tablet
Note: This Question is unanswered, help us to find answer for this one
61. A(n) _______________ is a fix for a single problem within an operating system.
Answer
Correct Answer:
Patch
Note: This Question is unanswered, help us to find answer for this one
62. ____ manage the system resources of a computer so programs can run properly.
Answer
Correct Answer:
Operating systems
Note: This Question is unanswered, help us to find answer for this one
63. Buttons act as ____, which instruct windows to perform tasks.
Answer
Correct Answer:
Commands
Note: This Question is unanswered, help us to find answer for this one
64. Compressed files sometimes are called ______ files.
Answer
Correct Answer:
Zipped
Note: This Question is unanswered, help us to find answer for this one
65. Clicking a _____ name opens a drop-down list of commands and options.
Answer
Correct Answer:
Menu
Note: This Question is unanswered, help us to find answer for this one
66. An icon on your desktop is a component of a ____ interface.
Answer
Correct Answer:
Graphical user
Note: This Question is unanswered, help us to find answer for this one
67. A(n) ______ expands the capability of a portable computer.
Answer
Correct Answer:
Docking station
Note: This Question is unanswered, help us to find answer for this one
68. A(n) ____ view of data is the way a user thinks about data.
Answer
Correct Answer:
Logical
Note: This Question is unanswered, help us to find answer for this one
69. A(n) ____ operating system is required to perform a command within a certain time frame.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
70. A(n) ____ is system software
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
71. A(n) ____ is a set of instructions or statements to the computer.
Answer
Correct Answer:
Computer Program
Note: This Question is unanswered, help us to find answer for this one
72. A(n) ____ file consists of several time entries, each marked with a time stamp.
Answer
Correct Answer:
WebVTT
Note: This Question is unanswered, help us to find answer for this one
73. A printer requires a ____ installed on the computer in order to operate.
Answer
Correct Answer:
Device driver
Note: This Question is unanswered, help us to find answer for this one
74. A disadvantage of software monitoring tools is that they ____.
Answer
Correct Answer:
Become part of the system and can distort analysis results
Note: This Question is unanswered, help us to find answer for this one
75. A ______ is a program that runs in the background.
Answer
Correct Answer:
Process
Note: This Question is unanswered, help us to find answer for this one
76. A _____ is a link between devices connected to a computer.
Answer
Correct Answer:
Bus
Note: This Question is unanswered, help us to find answer for this one
77. A ____ chip holds software that is used to start the computer.
Answer
Correct Answer:
ROM
Note: This Question is unanswered, help us to find answer for this one
78. _____ provide(s) an interface to the services provided by an operating system.
Answer
Correct Answer:
System calls
Note: This Question is unanswered, help us to find answer for this one
79. A(n) ____ is a computer program that coordinates all the activities of computer hardware.
Answer
Correct Answer:
Operating system (OS)
Note: This Question is unanswered, help us to find answer for this one
80. ______ is a set of applications that manages the activities and resources of a computer.
Answer
Correct Answer:
System software
Note: This Question is unanswered, help us to find answer for this one
81. Some important touch gestures begin at the _______________ of the screen.
Answer
Correct Answer:
Corners
Note: This Question is unanswered, help us to find answer for this one
82. Memory is said to be ________ if contents are lost when power is off.
Answer
Correct Answer:
Volatile
Note: This Question is unanswered, help us to find answer for this one
83. A _____ provides content that is accessible on the world wide web.
Answer
Correct Answer:
Web server
Note: This Question is unanswered, help us to find answer for this one
84. Software can be divided into two major categories: ____ and ____.
Answer
Correct Answer:
Application, system
Note: This Question is unanswered, help us to find answer for this one
85. By default, all print jobs have a priority of ____.
Answer
Correct Answer:
50
Note: This Question is unanswered, help us to find answer for this one
86. The ________ of the operating system enables users to communicate with the computer system
Answer
Correct Answer:
User interface
Note: This Question is unanswered, help us to find answer for this one
87. Clicking or tapping on a(n) ____ file will start up a program.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
88. You cannot boot a computer from ____________.
Answer
Correct Answer:
A wireless network
Note: This Question is unanswered, help us to find answer for this one
89. Microsoft windows and mac os use a ________ interface
Answer
Correct Answer:
Graphical user
Note: This Question is unanswered, help us to find answer for this one
90. In most cases, the word "software" is interchangeable with the word _______.
Answer
Correct Answer:
Program
Note: This Question is unanswered, help us to find answer for this one
91. In linux, the three levels of file access are ____, ____, and ____.
Answer
Correct Answer:
Owner; group; others
Note: This Question is unanswered, help us to find answer for this one
92. Current versions of windows support file names up to ____ characters long.
Answer
Correct Answer:
257
Note: This Question is unanswered, help us to find answer for this one
93. All of the following are examples of desktop operating systems except ______.
Answer
Correct Answer:
Android
Note: This Question is unanswered, help us to find answer for this one
94. A file ____ shows the location of a file or folder.
Answer
Correct Answer:
Path
Note: This Question is unanswered, help us to find answer for this one
95. A ____ allows the operating system to store and organize files on a hard disk.
Answer
Correct Answer:
File system
Note: This Question is unanswered, help us to find answer for this one
96. To clean up the registry in windows, you should ______________.
Answer
Correct Answer:
Acquire the right third-party tool
Note: This Question is unanswered, help us to find answer for this one
97. Cd-roms typically use the ____ filesystem type.
Answer
Correct Answer:
Iso9660
Note: This Question is unanswered, help us to find answer for this one
98. In a linux script, the line ____ is important because it identifies the file as a script.
Answer
Correct Answer:
#!/bin/sh
Note: This Question is unanswered, help us to find answer for this one
99. Chrome os is the first ____.
Answer
Correct Answer:
Cloud operating system
Note: This Question is unanswered, help us to find answer for this one
100. Odbc works on the _____ operating system.
Answer
Correct Answer:
Windows
Note: This Question is unanswered, help us to find answer for this one
101. Processes are started with a nice value of ____ by default.
Answer
Correct Answer:
&
Note: This Question is unanswered, help us to find answer for this one
102. A system process that is not associated with a terminal is called a(n) ____ process.
Answer
Correct Answer:
Daemon
Note: This Question is unanswered, help us to find answer for this one
103. If your computer is thrashing, increase ________ to solve the problem.
Answer
Correct Answer:
RAM
Note: This Question is unanswered, help us to find answer for this one
104. The maximum number of bytes that can be allocated to a single file in unix is ____.
Answer
Correct Answer:
1,082,201,088
Note: This Question is unanswered, help us to find answer for this one
105. The ____ command creates a subdirectory under a directory
Answer
Correct Answer:
MD
Note: This Question is unanswered, help us to find answer for this one
106. A process or program that divides itself into multiple threads is said to be ____.
Answer
Correct Answer:
Multi-headed
Note: This Question is unanswered, help us to find answer for this one
107. The job scheduler seeks to ____ when scheduling jobs.
Answer
Correct Answer:
Balance CPU and I/O intensive jobs
Note: This Question is unanswered, help us to find answer for this one
108. Raid level ____ requires two different parity calculations.
Answer
Correct Answer:
7
Note: This Question is unanswered, help us to find answer for this one
109. A ____ can be used to prevent a user program from never returning control to the operating system.
Answer
Correct Answer:
Timer
Note: This Question is unanswered, help us to find answer for this one
110. The first-come, first-served (fcfs) algorithm is fine for most ____ systems.
Answer
Correct Answer:
Batch
Note: This Question is unanswered, help us to find answer for this one
111. One example of a popular communication app is ________.
Answer
Correct Answer:
Skype
Note: This Question is unanswered, help us to find answer for this one
112. Thread-local storage is data that ____.
Answer
Correct Answer:
Is unique to each thread
Note: This Question is unanswered, help us to find answer for this one
113. The ____ is also called a high-level scheduler.
Answer
Correct Answer:
Job Scheduler
Note: This Question is unanswered, help us to find answer for this one
114. Mobile software is almost always ____
Answer
Correct Answer:
Downloaded from the Internet
Note: This Question is unanswered, help us to find answer for this one
115. The _________ domain connects remote users to the organization?s it infrastructure.
Answer
Correct Answer:
Remote Access
Note: This Question is unanswered, help us to find answer for this one
116. With the ____, the statements in the loop are repeated as long as a certain condition is false.
Answer
Correct Answer:
Do until structure
Note: This Question is unanswered, help us to find answer for this one
117. Video cards have their own _____.
Answer
Correct Answer:
Memory
Note: This Question is unanswered, help us to find answer for this one
118. The windows ________ utility rearranges files on a hard drive in order to improve efficiency.
Answer
Correct Answer:
Optimizing Drives
Note: This Question is unanswered, help us to find answer for this one
119. Under direct memory access, a device called a ____ is attached to the bus and to main memory.
Answer
Correct Answer:
DMA controller
Note: This Question is unanswered, help us to find answer for this one
120. A thin-client application is designed to run within a program such as ________.
Answer
Correct Answer:
Internet Explorer
Note: This Question is unanswered, help us to find answer for this one
121. A client-server application that requires nothing more than a browser is called ________.
Answer
Correct Answer:
Thin-client application
Note: This Question is unanswered, help us to find answer for this one
122. ________ is the process whereby multiple operating systems share the same hardware.
Answer
Correct Answer:
Virtualization
Note: This Question is unanswered, help us to find answer for this one
123. All of the following are examples of network operating systems except ________.
Answer
Correct Answer:
MS-DOS
Note: This Question is unanswered, help us to find answer for this one
124. ____ uses multiple sources of information and provides multidimensional analysis.
Answer
Correct Answer:
OLAP
Note: This Question is unanswered, help us to find answer for this one
125. ____ technique is also known as disk mirroring.
Answer
Correct Answer:
Disk mirroring
Note: This Question is unanswered, help us to find answer for this one
126. ____ storage is not lost when a computer loses power.
Answer
Correct Answer:
Permanent.
Note: This Question is unanswered, help us to find answer for this one
127. ____ storage allocation allows files to use any storage space available on the disk.
Answer
Correct Answer:
Noncontiguous storage
Note: This Question is unanswered, help us to find answer for this one
128. Magnetic disks are a _____ access storage medium
Answer
Correct Answer:
Direct
Note: This Question is unanswered, help us to find answer for this one
129. In linux, the command _________________________ displays currently logged-in users.
Answer
Correct Answer:
Who
Note: This Question is unanswered, help us to find answer for this one
130. In linux, runlevel ____ is also known as multiuser mode.
Answer
Correct Answer:
2
Note: This Question is unanswered, help us to find answer for this one
131. Access is a ____.
Answer
Correct Answer:
Database management system
Note: This Question is unanswered, help us to find answer for this one
132. A(n)________ is an example of storage hardware in computers.
Answer
Correct Answer:
Magnetic disk
Note: This Question is unanswered, help us to find answer for this one
133. Embedded systems can be found in all of the following except _____.
Answer
Correct Answer:
Cloud computers
Note: This Question is unanswered, help us to find answer for this one
134. In ____ systems, deadlocks can cause critical situations.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
135. Ultraportables conforming to intel's standards can be marketed as ____.
Answer
Correct Answer:
Ultrabooks
Note: This Question is unanswered, help us to find answer for this one
136. Windows server is an example of a(n) _____ operating system.
Answer
Correct Answer:
Network
Note: This Question is unanswered, help us to find answer for this one
137. The overall responsibility of keeping an organization’s software up to date ____.
Answer
Correct Answer:
Depends upon the organization
Note: This Question is unanswered, help us to find answer for this one
138. Primitive types serve as the building blocks for more complex data types, called ____ types.
Answer
Correct Answer:
Reference
Note: This Question is unanswered, help us to find answer for this one
139. Optimal page replacement ____.
Answer
Correct Answer:
Is used mostly for comparison with other page-replacement schemes
Note: This Question is unanswered, help us to find answer for this one
140. Operating systems used with personal computers are typically referred to as ____ operating systems.
Answer
Correct Answer:
Desktop
Note: This Question is unanswered, help us to find answer for this one
141. Operating systems provide file organization tools called ___________.
Answer
Correct Answer:
File management utilities
Note: This Question is unanswered, help us to find answer for this one
142. Operating systems installed on a single computer are called __________ operating systems.
Answer
Correct Answer:
Personal or desktop
Note: This Question is unanswered, help us to find answer for this one
143. Operating system software, also called a(n) _____, manages computer hardware and software.
Answer
Correct Answer:
Platform
Note: This Question is unanswered, help us to find answer for this one
144. One of the disadvantages of proprietary software is that ______________.
Answer
Correct Answer:
It can take a long time and significant resources to develop the required software features
Note: This Question is unanswered, help us to find answer for this one
145. One major disadvantage of encryption is that ____.
Answer
Correct Answer:
It increases the system's overhead
Note: This Question is unanswered, help us to find answer for this one
146. Ms-dos first used a(n) ________ interface.
Answer
Correct Answer:
Command-driven
Note: This Question is unanswered, help us to find answer for this one
147. Most smartphones use operating systems developed by ________.
Answer
Correct Answer:
Google and Apple
Note: This Question is unanswered, help us to find answer for this one
148. Most operating systems today primarily use a ____.
Answer
Correct Answer:
GUI
Note: This Question is unanswered, help us to find answer for this one
149. Most operating systems are now distributed on ____.
Answer
Correct Answer:
CD or DVD disks
Note: This Question is unanswered, help us to find answer for this one
150. Microsoft’s share of the total personal computer operating system market is about ____.
Answer
Correct Answer:
90% *
Note: This Question is unanswered, help us to find answer for this one
151. Memory compaction is also referred to as ____.
Answer
Correct Answer:
Defragmentation
Note: This Question is unanswered, help us to find answer for this one
152. Mac os and ios applications are constructed using ________ programming language.
Answer
Correct Answer:
Objective C
Note: This Question is unanswered, help us to find answer for this one
153. Lock and key synchronization must take place within a single ____.
Answer
Correct Answer:
Machine cycle
Note: This Question is unanswered, help us to find answer for this one
154. In linux, ____ devices cannot host a file system.
Answer
Correct Answer:
Char
Note: This Question is unanswered, help us to find answer for this one
155. In game theory, strategies include _______.
Answer
Correct Answer:
All possible actions of each player
Note: This Question is unanswered, help us to find answer for this one
156. In dos, the command ____ displays the files and folders in the current location.
Answer
Correct Answer:
DIR
Note: This Question is unanswered, help us to find answer for this one
157. In demand paging, pages are ____ between main memory and secondary storage.
Answer
Correct Answer:
Swapped
Note: This Question is unanswered, help us to find answer for this one
158. In common usage, the term “pc” refers to computers that ____.
Answer
Correct Answer:
Use external keyboards
Note: This Question is unanswered, help us to find answer for this one
159. In a network operating system (nos), ____.
Answer
Correct Answer:
Resources are owned by local nodes
Note: This Question is unanswered, help us to find answer for this one
160. In a multitasking operating system, ______ programs are running but not in use.
Answer
Correct Answer:
Background
Note: This Question is unanswered, help us to find answer for this one
161. In ________ process, a server hosts many versions of desktop operating systems.
Answer
Correct Answer:
Desktop virtualization
Note: This Question is unanswered, help us to find answer for this one
162. If you are using a touch screen _____ pointer appears on the screen.
Answer
Correct Answer:
No
Note: This Question is unanswered, help us to find answer for this one
163. For multiprogramming systems, most unix operating systems use either ____ management techniques.
Answer
Correct Answer:
Swapping or demand paging memory
Note: This Question is unanswered, help us to find answer for this one
164. File management capabilities available from application software include ____ files.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
165. Failure to lock database records before updating them may result in a ____ between processes.
Answer
Correct Answer:
Race
Note: This Question is unanswered, help us to find answer for this one
166. Electronic devices such as card readers use ___________ operating systems.
Answer
Correct Answer:
Embedded
Note: This Question is unanswered, help us to find answer for this one
167. Each memory page in virtual memory management is called a ____.
Answer
Correct Answer:
Page frame
Note: This Question is unanswered, help us to find answer for this one
168. Desktop apps are also known as ____ apps
Answer
Correct Answer:
Traditional
Note: This Question is unanswered, help us to find answer for this one
169. Deployment software falls into two groups: ____ software.
Answer
Correct Answer:
Agent-based and agentless
Note: This Question is unanswered, help us to find answer for this one
170. Computers represent data using binary digits, called ________.
Answer
Correct Answer:
Bits
Note: This Question is unanswered, help us to find answer for this one
171. Cloud computing provides _____, which matches resources to needs at any given time.
Answer
Correct Answer:
Scaling
Note: This Question is unanswered, help us to find answer for this one
172. Cloud computing is not possible without _____.
Answer
Correct Answer:
An Internet connection
Note: This Question is unanswered, help us to find answer for this one
173. Clicking and double-clicking are two of the five _____.
Answer
Correct Answer:
Pointing device actions
Note: This Question is unanswered, help us to find answer for this one
174. Chapter 4 describes the utilities included in an operating system package as _____ but not _____.
Answer
Correct Answer:
Useful; essential
Note: This Question is unanswered, help us to find answer for this one
175. By default, windows creates a ___________ every time new software is installed.
Answer
Correct Answer:
Restore point
Note: This Question is unanswered, help us to find answer for this one
176. A ____ dynamic volume can only be created with three or more dynamic disks.
Answer
Correct Answer:
RAID 5
Note: This Question is unanswered, help us to find answer for this one
177. Automated driver updates on a mac are accomplished by the _____ feature.
Answer
Correct Answer:
Software Update
Note: This Question is unanswered, help us to find answer for this one
178. As with other popular mobile operating systems, android is designed for _______ processors.
Answer
Correct Answer:
ARM
Note: This Question is unanswered, help us to find answer for this one
179. An optional file identifier that is separated from a main file name by a period is a ____.
Answer
Correct Answer:
File extension
Note: This Question is unanswered, help us to find answer for this one
180. An industrial operating system works with a large computer system requiring a(n) ____.
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
181. A process control block ____.
Answer
Correct Answer:
Includes information on the process's state
Note: This Question is unanswered, help us to find answer for this one
182. A file’s ____ filename includes all path information for that file.
Answer
Correct Answer:
Absolute
Note: This Question is unanswered, help us to find answer for this one
183. A file that stays in memory after it executes is a(n) _____________.
Answer
Correct Answer:
Terminate and Stay Resident program
Note: This Question is unanswered, help us to find answer for this one
184. A file containing data or programs belonging to users is known as a(n) ____.
Answer
Correct Answer:
Ordinary file
Note: This Question is unanswered, help us to find answer for this one
185. A disadvantage of segmented memory allocation is ____.
Answer
Correct Answer:
External fragmentation
Note: This Question is unanswered, help us to find answer for this one
186. A computer with a domain name is called a ________.
Answer
Correct Answer:
Website
Note: This Question is unanswered, help us to find answer for this one
187. A computer cannot function without a(n) _____.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
188. A clustered system ____.
Answer
Correct Answer:
Gathers together multiple CPUs to accomplish computational work
Note: This Question is unanswered, help us to find answer for this one
189. A _________ is a program that is written to use a particular operating system.
Answer
Correct Answer:
Native application
Note: This Question is unanswered, help us to find answer for this one
190. A ______ controls how computer hardware communicates with the operating system.
Answer
Correct Answer:
Device driver
Note: This Question is unanswered, help us to find answer for this one
191. A _____ is an example of a systems program.
Answer
Correct Answer:
Command interpreter
Note: This Question is unanswered, help us to find answer for this one
192. A ____ of processing must be handled as a single unit.
Answer
Correct Answer:
Critical region
Note: This Question is unanswered, help us to find answer for this one
193. __________ was the first operating system to integrate security as its core functions.
Answer
Correct Answer:
MULTICS
Note: This Question is unanswered, help us to find answer for this one
194. ________ is necessary to protect the host against attacks.
Answer
Correct Answer:
Host hardening
Note: This Question is unanswered, help us to find answer for this one
195. ______ allows a thread to run on only one processor.
Answer
Correct Answer:
Processor affinity
Note: This Question is unanswered, help us to find answer for this one
196. _____ is free storage space provided on microsoft’s server.
Answer
Correct Answer:
SkyDrive
Note: This Question is unanswered, help us to find answer for this one
197. ____ set the original standard for graphical user interfaces.
Answer
Correct Answer:
Mac OS
Note: This Question is unanswered, help us to find answer for this one
198. ____ peripheral devices are assigned to only one job at a time.
Answer
Correct Answer:
Dedicated
Note: This Question is unanswered, help us to find answer for this one
199. ____ memory allows you to use more memory than is physically available on your computer.
Answer
Correct Answer:
Virtual
Note: This Question is unanswered, help us to find answer for this one
200. ____ is where the data and instructions of a computer must reside to be processed.
Answer
Correct Answer:
Main memory
Note: This Question is unanswered, help us to find answer for this one
201. ____ is the policy of allowing only one process to have access to a dedicated resource.
Answer
Correct Answer:
Mutual exclusion
Note: This Question is unanswered, help us to find answer for this one
202. ____ is one of the most widely-used versions of linux.
Answer
Correct Answer:
Ubuntu
Note: This Question is unanswered, help us to find answer for this one
203. ____ is an open-platform mobile operating system.
Answer
Correct Answer:
Android
Note: This Question is unanswered, help us to find answer for this one
204. ____ is a term for software that is run directly from the internet.
Answer
Correct Answer:
SaaS (software as a service)
Note: This Question is unanswered, help us to find answer for this one
205. ____ has gained popularity as an open-source operating system.
Answer
Correct Answer:
Linux
Note: This Question is unanswered, help us to find answer for this one
206. ____ describes how instances of one entity relate to instances of another entity.
Answer
Correct Answer:
Scalability
Note: This Question is unanswered, help us to find answer for this one
207. ____ disks are commonly used with sun solaris systems.
Answer
Correct Answer:
SPARC
Note: This Question is unanswered, help us to find answer for this one
208. ____ development is the systematic process of transforming an idea into functional software.
Answer
Correct Answer:
Software
Note: This Question is unanswered, help us to find answer for this one
209. ____ can protect against someone accessing your pc via the internet.
Answer
Correct Answer:
Firewalls
Note: This Question is unanswered, help us to find answer for this one
210. ____ are software applications that run automated tasks over the internet.
Answer
Correct Answer:
Bots
Note: This Question is unanswered, help us to find answer for this one
211. ____ a data item means you override incorrect data by setting the variable to a specific value.
Answer
Correct Answer:
Forcing
Note: This Question is unanswered, help us to find answer for this one
212. The ______________ imaging tool produces three proprietary formats:
Answer
Correct Answer:
Ilookix
Note: This Question is unanswered, help us to find answer for this one
213. Questionnaires can be used to ask questions that _______.
Answer
Correct Answer:
Determine user opinions
Note: This Question is unanswered, help us to find answer for this one
214. Google play is an example of a(n) ______.
Answer
Correct Answer:
App Store
Note: This Question is unanswered, help us to find answer for this one
215. Another term for a zombie is a(n) ____.
Answer
Correct Answer:
Bot
Note: This Question is unanswered, help us to find answer for this one