Reference no: EM131428214
Question 1 : A single machine (server) that allows multiple users to access that machine simultaneously must have what type of OS installed?
A) Single-user/single-tasking
B) Single-user/multitasking
C) Multiuser
D) Multiprocessing
Question 2 :A complete operating system that works on a desktop computer, notebook computer, or mobile computing device is a __________ operating system.
A) standalone
B) network
Question 3 : True or false? The only system utilities available are those bundled with the OS.
A) True
B) False
Question 4 : You currently have a PC with Windows Vista installed. Would the following statement hold true in a decision to upgrade to Windows 10 (or the latest version available)? Select Yes or No
It can be loaded on a hardware configuration I currently have without upgrading any of the current hardware on my PC. Yes
The upgrade is free. Yes
There should be a very limited learning curve to become familiar with Windows 8. No
Yes:Incorrect. Hardware configurations that support Vista may need to be upgraded in order for Windows 7 or 8 to be installed.
No:Correct. There are rigorous system requirements for the latest versions of Windows, possibly requiring hardware upgrades to maintain performance.
No: There are rigorous system requirements for the latest versions of Windows, possibly requiring hardware upgrades to maintain performance.
Question 5 : The term used for a device that combines the screen size (5 to 6.9inch) and functions of a
tablet with several features of a phone is __________.
A) Android
B) Symbian
C) phablet
D) smartphone
Question 6 : Is the following considered a job that an operating system must perform? Select Yes or No.
Management of memory and storage
A) Yes
B) No
Question 7 : What type of program allows a user to copy or back up selected files or an entire hard disk to another storage medium?
A) Operating system
B) System utility
C) Application
D) Firmware
Question 8 : An operating system is considered to be __________.
A) computer hardware
B) application software
C) system software
D) memory
Question 9 : Which major OS has more reported security breaches?
A) Apple's OS X
B) Microsoft's Windows 7
C) Google's Android
Question 10 : Which OS has the largest library of applications compatible across many different computing platforms?
A) Apple's OS X
B) Linux
C) Microsoft's Windows
Identifying the purpose of the study
: Identifying the purpose of the study (why did the authors conduct this study). Stating the hypotheses in the study. Summarizing in sufficient detail the method used (procedure, materials, and participants)
|
What is the complement rule
: What is the complement rule? How do you compute the mean and SD of a discrete probability distribution?
|
What affect does parenting style have on the childs behavior
: Describe how marital relationships, a child’s age, and a child’s temperament all contribute to the manner in which a parent “parents” a child. What affect does parenting style have on the child’s behavior?
|
About the health maintenance organizations
: Determine two to three (2-3) benefits of having health insurance for a family. Specify two (2) avenues through which families may obtain health insurance. Compare and contrast two (2) differences between health maintenance organizations (HMOs) and pr..
|
Which major os has more reported security breaches
: A single machine (server) that allows multiple users to access that machine simultaneously must have what type of OS installed? What type of program allows a user to copy or back up selected files or an entire hard disk to another storage medium? Is ..
|
The three keys to effective portfolio management
: The three keys to effective portfolio management are having project leaders with full authority, having a competitive product advantage, and leveraging core competencies. “Faster, better, cheaper” is the ONLY way to ensure your firm does not fall int..
|
Assignment on applications of graph theory
: In 1736, a famous Swiss mathematician Leonhard Euler (1707 - 1783) started the work in the area of Graph Theory through his successful attempt in solving the problem of "Seven Bridges of Konigsberg."
|
Specifically apply elements of each to the enron scandal
: Utilizing two Professional Resources (such as PCAOB or FASB codification), specifically apply elements of each to the Enron Scandal. What accounting standards, audting standards, or generally accepted accounting principles were being violated and bac..
|
Perform an academic literature search
: For this Discussion, perform an academic literature search in the Walden Library for a research study that includes specific cross-cultural research. Then, analyze the theoretical, methodological, and ethical issues included in the research study
|