Unit 3 Test Review-OS/Appl. Online version Operating Systems and Application Software Test Review by connie wineland connie 1 What is the difference between a rendering engine and a browser engine? a Back and Forward buttons and a browser engine stores user passwords b User interface interactions and a browsing engine display content on screen c Enables browser to save info & a browser engine handles networking requests d Displays content on screen & a browser engine coordinates user interactions 2 What does data storage enable a browser to do? a organize lists of bookmarks b edit open-source software c organize a hard drive d save browsing information 3 Which of the following best describes open-source web browsers? a Open-source web browsers allow non-paid access and distribution. b Open-source web browsers do not include bookmarking features. c Open-source web browsers include browsers such as Internet Explorer & Opera d Open-source web browsers have rendering engines but not browsing engines. 4 Which of the following is an open-source web browser? a Firefox b Opera c Internet Explorer d Telnet 5 Examine info. in URL: http://www.example/home/index.html, what is the subdomain and what is the domain name? a The subdomain is http:// and the domain name is .html. b The subdomain is /home/ and the domain name is http://. c The subdomain is www and the domain name is example.com. d The subdomain is example.com and the domain name is www. 6 What is telnet? a internet protocol that allows one to access newsgroups b internet protocol that is the foundation for online data communication c internet protocol that connects to a computer remotely d internet protocol that loads a local file from a network onto a computer 7 What does the Internet Engineering Task Force (IEFT) do? a changes the code in open-source web browsers b standardizes Universal Resource Locators (URLs) c makes all Universal Resource Locators (URLs) human-readable d creates methods of moving files between computers and networks 8 Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand? a creating a URL with a long, descriptive domain name b creating a URL that can be rendered using file transfer protocol c creating a URL that represents data in strings of numbers d creating a human-readable URL 9 What allows a person to interact with web browser software? a user interface b file transfer protocol c networking d URLs 10 Icon view, list view, and details view are all common views provided by which kind of program? a a web browser to view web pages b a word processor to view headings c a file browser to view folders d a file manager to view files and folders 11 When you cut and then paste a file, what are you doing? a copying it and placing a duplicate in another location b compressing it and placing the compressed version in another location c renaming it, and then saving it with the new file name d removing it from its current location and placing it in another 12 What best describes the purpose of the Recycle Bin (Microsoft Windows) and Trash (Apple Mac) features? a to make more room for new files or folders on a storage device b to enable users to recover accidentally deleted files and folders c to scramble file content to make files unreadable d to clean out a folder so that it can be reused multiple times 13 Which of the following best describes a computer virus? a another name for a software bug b the product of a computer crash c software that can spread itself d software errors caused by power surges 14 Which of the following is a system management tool? a an event viewer b a firewall c antivirus software d a spam filter 15 The Event Viewer (Microsoft Windows) or Console (Apple Mac OS X) is used for what purpose? a to view and manage events scheduled in one or more user calendars b to configure system security features ie: firewalls & antivirus scanners c to view incidents recorded in the Application, Security, and System logs d to manage user names and passwords on a network 16 A deleted file or folder is not permanently deleted from a computer until which event occurs? a The computer is restarted. b The Recycle Bin or Trash is emptied. c The person who deleted it logs off. d The Event Viewer is cleared. 17 A nested folder can best be described as what? a a folder that is empty b a folder that contains more than one file c a folder contained within another folder d a folder that contains exactly one file 18 A file name extension provides what information about a file? a the file format b the file length c the file permissions d the file creation date 19 Which description of the plain text file format is most accurate? a uses binary code to store data b can only be opened with special software c supports text formatting like bold or italics d used by programmers for source code 20 What best describes proprietary file format? a A format that is closed but free of cost. b A format that is considered a trade secret. c A format that is not bound by copyright law. d A format that is open and free of cost. 21 What is the name of the top-level parentless folder in a digital file system? a root b tree c child d subfolder e root f tree 22 A linear representation of a hierarchical file directory is known as what? a a file list b a directory path c a subdirectory d a file association 23 A folder has been shared with other users and set to read-only. What does this mean for users? a Users can only read the name of the shared folder. b Users cannot add new folders or files. c Users can read and edit files. d Users can add new files but not new folders. 24 In what year were graphical user interfaces (GUIs) pioneered? a 1969 b 1974 c 1991 d 2001 25 What statement best describes operating systems? a It’s possible for modern computers to function without operating systems. b Most operating systems are free or very inexpensive. c Operating systems are managed by the computer’s microprocessor (CPU). d Operating systems manage the computer’s random access memory (RAM). 26 What does the shell of an operating system do? a changes the operating system so that it can be installed on smartphones b generates a printed list of the inputs and outputs of the OS c creates files and sets up a system so files are managed efficiently d provides a user interface that enables users to interact with the OS 27 Who designed the Apple I computer in 1976? a Steve Wozniak b Richard Stallman c Allen Konrad d Paul Zuse 28 What statement best describes the difference between Apple OS X and Linux-Based operating systems? a Apple OS X work variety of hardware & Linux-Based OS don't work everything b Apple OS X only work on Apple hardware & Linux-Based OS work most hardware c Apple OS X has fewer applications available than Linux-Based operating syst d Apple OS X is free or inexpensive and Linux-Based operating systems are very expensive. 29 If you want a smartphone with the fewest restrictions on application development, which smartphone OS should you choose? a IBM b Android c Apple iOS d Windows 30 What statement best describes Konrad Zuse? a He developed the first graphical user interface. b He created a method of designing smartphone applications. c He founded Microsoft with Paul Allen. d He developed the first electrically-powered computer. 31 During which phase of the software development process are developers most likely to log bugs? a requirements specifications b maintenance c evaluation d development 32 What do developers do to support software products? a explain which development process model was used to make the product b write an explanation of how the product functions and meets the requirement c revise product’s specification document so that it’s updated and accurate d update software code to fix bugs, improve functionality, and & new features 33 What software development model focuses on improving the product in small steps each time through the cycle? a agile process model b waterfall process model c iterative process model d spiral process model 34 Why is it important for software developers to study Human-Computer Interaction? a user interface easy to use, increases the value of software application b reduce # of software applications on a computer so the computer runs slow c no need for a mouse or keyboard in order to use the software application d users notice any bugs in the software application that need to be fixed 35 When does a kernel panic occur? a when the incorrect serial number is entered during software installation b when Dynamic-Ling Library (DLL) files are missing or damaged c when there are too many applications running on a computer at the same time d when an operating system finds a fatal error that it cannot safely recover 36 If your computer is running slowly, which of the following is most likely to solve the problem? a Scanning, cleaning, and optimizing your hard drive b Checking to make sure all of the computer’s cords are plugged in c Reentering the serial #s of the software programs the computer is running d Searching the hard drive for missing DLL files 37 Which of the following is the best example of an installation issue? a A computer can’t find the file that it needs to perform an OS function b A computer displays error messages, & then the Blue Screen of Death appears c A user made an error while trying to set up a software program. d A software program is not compatible with the computer’s OS. 38 Which of the following is an advantage of using proprietary licensed software? a The software’s source code can be easily modified. b The software is free for anyone who wants to use it. c The software is usually polished and has fewer bugs. d The software can be installed on unlimited computers. 39 Which of the following is an advantage of using proprietary licensed software? a The software’s source code can be easily modified. b The software is free for anyone who wants to use it. c The software is usually polished and has fewer bugs. d The software can be installed on unlimited computers. 40 Why do software developers prefer to use high-level language to author programs? a It can be used on computers without microprocessors. b It prevents anyone from making changes to the software later. c It uses a more English-like syntax. d It’s less complicated because it only uses zeros and ones. 41 Which of the following are examples of system software? a device drivers and system security utilities b operating systems and Web browsers c word processing programs and device drivers d disk drive utilities and email programs 42 Emails by Jim’s office is sending emails with viruses attached to user’s computers. What should Jim do? a Downgrade the email software to an older, previous version b Buy a newer email program and migrate the office computers to that program c Switch from open source software to proprietary software d Check for and install patches or software updates 43 What is the purpose of an End User License Agreement? a to ensure that software users understand their rights and responsibilities b ensure that software users understand how to use and install the program c require users to erase installer files after a software migration project d to license users to make multiple changes to proprietary software 44 What is the purpose of system software? a perform specific computing tasks, ie,word processing and calculation b provide basic operational functionality by coordinating hardware components c perform operations inside a web browser in many different OS d translate high-level software programming into machine language as is run