CIS 101 Test Review - Chapter 7
Identify the choice that best completes the statement or answers the question.
1. The operating system a computer uses sometimes is called the ____.
a. platform c. kernel
b. driver d. buffer
2. When turning on a computer that has been powered off completely, you are performing a ____.
a. hot boot c. warm boot
b. reboot d. cold boot
3. A(n) ____ computer continues to operate when one of its components fails.
a. fail-safe c. faulty
b. fault-tolerant d. always-on
4. ____ is a concept in which the operating system allocates a portion of a storage medium to function as additional
a. Fault-tolerant memory c. Logical memory
b. Redundant memory d. Virtual memory
5. The operating system technique of swapping items between memory and storage is called ____.
a. paging c. swapping
b. spooling d. thrashing
6. Multiple print jobs line up in a ____ within a buffer as shown in Figure 7-2.
a. queue c. page
b. row d. virtual page
7. Figure 7-3 lists the utilities available in Windows Vista; one of these, a(n) ____, is a utility that allows users to
display, copy, and print the contents of a graphics file.
a. video card c. scanner
b. video driver d. image viewer
8. Linux is ____ software, which means its code is available to the public for use, modification, and redistribution.
a. open source c. proprietary
b. free source d. embedded
9. ____ is a program placed on a computer without the user’s knowledge that secretly collects information about the
a. A virus c. Spyware
b. A worm d. A Trojan horse
10. Compressed files sometimes are called ____ files.
a. zapped c. reduced
b. zipped d. encrypted
11. A(n) ____ is a segment of memory or storage in which items are placed while waiting to be transferred from an
input device or to an output device.
a. index c. nexus
b. kernel d. buffer
12. The operating system on most PDAs and small devices, called a(n) ____ operating system, resides on a ROM chip.
a. symbian c. integrated
b. embedded d. resident
13. A(n) ____ copies itself repeatedly in memory or over a network, using up system resources and possibly shutting
the system down.
a. malex c. worm
b. virus d. Trojan horse
14. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
a. blocker c. stopper
b. driver d. monitor
15. Compressed files sometimes are called ____ files.
a. skipped c. zipped
b. controlled d. defragmented
Indicate whether the statement is true or false.
16. Utility programs like those shown in Figure 7-3 are considered to be application software.
17. Figure 7-3 lists the utilities available in Windows Vista; one of these, a disk scanner, is a utility that removes a
program from system files.
18. On mobile devices, the operating system may reside on a RAM chip.
19. When you purchase application software, the package identifies the required platform.
20. When you install new software you must perform a cold boot.
21. When you are finished using the computer it is acceptable simply to turn it off.
22. In a multitasking environment, many programs run in the foreground, while one program remains in the
23. One drawback of multiprocessing is that it tends to reduce a computer’s processing speed.
24. Virtual memory is faster than RAM.
25. The operating system determines the order in which jobs are processed.
26. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions.
27. Encryption is the process of encoding data and information into an unreadable form.
28. Windows Vista is available in several editions, which are grouped in two general categories: Embedded and
29. Windows CE is designed for use on computing devices with limited functionality.
30. An anti-spam program restricts access to certain material on the Web.