Deck 4: Operating Systems and File Management
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/51
العب
ملء الشاشة (f)
Deck 4: Operating Systems and File Management
1
While using several Windows programs at the same time, your computer displays an error message that refers to a program that is not responding. You recognize this message as one that might result from a(n)
leak and decide to close the non-responding program using the Ctrl, Shift, and Esc key combination.

Terminating non responsive programing
Whenever any program or software execute in a computer then a memory is allocated for that program in RAM. If user executes more than one program at a time in computer than operating system allocate particular area of memory for different programs. Sometime it happens that the program instruction and data of particular area of memory overlap with the other program memory area, this lead to the situation of memory leak. A computer displays the memory leaks by displaying "program not responding" an error message. A user can manually stop the memory leak by the combination of ctrl, shift and Esc key.
Hence, while using several programs at the same time, your computer displays an error message that refers to a program that is not responding. You recognize this message as one that might result from a (n) memory leak and decide to close the non-responding program using the Ctrl, Shift, and Esc key combination.
Whenever any program or software execute in a computer then a memory is allocated for that program in RAM. If user executes more than one program at a time in computer than operating system allocate particular area of memory for different programs. Sometime it happens that the program instruction and data of particular area of memory overlap with the other program memory area, this lead to the situation of memory leak. A computer displays the memory leaks by displaying "program not responding" an error message. A user can manually stop the memory leak by the combination of ctrl, shift and Esc key.
Hence, while using several programs at the same time, your computer displays an error message that refers to a program that is not responding. You recognize this message as one that might result from a (n) memory leak and decide to close the non-responding program using the Ctrl, Shift, and Esc key combination.
2
List and describe the four main resources that an operating system manages.
Resources that an operating system manages
Resources are the components that are required to perform any task. Operating System interacts with application software, device driver and hardware to manage computer's resources.
Following are the resource that an operating system manages:-
• Processor
• RAM
• Storage resources
• Peripherals
Processor Management:
The operating system keeps track of processes by recording whether the processor is busy and if so then which process is using it. If there are more than one process arriving to the processor then the processor decide which job should use the processor and for how much time.
There are several activities (process) arriving to the processor and at the same time the processor also has to give output.
For managing all these competing processes, the OS must allocate its time cycle to all the processes.
User can check the running processes by holding the key Ctrl+ Alt+ Esc.
Memory management:
The OS is responsible for memory management which involves the assigning of memory spaces to each program and to each application. It also reallocates the memory when the process is completed. The operating system keeps track of the memory by recording which part of memory is in use and by which process and what parts of memory are free to use.When user want to run several programs concurrently, the OS has to allocate memory to every program. After the use of memory, the operating system makes it available for other processes
Storage Resources:
The OS is responsible for keeping track of all storage resources. It stores and retrieves files from computer's hard disk. Operating system keeps track which files are in use and by which processes.
It remember all the names and the location of all files and as it found any free space it insert a new file if needed.
Peripherals Management:
A lot of input and output devices are connected to the computer. Device driver, software allows a fine data travel between computer and the peripheral resources. If the input/output devices or the drivers are not working properly then OS has to takes the decision to resolve the problem.
Resources are the components that are required to perform any task. Operating System interacts with application software, device driver and hardware to manage computer's resources.
Following are the resource that an operating system manages:-
• Processor
• RAM
• Storage resources
• Peripherals
Processor Management:
The operating system keeps track of processes by recording whether the processor is busy and if so then which process is using it. If there are more than one process arriving to the processor then the processor decide which job should use the processor and for how much time.
There are several activities (process) arriving to the processor and at the same time the processor also has to give output.
For managing all these competing processes, the OS must allocate its time cycle to all the processes.
User can check the running processes by holding the key Ctrl+ Alt+ Esc.
Memory management:
The OS is responsible for memory management which involves the assigning of memory spaces to each program and to each application. It also reallocates the memory when the process is completed. The operating system keeps track of the memory by recording which part of memory is in use and by which process and what parts of memory are free to use.When user want to run several programs concurrently, the OS has to allocate memory to every program. After the use of memory, the operating system makes it available for other processes
Storage Resources:
The OS is responsible for keeping track of all storage resources. It stores and retrieves files from computer's hard disk. Operating system keeps track which files are in use and by which processes.
It remember all the names and the location of all files and as it found any free space it insert a new file if needed.
Peripherals Management:
A lot of input and output devices are connected to the computer. Device driver, software allows a fine data travel between computer and the peripheral resources. If the input/output devices or the drivers are not working properly then OS has to takes the decision to resolve the problem.
3
Your friend wants to open a window on his Mac computer in which he can run Microsoft Windows and play some games designed for the Windows platform. You tell your friend to create a(n)
machine using software such as Parallels Desktop.

Virtual Machine Technology
Virtual Machine is a software which is used to simulate another machine (computer). Each virtual machine also has its own processor, RAM and ports like any other computer.
Each virtual machine is also capable of running or executing any software which is compatible with operating system (like window, Linux) installed in virtual machine.
The main motive behind to use virtual machine is to use two operating at a same time in a single machine. In Macintosh virtual machine software like VMware and Parallel desktop are used to execute windows software (games) in it.
Hence, your friend wants to open a window on his Mac computer in which he can run Microsoft Windows and play some games designed for the Windows platform. You tell your friend to create a (n) virtual machine using software such as Parallels Desktop.
Virtual Machine is a software which is used to simulate another machine (computer). Each virtual machine also has its own processor, RAM and ports like any other computer.
Each virtual machine is also capable of running or executing any software which is compatible with operating system (like window, Linux) installed in virtual machine.
The main motive behind to use virtual machine is to use two operating at a same time in a single machine. In Macintosh virtual machine software like VMware and Parallel desktop are used to execute windows software (games) in it.
Hence, your friend wants to open a window on his Mac computer in which he can run Microsoft Windows and play some games designed for the Windows platform. You tell your friend to create a (n) virtual machine using software such as Parallels Desktop.
4
Explain the significance of multitasking, multithreading, and multiprocessing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
5
Suppose you are using Microsoft Word and you want to open a file. When your software lists the documents you can open, you can expect them to be in Word's
file format, which is DOCX.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
6
Explain the term memory leak , and describe what you can do if one occurs on your PC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
7
Can you use a Windows application, create a document, and store it using the file name I L*ve NY ? Yes or no?


فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
8
Describe five tasks for which you must interact directly with the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
9
When you want to work with several files-to move them to different folders, for example-it would be most efficient to use a file management utility, such as Windows
or the Mac Finder.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
10
Describe the basic elements of a graphical user interface and contrast them with the elements of a command-line interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
11
When specifying a location for a data file on your hard disk, you should avoid saving it in the
directory.



فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
12
Watch your computer while it boots, and then revise the list so that it reflects what happens when your computer boots.
Power up. When you turn on the power switch, the power light is illuminated, and power is distributed to the computer circuitry.
Start boot program. The microprocessor begins to execute the bootstrap program that is stored in ROM.
Power-on self-test. The computer performs diagnostic tests of several crucial system components.
Identify peripheral devices. The computer identifies the peripheral devices that are connected and checks their settings.
Load operating system. The operating system is copied from the hard disk to RAM.
Check configuration and customization. The microprocessor reads configuration data and executes any customized startup routines specified by the user.






فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
13
Your computer seems to be taking longer to store and retrieve files. You use a(n)
utility to rearrange the files in contiguous clusters.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
14
List four operating systems used on personal computers, two operating systems used on servers, and four operating systems used on handheld devices. List advantages and disadvantages of the three most popular personal computer operating systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
15
You have an old computer that you will donate to a school, but you want to make sure its hard disk contains no trace of your data. To do so, you use file
software that overwrites empty sectors with random 1s and 0s.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
16
Explain the difference between dual booting and virtual machine technology. Give examples of tasks that might benefit from dual booting or virtual machine capability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
17
You just finished copying data files to an external USB hard disk. Before you depend on these files as a backup, you should test to make sure you can
the data in the event of a hard disk crash.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
18
Make a list of five file names that are valid under the file-naming conventions for your operating system. Also, create a list of five file names that are not valid, and explain the problem with each one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
19
Your hard disk crashed for some unknown reason. Now when you switch on the computer power, all you get is an "Error reading drive C:" message. You use a(n)
CD that contains the operating system files and device drivers needed to start your computer without accessing the hard disk.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
20
Describe the significance of file formats. List at least ten common formats and their extensions. Make a list of at least 20 file extensions you find on the computer you use most often. Group these extensions into the following categories: system files, graphics files, sound files, text files, other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
21
Demonstrate that you can manage files on a computer by looking at the files on your computer and locating at least five files or folders that should be renamed or relocated to improve the organization and make it easier to locate information on your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe what happens in the MFT when a file is stored or deleted. Explain what it means when a file is fragmented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
23
Discuss the pros and cons of using an external hard drive, USB flash drive, network server, or online storage service for backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe the way backup software deals with the files in the backup. Explain the differences between full, differential, and incremental backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe the significance of restore points, bare-metal restore, disk imaging, virtual machines, boot disks, and recovery disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the basic technique for backing up an iPhone, iPad, or iPod Touch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
27
An operating system manages a computer's
, such as RAM, storage, and peripherals.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
28
Most personal computer operating systems have
capabilities so that they can simultaneously run two or more tasks, jobs, or programs.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
29
The core part of an operating system is called its
.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
30
During the
process, a program stored in ROM tells the hard disk to load the operating system into RAM.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
31
Most computers today have
user interfaces.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
32
Microsoft Windows featured the first graphical user interface. True or false?


فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
33
A resource
is a companion file created by Mac OS to store information about a file and its data.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
34
VMware and Parallels Desktop are examples of
machine technology that can be used to run Windows software on a Mac.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
35
The operating system for iPads, iPod Touches, and iPhones is called
.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
36
Tablets and smartphones with the
operating system have a screen-based home button, rather than a physical button.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
37
.bmp,.docx,.exe, and.mov are examples of file
.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
38
When using Windows, you cannot use a(n)
word, such as Aux, as a file name.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
39
A disk
is a section of a hard disk drive that is treated as a separate storage unit.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
40
A software application automatically stores files in its
file format unless you specify otherwise.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
41
When you convert a DOCX file into HTML format, the resulting file is virtually indistinguishable from the original. True or false?


فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
42
Suppose you open a file and edit it, and then want to save it with a different name. You can use the Save option from the File menu. True or false?


فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
43

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
44
Windows 7 offers a preconfigured Documents
that's designed to hold links to document files stored in various folders.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
45
A hard disk stores data in concentric circles called
, which are divided into wedge-shaped.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
46
The acronyms NTFS, HFS+, and MFT pertain to
file storage models.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
47

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
48
One of the best devices for home backup is a(n)
hard drive.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
49
A(n)
backup makes copies of only those files that have changed since your last full backup.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n)
point is essentially a backup of the settings in the Windows Registry.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck
51
A bare-
restore includes the operating system, boot program, drivers, software applications, and data necessary to rebuild a replacement hard disk in one easy operation.

فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 51 في هذه المجموعة.
فتح الحزمة
k this deck