MCQs > IT & Programming > Computer Science MCQs > Operating Systems MCQs

Operating Systems MCQ

Operating Systems

1. An address generated by a cpu is referred to as a ____.

Answer

Correct Answer: Logical address

Note: This Question is unanswered, help us to find answer for this one

2. A software utility designed to clean up after a failed software installation is ____.

Answer

Correct Answer: An uninstaller utility

Note: This Question is unanswered, help us to find answer for this one

3. The primary advantage of storing programs in noncontiguous locations is that ____.

Answer

Correct Answer: Multiple programs can run at the same time

Note: This Question is unanswered, help us to find answer for this one

4. Total productive maintenance (tpm) seeks to do all of the following except ____.

Answer

Correct Answer: Maximize equipment effectiveness

Note: This Question is unanswered, help us to find answer for this one

5. With ____ connections, polling is not necessary because there is only one terminal per line.

Answer

Correct Answer: Point-to-point

Note: This Question is unanswered, help us to find answer for this one

6. The program segment that catches a possible by zero is known as a(n) ______.

Answer

Correct Answer: Error trap

Note: This Question is unanswered, help us to find answer for this one

7. The smallest amount of memory the vm can use at any time is called _______.

Answer

Correct Answer: Minimum RAM

Note: This Question is unanswered, help us to find answer for this one

8. The linux page replacement algorithm is an expanded version of the ____ replacement policy.

Answer

Correct Answer: Clock page

Note: This Question is unanswered, help us to find answer for this one

9. One approach to performing compaction is to do it when a certain ____ of memory becomes busy.

Answer

Correct Answer: Percentage

Note: This Question is unanswered, help us to find answer for this one

10. No movement between queues is a very simple policy that rewards those who have ____ jobs.

Answer

Correct Answer: High-priority

Note: This Question is unanswered, help us to find answer for this one

11. A utility tool that can change the software that is launched automatically during start-up is ____.

Answer

Correct Answer: An autoruns utility

Note: This Question is unanswered, help us to find answer for this one

12. Mac os x includes a backup utility called ________.

Answer

Correct Answer: Time Machine

Note: This Question is unanswered, help us to find answer for this one

13. A(n) _______ refers to where a process is accessing/updating shared data.

Answer

Correct Answer: Critical section

Note: This Question is unanswered, help us to find answer for this one

14. In unix/linux, text files and binary files are considered to be ____ files.

Answer

Correct Answer: Regular

Note: This Question is unanswered, help us to find answer for this one

15. Cortana stores personalized information about you in a local database called the __________.

Answer

Correct Answer: Notebook

Note: This Question is unanswered, help us to find answer for this one

16. The three standard classes of devices supported by linux are ____.

Answer

Correct Answer: Character devices, block devices, and network devices

Note: This Question is unanswered, help us to find answer for this one

17. ________ refers to the leasing of hardware with pre-installed operating systems.

Answer

Correct Answer: Platform as a Service (PaaS)

Note: This Question is unanswered, help us to find answer for this one

18. Bing, google, and yahoo! are all examples of web ____________________.

Answer

Correct Answer: Search engine

Note: This Question is unanswered, help us to find answer for this one

19. Remote access to a user's pc can be implemented with a ____.

Answer

Correct Answer: Virtual Private Network

Note: This Question is unanswered, help us to find answer for this one

20. The ________ operating system(s) treat uppercase and lowercase letters differently.

Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

21. ____ is processing that involves performing the same tasks with many records, one after the other.

Answer

Correct Answer: Volume processing.

Note: This Question is unanswered, help us to find answer for this one

22. A(n) ______ key is a special key programmed to issue commands to a computer.

Answer

Correct Answer: Function

Note: This Question is unanswered, help us to find answer for this one

23. Virtual sans allow you to _______.

Answer

Correct Answer: Make distant storage accessible to VMs

Note: This Question is unanswered, help us to find answer for this one

24. All of the following word groups show parallelism except __________.

Answer

Correct Answer: Smiling at my mother, when I cleaned my room, to ask my parents for a favor

Note: This Question is unanswered, help us to find answer for this one

25. All of the following are categories of a computer security threat except ____.

Answer

Correct Answer: ​subterfuge

Note: This Question is unanswered, help us to find answer for this one

26. The internal part of an operating system is called the ______.

Answer

Correct Answer: Kernel

Note: This Question is unanswered, help us to find answer for this one

27. The first personal computer operating system was named ___________.

Answer

Correct Answer: DOS (Disk Operating System)

Note: This Question is unanswered, help us to find answer for this one

28. The cpu stores the results of computations in ________.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

29. The ________ software makes the computer run.

Answer

Correct Answer: System

Note: This Question is unanswered, help us to find answer for this one

30. Placing data in a buffer so it can be retrieved later is called _______.

Answer

Correct Answer: Spooling

Note: This Question is unanswered, help us to find answer for this one

31. Deadlock can occur on a printer when ____.

Answer

Correct Answer: The printer needs all of a job's output before it will begin printing, but the spooling system fills the available disk space with only partially completed output

Note: This Question is unanswered, help us to find answer for this one

32. Software for pcs contains a _________ program that guides you through the installation process.

Answer

Correct Answer: ​setup

Note: This Question is unanswered, help us to find answer for this one

33. Of the following, the ____ operating system was developed the earliest.

Answer

Correct Answer: UNIX

Note: This Question is unanswered, help us to find answer for this one

34. Microsoft _____ is the new microsoft web browser that lets you display and interact with webpages.

Answer

Correct Answer: Edge

Note: This Question is unanswered, help us to find answer for this one

35. If a user turns on a computer that is currently turned off, it is referred to as a __________.

Answer

Correct Answer: Cold boot

Note: This Question is unanswered, help us to find answer for this one

36. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.

Answer

Correct Answer: Graphics table

Note: This Question is unanswered, help us to find answer for this one

37. ____ are utility programs that search for documents and other files on a users hard drives.

Answer

Correct Answer: Search tools

Note: This Question is unanswered, help us to find answer for this one

38. Running the disk cleanup utility is a quick way to ________.

Answer

Correct Answer: Clear out unnecessary files

Note: This Question is unanswered, help us to find answer for this one

39. Ronald runs both windows 7 and linux on his desktop computer. this process is called ________.

Answer

Correct Answer: PC virtualization

Note: This Question is unanswered, help us to find answer for this one

40. One advantage of proprietary software versus off-the-shelf software is that _____.

Answer

Correct Answer: The software provides a company a competitive advantage by solving problems in a unique manner

Note: This Question is unanswered, help us to find answer for this one

41. If a pc fails its initial nac health assessment, it may be ________.

Answer

Correct Answer: Refused access

Note: This Question is unanswered, help us to find answer for this one

42. Disk cleanup, file history, and disk defragmenter are all examples of _____ programs.

Answer

Correct Answer: Utility

Note: This Question is unanswered, help us to find answer for this one

43. Disk ________ realigns separated data so that related file pieces are unified.

Answer

Correct Answer: Defrafmentation

Note: This Question is unanswered, help us to find answer for this one

44. C: denotes a ________ directory that is at the top of the filing structure of a computer.

Answer

Correct Answer: Root.

Note: This Question is unanswered, help us to find answer for this one

45. Use the windows ________ to check on a nonresponsive program.

Answer

Correct Answer: Task Manager

Note: This Question is unanswered, help us to find answer for this one

46. The vast majority of smartphones use the ________ or ________ operating systems.

Answer

Correct Answer: Android, iOS

Note: This Question is unanswered, help us to find answer for this one

47. Freebsd is a(n) _____-based operating system.

Answer

Correct Answer: UNIX

Note: This Question is unanswered, help us to find answer for this one

48. The small circuit boards that hold a series of ram chips are called ________.

Answer

Correct Answer: Memory modules

Note: This Question is unanswered, help us to find answer for this one

49. The means by which you interact with any program on a computer is called the user ____.

Answer

Correct Answer: User interface

Note: This Question is unanswered, help us to find answer for this one

50. The main directory on a storage device is referred to as the ________ directory.

Answer

Correct Answer: Root

Note: This Question is unanswered, help us to find answer for this one

51. The ____ shows the name and location of the item you have open.

Answer

Correct Answer: Address bar

Note: This Question is unanswered, help us to find answer for this one

52. Smartphone operating systems are a type of _____ operating system.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

53. The ________ statement can cause other program statements to execute only under certain conditions.

Answer

Correct Answer: If

Note: This Question is unanswered, help us to find answer for this one

54. To develop software you need all these except ________.

Answer

Correct Answer: Personal application software

Note: This Question is unanswered, help us to find answer for this one

55. The root of a file system is denoted by the ____.

Answer

Correct Answer: Forward slash (/)

Note: This Question is unanswered, help us to find answer for this one

56. The process that launched a given process is known as the ________ process.

Answer

Correct Answer: Parent

Note: This Question is unanswered, help us to find answer for this one

57. All of the following are examples of someone using personal productivity software except _________.

Answer

Correct Answer: Callie entering a customer's order into a restaurant's ordering system

Note: This Question is unanswered, help us to find answer for this one

58. All of the following are examples of activities performed by an operating system except ________.

Answer

Correct Answer: Allowing a user to do word processing

Note: This Question is unanswered, help us to find answer for this one

59. A ___________ is any known starting point.

Answer

Correct Answer: Baseline

Note: This Question is unanswered, help us to find answer for this one

60. A _________ is a mobile device that typically ranges from seven to ten inches in size.

Answer

Correct Answer: Tablet

Note: This Question is unanswered, help us to find answer for this one

61. A(n) _______________ is a fix for a single problem within an operating system.

Answer

Correct Answer: Patch

Note: This Question is unanswered, help us to find answer for this one

62. ____ manage the system resources of a computer so programs can run properly.

Answer

Correct Answer: Operating systems

Note: This Question is unanswered, help us to find answer for this one

63. Buttons act as ____, which instruct windows to perform tasks.

Answer

Correct Answer: Commands

Note: This Question is unanswered, help us to find answer for this one

64. Compressed files sometimes are called ______ files.

Answer

Correct Answer: Zipped

Note: This Question is unanswered, help us to find answer for this one

65. Clicking a _____ name opens a drop-down list of commands and options.

Answer

Correct Answer: Menu

Note: This Question is unanswered, help us to find answer for this one

66. An icon on your desktop is a component of a ____ interface.

Answer

Correct Answer: Graphical user

Note: This Question is unanswered, help us to find answer for this one

67. A(n) ______ expands the capability of a portable computer.

Answer

Correct Answer: Docking station

Note: This Question is unanswered, help us to find answer for this one

68. A(n) ____ view of data is the way a user thinks about data.

Answer

Correct Answer: Logical

Note: This Question is unanswered, help us to find answer for this one

69. A(n) ____ operating system is required to perform a command within a certain time frame.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

70. A(n) ____ is system software

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

71. A(n) ____ is a set of instructions or statements to the computer.

Answer

Correct Answer: Computer Program

Note: This Question is unanswered, help us to find answer for this one

72. A(n) ____ file consists of several time entries, each marked with a time stamp.

Answer

Correct Answer: WebVTT

Note: This Question is unanswered, help us to find answer for this one

73. A printer requires a ____ installed on the computer in order to operate.

Answer

Correct Answer: Device driver

Note: This Question is unanswered, help us to find answer for this one

74. A disadvantage of software monitoring tools is that they ____.

Answer

Correct Answer: Become part of the system and can distort analysis results

Note: This Question is unanswered, help us to find answer for this one

75. A ______ is a program that runs in the background.

Answer

Correct Answer: Process

Note: This Question is unanswered, help us to find answer for this one

76. A _____ is a link between devices connected to a computer.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

77. A ____ chip holds software that is used to start the computer.

Answer

Correct Answer: ROM

Note: This Question is unanswered, help us to find answer for this one

78. _____ provide(s) an interface to the services provided by an operating system.

Answer

Correct Answer: System calls

Note: This Question is unanswered, help us to find answer for this one

79. A(n) ____ is a computer program that coordinates all the activities of computer hardware.

Answer

Correct Answer: Operating system (OS)

Note: This Question is unanswered, help us to find answer for this one

80. ______ is a set of applications that manages the activities and resources of a computer.

Answer

Correct Answer: System software

Note: This Question is unanswered, help us to find answer for this one

81. Some important touch gestures begin at the _______________ of the screen.

Answer

Correct Answer: Corners

Note: This Question is unanswered, help us to find answer for this one

82. Memory is said to be ________ if contents are lost when power is off.

Answer

Correct Answer: Volatile

Note: This Question is unanswered, help us to find answer for this one

83. A _____ provides content that is accessible on the world wide web.

Answer

Correct Answer: Web server

Note: This Question is unanswered, help us to find answer for this one

84. Software can be divided into two major categories: ____ and ____.

Answer

Correct Answer: Application, system

Note: This Question is unanswered, help us to find answer for this one

85. By default, all print jobs have a priority of ____.

Answer

Correct Answer: 50

Note: This Question is unanswered, help us to find answer for this one

86. The ________ of the operating system enables users to communicate with the computer system

Answer

Correct Answer: User interface

Note: This Question is unanswered, help us to find answer for this one

87. Clicking or tapping on a(n) ____ file will start up a program.

Answer

Correct Answer: Executable

Note: This Question is unanswered, help us to find answer for this one

88. You cannot boot a computer from ____________.

Answer

Correct Answer: A wireless network

Note: This Question is unanswered, help us to find answer for this one

89. Microsoft windows and mac os use a ________ interface

Answer

Correct Answer: Graphical user

Note: This Question is unanswered, help us to find answer for this one

90. In most cases, the word "software" is interchangeable with the word _______.

Answer

Correct Answer: Program

Note: This Question is unanswered, help us to find answer for this one

91. In linux, the three levels of file access are ____, ____, and ____.

Answer

Correct Answer: Owner; group; others

Note: This Question is unanswered, help us to find answer for this one

92. Current versions of windows support file names up to ____ characters long.

Answer

Correct Answer: 257

Note: This Question is unanswered, help us to find answer for this one

93. All of the following are examples of desktop operating systems except ______.

Answer

Correct Answer: Android

Note: This Question is unanswered, help us to find answer for this one

94. A file ____ shows the location of a file or folder.

Answer

Correct Answer: Path

Note: This Question is unanswered, help us to find answer for this one

95. A ____ allows the operating system to store and organize files on a hard disk.

Answer

Correct Answer: File system

Note: This Question is unanswered, help us to find answer for this one

96. To clean up the registry in windows, you should ______________.

Answer

Correct Answer: Acquire the right third-party tool

Note: This Question is unanswered, help us to find answer for this one

97. Cd-roms typically use the ____ filesystem type.

Answer

Correct Answer: Iso9660

Note: This Question is unanswered, help us to find answer for this one

98. In a linux script, the line ____ is important because it identifies the file as a script.

Answer

Correct Answer: #!/bin/sh

Note: This Question is unanswered, help us to find answer for this one

99. Chrome os is the first ____.

Answer

Correct Answer: Cloud operating system

Note: This Question is unanswered, help us to find answer for this one

100. Odbc works on the _____ operating system.

Answer

Correct Answer: Windows

Note: This Question is unanswered, help us to find answer for this one

101. Processes are started with a nice value of ____ by default.

Answer

Correct Answer: &

Note: This Question is unanswered, help us to find answer for this one

102. A system process that is not associated with a terminal is called a(n) ____ process.

Answer

Correct Answer: Daemon

Note: This Question is unanswered, help us to find answer for this one

103. If your computer is thrashing, increase ________ to solve the problem.

Answer

Correct Answer: RAM

Note: This Question is unanswered, help us to find answer for this one

104. The maximum number of bytes that can be allocated to a single file in unix is ____.

Answer

Correct Answer: 1,082,201,088

Note: This Question is unanswered, help us to find answer for this one

105. The ____ command creates a subdirectory under a directory

Answer

Correct Answer: MD

Note: This Question is unanswered, help us to find answer for this one

106. A process or program that divides itself into multiple threads is said to be ____.

Answer

Correct Answer: Multi-headed

Note: This Question is unanswered, help us to find answer for this one

107. The job scheduler seeks to ____ when scheduling jobs.

Answer

Correct Answer: Balance CPU and I/O intensive jobs

Note: This Question is unanswered, help us to find answer for this one

108. Raid level ____ requires two different parity calculations.

Answer

Correct Answer: 7

Note: This Question is unanswered, help us to find answer for this one

109. A ____ can be used to prevent a user program from never returning control to the operating system.

Answer

Correct Answer: Timer

Note: This Question is unanswered, help us to find answer for this one

110. The first-come, first-served (fcfs) algorithm is fine for most ____ systems.

Answer

Correct Answer: Batch

Note: This Question is unanswered, help us to find answer for this one

111. One example of a popular communication app is ________.

Answer

Correct Answer: Skype

Note: This Question is unanswered, help us to find answer for this one

112. Thread-local storage is data that ____.

Answer

Correct Answer: Is unique to each thread

Note: This Question is unanswered, help us to find answer for this one

113. The ____ is also called a high-level scheduler.

Answer

Correct Answer: Job Scheduler

Note: This Question is unanswered, help us to find answer for this one

114. Mobile software is almost always ____

Answer

Correct Answer: Downloaded from the Internet

Note: This Question is unanswered, help us to find answer for this one

115. The _________ domain connects remote users to the organization?s it infrastructure.

Answer

Correct Answer: Remote Access

Note: This Question is unanswered, help us to find answer for this one

116. With the ____, the statements in the loop are repeated as long as a certain condition is false.

Answer

Correct Answer: Do until structure

Note: This Question is unanswered, help us to find answer for this one

117. Video cards have their own _____.

Answer

Correct Answer: Memory

Note: This Question is unanswered, help us to find answer for this one

118. The windows ________ utility rearranges files on a hard drive in order to improve efficiency.

Answer

Correct Answer: Optimizing Drives

Note: This Question is unanswered, help us to find answer for this one

119. Under direct memory access, a device called a ____ is attached to the bus and to main memory.

Answer

Correct Answer: DMA controller

Note: This Question is unanswered, help us to find answer for this one

120. A thin-client application is designed to run within a program such as ________.

Answer

Correct Answer: Internet Explorer

Note: This Question is unanswered, help us to find answer for this one

121. A client-server application that requires nothing more than a browser is called ________.

Answer

Correct Answer: Thin-client application

Note: This Question is unanswered, help us to find answer for this one

122. ________ is the process whereby multiple operating systems share the same hardware.

Answer

Correct Answer: Virtualization

Note: This Question is unanswered, help us to find answer for this one

123. All of the following are examples of network operating systems except ________.

Answer

Correct Answer: MS-DOS

Note: This Question is unanswered, help us to find answer for this one

124. ____ uses multiple sources of information and provides multidimensional analysis.

Answer

Correct Answer: OLAP

Note: This Question is unanswered, help us to find answer for this one

125. ____ technique is also known as disk mirroring.

Answer

Correct Answer: Disk mirroring

Note: This Question is unanswered, help us to find answer for this one

126. ____ storage is not lost when a computer loses power.

Answer

Correct Answer: Permanent.

Note: This Question is unanswered, help us to find answer for this one

127. ____ storage allocation allows files to use any storage space available on the disk.

Answer

Correct Answer: Noncontiguous storage

Note: This Question is unanswered, help us to find answer for this one

128. Magnetic disks are a _____ access storage medium

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

129. In linux, the command _________________________ displays currently logged-in users.

Answer

Correct Answer: Who

Note: This Question is unanswered, help us to find answer for this one

130. In linux, runlevel ____ is also known as multiuser mode.

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

131. Access is a ____.

Answer

Correct Answer: Database management system

Note: This Question is unanswered, help us to find answer for this one

132. A(n)________ is an example of storage hardware in computers.

Answer

Correct Answer: Magnetic disk

Note: This Question is unanswered, help us to find answer for this one

133. Embedded systems can be found in all of the following except _____.

Answer

Correct Answer: Cloud computers

Note: This Question is unanswered, help us to find answer for this one

134. In ____ systems, deadlocks can cause critical situations.

Answer

Correct Answer: Real-time

Note: This Question is unanswered, help us to find answer for this one

135. Ultraportables conforming to intel's standards can be marketed as ____.

Answer

Correct Answer: Ultrabooks

Note: This Question is unanswered, help us to find answer for this one

136. Windows server is an example of a(n) _____ operating system.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

137. The overall responsibility of keeping an organization’s software up to date ____.

Answer

Correct Answer: Depends upon the organization

Note: This Question is unanswered, help us to find answer for this one

138. Primitive types serve as the building blocks for more complex data types, called ____ types.

Answer

Correct Answer: Reference

Note: This Question is unanswered, help us to find answer for this one

139. Optimal page replacement ____.

Answer

Correct Answer: Is used mostly for comparison with other page-replacement schemes

Note: This Question is unanswered, help us to find answer for this one

140. Operating systems used with personal computers are typically referred to as ____ operating systems.

Answer

Correct Answer: Desktop

Note: This Question is unanswered, help us to find answer for this one

141. Operating systems provide file organization tools called ___________.

Answer

Correct Answer: File management utilities

Note: This Question is unanswered, help us to find answer for this one

142. Operating systems installed on a single computer are called __________ operating systems.

Answer

Correct Answer: Personal or desktop

Note: This Question is unanswered, help us to find answer for this one

143. Operating system software, also called a(n) _____, manages computer hardware and software.

Answer

Correct Answer: Platform

Note: This Question is unanswered, help us to find answer for this one

144. One of the disadvantages of proprietary software is that ______________.

Answer

Correct Answer: It can take a long time and significant resources to develop the required software features

Note: This Question is unanswered, help us to find answer for this one

145. One major disadvantage of encryption is that ____.

Answer

Correct Answer: It increases the system's overhead

Note: This Question is unanswered, help us to find answer for this one

146. Ms-dos first used a(n) ________ interface.

Answer

Correct Answer: Command-driven

Note: This Question is unanswered, help us to find answer for this one

147. Most smartphones use operating systems developed by ________.

Answer

Correct Answer: Google and Apple

Note: This Question is unanswered, help us to find answer for this one

148. Most operating systems today primarily use a ____.

Answer

Correct Answer: GUI

Note: This Question is unanswered, help us to find answer for this one

149. Most operating systems are now distributed on ____.

Answer

Correct Answer: CD or DVD disks

Note: This Question is unanswered, help us to find answer for this one

150. Microsoft’s share of the total personal computer operating system market is about ____.

Answer

Correct Answer: 90% *

Note: This Question is unanswered, help us to find answer for this one

151. Memory compaction is also referred to as ____.

Answer

Correct Answer: Defragmentation

Note: This Question is unanswered, help us to find answer for this one

152. Mac os and ios applications are constructed using ________ programming language.

Answer

Correct Answer: Objective C

Note: This Question is unanswered, help us to find answer for this one

153. Lock and key synchronization must take place within a single ____.

Answer

Correct Answer: Machine cycle

Note: This Question is unanswered, help us to find answer for this one

154. In linux, ____ devices cannot host a file system.

Answer

Correct Answer: Char

Note: This Question is unanswered, help us to find answer for this one

155. In game theory, strategies include _______.

Answer

Correct Answer: All possible actions of each player

Note: This Question is unanswered, help us to find answer for this one

156. In dos, the command ____ displays the files and folders in the current location.

Answer

Correct Answer: DIR

Note: This Question is unanswered, help us to find answer for this one

157. In demand paging, pages are ____ between main memory and secondary storage.

Answer

Correct Answer: Swapped

Note: This Question is unanswered, help us to find answer for this one

158. In common usage, the term “pc” refers to computers that ____.

Answer

Correct Answer: Use external keyboards

Note: This Question is unanswered, help us to find answer for this one

159. In a network operating system (nos), ____.

Answer

Correct Answer: Resources are owned by local nodes

Note: This Question is unanswered, help us to find answer for this one

160. In a multitasking operating system, ______ programs are running but not in use.

Answer

Correct Answer: Background

Note: This Question is unanswered, help us to find answer for this one

161. In ________ process, a server hosts many versions of desktop operating systems.

Answer

Correct Answer: Desktop virtualization

Note: This Question is unanswered, help us to find answer for this one

162. If you are using a touch screen _____ pointer appears on the screen.

Answer

Correct Answer: No

Note: This Question is unanswered, help us to find answer for this one

163. For multiprogramming systems, most unix operating systems use either ____ management techniques.

Answer

Correct Answer: Swapping or demand paging memory

Note: This Question is unanswered, help us to find answer for this one

164. File management capabilities available from application software include ____ files.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

165. Failure to lock database records before updating them may result in a ____ between processes.

Answer

Correct Answer: Race

Note: This Question is unanswered, help us to find answer for this one

166. Electronic devices such as card readers use ___________ operating systems.

Answer

Correct Answer: Embedded

Note: This Question is unanswered, help us to find answer for this one

167. Each memory page in virtual memory management is called a ____.

Answer

Correct Answer: Page frame

Note: This Question is unanswered, help us to find answer for this one

168. Desktop apps are also known as ____ apps

Answer

Correct Answer: Traditional

Note: This Question is unanswered, help us to find answer for this one

169. Deployment software falls into two groups: ____ software.

Answer

Correct Answer: Agent-based and agentless

Note: This Question is unanswered, help us to find answer for this one

170. Computers represent data using binary digits, called ________.

Answer

Correct Answer: Bits

Note: This Question is unanswered, help us to find answer for this one

171. Cloud computing provides _____, which matches resources to needs at any given time.

Answer

Correct Answer: Scaling

Note: This Question is unanswered, help us to find answer for this one

172. Cloud computing is not possible without _____.

Answer

Correct Answer: An Internet connection

Note: This Question is unanswered, help us to find answer for this one

173. Clicking and double-clicking are two of the five _____.

Answer

Correct Answer: Pointing device actions

Note: This Question is unanswered, help us to find answer for this one

174. Chapter 4 describes the utilities included in an operating system package as _____ but not _____.

Answer

Correct Answer: Useful; essential

Note: This Question is unanswered, help us to find answer for this one

175. By default, windows creates a ___________ every time new software is installed.

Answer

Correct Answer: Restore point

Note: This Question is unanswered, help us to find answer for this one

176. A ____ dynamic volume can only be created with three or more dynamic disks.

Answer

Correct Answer: RAID 5

Note: This Question is unanswered, help us to find answer for this one

177. Automated driver updates on a mac are accomplished by the _____ feature.

Answer

Correct Answer: Software Update

Note: This Question is unanswered, help us to find answer for this one

178. As with other popular mobile operating systems, android is designed for _______ processors.

Answer

Correct Answer: ARM

Note: This Question is unanswered, help us to find answer for this one

179. An optional file identifier that is separated from a main file name by a period is a ____.

Answer

Correct Answer: File extension

Note: This Question is unanswered, help us to find answer for this one

180. An industrial operating system works with a large computer system requiring a(n) ____.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

181. A process control block ____.

Answer

Correct Answer: Includes information on the process's state

Note: This Question is unanswered, help us to find answer for this one

182. A file’s ____ filename includes all path information for that file.

Answer

Correct Answer: Absolute

Note: This Question is unanswered, help us to find answer for this one

183. A file that stays in memory after it executes is a(n) _____________.

Answer

Correct Answer: Terminate and Stay Resident program

Note: This Question is unanswered, help us to find answer for this one

184. A file containing data or programs belonging to users is known as a(n) ____.

Answer

Correct Answer: Ordinary file

Note: This Question is unanswered, help us to find answer for this one

185. A disadvantage of segmented memory allocation is ____.

Answer

Correct Answer: External fragmentation

Note: This Question is unanswered, help us to find answer for this one

186. A computer with a domain name is called a ________.

Answer

Correct Answer: Website

Note: This Question is unanswered, help us to find answer for this one

187. A computer cannot function without a(n) _____.

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

188. A clustered system ____.

Answer

Correct Answer: Gathers together multiple CPUs to accomplish computational work

Note: This Question is unanswered, help us to find answer for this one

189. A _________ is a program that is written to use a particular operating system.

Answer

Correct Answer: Native application

Note: This Question is unanswered, help us to find answer for this one

190. A ______ controls how computer hardware communicates with the operating system.

Answer

Correct Answer: Device driver

Note: This Question is unanswered, help us to find answer for this one

191. A _____ is an example of a systems program.

Answer

Correct Answer: Command interpreter

Note: This Question is unanswered, help us to find answer for this one

192. A ____ of processing must be handled as a single unit.

Answer

Correct Answer: Critical region

Note: This Question is unanswered, help us to find answer for this one

193. __________ was the first operating system to integrate security as its core functions.

Answer

Correct Answer: MULTICS

Note: This Question is unanswered, help us to find answer for this one

194. ________ is necessary to protect the host against attacks.

Answer

Correct Answer: Host hardening

Note: This Question is unanswered, help us to find answer for this one

195. ______ allows a thread to run on only one processor.

Answer

Correct Answer: Processor affinity

Note: This Question is unanswered, help us to find answer for this one

196. _____ is free storage space provided on microsoft’s server.

Answer

Correct Answer: SkyDrive

Note: This Question is unanswered, help us to find answer for this one

197. ____ set the original standard for graphical user interfaces.

Answer

Correct Answer: Mac OS

Note: This Question is unanswered, help us to find answer for this one

198. ____ peripheral devices are assigned to only one job at a time.

Answer

Correct Answer: Dedicated

Note: This Question is unanswered, help us to find answer for this one

199. ____ memory allows you to use more memory than is physically available on your computer.

Answer

Correct Answer: Virtual

Note: This Question is unanswered, help us to find answer for this one

200. ____ is where the data and instructions of a computer must reside to be processed.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

201. ____ is the policy of allowing only one process to have access to a dedicated resource.

Answer

Correct Answer: Mutual exclusion

Note: This Question is unanswered, help us to find answer for this one

202. ____ is one of the most widely-used versions of linux.

Answer

Correct Answer: Ubuntu

Note: This Question is unanswered, help us to find answer for this one

203. ____ is an open-platform mobile operating system.

Answer

Correct Answer: Android

Note: This Question is unanswered, help us to find answer for this one

204. ____ is a term for software that is run directly from the internet.

Answer

Correct Answer: SaaS (software as a service)

Note: This Question is unanswered, help us to find answer for this one

205. ____ has gained popularity as an open-source operating system.

Answer

Correct Answer: Linux

Note: This Question is unanswered, help us to find answer for this one

206. ____ describes how instances of one entity relate to instances of another entity.

Answer

Correct Answer: Scalability

Note: This Question is unanswered, help us to find answer for this one

207. ____ disks are commonly used with sun solaris systems.

Answer

Correct Answer: SPARC

Note: This Question is unanswered, help us to find answer for this one

208. ____ development is the systematic process of transforming an idea into functional software.

Answer

Correct Answer: Software

Note: This Question is unanswered, help us to find answer for this one

209. ____ can protect against someone accessing your pc via the internet.

Answer

Correct Answer: Firewalls

Note: This Question is unanswered, help us to find answer for this one

210. ____ are software applications that run automated tasks over the internet.

Answer

Correct Answer: Bots

Note: This Question is unanswered, help us to find answer for this one

211. ____ a data item means you override incorrect data by setting the variable to a specific value.

Answer

Correct Answer: Forcing

Note: This Question is unanswered, help us to find answer for this one

212. The ______________ imaging tool produces three proprietary formats:

Answer

Correct Answer: Ilookix

Note: This Question is unanswered, help us to find answer for this one

213. Questionnaires can be used to ask questions that _______.

Answer

Correct Answer: Determine user opinions

Note: This Question is unanswered, help us to find answer for this one

214. Google play is an example of a(n) ______.

Answer

Correct Answer: App Store

Note: This Question is unanswered, help us to find answer for this one

215. Another term for a zombie is a(n) ____.

Answer

Correct Answer: Bot

Note: This Question is unanswered, help us to find answer for this one