Operating systems and application unit test ********
The popularity of the graphical user interface (GUI) on personal computers was spurred by the release of which computer:
Apple Macintosh
Which of the following are common file naming conventions? Check all of the boxes that apply.
Avoid characters that have special meaning to operating systems. Use descriptive and concise file names.
Which of the following is an example of a directory path? Check all of the boxes that apply.
C:\user\docs\summary.doc /home/user/docs/summary.doc
What can become lost or damaged on a computer and prevent it from working correctly?
DLL Files
Which of the following are best practices for managing files? Check all of the boxes that apply.
Follow file naming conventions. Keep file names brief and meaningful. Set file access permissions.
Choose all of the items that represent operating systems largely derived from UNIX.
GNU/Linux Mac OS X BSD
Which of the following represent advantages of GPL-licensed software? Check all of the boxes that apply
It allows the source code to be modified. It can be redistributed by the user.
Which of the following is an advantage to using plain text format? Check all of the boxes that apply.
It is easily read by most software and hardware because it requires little processing. It can be used by programmers for source code files.
Which of the following is most often a barrier to software migration?
It's usually cheaper to upgrade software than it is to purchase a new product.
Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques
Keep reinstallation operating system software Avoid using questionable software. Protect the system with a password. Keep food and beverages away from the computer. Use spam protection.
The early success of Microsoft was cemented by the release of which software product:
MS-DOS for the IBM PC
What statement best describes the Microsoft Windows operating system?
Microsoft Windows is a relatively secure operating system.
For each of the following file extensions, select the correct file association from the drop-down menu. .doc .iBooks .msg .psd
Microsoft word Apple Ibooks Microsoft Outlook Adobe Photoshop
Which of the following are examples of binary format files? Check all of the boxes that apply.
PDF files word files
What is the correct order of the phases of the software development process?
Requirements specification, design, development, evaluation, maintenance
What operating system is a smartphone most likely to use?
Symbian
Which careers use web browsers?
Teacher Computer programmer Mechanic Cosmetologist Park ranger (all)
What development in operating systems happened between the years 1990 and 2000?
The Linux operating system was released.
Which of the following statements is true of directory paths?
They are linear representations of a hierarchical file directory.
Which of the following represent features of high-level programming languages? Check all of the boxes that apply.
They are used to author most software today. They use friendly English-like languages. They are compiled or interpreted into machine language.
Why should characters such as / \ " ' * ; - ? [ ] ( ) ~ ! $ { } < > # @ & | space, tab, and newline be avoided in file names?
They may have special meaning to the operating system.
Which of the following is a disadvantage of using open source software?
Training and help files may be harder to find.
Which of the following do web browsers offer?
URLs to find resources on the Internet rendering of web pages toolbar
Which of the following are best practices for managing folders? Check all of the boxes that apply.
Use a consistent naming scheme. Take advantage of the hierarchical structure of the file system. Set folder access permissions.
A computer program that enables users to create and work with files and folders is called what?
a file manager
What do users make use of to interact with graphical icons and other visual elements in order to accomplish tasks?
a graphical user interface
A disadvantage to using open source software is
a higher level of technical skill may be required to install, use, or modify it.
A software update is also referred to as what?
a path
What is a patch?
a software update that contains fixes for bugs or security issues
URLs are the global URLs are the global _______ of resources on the Internet.
addressees
You prefer to use Google products such as Gmail and the Google+ social networking site. Which of the following smartphone operating systems would have the best feature integration for you?
android
____helps users accomplish tasks.
application software
Compared with other PC operating systems, the Linux-based operating systems:
are free or very inexpensive.
For each of the following file extensions, select the correct file format from the drop-down menu. .avi .rtf .pdf .txt
audio video interleave rich text format portable document format plain text
What is the best way to protect against the loss of important files?
backup files
Computer files have names that consist of which two parts?
base file name and file name extension
If you wanted to keep track of your favorite links and your logins for certain web pages, which two web browser features are you most likely to use?
bookmarking and password manager
Any issues with the software are logged as _____ to be resolved by developers.
bugs
Errors, flaws, mistakes, failures, or problems in a software program are called
bugs
Which of the following are examples of security threats? Select all of the boxes that apply.
bugs power surges theft of hardware
Software licensed using the Open Software Initiative (OSI) definition
can be modified and re-licensed as proprietary software.
An open file format
can free or proprietary
Compared with other PC operating systems, the Microsoft Windows operating systems:
can run on a variety of hardware.
Which of the following is another term for a subfolder?
child folder
What are some reasons that system management tools are used? Check all of the boxes that apply.
copy files view events find out more about security events manage shared folders find software, hardware, and system problems
The operation of early electronic computing devices required:
customer-produced helper program libraries.
What can file managers be used for? Check all of the boxes that apply
delete files view files manipulate files create folders
If you want to see the most information about a file, you can view them in
details view
URL structure is: Protocol + Domain Name +
directory path
Software licensed as proprietary
does not permit source code changes.
URLs are to web browsers what postal addresses are to
envelopes
The manipulation of data files on a computer using a file browser is
file management
A _______ is a computer program that allows a user to manipulate files.
file manager
A _____ format is not bound by copyrights, trademarks, patents, or restrictions.
free
What are the two parts of the platform used to run application software?
hardware and operating system
What is the name of the discipline concerned with the design of optimal user interfaces?
human-computer interaction
Which of the following represent features of free software licensing? Check all of the boxes that apply.
is concerned with defending users' freedom of use makes source code available for editing
A closed file format
is unpublished
What are software applications?
lines of code that were written by developers
Choose all of the devices where an operating system can be found.
mainframe and desktop computers smartphones embedded devices controlling robots
Choose all of the items that represent functions of an operating system.
manages peripheral hardware devices runs software applications manages user accounts and passwords manages network connections generates system error messages
Early electronic computing devices were:
manpower intensive.
Which of the following represent emerging classes of application software? Check all of the boxes that apply.
medical robotics machine translation mobile phone apps
Choose all of the items that represent functions of the operating system kernel.
memory management process management system input and output (I/O) management file creation and management
A file manager can help you
move a file
What changes to software are usually included in version upgrades?
new features
Which of the following are examples of software? Check all of the boxes that apply.
operating system web browser word processor device driver the clipboard
Which of the following best describes application software?
performs useful tasks like word processing for the user
A ______ format is considered to be intellectual property, which means it is owned by an individual or organization.
proprietary
What do Dynamic-Link Library (DLL) files do?
provide operating systems with information about performing specific computing functions
In Windows, deleted files go to the
recycle bin
Which of the following best defines software migration?
replacing one software product with a product from another vendor
_____ ensures that a software product meets customer needs.
requirements gathering and analysis
The first phase of software development process is
requirements speculations
Which of the following is the term for the topmost folder in a directory?
root folder
A _______ is anything that puts computer information at risk.
security threat
What happens during the software requirements specification phase? (choose all that apply)
software application results are analyzed and documented software applications are researched
____ means the process of setting up an application and selecting specific options.
software configuration
During the, _______ development teams transform the requirements into a software application design.
software design phase
During the, _____ the software design is implemented by developers in code.
software development phase
In the, _______ software is evaluated for quality.
software evaluation phase
Software that is maintained by developers is said to be
supported
What type of software can you run to help fix computer problems?
system software repair
Which of the following types of content are often saved in a binary format? Check all of the boxes that apply.
text images voice video
Which of the following should you consider when choosing a file format? Check all of the boxes that apply.
the need for future access the need for digital preservation
One disadvantage of using proprietary licensed software is that
the software company may decide to discontinue support for the product.
What does a file association specify?
the software needed to open a file
Software programs that can spread from one computer to another are called
viruses
A software program that enables you to search for, interact with, and retrieve information resources. A method by which data is transferred from one computer to another through the Internet. Coordinates actions between the user interface and the rendering engine. Handles requests for information resources from networked servers. Includes webpages, images, videos, music files, and other forms of content. Enables a browser to save browsing information. Includes an address bar, Back and Forward buttons, bookmarking menu, and other useful features. Displays content on the screen.
web browser internet protocol browser engine networking information resources data storage user interface rendering engine
Check the URLs that are human readable.
www.edgenuity.com http://www.google.com