download instant at www.easysemester.com

Student Name: ______

Instructors erase this line and the asterisks in front of each correct answer before giving an exam to students.

The following Test contains 50 items of the multiple-choice type. Read each of the following problems and select the response that best completes the sentence, or answers the question. Write the letter of your selected choice on the answer form provided by your teacher.

1. In UNIX/Linux terminology, the command line interface is called:

a. Firmware

*b. shell

c. GUI

d. instruction set

(p. 38)

2. The major classifications of user interfaces are:

a.  Low-level and high-level

*b. CLI and GUI

c. complied and interpreted

d.  Assembly and COBOL

(p. 38)

3. The area on the screen where the user interacts with the operating system is:

a. the briefcase

b. the recycle bin

* c. the desktop

d. the laptop

(p. 40)

4. The horizontal bar across the top of a GUI window is called:

a.  mnemonic

b.  desktop

* c. Title bar

d.  Minimize bar

(p. 40)

5. What are the buttons located in the upper right hand corner of the Title Bar?

a. Minimize, Maximize and Exit.

b. Maximize, Save As and Exit

* c. Minimize, Maximize and Close.

d.  Small, Medium and Large

(p. 40)

6. In Microsoft Windows-based operating systems, you install and uninstall programs using:

a.  Common User Access

b.  the printer API

c. rpm

* d. Add/Remove Programs

(p. 43)

7. A process is given a reference called the ______.

a. ALU

b. CUA

* c. PID

c.  API

(p. 43)

8. A Dynamic Link Library is

a.  where files are checked out by users.

b.  called the rpm package on Linux.

c. used by the operating system to reference the process.

* d. an executable file that contains smaller programs, called functions, and data.

(p. 43)

9. A process is comprised of many ______.

* a. threads

b. instruction sets

c.  DLLs

d.  APIs

(p. 45)

10. The command to fix the Master Boot Record should it become corrupt is:

a.  dir

* b. fdisk /mbr

b.  mem

d. part /mbr

(p. 47)

11. In DOS you use ______to create partitions.

a.  Windows 98

b.  MBR

c. dir

* d. fdisk

(p. 47)

12. Formatting a partition is:

* a. the process of preparing the disk for use.

b. called the rpm package on Linux.

c. used by the operating system to reference the process.

d. an executable file that contains smaller programs, called functions, and data.

(p. 46)

13. The file system:

a. the process of preparing the disk for use.

* b. defines how the files and folders are stored on disk.

c. used by the operating system to reference the process.

d. an executable file that contains smaller programs, called functions, and data.

(p. 46)

14. Where is the operating system loaded?

a.  Logical partition named F:

b.  Database partition

c.  System partition

* d. Boot partition

(p. 47)

15. Tracks are:

* a. concentric circles on disk.

b. called the rpm package on Linux.

c. sections of the disk.

d. an executable file that contains smaller programs, called functions, and data.

(p. 48)

16. Sectors are:

a. concentric circles on disk.

b. called the rpm package on Linux.

* c. sections of the disk.

d. an executable file that contains smaller programs, called functions, and data.

(p.48)

17. A file:

* a. is the lowest unit of storage within the file system.

b.  can store other files.

c.  can store directories.

d.  cannot store data.

(p. 49)

18. A folder:

a. is the lowest unit of storage within the file system.

* b. can contain other folders or files.

c. is not synonymous with the term directory.

d. cannot store files.

(p. 49)

19. When storing a file, if the file does not take up a complete cluster, the remaining unoccupied space in the cluster is:

a. is deleted from the FAT.

b.  available for use by another file.

* c. considered waste.

d. where a copy of the file system is stored for backup purposes.

(p. 48 - 49)

20. In DOS, the top of the file system hierarchy is:

a.  /

* b. \

c.  C:

d. stored in the unoccupied space in a cluster.

(p. 50)

21. In UNIX/Linux, the top of the file system hierarchy is:

* a. /

b. \

a.  C:

d. stored in the unoccupied space in a cluster.

(p. 50)

22. In DOS, file names follow:

a.  ASCII rules.

b.  no naming convention rules.

* c. the 8.3 rule.

d. the 1,024 letter rule.

(p. 52)

23. A file or folder’s path is:

* a. the location of the file, or directory.

. b. concentric circles on disk.

c. contiguous on the tape storage unit.

d. nonexistent.

(p. 54)

24. The FAT is ______for speedy access

* a. cached in memory

. b. deleted from memory

c. noncontiguous on disk

d. stored on disk

(p. 55)

25. ______is analogous to “The End” in a movie.

a.  CLI

b.  GUI

* c. EOF

a.  CUA

(p. 55)

26. A file not located in contiguous clusters is considered to be:

a. hierarchical

b. cluster-challenged

* c. fragmented

d. fault tolerant

(p. 57)

27. A fragmented file is one:

* a. that is physically spread over non-contiguous areas of the disk.

b. that is not physically spread over non-contiguous areas of the disk.

c. complied or interpreted.

e.  that is actually split into three fragments.

(p. 57)

28. The process of placing a file into contiguous areas of a disk is called:

a. fragmenting

b. compiling

* c. defragmenting

d. deconverting

(p. 58)

29. Which of the file system formats came out with Windows 95 and supports file names longer than 8.3?

a. MFT

b.  FAT12

* c. VFAT

e.  FAT32

(p. 59)

30. In FAT16, the backup copy of the FAT is used for ______.

a. compression

* b. fault tolerance

c. partitioning

e.  encryption

(p. 59)

31. Which of the following beneficial features are provided by NTFS?

d.  CUA, GUI, API and the ext2 file system

e.  disk quotas, compression and fragmentation

c. Add/Remove Programs and fragmentation

* d. disk quotas, compression and encryption

(p. 59)

32. Which of the following file system formats are used on floppies?

a. ext3

b. FAT16

* c. FAT12

d. NFS

(p. 59 - 60)

33. NTFS uses a ______to access files and folders.

e.  CUA

* b. MFT

c. ALU

d. API

(p. 60)

34. With ______, physical disk locations that are bad are marked and will not use them in the future.

* a. bad-cluster remapping

b. auditing

f.  threads

g.  PIDs

(p. 60)

35. The Microsoft tool to fix a corrupt file system is:

c.  dir

* b. scandisk

d.  fdisk

d. fsck

(p. 61)

36. The UNIX/Linux command to fix a corrupt file system is:

a. dir

b. scandisk

e.  fdisk

* d. fsck

(p. 61)

37. The BIOS is:

* a. a set of instructions permanently stored on a chip that directs basic input and output operations.

b. a set of instructions temporarily stored in RAM that directs basic input and output operations

c. used by the operating system to reference the process.

d. an executable file that contains smaller programs, called functions, and data.

(p. 62)

38. Firmware is:

a. the process of preparing the disk for use.

* b. a set of instructions permanently stored on ROM.

c. a set of instructions permanently stored on RAM.

d. an executable file that contains smaller programs, called functions, and data.

(p. 62)

39. Hardware devices connect to the computer through ______located inside the computer.

d.  sectors

e.  threads

f.  cells

* d. expansion slots

(p. 62)

40. PnP is:

* a. a standard allowing the computer to automatically detect and configure an installed hardware device.

b. a standard allowing the computer to manually detect and configure an installed hardware device.

c. synonymous with a directory.

d. an executable file that contains smaller programs, called functions, and data.

(p. 64)

41. System resources are:

a. concentric circles on disk.

b. a set of instructions permanently stored on ROM.

* c. features that control how devices on the computer work.

d. a set of standards allowing the computer to automatically detect and configure an installed hardware device

(p. 64)

42. An IRQ is the process of

* a. a signal is sent by a device to the processor when it needs attention.

e.  a signal is sent directly by a user to the processor when it needs attention.

f.  data is being fragmented and encrypted.

g.  data being converted from ASCII to bits.

(p. 65)

43. A ______occurs when an interrupt is requested by a device, such as a printer.

a. software interrupt

* b. hardware interrupt

c. thread

d. GPF

(p. 65)

44. A ______occurs when application software requests use of a device.

* a. software interrupt

b. hardware interrupt

c. thread

d. GPF

(p. 65)

45. The operating system kernel is:

b.  the core of any operating system and it occupies memory as long as the computer remains off.

b. the process of preparing the disk for use.

c. a set of instructions permanently stored on ROM.

* d. the core of any operating system and it occupies memory as long as the computer remains on.

(p. 69)

46. On Windows 2000, you use the ______command to edit the Registry.

* a. regedt32

b. regedit32

b.  fdisk

d. reg

(p. 69)

47. The page file is:

a. a section of the floppy disk used for virtual memory.

b. a section of the hard disk used for printer memory.

* c. a section of the hard disk used for virtual memory.

d. a thread of data.

(p. 71)

48. A task is:

* a. a program that is running.

b. a set of concentric circles on disk.

c. is a contiguous area of storage on disk or tape.

d. analogous to a directory.

(p. 71)

49. Identify one feature of real mode:

* a. direct access to hardware

b. no direct access to hardware

c. supports multiple applications running concurrently

d. the failure of a single application won’t cause the whole system to fail.

(p. 71)

50. Identify one feature of protected mode:

a. direct access to hardware

* b. no direct access to hardware

c. supports single-tasking only

d. the failure of a single application will cause the whole system to fail.

(p. 71)

download instant at www.easysemester.com