keywords:
Bookmark and Share



Front Back
T/F: The input-output control sytem incorporates routines that allow the user or programmer to create, delete, modify, and manipulate files by name.
FALSE
The __________ provides a mechanism for the user and application programs to communicate with the operating system and request operating system support.
User interface
Memory management is concerned with __________. (3 things)
Managing the system's memory resources as the computer runs, Allocating space to applications as needed, Ensuring that applications do not interfere with each other
T/F: The device management function is responsible for controlling communications with the system's peripheral devices.
TRUE
T/F: It is much easier to add and subtract roman numerals (I, II, V, X, etc) than arabic numerals (1, 2, 3, etc).  However, we use arabic numbers because it is much easier to do logarithms and advanced math.
FALSE
T/F: A batch file is a file of pre-coded MS-DOS commands.
TRUE
T/F: You can assign any file name to a batch file but the extension must be .EXE.
FALSE
The operating system's job is:
to manage the computer system's resources as efficiently as possible.
Throughput is typically defined as:
total execution time (for all programs) divided by total elapsed time.
Turnaround is typically defined as:
the elapsed time between job submission and job completion
Response time is typically defined as:
the elapsed time between a request for the computer's attention and the computer's response.
T/F: Security is the probability that a system will perform as expected for a specified period of time.
FALSE
Generally the more programs in memory, ________ of the processor.
the greater the utilization
The simplest approach to managing memory for multiple concurrent programs, ________, divides the available space into fixed‑length partitions each of which holds one program (4 words)
Fixed-partition memory management
T/F: The external paging device is usually RAM.
FALSE
With segmentation, programs are divided into independently addressed segments and stored in __________ memory.
Noncontiguous
On a segmented system the dynamically expanded address consists of __________.
A segment number, and
A displacement.
If a program attempts to modify (or sometimes even to read) the contents of memory locations that do not belong to it, the operating system's __________ routine intervenes and (usually) terminates the program.
Memory protection
____ protects your computer from viruses and spyware that may attempt to steal your password.
Secure Logon
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.
Fast user switching
Holding down the ____ key during the boot process stops the automatic logon from occurring.
Shift
The ____ account is the most powerful local user account possible.
Administrator
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.
Guest
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.
Everyone
Members of the ____ group can back up and restore all files and folders on the computer.
Backup Operators
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.
Performance Log Users
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.
Performance Monitor Users
An administrator account derives its privileges from being a member of the local ____ group.
Administrators
The ____ applet in Control Panel is a simplified interface for user management.
User Accounts
The ____ profile is used when new user profiles are created.
Default
In Windows 7, the default profile is configured using ____.
Sysprep
T/F: The most critical effect of malware is degraded system performance.
FALSE
it is the least critical effect.

The most commonly used method for authentication is:
a username and password.
NTFS permissions can be easily circumvented when:
you have physical access to a computer.
T/F: In Windows 7, advanced audit policies can only be edited at a command-line.
FALSE
T/F: Every object in Windows 7 has audit events related to it.
TRUE
____ is a threat to privacy and often makes systems unstable.
Spyware or Viruses, Adware, Malware, Worms, etc.
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.
Unhealthy, or Unsafe
While ____ is a great source of information, it is also the biggest source of malware (malicious software).
the Internet
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.
Spyware (specifically)
The most basic level of data security in Windows 7 is ____ permissions.
NTFS
____ is the process of taking data and making it unreadable
Encryption
____ is the process of taking data that is unreadable and making it readable again.
Decryption
A(n) ____ encryption algorithm uses the same key to encrypt and decrypt data.
Symmetric
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.
Asymmetric
A(n) ____ encryption algorithm is a one-way encryption, which means that it encrypts data, but the data cannot be decrypted.
Hash
T/F: The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
TRUE
T/F: Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
FALSE
T/F: DOS was designed as a multitasking operating system.
FALSE
T/F: Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
TRUE
x of y cards Next >|