CIT-120-CH-05

All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.
Pages
____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer.
System
During the 1980s and the early 1990s, ____ was the dominant operating system for microcomputers.
DOS (Disk Operating System)
The ____ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
Operating System
With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are selected with the mouse to issue commands to the PC.
Graphical User Interface
____ is the most widely used mobile operating system worldwide.
Android
Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
Disk Defragmentation
Andrea tells Dean that it is very important for him to ____ all of his important data on a regular basis to protect against data loss in the case of a problem with the computer, He can also use a backup utility to do this.
Backup
Andrea advises Dean to remove unnecessary programs from his computer by using an ____ utility
Uninstall
In DOS, the command ____ displays the files and folders in the current location.
DIR
Small programs called ____ are used to communicate with peripheral devices, such as monitors printers, and scanners.
Drivers
System software is usually divided into two categories: operating system software and ____ programs.
Utility
____ is a Linux-based operating system developed by the Open Handset Alliance.
Android
The file management program incorporated into Windows 8 is ____.
File Explorer
____ can protect against someone accessing your PC via the internet.
Firewalls
Most operating systems have security features available, such as integrated ____ to protect against unauthorized access via the internet.
Firewall
____ memory allows you to use more memory than is physically available on your computer.
Virtual
A ____ is an area in RAM or on the hard drive designed to hold input and output on their way in or out of the system.
Buffer
____ is one of the most widely-used versions of Linux.
Ubuntu
One of the most obvious initial changes in Windows Vista is the ____ interface.
Aero
The most recent version of Windows is Windows ____.
8
Filenames typically include a ____ at the end of the filename.
File Extension
____ is the proprietary operating system for computers made by the Apple Corporation.
Mac OS
____ are utility programs that search for documents and other files on a user’s hard drives.
Search Tools
The means by which an operating system or any other program interacts with the user is called the ____.
User Interface
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
File Management
____ is the current version of Windows Phone.
Windows Phone 8
Janet has an Apple computer at home. The operating system of that computer is ____.
Mac OS
All the computers in Janet’s school computer lab have the newest version of Windows installed, which is ____.
Windows 8
____ refers to the ability of an operating system to work with more than one program at a time.
Multitasking
To restore the file or folder deleted from your computer’s hard drive, open your computer’s ____ and restore the file to its original location.
Recycle Bin
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ___.
Disk Defragmentation
A ____ is a program that is designed to cause damage to the computer system or perform some other malicious act.
Computer Virus
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system’s manufacturer on a regular basis.
Security Patches
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy.
Backup
____ is a family of operating systems based on Windows that is designed primarily for consumer and industrial devices that are not personal computers.
Windows Embedded
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.
UNIX
In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____.
Embedded Operating Systems
A computer’s ____ is a collection of programs that manage and coordinate the activities taking place within a computer system.
Operating System
____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter.
Application Software