Pay And Download
$15.00
Complete Test Bank With Answers
Sample Questions Posted Below
Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
1. In practice, the difference between system and application software is not always straightforward.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 177
2. When you issue the command for your computer to store a document on your hard drive, the application software must
make sure that the specified hard drive exists.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 178
3. Most operating systems today use a text-based user interface.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 179
4. The Windows Action Manager lists all the program and processes currently running on a computer.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 179
5. As you work on your computer, the operating system continuously manages your computer’s resources and makes them
available to devices and programs when they are needed.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 180
6. Filename rules are the same in all operating systems.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 181
Copyright Cengage Learning. Powered by Cognero. Page 1Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
7. File extensions should not be changed by the user because the operating system uses them to identify the program that
should be used to open the file.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 181
8. Using virtual memory is faster than just using RAM.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 184
9. There are two primary forms of DOS: PC-DOS and MS-DOS.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 188
10. Windows 98 was built from the ground up using a different kernel than the other versions of Windows.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 189
11. Windows Vista replaced Windows XP.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 189
12. Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical
user interface.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 193
Copyright Cengage Learning. Powered by Cognero. Page 2Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
13. Larger computers—such as high-end servers, mainframes, and supercomputers—sometimes use operating systems
designed solely for that type of system.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 198
14. Linux is increasingly being used with both mainframes and supercomputers.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 198
15. There are many stand-alone utility programs available as an alternative to the operating system’s utility programs.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 198-199
16. Stand-alone utility programs are often available in a suite of related programs.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 199
17. Once a file management program is open, you can look at the folders and files stored on your computer.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 199
18. In Windows, users can use the search box located at the lower-left corner of the File Explorer window to search for
files and folders in the current location that match the keywords entered into the search box.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 201
Copyright Cengage Learning. Powered by Cognero. Page 3Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
19. File compression programs reduce the size of files so they take up less storage space on a storage medium or can be
transmitted faster over the Internet.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 203
20. Using the Save As option on the File tab, before editing a document is a good idea, so you can return to the
original version if needed.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 204
21. Application software runs in the background at all times, making it possible for you to use your computer.
_________________________
ANSWER: False – System software
POINTS: 1
REFERENCES: 177
22. In general, the operating system serves as an intermediary between the user and the computer.
_________________________
ANSWER: True
POINTS: 1
REFERENCES: 178
23. Most application systems today look for and recognize new devices each time the computer boots.
_________________________
ANSWER: False – operating systems
POINTS: 1
REFERENCES: 180
24. If a device driver file is deleted, becomes corrupted, or has a conflict with another piece of software, then the device
will no longer work. _________________________
ANSWER: True
POINTS: 1
REFERENCES: 180
25. Folders can contain both files and other folders (called subfolders). _________________________
ANSWER: True
POINTS: 1
REFERENCES: 181
Copyright Cengage Learning. Powered by Cognero. Page 4Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
26. All programs and data located in RAM are divided into fixed-length pages or variable-length files.
_________________________
ANSWER: False – segments
POINTS: 1
REFERENCES: 183-184
27. The documents waiting to be printed are said to be in a(n) print queue, which designates the order the documents will
be printed. _________________________
ANSWER: True
POINTS: 1
REFERENCES: 184
28. The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user
interface. _________________________
ANSWER: False – command line
POINTS: 1
REFERENCES: 185
29. Most operating systems are designed for either 16-bit or 32-bit CPUs. _________________________
ANSWER: False – 64, sixty-four
POINTS: 1
REFERENCES: 186
30. There have been many different versions of Windows over the years. _________________________
ANSWER: True
POINTS: 1
REFERENCES: 188
31. In 1994, Microsoft announced that all versions of Windows after 3.11 would be full-fledged operating systems instead
of just application environments. _________________________
ANSWER: False – operating
POINTS: 1
REFERENCES: 189
32. With File Explorer, use the View tab to specify how the items in the right pane are displayed.
_________________________
ANSWER: True
POINTS: 1
REFERENCES: 199
33. Cleanup programs evaluate your system, looking for problems and making recommendations for fixing any errors that
are discovered. _________________________
ANSWER: False – Diagnostic
POINTS: 1
REFERENCES: 201
Copyright Cengage Learning. Powered by Cognero. Page 5Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
34. Disk management programs diagnose and repair problems related to your hard drive. _________________________
ANSWER: True
POINTS: 1
REFERENCES: 201
35. Uninstall utilities are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary
Internet files, temporary installation files, and so forth) in order to free up disk space. _________________________
ANSWER: False – Cleanup
POINTS: 1
REFERENCES: 203
36. System software is usually divided into two categories: operating systems and ____ programs.
a. planning system b. utility
c. FAT system d. background
ANSWER: b
POINTS: 1
REFERENCES: 177
37. ____ consists of the operating system and utility programs that control your computer and allow you to use it.
a. Background software b. Front-end software
c. Application software d. System software
ANSWER: d
POINTS: 1
REFERENCES: 177
38. ____ includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter.
a. System software b. Utility programs
c. Application software d. Background programs
ANSWER: c
POINTS: 1
REFERENCES: 177
39. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place within the
computer.
a. database system b. storage system
c. application system d. operating system
ANSWER: d
POINTS: 1
REFERENCES: 178
40. The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid
and processed in an orderly fashion.
a. startup b. operating system
Copyright Cengage Learning. Powered by Cognero. Page 6Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
c. driver d. registry
ANSWER: b
POINTS: 1
REFERENCES: 178
41. The means by which an operating system or any other program interacts with the user is called the ____.
a. user login b. programming interface
c. program front-end d. user interface
ANSWER: d
POINTS: 1
REFERENCES: 179
42. Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, portable
storage devices, and keyboards.
a. interfaces b. utilities
c. drivers d. managers
ANSWER: c
POINTS: 1
REFERENCES: 180
43. An important task that the operating system performs is ____, which keeps track of the files stored on a computer so
that they can be retrieved when needed.
a. disk management b. file management
c. file listing d. file recovery
ANSWER: b
POINTS: 1
REFERENCES: 181
44. Filenames typically include a ____ at the end of the filename.
a. file extension c. file subname b. file subscript
d. file attachment
ANSWER: a
POINTS: 1
REFERENCES: 181
45. Most operating systems include security features, such as an integrated ____, to protect against unauthorized access
via the Internet.
a. router b. firewall
c. hub d. modem
ANSWER: b
POINTS: 1
REFERENCES: 182
46. Most operating systems include security features, such as an option to download and install ____ automatically from
Copyright Cengage Learning. Powered by Cognero. Page 7Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
the operating system’s manufacturer on a regular basis.
a. security walls b. device patches
c. security patches d. device drivers
ANSWER: c
POINTS: 1
REFERENCES: 182
47. ____ refers to the ability of an operating system to have more than one program open at one time.
a. Multidimensional b. Multiprogramming
c. Polyprogramming d. Multitasking
ANSWER: d
POINTS: 1
REFERENCES: 182
48. All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on
the operating system being used.
a. pies b. sectors
c. pages d. cylinders
ANSWER: c
POINTS: 1
REFERENCES: 183-184
49. ____ memory allows you to use more memory than is physically available on your computer.
a. Shared b. Virtual
c. Multithreading d. Buffer
ANSWER: b
POINTS: 1
REFERENCES: 184
50. A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the
computer system.
a. segment b. buffer
c. page d. sector
ANSWER: b
POINTS: 1
REFERENCES: 184
51. ____ allow the user to issue commands by selecting icons, buttons, menu items, and other objects—typically with a
mouse, pen, or finger.
a. Graphical user interfaces b. Command line interfaces
c. Desktops d. Command-driven interfaces
ANSWER: a
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 8Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
REFERENCES: 185
52. During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
a. Mac OS b. DOS (Disk Operating System)
c. Linux d. desktop operating system
ANSWER: b
POINTS: 1
REFERENCES: 188
53. In DOS, the command ____ displays the files and folders in the current location.
a. CD b. FORMAT
c. DIR d. COPY
ANSWER: c
POINTS: 1
REFERENCES: 188
54. One of the most obvious initial changes in Windows Vista was the ____ interface.
a. Leopard b. Android
c. Aero d. Symbian
ANSWER: c
POINTS: 1
REFERENCES: 189
55. Windows ____ was released in 2012.
a. Leopard b. 7
c. 8 d. Vista
ANSWER: c
POINTS: 1
REFERENCES: 189
56. The proprietary operating system for Mac computers made by Apple Corporation was ____.
a. Linux b. Solaris
c. Mac OS d. Unix
ANSWER: c
POINTS: 1
REFERENCES: 192
57. ____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange
servers.
a. Linux b. UNIX
c. Solaris d. Mac OS X
ANSWER: b
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 9Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
REFERENCES: 192
58. ____ is one of the most widely-used versions of Linux.
a. Ubuntu b. Chrome
c. Cisco d. Uhuru
ANSWER: a
POINTS: 1
REFERENCES: 193
59. Chrome OS is the first ____.
a. cloud operating system b. high-performance operating system
c. virtual operating system d. storage operating system
ANSWER: a
POINTS: 1
REFERENCES: 194
60. ____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-
readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.
a. Virtual operating systems b. Embedded operating systems
c. High-performance operating systems d. Storage operating systems
ANSWER: b
POINTS: 1
REFERENCES: 194
61. Windows 10 replaces older mobile versions of Windows, including ____ and Windows RT, as well as older embedded
versions of Windows.
a. Windows Phone Dragon c. Windows Phone 8 b. Windows Phone 5
d. Windows Server 2014
ANSWER: c
POINTS: 1
REFERENCES: 196
62. ____ is a Linux-based operating system developed by the Open Handset Alliance.
a. Android b. UNIX
c. Mac OS X d. Vista
ANSWER: a
POINTS: 1
REFERENCES: 196
63. ____ is the most widely used mobile operating system in the United States.
a. Mac OS b. Palm OS
c. Windows Mobile d. Android
ANSWER: d
Copyright Cengage Learning. Powered by Cognero. Page 10Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
POINTS: 1
REFERENCES: 196
64. The file management program incorporated into recent versions of Windows is ____.
a. StuffIt b. WinZip
c. File Explorer d. Disk Cleanup
ANSWER: c
POINTS: 1
REFERENCES: 199
65. To restore a file or folder deleted from your computer’s hard drive, open the ____ and restore the file.
a. Recycle Bin b. Windows Explorer
c. System Restore program d. Recycle Menu
ANSWER: a
POINTS: 1
REFERENCES: 200
66. ____ are utility programs that search for documents and other files on a user’s hard drives.
a. Search tools b. Tool boxes
c. Search engines d. Tool programs
ANSWER: a
POINTS: 1
REFERENCES: 201
67. Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
a. disk defragmentation b. file compression
c. disk backup d. disk cleanup
ANSWER: a
POINTS: 1
REFERENCES: 201
68. Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore
those files using the copy.
a. mirror b. backup
c. index d. hidden file
ANSWER: b
POINTS: 1
REFERENCES: 204
69. A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
a. firewall b. utility program
c. spyware d. computer virus
ANSWER: d
Copyright Cengage Learning. Powered by Cognero. Page 11Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
POINTS: 1
REFERENCES: 205
70. ____ programs can protect against someone accessing your computer via the Internet or a wireless connection.
a. Mirror b. Antispam
c. Firewall d. Modem
ANSWER: c
POINTS: 1
REFERENCES: 205
Case-Based Critical Thinking Questions
Case 5-1
Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different
types of operating systems, she realizes that she uses a number of them in her daily life.
71. All the computers in Janet’s school computer lab have the latest version of Windows installed, which is ____.
a. Windows Vista b. Windows 8
c. Windows XP d. Windows 10
ANSWER: d
POINTS: 1
REFERENCES: 191
TOPICS: Critical Thinking
72. Janet recently purchased a new Apple computer. The operating system of that computer is ____.
a. Windows Vista b. Solaris
c. Windows Embedded d. OS X
ANSWER: d
POINTS: 1
REFERENCES: 192
TOPICS: Critical Thinking
Case-Based Critical Thinking Questions
Case 5-2
Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to
better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs.
73. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works
more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous
locations.
a. disk defragmentation b. file compression
c. disk cleanup d. backup
ANSWER: a
POINTS: 1
REFERENCES: 201
Copyright Cengage Learning. Powered by Cognero. Page 12Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
TOPICS: Critical Thinking
74. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.
a. delete b. uninstall
c. remove d. cleanup
ANSWER: b
POINTS: 1
REFERENCES: 202
TOPICS: Critical Thinking
75. Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data
loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.
a. cleanup b. defragment
c. compress d. backup
ANSWER: d
POINTS: 1
REFERENCES: 204
TOPICS: Critical Thinking
76. One of the principal roles of every ____________________ is to translate user instructions into a form the computer
can understand.
ANSWER: operating system
POINTS: 1
REFERENCES: 179
77. During the boot process, the essential portion, or core, of the operating system (called the ____________________) is
loaded into memory.
ANSWER: kernel
POINTS: 1
REFERENCES: 179
78. Certain system configuration information is stored in the Windows ____________________ files.
ANSWER: registry
POINTS: 1
REFERENCES: 179
79. You may need to update or reinstall some device drivers if you ____________________ your operating system to a
newer version.
ANSWER: upgrade
POINTS: 1
REFERENCES: 180
80. ____________________ routines in the operating system determine the order in which jobs are carried out, as well as
which commands get executed first if the user is working with more than one program at one time or if the computer
supports multiple users.
Copyright Cengage Learning. Powered by Cognero. Page 13Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
ANSWER: Scheduling
POINTS: 1
REFERENCES: 181
81. One memory management technique frequently used by operating systems is ____________________, which uses a
portion of the computer’s hard drive as additional RAM.
ANSWER: virtual memory
POINTS: 1
REFERENCES: 183
82. The process of placing items in a buffer so they can be retrieved by the appropriate device when needed is called
____________________.
ANSWER: spooling
buffering
POINTS: 1
REFERENCES: 184
83. DOS traditionally used a command line interface, although later versions of DOS supported a(n)
____________________ interface.
ANSWER: menu-driven
POINTS: 1
REFERENCES: 188
84. Computers running the Windows operating system can still execute ____________________ commands via the
Command Prompt window.
ANSWER: DOS
POINTS: 1
REFERENCES: 188
85. The new Windows 8 Start screen uses ____________________ to represent apps, folders, Web sites, and more.
ANSWER: tiles
POINTS: 1
REFERENCES: 189-190
86. In Windows 8, the ____________________ bar is displayed by pointing to the upper or lower right corner of the
screen or by swiping in from the right edge of the screen.
ANSWER: charms
POINTS: 1
REFERENCES: 190
87. ____________________ was based on the UNIX operating system and originally set the standard for graphical user
interfaces.
ANSWER: Mac OS
POINTS: 1
REFERENCES: 192
Copyright Cengage Learning. Powered by Cognero. Page 14Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
88. OS X includes the Safari Web browser and a(n) ____________________, which you can use to launch programs and
open frequently used files and folders.
ANSWER: Dock
POINTS: 1
REFERENCES: 192
89. ____________________ is an operating system developed by Linus Torvalds in 1991 when he was a student at the
University of Helsinki in Finland.
ANSWER: Linux
POINTS: 1
REFERENCES: 193
90. Over the years, the number of ____________________ users has grown, and volunteer programmers from all over the
world have collaborated to improve it, sharing their modified code with others over the Internet.
ANSWER: Linux
POINTS: 1
REFERENCES: 193
91. The mobile operating system designed for Apple mobile devices, such as the iPhone and the iPad,
is ____________________.
ANSWER: iOS
POINTS: 1
REFERENCES: 197
92. A(n) ____________________ is a software program that performs a specific task, usually related to managing or
maintaining a computer system.
ANSWER: utility program
POINTS: 1
REFERENCES: 198
93. With Windows File Explorer, to see the folders and files, click the appropriate letter or name for that medium in the
left pane (called the ____________________ pane).
ANSWER: Navigation
POINTS: 1
REFERENCES: 199
94. If a document has been manually or automatically assigned ____________________ tags (information about the file,
such as author, artist, or keywords), some search programs can search by those tags as well.
ANSWER: metadata
POINTS: 1
REFERENCES: 201
95. ____________________ is a software program installed without the user’s knowledge that secretly collects
information and sends it to an outside party via the user’s Internet connection.
Copyright Cengage Learning. Powered by Cognero. Page 15Name
Clas
s:
Dat
e:
:
Chapter 05: System Software
ANSWER: Spyware
POINTS: 1
REFERENCES: 205
96. Describe the functionality of an operating system.
ANSWER: A computer’s operating system is a collection of programs that manage and coordinate the activities
taking place within the computer and it is the most critical piece of software installed on the
computer. The operating system boots the computer, launches application software, and ensures that
all actions requested by a user are valid and processed in an orderly fashion. For example, when you
issue the command for your computer to store a document on your hard drive, the operating system
must perform the following steps: 1) make sure that the specified hard drive exists, 2) verify that there
is adequate space on the hard drive to store the document and then store the document in that location,
and 3) update the hard drive’s directory with the filename and disk location for that file so that the
document can be retrieved again when needed. In addition to managing all of the resources associated
with your local computer, the operating system also facilitates connections to the Internet and other
networks..
POINTS: 1
REFERENCES: 178
TOPICS: Critical Thinking
97. Explain multitasking with reference to an operating system.
ANSWER: Multitasking refers to the ability of an operating system to have more than one program (also called a
task) open at one time. Without the ability to multitask, an operating system would require the user to
close one program before opening another program. Virtually all operating systems today support
multitasking. Although multitasking enables a user to work with multiple programs at one time, a
single CPU core cannot execute more than one task at one time (unless Intel’s Hyper-Threading
Technology or another technology that allows a single core to function as two cores is used).
Consequently, the CPU rotates between processing tasks, but it works so quickly that it appears to the
user that all programs are executing at the same time.
POINTS: 1
REFERENCES: 182
TOPICS: Critical Thinking
98. Explain multithreading.
ANSWER: A thread is a sequence of instructions within a program that is independent of other threads, such as
spell checking, printing, and opening documents in a word processing program. Operating systems
that support multithreading have the ability to rotate between multiple threads (similar to the way
multitasking can rotate between multiple programs) so that processing is completed faster and more
efficiently, even though only one thread is executed by a single core at one time. Most operating
systems support multithreading.
POINTS: 1
REFERENCES: 182
TOPICS: Critical Thinking
99. Compare graphical user interfaces (GUIs) with command line interfaces.
Copyright Cengage Learning. Powered by Cognero. Page 16Name
:
Clas
s:
Dat
e:
Chapter 05: System Software
ANSWER: A user interface is the manner in which an operating system interacts with its users. Most
operating systems today use a graphical user interface (GUI). The older DOS operating system and
some versions of the UNIX and Linux operating systems use a command line interface, although
graphical versions of UNIX and Linux are available. Command line interfaces require users to input
commands using the keyboard; graphical user interfaces allow the user to issue commands by
selecting icons, buttons, menu items, and other graphical objects—typically with a mouse, pen, or
finger.
POINTS: 1
REFERENCES: 185
TOPICS: Critical Thinking
100. What is the purpose of uninstall utilities?
ANSWER: As programs are used, temporary data is often created. When programs are uninstalled (removed from
the hard drive), this data and other remnants of that program can be left behind on the hard drive or in
system files unless an uninstall utility is used. If a user removes programs by deleting the program’s
folder (which is not the recommended method for removing programs), the extraneous data is left
behind, using up valuable disk space and, sometimes, slowing down the computer. Uninstall utilities
remove the programs along with related extraneous data, such as references to those programs in your
system files.
POINTS: 1
REFERENCES: 202
TOPICS: Critical Thinking
Copyright Cengage Learning. Powered by Cognero. Page 17
There are no reviews yet.