A) To browse the internet faster. B) To manage computer hardware and act as an intermediary between the user and the computer. C) To make phone calls. D) To create documents and presentations.
A) macOS B) Linux C) Windows D) Android
A) To manage email accounts. B) To design websites. C) To play video games. D) To provide an interface for hardware devices to communicate with the operating system.
A) Windows B) Android C) macOS D) Ubuntu
A) Graphical User Interface B) Global User Interaction C) General Usage Indicator D) Great User Interface
A) To design logos for companies. B) To create music playlists. C) To track the number of steps taken in a day. D) To load the operating system into memory during the boot process.
A) The highest level of access to the operating system, allowing full control over system settings and files. B) Access to plant roots. C) Access to tree roots. D) Access to root vegetables.
A) Juggling multiple physical objects. B) Downloading multiple files simultaneously. C) Using multiple keyboards and mice at the same time. D) The ability of an operating system to execute multiple tasks concurrently.
A) Windows B) Chrome OS C) Linux D) iOS
A) A central database used to store configuration settings and options for the operating system. B) To store photos and videos. C) To keep track of physical exercise routines. D) To manage financial transactions.
A) An online shopping platform. B) A messaging system for computer users. C) An interface provided by the operating system that allows user-level processes to request services from the kernel. D) A customer service hotline for software issues.
A) Online shopping platform. B) Outer layer of the operating system. C) A program that interprets commands and allows the user to interact with the operating system. D) Protective covering for hardware components.
A) To send emails. B) To create presentations. C) To monitor system performance and manage running processes. D) To play video games.
A) Chrome OS B) Windows C) iOS D) Ubuntu
A) UNIX B) MINIX C) Fortran Monitor System (FMS) D) OS/360
A) MULTICS B) System/360 C) UNIX D) Linux
A) IEEE 802.11 B) POSIX C) ISO/IEC 27001 D) ANSI C
A) Microsoft Windows B) UNIX C) Apple's Macintosh D) IBM PC
A) Symbian OS B) VAX/VMS C) Linux D) BlackBerry OS
A) Linux kernel B) Windows API C) UNIX shell D) Bionic C library
A) Accessing valid memory addresses. B) A time slice occurring, requiring a context switch. C) User input from the keyboard. D) The completion of a program's execution.
A) JMP X, where X is the jump address. B) CALL X, where X is a function identifier. C) MOV X, Y, where X and Y are registers. D) INT X, where X is the offset number in hexadecimal format.
A) exec(pid, signum). B) kill(pid, signum). C) wait(pid, signum). D) fork(pid, signum).
A) alpha | bravo. B) alpha > bravo. C) alpha & bravo. D) alpha < bravo.
A) Cross-site scripting attacks. B) SQL injection attacks. C) Buffer overflow attacks. D) Phishing attacks.
A) Address space layout randomization (ASLR). B) Secure socket layer (SSL). C) Data encryption standard (DES). D) Virtual private network (VPN).
A) Andrew S. Tanenbaum. B) Linus Torvalds. C) Bill Gates. D) Steve Jobs.
A) Ubuntu or Fedora B) Android or iOS C) Syllable or TempleOS D) Windows or macOS
A) Apache License B) GNU General Public License (GPL) C) BSD License D) MIT License
A) Standard UNIX networking features B) Android networking features C) Windows networking features D) MacOS networking features
A) Batch processing B) Cooperative multitasking C) Non-preemptive multitasking D) Preemptive multitasking
A) C++ B) Ruby C) Python D) Java
A) Object-oriented design B) Procedural design C) Imperative programming D) Functional programming
A) Open-source development B) Redundancy C) Minimalism D) Security
A) EXT4 B) NTFS C) FAT32 D) HFS+ |