![]()
A) To manage computer hardware and act as an intermediary between the user and the computer. B) To browse the internet faster. C) To create documents and presentations. D) To make phone calls.
A) macOS B) Linux C) Android D) Windows
A) To design websites. B) To provide an interface for hardware devices to communicate with the operating system. C) To play video games. D) To manage email accounts.
A) Windows B) Android C) macOS D) Ubuntu
A) General Usage Indicator B) Great User Interface C) Global User Interaction D) Graphical User Interface
A) To create music playlists. B) To design logos for companies. C) To track the number of steps taken in a day. D) To load the operating system into memory during the boot process.
A) The highest level of access to the operating system, allowing full control over system settings and files. B) Access to tree roots. C) Access to root vegetables. D) Access to plant roots.
A) Using multiple keyboards and mice at the same time. B) Juggling multiple physical objects. C) The ability of an operating system to execute multiple tasks concurrently. D) Downloading multiple files simultaneously.
A) Windows B) Linux C) Chrome OS D) iOS
A) To store photos and videos. B) To keep track of physical exercise routines. C) To manage financial transactions. D) A central database used to store configuration settings and options for the operating system.
A) An online shopping platform. B) A messaging system for computer users. C) An interface provided by the operating system that allows user-level processes to request services from the kernel. D) A customer service hotline for software issues.
A) Outer layer of the operating system. B) A program that interprets commands and allows the user to interact with the operating system. C) Online shopping platform. D) Protective covering for hardware components.
A) To monitor system performance and manage running processes. B) To send emails. C) To play video games. D) To create presentations.
A) Ubuntu B) iOS C) Windows D) Chrome OS
A) OS/360 B) UNIX C) Fortran Monitor System (FMS) D) MINIX
A) UNIX B) System/360 C) MULTICS D) Linux
A) ISO/IEC 27001 B) ANSI C C) POSIX D) IEEE 802.11
A) Apple's Macintosh B) IBM PC C) UNIX D) Microsoft Windows
A) Linux B) BlackBerry OS C) Symbian OS D) VAX/VMS
A) Linux kernel B) UNIX shell C) Bionic C library D) Windows API
A) User input from the keyboard. B) A time slice occurring, requiring a context switch. C) Accessing valid memory addresses. D) The completion of a program's execution.
A) MOV X, Y, where X and Y are registers. B) CALL X, where X is a function identifier. C) JMP X, where X is the jump address. D) INT X, where X is the offset number in hexadecimal format.
A) exec(pid, signum). B) fork(pid, signum). C) wait(pid, signum). D) kill(pid, signum).
A) alpha & bravo. B) alpha | bravo. C) alpha > bravo. D) alpha < bravo.
A) Buffer overflow attacks. B) Cross-site scripting attacks. C) Phishing attacks. D) SQL injection attacks.
A) Virtual private network (VPN). B) Address space layout randomization (ASLR). C) Data encryption standard (DES). D) Secure socket layer (SSL).
A) Linus Torvalds. B) Andrew S. Tanenbaum. C) Bill Gates. D) Steve Jobs.
A) Ubuntu or Fedora B) Syllable or TempleOS C) Android or iOS D) Windows or macOS
A) BSD License B) GNU General Public License (GPL) C) Apache License D) MIT License
A) MacOS networking features B) Standard UNIX networking features C) Android networking features D) Windows networking features
A) Batch processing B) Preemptive multitasking C) Non-preemptive multitasking D) Cooperative multitasking
A) C++ B) Java C) Ruby D) Python
A) Object-oriented design B) Procedural design C) Functional programming D) Imperative programming
A) Security B) Minimalism C) Open-source development D) Redundancy
A) FAT32 B) NTFS C) EXT4 D) HFS+ |