Software and Operating Systems Flashcards

Objective 3

1
Q

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
A. Word processing
B. Spreadsheet
C. Text editor
D. Visual diagramming

A

A. Word processing

Word processing software, such as Microsoft Word, Google Docs, or Apple Pages, is designed for creating and formatting text documents. Word processing software offers a range of formatting tools and features that allow users to easily format text, adjust layouts, insert images and graphics, and customize the appearance of documents. Additionally, word processing software is optimized for printing, allowing users to create printer-friendly documents with precise control over margins, page breaks, and print settings.

B. Spreadsheet software (e.g., Excel) is mainly used for organizing and calculating data, not for formatting text-rich documents.
C. Text editor (e.g., Notepad) provides basic text input without advanced formatting options, so it’s not suitable for creating polished, printer-friendly handouts.
D. Visual diagramming software (e.g., Microsoft Visio) focuses on creating diagrams and charts, which may not be ideal for typical text-based handouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
A. Site licensing
B. Open-source licensing
C. Product key licensing
D. Single-use licensing

A

C. Product key licensing

Product key licensing involves providing users with a unique alphanumeric code, known as a product key or serial number, that grants them continuous personal access to a software product. This code is typically required during the installation process to activate the software and verify its legitimacy. Once activated, the user can use the software indefinitely on their personal device(s) by entering the product key when prompted.

A. Site licensing allows multiple users at a specific location to access the software, but it does not involve personalized codes for individual access.
B. Open-source licensing allows anyone to access, modify, and distribute the software, without the need for a personalized code or product key.
D. Single-use licensing provides access to software for a one-time use or installation but doesn’t necessarily involve personalized codes like product key licensing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user inserts a USB flash drive into a computer for the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
A. Driver installation
B. Plug-and-play
C. IP-based
D. Web-based

A

B. Plug-and-play

Plug-and-play (PnP) is a technology that allows devices to be automatically detected and configured by a computer’s operating system without the need for manual intervention. When a user inserts a USB flash drive into a computer for the first time, the operating system automatically detects the device, installs necessary drivers (if available), and configures it for use. The user typically sees a message indicating that the device is being set up, followed by a message indicating that the device is ready for use. This seamless process is characteristic of plug-and-play functionality.

A. Driver installation does occur as part of the plug-and-play process, but this specific question refers to the broader process of automatic device recognition, which is covered by plug-and-play.
C. IP-based configurations are typically used for network devices, not for USB flash drives.
D. Web-based setups refer to configuring devices through a web interface, which is not relevant to USB drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be best to use to store a project task list that will be updated by multiple team members?
A. Visual diagramming software
B. Document sharing software
C. Conferencing software
D. Database software

A

b. Document Sharing Software

Document sharing software: Document sharing software, such as Google Docs, Microsoft SharePoint, or Dropbox, allows multiple users to collaborate on documents by providing features for sharing, editing, and commenting on files.

A. Visual diagramming software is more suited for creating diagrams or flowcharts, not for managing a task list.
C. Conferencing software is used for communication and meetings, not for task list management.
D. Database software is better for structured data storage but may be too complex and overkill for a simple task list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician travels to a data center to review specifications on a new project. Which of the following is the technician most likely to see pertaining to types of operating systems?
A. Mobile device OS
B. Workstation OS
C. Embedded OS
D. Hypervisor OS

A

D. Hypervisor OS

Hypervisor OS is commonly used in data centers for managing virtual machines. It allows multiple operating systems to run on a single physical server by virtualizing hardware resources.

A. Mobile device OS is for smartphones or tablets, unlikely in a data center environment.
B. Workstation OS is used for individual desktops or laptops, not typically in a server-centric data center.
C. Embedded OS is for specialized devices like routers or IoT devices, not the primary OS type seen in data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
A. Local network-hosted
B. Cloud-hosted
C. Hybrid-installed
D. Locally installed

A

B. Cloud-hosted

A cloud-hosted application delivery method fits the scenario where the thin client is running a web application managed and updated via an internet connection, without a hard drive for local storage.

A. Local network-hosted: The application would be hosted on a local network server, but the description specifies that it’s managed over the internet.
C. Hybrid-installed: This involves a mix of local and cloud-based components, but the setup described relies entirely on the internet.
D. Locally installed: This refers to applications installed directly on a device, which is not the case here since there’s no hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A business provides access to the internet for customers through a lobby kiosk. After customers check their personal webmail, which of the following actions should customers immediately take to prevent others from accessing their email accounts on the kiosk?
A. Restart the kiosk.
B. Change the webmail password.
C. Reset the browser’s home page.
D. Clear the browser cache.

A

D. Clear the browser cache.

Clearing the browser cache is important because it removes saved data such as cookies, login credentials, and browsing history, preventing others from accessing the customer’s webmail account on the kiosk.

A. Restart the kiosk: It may not guarantee that all browsing data is cleared, as the session data could remain.
B. Change the webmail password: While helpful in some cases, it doesn’t directly address the issue of leaving session data behind.
C. Reset the browser’s home page: This won’t prevent others from accessing the account, as it doesn’t remove any saved data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the most secure filesystem?
A. FAT32
B. NFS
C. NTFS
D. exFAT

A

C. NTFS

NTFS (New Technology File System) is generally considered to be more secure compared to other filesystems such as FAT32, exFAT, and NFS. NTFS offers features like file and folder permissions, encryption, access control lists (ACLs), and journaling, which enhance security and help protect data from unauthorized access, modification, or deletion. NTFS is commonly used in Windows operating systems and provides robust security mechanisms for managing and securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
A. Disk optimizer
B. Operating system
C. Type 1 hypervisor
D. Anti-malware

A

B. Operating system

The operating system manages resources such as memory, CPU, and peripherals on a computer. One of its key functions is memory management, which includes ensuring that programs running simultaneously on a workstation do not utilize the same physical memory. The operating system allocates and manages memory resources for each program, preventing conflicts and ensuring efficient use of system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following scripting languages is most likely to be used in a Linux command-line environment?
A. JavaScript
B. PowerShell
C. C++
D. Bash

A

D. Bash

Bash (Bourne Again Shell) is a command language interpreter for Unix and Linux operating systems. It is the default shell for most Linux distributions and provides a powerful scripting environment for automating tasks, managing system configurations, and executing commands. Bash scripts, written in the Bash scripting language, are commonly used to create automated workflows, system administration tasks, and custom utilities within the Linux command-line environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A help desk technician loads a browser-based ticketing system, but when navigating to the queue, the technician realizes that another employee’s queue is being accessed. Which of the following explains the issue?
A. The previous user’s session is cached.
B. The proxy settings were misconfigured.
C. The application is not compatible with the browser.
D. The browser was opened in private mode.

A

A. The previous user’s session is cached.

When a user logs into a web-based application such as a ticketing system, the application typically creates a session that persists until the user logs out or the session times out. If the previous user did not properly log out or if the session was not terminated correctly, the browser may cache the session information, including the user’s credentials or session token. When another user accesses the same application on the same browser without explicitly logging in, the browser may reuse the cached session information, leading to unintended access to the previous user’s account or queue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following filesystems is compatible with the greatest number of operating systems?
A. ext4
B. FAT32
C. NTFS
D. HFS

A

B. FAT32

FAT32 is a filesystem commonly used for removable storage devices such as USB drives, memory cards, and external hard drives. It is supported by a wide range of operating systems, including Windows, macOS, Linux, and various embedded systems and consumer electronics devices. FAT32’s broad compatibility makes it a popular choice for sharing files between different operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is MOST likely managed directly by the operating system?
A. Email
B. Database connections
C. Memory allocation
D. Instant messaging

A

C. Memory Allocation

The operating system is responsible for managing the computer’s memory, including allocating and deallocating memory to running processes. It ensures that each process receives the necessary memory resources to execute efficiently while preventing conflicts and optimizing overall system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Word processing, spreadsheets, and presentation software are examples of what?
A. Productivity software
B. Collaboration software
C. Utility software
D. Operating system add-ins

A

A. Productivity software

These software allow us to be creative and complete different types of tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company wants to set up an application without needing to buy hardware. Which of the following would be the BEST solution?
A. On-site-hosted
B. Cloud-hosted
C. Locally installed
D. Local network-hosted

A

B. Cloud-hosted

This option is correct. Cloud hosting allows companies to deploy applications on remote servers provided by a third-party cloud service provider. With cloud hosting, companies can access computing resources, such as servers, storage, and networking, over the internet without the need to invest in and maintain their own physical hardware infrastructure. Cloud hosting offers scalability, flexibility, and cost-effectiveness, as companies can pay for the resources they use on a subscription or pay-per-use basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is installing a printer on a Windows 10 workstation. The technician has connected the printer using a serial cable, and the printer is powered on. However, the printer does not appear in Devices and Printers. Which of the following actions will MOST likely resolve the issue and
enable the printer to function?
A. Enable Bluetooth on the printer.
B. Manually install the printer driver.
C. Connect the printer using a USB cable.
D. Turn the printer off and back on.

A

B. Manually install the printer driver.

This option is correct. Even though the printer is physically connected to the Windows 10 workstation via a serial cable and powered on, the printer driver may not have been automatically installed. Manually installing the printer driver ensures that the operating system recognizes the printer and enables it to function properly.

17
Q

Which of the following operating system components would MOST likely be involved when an application needs to save data?
A. Process scheduler
B. Disk management
C. Memory management
D. Task scheduler

A

B. Disk Management

Disk management involves managing storage devices such as hard drives or solid-state drives (SSDs). When an application needs to save data, the operating system interacts with the disk management component to allocate space on the storage device, manage file systems, and handle data storage operations like writing data to disk.

18
Q

Which of the following would be the MOST secure method to communicate information to a supervisor regarding a project’s status?
A. Project distribution list
B. Personal email
C. Company-provided instant messaging system
D. Text message

A

Company-provided instant messaging system

Using a company-provided instant messaging system is the most secure method to communicate information to a supervisor regarding a project’s status. These systems are typically designed with security features such as encryption and access controls to protect sensitive information exchanged within the organization. Additionally, messages sent through company-provided systems are usually monitored and managed by IT administrators, ensuring compliance with company policies and regulations.

19
Q

A company has a reoccurring issue that involves users having antivirus browser extensions installed after updating to the latest version of the company’s antivirus software. Which of the following would prevent this issue?
A. Clearing browser history
B. Changing proxy settings
C. Disabling certificate verification
D. Disabling browser extensions

A

D. Disabling browser extensions

Disabling browser extensions would prevent users from having antivirus browser extensions installed after updating to the latest version of the company’s antivirus software. By disabling browser extensions, the company ensures that only the intended antivirus software extensions are installed and active, reducing the likelihood of conflicts or unintended installations.

20
Q

A hotel guest is using the public computer to check travel plans. Which of the following is the BEST approach to prevent others from seeing what the guest was doing on the computer?
A. Restart the computer when done.
B. Log off the computer.
C. Use private browsing.
D. Enable pop-up blocker.

A

C. Use private browsing

Private browsing, also known as “incognito mode” in some browsers, is a feature that allows users to browse the web without storing browsing history, cookies, or other data locally on the computer. When private browsing is enabled, the browser does not save any information about the websites visited or activities performed during the browsing session.

21
Q

An employee needs a visual aid to help demonstrate slides to a group. Which of the following would the employee MOTS likely select to help?
A. Word processing software
B. Spreadsheet software
C. Visual diagramming software
D. Presentation software

A

D. Presentation software

Presentation software, such as Microsoft PowerPoint or Google Slides, is specifically designed for creating and delivering visual presentations. It allows users to create slides containing text, images, charts, and multimedia elements, which can be displayed sequentially to convey information to an audience.

22
Q

Which of the following is MOST commonly used by Linux operating systems?
A. HFS
B. NTFS
C. FAT32
D. ext4

A

D. ext4

ext4 (Fourth Extended Filesystem) is a widely used filesystem format for Linux operating systems. It is the default filesystem for many Linux distributions due to its performance, reliability, and feature set. ext4 supports large file sizes, journaling for improved data integrity, and efficient storage allocation, making it suitable for a wide range of Linux-based devices and systems.

23
Q

A company has multiple users that need to modify the same document concurrently. Which of the following types of collaboration software would
be BEST suited for this situation?
A. Email client
B. Instant message
C. Web conference
D. Online workspace

A

D. Online workspace

An online workspace, also known as collaborative editing software or collaborative document editing platforms, allows multiple users to work on the same document concurrently. These platforms typically provide real-time editing capabilities, version control, and collaboration features such as comments and chat, enabling efficient collaboration among users working on the same document from different locations.

24
Q

A technician is installing a new application on laptops that will be installed in work trucks. The laptops do not have a network connection. Which of the following application delivery models would BEST fulfill this need?
A. Local network-hosted
B. Three-tier
C. Cloud-hosted
D. Locally installed

A

D. Locally installed

Locally installed applications are installed directly onto the user’s device, in this case, the laptops installed in work trucks. These applications do not require a network connection to function as they are installed locally on the device itself. This delivery model is suitable for situations where the devices operate in environments without reliable network connectivity.

25
Q

Which of the following types of software is MOST likely to display a certificate error during normal usage?
A. Web browser
B. Spreadsheet
C. Visual diagramming
D. Accounting

A

A. Web browser

A web browser is the type of software most likely to display a certificate error during normal usage. Certificate errors typically occur when a web browser encounters an issue with the SSL/TLS certificate presented by a website. This can happen for various reasons, such as an expired certificate, a mismatch between the domain and the certificate, or an untrusted certificate authority. When a certificate error occurs, the web browser will usually display a warning message to the user, indicating that the website’s security may be compromised, and giving the user the option to proceed at their own risk or to return to safety.

26
Q

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is MOST likely the issue?
A. Scripting is disabled.
B. The security settings are too high.
C. Pop-up blockers are enabled.
D. The web certificate is invalid.

A

C. Pop-up blockers are enabled

The most likely issue causing nothing to happen when a user clicks a link to view a document is that pop-up blockers are enabled. Pop-up blockers are browser features or extensions designed to prevent web pages from opening pop-up windows automatically. Sometimes, when a link is clicked to open a document or another web page, it may trigger a pop-up window, which gets blocked by the pop-up blocker. As a result, the user may not see any response or action, assuming that nothing has happened.

27
Q

Which of the following types of software would be the MOST appropriate for scheduling personnel and viewing activity progress?
A. Project management software
B. Spreadsheet software
C. Accounting software
D. Database software

A

A. Project management software

Project management software is the most appropriate type of software for scheduling personnel and viewing activity progress. Project management software is specifically designed to help plan, organize, and track tasks, resources, and timelines for projects. It allows users to create schedules, assign tasks to personnel, monitor progress, and generate reports to track activity progress effectively.

28
Q

Ann, a home user, purchases a wireless keyboard to use with a computer connected to a television. After installing batteries, plugging the USB receiver into a USB port on the computer, and successfully logging on, Ann notices some of the new keyboard’s multimedia keys do not function. Which of the following steps is MOST likely needed to enable the missing keyboard functionality?
A. Utility installation
B. OS update
C. Hardware replacement
D. BIOS configuration

A

A. Utility installation

The most likely step needed to enable the missing keyboard functionality is utility installation. Many wireless keyboards come with additional software utilities that need to be installed on the computer to enable full functionality, including multimedia keys. These utilities often provide drivers and additional settings to customize the keyboard’s behavior, including the functionality of multimedia keys.

29
Q

An end user clicks on a link from an email that redirects to a web page. Which of the following browser settings should be enabled to reduce the threat of malicious code being executed from the web page?
A. Cache clearing
B. Private browsing
C. Pop-up blocker
D. Script blocker

A

D. Script blocker

Enabling a script blocker in the browser settings helps reduce the threat of malicious code being executed from the web page. Script blockers prevent JavaScript, Java, Flash, and other executable content from running automatically, thus providing an additional layer of protection against malicious scripts that may be embedded in web pages.

30
Q

A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
a. Local application
b. Intranet application
c. Extranet application
d. Internet application

A

B. Intranet Application

This is a private network accessible only to an organization’s staff. Since employees can access the portal only when they are at work, it implies that the application is hosted on the company’s internal network (intranet) and not on the internet. Additionally, the requirement for a VPN connection from home suggests that the portal is not accessible from outside the company’s network, further indicating it’s an intranet application.

31
Q

Which of the following best describes an application running on a typical operating system?
a. Process
b. Thread
c. Function
d. Task

A

A. Process

In Windows, if we go to the Task Manager and look under the Processes tab, we will see all current running applications.

32
Q
  1. Which of the following best describes the practice of providing user credentials when logging onto the network?
    a. Output
    b. Storage
    c. Input
    d. Processing
A

C. Input

Logging onto or INto the network, whenever we go “onto/into” specifically will be input. This could be via mouse click, keyboard, facial recognition, thumb print reader.

33
Q

What kind of back up would best be used for a company’s network server
A. File
B. Server
C. OS
D. Database

A

C. OS

Servers are super computers that have their own type of operating system. We’d want to run a OS backup of our server configurations.

34
Q

In windows settings which tab would be used to find certificates for websites?
A. Network & wifi
B. Internet options
C. Disk Management
D. Task Scheduler

A

B. Internet Options

Go into Internet options, go to the Content Tab, here we’ll be able to add or remove Certificates.

35
Q

What type of file is an RTF extension?
a. Audio
b. Doc
c. Compression
d. Picture

A

B. Document

Rich Text File

.rtf is simply another type of document, similar to .pdf, .docs, .docx, .csv

36
Q
  1. Claire, a co-worker, is browsing the Internet and wants to know whether it’s safe to enter her credit card information into a website. What do you tell her to look for?
    A. HTTPS
    B. HTTP
    C. SSL
    D. TLS
A

A. Https

This will encrypt our data on the website, http is NOT secure.

37
Q

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
A. Disk optimizer
B. Operating system
C. Type 1 hypervisor
D. Anti-malware

A

B. Operating System

Software solution = key word. The purpose of an OS is to coordnate users and hardware. Type 1 hypervisors and hypervisors in general use the same resources as the hardware.

38
Q

A technician is deploying a new application that runs on thin clients with no local storage on the user’s device. The thin client cannot make a VPN connection to the company data center. Which of the following application types would MOST likely fulfill this requirement?

A. Locally installed
B. Local network-hosted
C. Cloud-hosted
D. Three-tier

A

C. Cloud-hosted

Cloud-hosted applications are hosted on remote servers and accessed over the internet. Users can access these applications through a web browser or a dedicated client application. Since the thin client cannot establish a VPN connection to the company data center and has no local storage, accessing an application hosted in the cloud provides an ideal solution. Users can access the application directly over the internet without the need for a VPN connection or local storage.

39
Q

Which of the following is the BEST example of one-tier service architecture?

A. Online banking website

B. Cloud management system

C. Database management system

D. Mobile photography application

A

D. Mobile photography application:

A mobile photography application running entirely on a single device can indeed be considered a one-tier architecture. In this setup, the application handles all functions—such as capturing images, processing them, and storing them locally—on the same device without relying on separate servers or remote databases.