What is a operating system

Assignment Help Operating System
Reference no: EM132111734

Questions: 1. The Operating System is a :

A. System Software
B. Application Software
C. Utility Software
D. Malware

2.  Files are Organized in:

A. RAM
B. Cache
C. Directories
D. None of the above

3. Computer Hardware is: Discuss

A. A medium for Data Communications
B. A Physical Device that driven by data
C. A Physical Device Driven by software
D. All of the Above

4. Two types of Networks are : Discuss

A. WAN and LAN

B. WAN and LAN

C. TAN and CAN

D. All of the above

5. The Window’s Desktop is: Discuss

A. An area that is used for viewing documents
B. An area that organizes your documents
C. An area that gives you quick access to files
D. All of the Above

6. A graphic artist would use:

A. Accounting Software
B. Word Processing Application
C. Graphics Presentation Software
D. Antivirus Software

7. Backing up of computer data is the process of: Discuss

A. Reversing the files stored on the hard drive
B. Putting your computer in the back of the room
C. Storing an extra copy of data on the hard disk
D. Storing an extra copy on an external storage device

8. The process of carrying out a command is called:

A. Fetching
B. Controlling
C. Storing
D. Executing

9. A Database is used to:

A. Store and Organize data in records
B. Store and Organize papers
C. Store and Organize records in files
D. Store and Organize records in fields

10. ABC Super Market has a new inventory system, what type of software is managing it? Discuss

A. Communications Software
B. System Software
C. Accounting Software
D. Database Software

11. Electronic mail is best used to:

A. Send and Receive messages over a network
B. Send and Receive messages via the Internet
C. Send and Receive messages via radio waves.
D. A and B

12. The term Icon refers to:

A. A Picture of symbol that represents a command
B. A Photograph
C. A Leader
D. A Symbol of Power

13. Word Processing and Desktop Publishing are Applications

A. True
B. False

14. What does the “R” in RAM stands for?

A. Rewrite
B. Read
C. Readable
D. Random

15. Which of the following is a multi-user, multi-tasking Operating System?

A. MSDOS
B. Windows 95/98
C. UNIX
D. Utility Software

16. Which one of the following applications is used to manage non-numeric lists?

A. Database Management System
B. Spreadsheet
C. Graphics Software
D. Microsoft Disk Operating System

17. Raw facts such as letters, words and sounds are called:

A. Commands
B. Data
C. User Response
D. Programs

18. The first electronic digital computer was built in the:

A. 1920’s
B. 1940’s
C. 1960's
D. 1970's

19. Modem is short for:

A. Modulation Demolition
B. Modulator Demodulator
C. A and B
D. None of the above

20. The Main directory is otherwise called the _____________?

A. Truck Directory
B. C directory
C. Root Directory
D. LAN Directory

21. Software development is most often done by:

A. Analyst
B. Programmer
C. End User
D. None of the Above

22. C++ is a Programming Language

A. True
B. False

23. DVD stands for ______________

A. Digital video data
B. Direct video
C. Digital versatile disc
D. Direct vertical disc

24. GUI Stands for ____________________

A. Graphical User Interface
B. Greater User Interface
C. Graphical Utility Icon
D. Graphical Utility Interface
 
25. The special formatting language used to create Web Pages is called:

A. HTML
B. COBOL
C. Perl
D. JAVA

26. Skyquest Inc has a large science and research facility. They hope to improve their systems performance and simulations, the types of computers they are using are: I)   Work Stations II) Terminals III) Main Frame IV) Super Computers

A. I and IV
B. II and III
C. I and III
D. I only

27. An example of an Input device is a:

A. Digital camera
B. Plotter
C. Optical Disc
D. Monitor

28. An example of an Output device is a:
A. Scanner
B. Plotter
C. Tapes
D. Software

29. The Stages of Storage are:

A. Primary, Secondary and Tertiary
B. Primary, Secondary, and Memory
C. Primary and Secondary
D. None of the above

30.  The most popular device for computer games is called:

A. Track Ball
B. Touch Screen
C. Glide Pad
D. Joystick

31. Multimedia is similar to Multi-Tasking
A. True
B. False
 
32. A computer Virus is a malicious program that affects the computer

A. True
B. False

33. Which of the following is required to access the internet from a home location? Discuss
A. Access to an Internet node or a service provider
B. Access to a LAN
C. Access to a mainframe computer
D. An Email Address

34. ISP Stands for Internet Service Provider
A. True
B. False

35. The main difference between a super computer and a main frame is

A. Processing speed and memory size
B. Architecture
C. Architecture
D. Number of users
E. All of the above

36. The WWW and the INTERNET are the same thing

A. True
B. False

37. 1024 KB make 1MB

A. True
B. False

38. Diagnosis Software is used to:
A. Monitor activity and health of software
B. Heal the sick
C. Stop Viruses
D. Format a disk

39. The size of the computer’s memory is measured by the number of:
A. Memory Space
B. Bytes
C. RAM
D. ROM

40. In Spread Sheets values, formulas and Labels are stored in :
A. Ranges
B. Functions
C. Labels
D. Cells

41. The keyboard is output Device used to input data to the computer

A. True
B. False

42. In Word Processing to Embolden means:
Discuss
A. To increase the size of the font
B. To Render the font
C. To increase the outline of the font
D. None of the Above

43. Networks are always connected in the same building

A. True
B. False

44. ENIAC stands for:

A. Electronic Networks Integrated Ace Computer
B. Electronic Numerical Integration and Calculation
C. Electronic Numerical Integer And Computing
D. Electronic November Is A Crossing

45. Micro Computers are:

A. Devices that are only seen by a microscope
B. Large and Complex Machines for I/O processing
C. Single user devices used in Small Home Office Environment
D. None of the above

46. A Network is:

A. Series of communication point connected by a nodes
B. A Series of points or nodes interconnected by communication paths
C. Series of nodes connecting paths and interconnections
D. A path on a Series of interconnecting points

47. The WWW is:

A. World Wide Wig of collections
B. World Wide WAN of Computers
C. World Wide Web
D. None of the above

48. A byte is a:

A. Scar that is inflicted by an animal of some kind
B. Single unit of a megabyte
C. Representation of a single character
D. All of the Above

49. When it comes to database Records are:

A. Devices that store music
B. A combination of related fields
C. A storage system
D. None of the above

50. The primary key is software used to open virtual doors

A. True
B. False

51. Which storage device is considered portable?

A. Hard Disk
B. Magnetic Tape
C. Flash Drive
D. ROM

52. A web portal is

A. A website that manage programs
B. A website that find information on other websites
C. A sports website
D. An all in one web resource and communication hub

53. Which of the following is true regarding deleted files in Windows?

A. Once the files have been deleted, there is no scope left for recovering them
B. The last 100 files that have been deleted can be recovered
C. The deleted files are sent to a Recycle Bin
D. None of the Above

54. You are preparing a letter in Notepad and your computer reboots without your saving the file, can you recover what you had written?

A. Yes
B. No

55. Which of the following are extensions of graphics files?

A. .BMP
B. .TXT
C. .DOC
D. .EXE

56. Select the ones you like

A. Option1
B. Option2
C. Option3
D. Option4

Reference no: EM132111734

Questions Cloud

Define trade-offs between internal cohesion and external tie : Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries? What are the trade-offs between internal.
Prepare thorough strategy-formulation analytical framework : Using the theoretical foundations in the units, prepare a thorough Strategy-Formulation Analytical Framework
Improving organizational effectiveness : Involving Employees In Week 4, we begin to examine “interventions,” or planned activities for improving organizational effectiveness.
Evaluating change leadership : Your reading for this week provides overview of process for effectively leading and managing change. Evaluate leadership effectiveness in Sustaining Momentum.
What is a operating system : 1. The Operating System is a : A. System Software B. Application Software C. Utility Software D. Malware
Firm strategies to gain and sustain competitive advantage : Corporate leaders are responsible for setting the firm’s strategies to gain and sustain a competitive advantage.
What might a company do to raise job satisfaction : According to the case, what might a company do to raise job satisfaction and retain employees who are cognitively overqualified?
Critical step in the organizational improvement process : Diagnosis is a critical step in the organizational improvement process. Briefly identify the organizational problem.
Customer relationship management cycle : Describe in detail the 4 components of the Customer Relationship Management (CRM) cycle

Reviews

Write a Review

Operating System Questions & Answers

  Design principles underlying the operating system

Design principles underlying the operating system. Advantages and disadvantages of this operating system including which environments this operating system works best.

  Empirical analysis of an algorithm

Submit a write-up as well as your program. Your write-up should include analysis of performance measure with various parameter values, any known bugs, limitations, and assumptions in your program. This write-up should be in text-format and titled ..

  Problem related to cisc machines versus risc machines

Question 1: Discuss some do's and don'ts related to character translation.  Question 2: Discuss what is meant CISC machines versus RISC machines.

  A queue is a first-in, first-out list

A queue is a first-in, first-out list. The queue has two essential operations: enqueue, which appends an entry to the end of the list (called the tail ) and dequeue, which returns and removes the first entry in the list

  Create a program to implement the selection sort algorithm

Draw the decision tree for the insertion sort algorithm for the following array of names

  Configuration and implementation of a cluster computing

Develop and submit a project plan including implementation steps for the configuration and implementation of a cluster computing solution to support a mission critical application

  Describe the specific security concerns or risks

Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one presents.

  How many reads from harddrive will the original query take

How many reads from the hard drive would the rewritten query take?

  A plug in and a helper application

Discuss similarities and differences between a plug-in and a helper application?

  Computing total pay and net pay

Construct a Unix shell script to input number of hours worked and pay rate and compute the total pay, then the social security amount, then the net pay.

  How could blocking all icmp traffic protect you

How could blocking all ICMP traffic protect you? Could you still access some websites with your Port 80 rule enabled? Why? Why would you want to allow incoming (not outgoing) Port 443, but block incoming Port 80?

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd