 |
1 |  |  The mosimportant software needed for a computer to function efficiently is: |
|  | A) | Application software. |
|  | B) | Utility software. |
|  | C) | Surfing software. |
|  | D) | System software. |
 |
 |
2 |  |  Which one of the following is not an operating system? |
|  | A) | Mac OS. |
|  | B) | Linux. |
|  | C) | Norton. |
|  | D) | Windows XP. |
 |
 |
3 |  |  The three main categories of system software are: |
|  | A) | Operating system, device drivers, and utility software. |
|  | B) | Utilities, devices, and software suites. |
|  | C) | Browsers, device drivers, and applications. |
|  | D) | Spreadsheets, word processing, and database managemensoftware. |
 |
 |
4 |  |  Windows 2000 Pro is an example of a(n): |
|  | A) | Utility software. |
|  | B) | Application software. |
|  | C) | Operating system software. |
|  | D) | Browser software. |
 |
 |
5 |  |  The newest edition to the Microsofoperating system family is: |
|  | A) | Windows 98. |
|  | B) | Windows 2000. |
|  | C) | Windows XP. |
|  | D) | Yukon. |
 |
 |
6 |  |  Microsoft released Windows XP in: |
|  | A) | 2000. |
|  | B) | 2001. |
|  | C) | 2002. |
|  | D) | 2003. |
 |
 |
7 |  |  Mac OS is an operating system for these computers: |
|  | A) | Clones. |
|  | B) | Dells. |
|  | C) | HPs. |
|  | D) | Apples. |
 |
 |
8 |  |  An open-source operating system thaprovides a rich operating environment for mostly high-end workstations and network servers is: |
|  | A) | Linux. |
|  | B) | Mac OS. |
|  | C) | Windows XP. |
|  | D) | Unix. |
 |
 |
9 |  |  Multitasking refers to: |
|  | A) | Displaying HTML code from a Web page. |
|  | B) | Scheduling backup procedures. |
|  | C) | Working with more than one piece of software at a time. |
|  | D) | Using project management software to plan your day. |
 |
 |
10 |  |  Specialized programs designed to enable input and output devices to communicate with your computer system are called: |
|  | A) | Device drivers. |
|  | B) | Utility programs. |
|  | C) | Application drivers. |
|  | D) | Utility drivers. |
 |
 |
11 |  |  New computers are able to recognize expansion cards without requiring a special setup. This ability is referred to moscommonly as: |
|  | A) | Plug and go. |
|  | B) | Plug and start. |
|  | C) | Plug and run. |
|  | D) | Plug and play. |
 |
 |
12 |  |  An operating system feature that allows you: while your computer is running: to unplug a given device and plug in a new one without first shutting down your computer is: |
|  | A) | Warm swap. |
|  | B) | On the fly swap. |
|  | C) | Secure swap. |
|  | D) | Hot swap. |
 |
 |
13 |  |  One of these packages is not a utility software suite: |
|  | A) | Windows 2000. |
|  | B) | McAfee Office. |
|  | C) | Norton SystemWorks. |
|  | D) | Ontrack System. |
 |
 |
14 |  |  This software continually scans your RAM, storage devices, and incoming files for viruses or other damaging programs: |
|  | A) | Disk doctor. |
|  | B) | Anti-virus. |
|  | C) | Virus scanner. |
|  | D) | System software. |
 |
 |
15 |  |  A(n) __________ is hardware and/or software that protects a computer or network from intruders. |
|  | A) | ISP |
|  | B) | NOS |
|  | C) | firewall |
|  | D) | protocol |
 |
 |
16 |  |  This utility program is used to locate and eliminate unnecessary fragments, rearrange files, and free up unused space on your hard disk: |
|  | A) | Organizer program. |
|  | B) | Uninstaller program. |
|  | C) | Defragmentation program. |
|  | D) | Compression program. |
 |
 |
17 |  |  The time between when you ask for a file and when the computer delivers it to you is known as: |
|  | A) | Access speed. |
|  | B) | Locate speed. |
|  | C) | Bus speed. |
|  | D) | BIOS speed. |
 |
 |
18 |  |  What type of software would you use before sending your professor a very large PowerPoinpresentation file? |
|  | A) | Restore program. |
|  | B) | Installer program. |
|  | C) | Setup program. |
|  | D) | File compression program. |
 |
 |
19 |  |  A small text file containing specific information about you that a Web site stores on your computer's hard disk is a: |
|  | A) | Tidbit. |
|  | B) | Tilde. |
|  | C) | Cookie. |
|  | D) | Byte. |
 |
 |
20 |  |  Software designed to cause annoyance but does not damage your files is a: |
|  | A) | Benign virus. |
|  | B) | Malignant virus. |
|  | C) | Cookie virus. |
|  | D) | Compression virus. |
 |