Test Bank For Survey of Operating Systems, 7th Edition Jane Holcombe and Charles Holcombe Chapter 1-12 Chapter 1 Introduction to Operating Systems True/False Questions [Question] Smartphones generally have larger screens than tablets. Answer: False Feedback: Increasingly, fewer distinctions exist between smartphones and tablet, but the majority of new smartphones do not have screens that approach the size of those on tablets. Page: 4 Difficulty: Easy [Question] A computer that provides services to other computers over a network is a client. Answer: False Feedback: A computer that provides services is a server; it “serves” its clients running on other computers. Page: 3 Difficulty: Medium [Question] A microcomputer is a computer built around a microprocessor. Answer: True Feedback: Essentially all commonly used computers today are microcomputers. Page: 2 Difficulty: Easy [Question] The Apple Mac computer, running the Mac OS System 1 was the first commercially available computer with a graphical user interface. Answer: False Feedback: An Apple computer model named Lisa predated the Mac by two years and was the first commercially available computer with a GUI. Page: 14 Difficulty: Medium [Question] The most controversial changes to the desktop in Windows 8 were to the GUI. Answer: True Feedback: The Windows 8 GUI was modeled on the Metro GUI introduced in Windows Phone 7.5.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 24 Difficulty: Medium [Question] The same security threats that attack other computers target mobile devices. Answer: True Feedback: Like modern desktop OSs, mobile OSs are targeted by security threats and have many built-in security features. Page: 32 Difficulty: Medium [Question] Windows NT was a version of Windows that included a graphical interface on top of a DOS kernel. Answer: False Feedback: Windows NT was an entirely new operating system with a new kernel. Page: 20 Difficulty: Medium [Question] The native user interface of Linux is a command-line interface. Answer: True Feedback: Although native user interface for Linux is a CLI, Many distributions of Linux include a GUI shell. Page: 28 Difficulty: Easy [Question] Storage on a mobile device is usually an SSD. Answer: True Feedback: Mobile devices are designed for portability, requiring lightweight components, such as SSD storage. Page: 29 Difficulty: Medium [Question] Today’s macOS versions run on the same kernel used in the 1990s in Mac OS 9. Answer: False Feedback: Beginning with Mac OS X, and continuing to macOS, the OS is entirely different from Mac OS 9, and it is built on a UNIX kernel. Page: 28 Difficulty: Medium
Multiple Choice Questions
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] This type of small integrated circuit is central to a desktop computer, performing the processing for the computer. A. RAM B. ROM BIOS C. motherboard D. microprocessor Answer: D Feedback: A microprocessor is also known as the central processing unit (CPU). Page: 2 Difficulty: Medium [Question] This is the central circuit board of a computer. A. memory B. motherboard C. ROM BIOS D. video adapter Answer: B Feedback: The memory, ROM BIOS, microprocessor, and (often) the video adapter are on the motherboard. Page: 2 Difficulty: Medium [Question] Of the mobile OSs discussed in this chapter, which one is legally installed only on devices from a single manufacturer? A. iOS B. Android C. Windows 11 D. Linux Answer: A Feedback: Apple installs iOS on their devices, and they do not license it to other manufacturers. Page: 31 Difficulty: Easy [Question] Which of the following choices is the Google OS installed by manufacturers on certain laptops, desktops, and tablet computers? A. UNIX B. iOS C. Linux D. Chrome OS Answer: D
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: The Google Chrome OS is installed by manufacturers on Chromebook laptops and Chromebox desktops. Page: 29 Difficulty: Medium [Question] The user communicates with the OS through this software layer. A. job management B. user interface C. device management D. video adapter Answer: B Feedback: This is one of the functions of an operating system. Page: 5 Difficulty: Medium [Question] What OS function controls the focus (where the OS’s attention is at any given moment) and allows the user to move the focus from one application to another as the user brings each in turn to the foreground? A. user interface B. device management C. memory management D. task management Answer: D Feedback: This function gives the attention of the computer’s resources to each task as needed. Page: 6 Difficulty: Difficult [Question] Six years after Microsoft released a version of Windows that many thought would be the last named version, they announced this new version that includes significant security requirements. A. Windows XP B. Windows 10 C. Windows Vista D. Windows 11 Answer: D Feedback: Because of its hardware-level security requirements, this is the most secure version of Windows. Page: 26 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
What common mobile OS feature is important for people who want to access the same data across all their devices? A. acceleration B. updates C. synchronization D. touch screen Answer: C Feedback: Keep your data files up-to-date across all your computing devices with synchronization. Page: 32 Difficulty: Medium [Question] On a mobile device, the operating system resides in firmware, and is therefore, a/an ______________ OS. A. single-use/multitasking B. multiuser/multitasking C. embedded D. GUI Answer: C Feedback: Although a mobile OS is stored in firmware, it can still be updated as needed. Page: 4 Difficulty: Medium [Question] Use one of these popular mobile devices for cellular voice communications, browsing the Internet, managing email, and many other functions. A. PC B. laptop C. MacBook D. smartphone. Answer: D Feedback: Smartphones are often used for tasks that previously required a desktop computer. Page: 4 Difficulty: Easy [Question] What term is used in an OS GUI to describe a specialized file that contains information about the locations of other files? A. partition B. folder C. file allocation table D. sector Answer: B Feedback: The icon that represents a folder resembles the traditional manilla card stock file folder used to organize documents in a file cabinet.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 7 Difficulty: Easy [Question] Save money on your data plan by using this type of connection to access the Internet whenever possible. A. Bluetooth B. cellular C. Ethernet D. Wi-Fi Answer: D Feedback: Connect to the Internet through a Wi-Fi hotspot and save on cellular costs. Page: 31 Difficulty: Medium [Question] Although this OS predates microcomputers, today a wide variety of computer platforms still use recent versions. A. UNIX B. macOS C. Windows D. DOS Answer: A Feedback: Bell Labs started work on this OS in 1969, and it is still in use today on servers and other systems. Page: 10 Difficulty: Medium [Question] What version of UNIX came out of a California university, and carries the name of that campus? A. AIX B. HP/UX C. BSD D. Solaris Answer: C Feedback: This version of UNIX originated at the Berkeley campus of the University of California. Page: 11 Difficulty: Difficult [Question] This acronym describes the networking of devices that are not thought of as computing devices but contain microcomputers to control their functions. A. IC B. UEFI
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. SoC D. IoT Answer: D Feedback: The non-computer “things” now connected to networks includes kitchen appliances, thermostats, utility meters, components in automobiles, light bulbs, and industrial control devices: the Internet of Things (IoT). Page: 5 Difficulty: Medium [Question] This early microcomputer predated the Apple II computer. A. Commodore PET B. MITS Altair C. Lisa D. IBM PC Answer: B Feedback: Popular Electronics features this computer in a cover story in 1965; the input was via switches, and the output consisted of blinking lights. Page: 9 Difficulty: Medium [Question] This application program was considered the killer app for the Apple II computer. A. Lotus 1-2-3 B. Microsoft BASIC C. VisiCalc D. CP/M Answer: C Feedback: VisiCalc was the first widely successful spreadsheet application. Page: 13 Difficulty: Difficult [Question] What application program was the killer app that helped make the IBM PC successful in the 1980s? A. Lotus 1-2-3 B. Microsoft BASIC C. VisiCalc D. CP/M Answer: A Feedback: This spreadsheet application ran on DOS and was introduced in 1983. Page: 16 Difficulty: Medium [Question] What was the first Apple computer with a GUI OS?
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. Lisa B. Apple I C. iMac D. Apple II Answer: A Feedback: This computer was not a commercial success because it lacked applications; it was overshadowed by another Apple computer that was released two years later. Page: 14 Difficulty: Medium [Question] This OS was jointly developed by Microsoft and IBM. A. PC DOS B. MS-DOS C. OS/2 D. Warp Answer: C Feedback: Microsoft and IBM introduced this operating system in 1987. Page: 16 Difficulty: Difficult [Question] Introduced in 2021, this OS could not install on many older computers because it required hardware-level security features not supported by many existing computers. A. Windows 10 B. Windows 11 C. Windows NT D. Windows 8.1 Answer: B Feedback: This version of Windows also included changes to the appearance of the desktop. Page: 27 Difficulty: Easy [Question] What is the name of Google’s mobile operating system, used on smartphones and tablets from many manufacturers? A. Chrome OS B. iOS C. Chrome D. Android Answer: D Feedback: Google licenses its mobile OS for free. Page: 30 Difficulty: Easy [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Use this onscreen device whenever you need to enter alphanumeric data into your mobile device. A. Bluetooth keyboard B. screen rotation C. virtual keyboard D. accelerometer Answer: C Feedback: Mobile devices are not the only devices that use virtual keyboards; Windows and Chrome OS support virtual keyboards on computers with touchscreens. Page: 31 Difficulty: Medium [Question] Begin your Windows session from this prominent feature where you find shortcuts to apps and utilities and a list of all installed apps. A. desktop B. Settings screen C. sign-in screen D. Start menu Answer: D Feedback: The start menu has grown and evolved through several versions of Windows. Page: 22, 23, 26, 27 Difficulty: Easy [Question] What hardware feature of most mobile devices is used by a mobile OS to detect when to rotate the screen to allow you to read or view the image properly? A. SSD B. accelerometer C. touch screen D. digital camera Answer: B Feedback: Mobile devices today are packed with sophisticated hardware features, such as the accelerometer, making them useful and easier to use. Page: 31 Difficulty: Difficult [Question] While earlier versions of this OS ran only on computers with the Motorola PowerPC chip, the current versions run on computers with either the Intel or M1 processors. Which OS is this? A. Chrome OS B. macOS C. Linux D. Windows Answer: B
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Between 2020 and 2021, the Apple Mac line of desktop and laptop computers were Intel-based, but that started changing in 2020 when they introduced MacBook models with the M1 processor. Page: 28 Difficulty: Difficult [Question] What term is used for a software bundle that includes the Linux kernel and additional software? A. version B. GNU C. edition D. distribution Answer: D Feedback: There are many Linus distributions available from dozens of sources. Page: 28 Difficulty: Medium [Question] What OS began as a student project in 1991? A. Windows 3.1 B. macOS C. Linux D. UNIX Answer: C Feedback: In 1991 Linus Benedict Torvalds invited other programmers to work together to create an open-source operating system for modern computers. Page: 28 Difficulty: Medium [Question] Which of the following is an open source operating system? A. Windows B. DOS C. macOS D. Linux Answer: D Feedback: Linus Benedict Torvalds started the project that resulted in Linux in order to create an open source operating system. Page: 31 Difficulty: Medium [Question] Which of the following network technologies is the default for a smartphone, even when it supports others? A. Bluetooth
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
B. cellular C. infrared D. Ethernet Answer: B Feedback: Smartphones usually support other network technologies in addition to cellular. Page: 31 Difficulty: Easy Essay Questions [Question] Complete this sentence: “An operating system is…” Answer: An operating system is a collection of programs that controls all interactions among various computer components. It frees application programmers from needing to include such functions in their programs. Page: E3-163 Difficulty: Medium [Question] Describe several actions a user can take that involve computer input. Include actions described in the chapter, as well as those you have observed. Answer: A user performs computer input when they type at a keyboard, tap or use other gestures on a touch screen, move a mouse, click a mouse, scroll a mouse, scan a document, or speak into a microphone. Taking pictures with a still camera or recording with a video camera on a device also involves computer input. Further, when a user copies data from any location to the computer, which is input. Incoming mail and messages are input. Page: 2 Difficulty: Medium [Question] Describe several examples of computer output. Include actions described in the chapter, as well as those you have observed. Answer: Computer output includes the images, videos, and text displayed on the screen, sound broadcast from a device’s speaker, and files formatted with text and graphics sent to a printer. Also, outgoing email and messages are output. Other examples of output are files sent to network locations or to locally connected storage. Page: 2 Difficulty: Medium [Question] Provide at least five typical desktop computer hardware components. Include components described in the chapter, as well as those you have observed. Answer: Desktop computer hardware components include the central processing unit (CPU)/microprocessor, motherboard, random-access memory (RAM, keyboard (an input device), pointing device (an input device), microphone (an input device), disk drive storage,
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
screen (an output device as well as an input device if it is a touch screen), one or more printers (output), scanner (input), and speakers (output). Page: 2 Difficulty: Medium [Question] What contributed more to the evolution of desktop operating systems—inventions, or individual’s actions and demands? Include contributions described in the chapter, as well as those you may have observed or learned about from other sources. Answer: The short answer is that both technical advances and the way people wanted to use computers were parallel influences on the evolution of desktop operating systems. The miniaturization of components occurred over decades until sufficient computing power could be enclosed in a desktop box. Other peripherals were developed in parallel or soon after some of these advances. Data storage is another components area that changed to devices that would fit in those boxes, or at least nearby. All of this also occurred in response for more access to computing power which at first was available to government agencies and corporations. It was a long, gradual climb to putting computing power onto desktops, and now beyond desktops and into our hands. Page: 12 Difficulty: Difficult [Question] Explain differences as well as similarities between smartphones and tablets. Include information from the chapter, as well as your own observations. Answer: Both smartphones and tablets are mobile devices. In general terms, a smartphone fits in the palm of your hand, or can be gripped one-handed, while a tablet is closer to the size of paper tablets (Remember them?). Both types of devices come with an array of miniature components, such as cameras, microphones, high-resolution touch screens, and sensors. And they wouldn’t be “mobile” without wireless technologies. They have multiple wireless radios, including cellular, included in all smartphones and an optional add-on for tablets. They also come with Bluetooth, Wi-Fi, and the near-field communications (NFC) technology used for payment system, keycards, and passes. Page: 4 Difficulty: Medium [Question] Name several microcomputers created in the 1970s and explain how they contributed to the evolution of microcomputers. Include information from the text, as well as any information you have learned from other sources. Answer: The MITS Altair, Apple I, Apple II, Radio Shack TRS-80, and Commodore PET were all microcomputers created in the 1970s. A small, but growing number of technically-minded people saw the potential in these early computers. They gathered in informal user groups at first, but grew to larger events, such as the West Coast Computer Faire in San Francisco in the late 1970s. The news spread, and when apps needed for everyday business tasks, such as creating spreadsheets, became available, the computers spread from techie workbenches to office desktops.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 12 Difficulty: Difficult [Question] Complete this sentence: “Mobile devices do not have a single killer app that compels people to purchase them, but …” Answer: Mobile devices do not have a single killer app that compels people to purchase them, but the availability of a large number of useful apps will influence people to buy a certain device. Page: 30 Difficulty: Medium [Question] What operating systems are you most likely to find on desktop (and laptop) computers today? Name and describe the devices and scenarios in which they are used. Include information from the text, as well as any information you have learned from other sources Answer: Windows, macOS, Chrome OS, and Linux are the operating systems I am most likely to find on desktop and laptop computers. Windows is popular on home, school, and office desktop and laptops. Apple computers, such as the MacBooks and iMacs run the macOS, which has a strong following in all three environments in spite of the higher price tag for the devices. Chrome OS is growing in popularity in schools due to the lower cost of the devices, the free OS, and its association with Google for people and organizations depending on Google online services. Linux is much less visible, but an important OS in schools as a platform for programming and other cyber skills. Page: 24 Difficulty: Medium [Question] Describe nontechnical distinctions between Linux desktop distributions and Windows and macOS. Answer: Many Linux distributions are free, while Windows and macOS are commercial products. Also, while macOS and Windows include many utilities and small apps, you need to add apps to them to accomplish work or do other activities. Linux distributions include many free apps. Page: 28 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Survey of Operating Systems 7e - Chapter 2 Computer & User Security Basics True/False Questions [Question] HTTPS uses a private key to encrypt data between a client and an e-commerce server. Answer: False Feedback: HTTPS uses a public key to encrypt data, and a private key to decrypt data. Page: 69 Difficulty: Difficult [Question] Browser cookies are always a threat. Answer: False Cookies can be useful to you by remembering user preferences and browsing activity for a site so that you do not have to repeat certain actions every time you go to that site. Page: 49 Difficulty: Medium [Question] Secure HTTP (HTTPS) uses the Secret Key Security protocol. Answer: False Feedback: HTTPS uses the Secure Sockets Layer (SSL) protocol. Page: 69 Difficulty: Easy [Question] If you plan to sell or give away your computer, you should use data wiping software to remove your data. Answer: True Feedback: Even if you reset the operating system, other people can access your data on the local storage device through various means. Page: 69 Difficulty: Medium [Question] When you access a Web page to pay for an online purchase, it should show HTTPS as the protocol in the address line. Answer: True Feedback: HTTPS, which is Secure HTTP, encrypts the communications between you and the e-commerce server through which you pay for your purchases. Page: 70
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Chapter 2 includes the recommendation that you block first-party cookies and allow third-party cookies. Answer: True Feedback: It is the other way around; you should allow first-party cookies from trusted sites but block all third-party cookies. Page: 61 Difficulty: Medium [Question] You must use data wiping software on a hard drive before installing a new operating system. Answer: False Feedback: Data wiping is not a necessary task when installing a new operating system unless you are preparing the computer for someone else's use, as when you donate an old computer. Use data wiping software to permanently delete files from a hard drive. Page: 70 Difficulty: Medium [Question] The guest account is the least privileged and is enabled by default. Answer: False Feedback: Although it is true that the guest account is the least privileged account, it is disabled by default. Page: 67 Difficulty: Medium [Question] Windows will warn you if you try to log on with the Caps Lock key turned on. Answer: True Feedback: The log-in dialog box will warn you if the Caps Lock key is turned. Page: 70 Difficulty: Medium [Question] Today’s macOS versions run on the same kernel used in the 1990s in Mac OS 9. Answer: False Feedback: Beginning with Mac OS X, and continuing to macOS, the OS is entirely different from Mac OS 9, and it is built on a UNIX kernel. Page: 28 Difficulty: Medium
Multiple Choice Questions [Question] What is the generic term for a mode or method of malware infection. A. firewall B. virus C. DMZ D. vector Answer: D Feedback: Just as with viruses that infect humans, malware finds many vectors for infecting devices. Page: 38
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] What type of malware is also a vector and gets its name from an epic poem, which described how Greek warriors gained access to a city? A. botnet B. Trojan horse C. back door D. DMZ Answer: B Feedback: In the epic poem, ancient Greek warriors gained access to the city of Troy by hiding in a large wooden horse presented as a gift to the City. Page: 39 Difficulty: Medium [Question] What is the oldest malware vector? A. sneakernet B. back door C. war driving D. bluesnarfing Answer: A Feedback: Today, most computers connect to the Internet, providing a path for a variety of malware to attack; but in the 1980s that was not true, and viruses were hand-carried from computer-to-computer on infected floppy disks. Page: 40 Difficulty: Medium [Question] What term describes a password cracker that tries a huge number of possible passwords? A. keylogger B. cracker C. zombie D. brute-force Answer: D Feedback: In conventional warfare this type of attack is very violent and direct. Page: 42 Difficulty: Medium [Question] What type of malware replicates itself on a computer or throughout a network? A. zero-day exploit B. worm C. botnet D. zombie Answer: B Feedback: Imagine this type of malware “worming” its way through your computer or network. Page: 43 Difficulty: Medium [Question] What term describes a group of networked computers infected with malware that forward information to other computers?
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. Trojan horse B. worm C. botnet D. zombie Answer: C Feedback: Botnets can be created for either good or evit. Page: 44 Difficulty: Medium [Question] What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers? A. Trojan horse B. worm C. botnet D. zombie Answer: D Feedback: The person who controls these computers is referred to as a botherder. Page: 44 Difficulty: Medium [Question] What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user? A. zero-day B. browser hijacking C. adware D. worm Answer: C Feedback: This type of spyware may take the form of inline banners or pop-ups. Aside from being very annoying, clicking on one of these may trigger a pop-up download, installing malware. Page: 44 Difficulty: Medium [Question] What type of threat points your browser's home page to a website you did not chose, and may even keep you from changing the browser’s default home page? A. bluesnarfing B. phishing C. browser hijacking D. key logging Answer: C Feedback: Some unscrupulous people do this so that their Website will register more visitors. Page: 44 Difficulty: Medium [Question] What term describes unsolicited instant messages? A. spam B. browser hijacking C. phishing D. spim Answer: D
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Rather than relating this to a meat product, spim includes the "im" of instant messages. Page: 44 Difficulty: Easy [Question] What term describes malware that takes advantage of a vulnerability in an operating system or application that is unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched? A. zero-day exploit B. browser hijacking C. spim D. bluesnarfing Answer: B Feedback: It is a constant challenge to keep ahead of the bad guys; when they know about and exploit a vulnerability before the publisher does, there is no time to fix it. Page: 44 Difficulty: Easy [Question] You receive an e-mail message from a friend claiming that she is in another country, in trouble, and urgently needs money wired to her. You call the friend and discover that she is safe at home and did not know about the message. This scenario is an example of a/an ____________. A. spam B. browser hijacking C. hoax D. war driving Answer: C Feedback: To attempt this hoax, the perpetrator had to hijack the user’s email account. Page: 46 Difficulty: Medium [Question] This method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page. If you click within the window, you may unknowingly agree to install malware. A. rootkit B. pop-up download C. drive-by download D. hoax Answer: B Feedback: Some pop-ups claim to be from Microsoft (on a Windows computer) and pose as virus infection alerts. If you click in the window, malware downloads and installed. Page: 40 Difficulty: Medium [Question] Once installed, this type of malware becomes a vector, giving other malware administrative access to a computer. A. rootkit B. pop-up download C. drive-by download D. hoax Answer: C
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Because a rootkit is installed in the OS code, it has administrative, or “root” access to the system. It can subsequently give root access to other malware. Page: 40 Difficulty: Medium [Question] An email containing enticements (often appealing to human weaknesses) to open attachments is a form of what type of threat? A. phishing B. hoax C. social engineering D. worm Answer: C Feedback: Social engineering uses persuasion techniques to gain the confidence of individuals. Persuasion can appeal to human characteristics, such as greed or empathy. Page: 45 Difficulty: Medium [Question] This software or hardware device examines network traffic and allows or rejects traffic into a network or computer based on predefined rules. A. proxy service B. DMZ C. firewall D. VPN Answer: B Feedback: A firewall uses several technologies to accomplish its work. Page: 55 Difficulty: Medium [Question] An administrator would create one of these for someone who does not need administrator status, but will be regularly signing in. A. group account B. two-factor authentication C. guest account D. standard user account Answer: D Feedback: A standard user account does not have administrative access, but can have access to their own folders and data. Page: 67 Difficulty: Medium [Question] This type of social engineering sends a bogus message to a few high-value targets, rather than sending the same message to millions. A. spear phishing B. DMZ C. firewall D. fraud Answer: A Feedback: Spearphishing targets (spears) a certain person or persons who have the potential of giving the attacker access to money or other network locations.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 46 Difficulty: Medium [Question] It is a good idea to install or enable one of these on your computer, even if your network has similar protection between it and other networks. A. administrator B. secret key C. DMZ D. personal firewall Answer: D Feedback: Threats can originate from other computers on your local area network (LAN), as well as from the Internet. Page: 55 Difficulty: Medium [Question] This type of software protects against unsolicited email, filtering out those that have certain characteristics. A. antivirus B. spam filter C. firewall D. proxy service Answer: B Feedback: A spam filter is included with an email app to filter out unsolicited e-mail based on language and also on the source of the email. Page: 59 Difficulty: Medium [Question] A set of these should exist in both document form and software form for any organization. A. cookies B. account lockout policy C. anti-spyware D. security policies Answer: D Feedback: Security policies exist in the form of documents that describe all the necessary security steps and rules. It exists in the form of the software that is configured to support security policies. Page: 55 Difficulty: Medium [Question] If your private network has both client computers needing Internet access and servers that must be available from the Internet, you should create this separate network for those servers in order to keep Internet-initiated traffic from entering the network containing your client computers. What is the term for the network where the servers are located? A. back door B. DMZ C. botnet D. firewall Answer: B Feedback: A demilitarized zone (DMZ) is a network that sites between the Internet and an private network, providing two gateways—one to the servers sitting in the DMZ, and another to the private network. Page: 57
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Easy [Question] What type of security software can you use to both protect from malware infections and to scan disk space and RAM looking for installed malware? A. antivirus B. anti-spam C. firewall D. proxy service Answer: A Feedback: An antivirus can protect from malware by scanning incoming files and code and by scanning disk space and RAM looking for installed malware. Page: 60 Difficulty: Medium [Question] When you receive a robocall, caller ID may not help you identify the caller because the phone number may be ______________. A. encrypted B. spoofed C. forged D. wiped Answer: B Feedback: Recent FCC rules, if implemented by cellular providers, call for authenticated phone numbers to prevent the use of spoofed numbers. Page: 45 Difficulty: Medium [Question] After several failed attempts to log on/sign in to your Windows computer you see a message stating that your account has been locked out. What caused this problem?? A. wrong password B. too many log-on attempts C. wrong username D. incorrect version of Windows Answer: B Feedback: At work or at school, the account policy may be configured with an account lockout threshold, which is the maximum number of failed attempts before it locks the account. There is then usually an amount of time (account lockout duration) before it will accept another log on (sign in) attempt. Page: 71 Difficulty: Difficult [Question] This special file holds a secret key. A. cookie B. token C. vector D. digital certificate Answer: D Feedback: A digital certificate contains a secret key. Page: 69 Difficulty: Difficult
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Use this type of program to guard against an especially annoying type of adware that appears in your browser and may contain a link to malware. A. pop-up blocker B. antivirus C. spam filter D. content filter Answer: A Feedback: A pop-up will prevent pop-ups. Page: 61 Difficulty: Medium [Question] Which of the following may be a symptom of a possible malware infection? A. adware B. unsolicited email C. sudden computer slowdown D. an error message after you enter your password Answer: D Feedback: A sudden system slowdown can be a symptom of a malware infection. Page: 53 Difficulty: Medium [Question] Ransomware attackers may require payment using ______________, a cyber currency. A. credit cards B. bitcoin C. cash D. coupons Answer: B Feedback: Ransomware attackers may require payment using bitcoin, a cyber currency. Page: 44 Difficulty: Medium [Question] Your Windows computer has been showing signs of a malware infection, and it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what powerful built-in account can you log on with to try to resolve the problem? A. Guest B. standard user C. root D. Administrator Answer: B Feedback: Smartphones usually support other network technologies in addition to cellular. Page: 72 Difficulty: Easy Essay Questions [Question] Explain the word “malware.” Answer: Malware is a term derived from “malicious software.” This “bad” software comes in many forms, so malware is an umbrella term.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 38 Difficulty: Medium [Question] Describe how a honey pot is used. Answer: A honey pot is a server created as a decoy to draw malware attacks and gather information about attackers, often tracking them back to their source. The information can be used to fight off the malware attacks. A honey pot may be located outside a corporate firewall, within a DMZ, or inside a corporate network. Page: 57 Difficulty: Medium [Question] Describe the Windows Account Lockout Policy. Answer: Windows Account Lockout Policy is part of Windows Local Security Policy. The Account Lockout Policy has three settings: 1) Account lockout threshold defines how many invalid logon attempts will trigger an account lockout, 2) Account lockout duration determines the length of time of a lockout, and 3) Reset account lockout counter after defines the length of time in minutes that will elapse after a failed logon attempt before the counter is reset to zero bad logon attempts. Page: 71 Difficulty: Difficult [Question] What should you do before donating an old computer to your favorite charity? Answer: You should use data wiping software to ensure that all personal data—even deleted data—is not recoverable. The normal deleting action only removes the directory entries with pointers to the data locations. It does not erase the actual data, although subsequent file writes to the storage media may overwrite the data, but sophisticated software can still retrieve at least some of this data. Therefore, data wiping software should be used on the non-system portions of the disk. Page: 70 Difficulty: Medium [Question] Describe at least two common symptoms of a malware infection. Answer: Common symptoms of a malware infection include strange screen messages, sudden computer slowdown, missing data, and inability to access the hard drive. The strange screen message may be warnings, purportedly from such sources as Microsoft or the Treasury Department. Page: 53 Difficulty: Medium [Question] Describe the authorization process. Answer: The authorization process includes authentication of an account, followed by the determination of the level of access that account has to a computer or a resource. Page: 64 Difficulty: Difficult [Question] You believe your computer is infected by malware, but you have not kept your security software up-to-date. Describe how you can quickly run an up-to-date scan for malware, providing you have an Internet connection.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: Connect to the website of a reputable source of malware protection and run an online scan of your computer. An example of a reputable source of malware protection is www.trendmicro.com who offer the online HouseCall malware scanner. Page: 72 Difficulty: Medium [Question] After typing in your password, you are greeted with an error message indicating that your user name or password is incorrect. What should you check before attempting to enter it again? Answer: Check that the Caps Lock key is not on and check to ensure that you properly placed your hands on the keyboard. Page: 70 Difficulty: Medium [Question] Describe at least two indications that can mean that you are the victim of identity theft. Answer: Indications that you may be a victim of identity theft include 1) charges you are sure neither you not a family member made appear on an account; 2) you receive a collection call for overdue payments on an account you never opened; 3) you apply for new credit and are rejected for reasons you know are not true; and 4) a credit bureau reports existing credit accounts you never opened. Page: 46 Difficulty: Medium [Question] Describe what may be the most effective way to protect yourself against thieves creating new credit accounts using your financial information. Answer: Put a freeze on your credit to prevent someone opening a new account in your name. To open a new credit account using your identity a thief would apply to the bank or other organization, and they would do a credit check. With a freeze in place, the credit would not be approved. Page: 55 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 3 Desktop Virtualization True/False Questions [Question] In application virtualization a user connects to a server and accesses one or more applications as well as a desktop environment resembling an OS running on the local computer. Answer: False Feedback: In application virtualization, a user connects to a server and accesses one or more applications, but not an entire desktop environment. Page: 81 Difficulty: Medium [Question] Use a terminal client to connect to a terminal service that provides a fully configurable desktop virtual machine. Answer: False Feedback: A terminal client connects to a partition on a server running terminal services. A partition is not a virtual machine because the entire hardware and operating system environment are not part of the partition. Page: 81
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] The hypervisors for Windows desktop hosts discussed in Chapter 3, Desktop Virtualization, are Type II hypervisors. Answer: False Feedback: One hypervisor described in chapter 3, Hyper-V, is a Type I hypervisor. Page: 83 Difficulty: Medium [Question] you cannot simultaneously run two hypervisors on the same host OS, although you can install more than one. Answer: True Feedback: Multiple hypervisors can be installed, but multiple hypervisors cannot run at the same time. Page: 83 Difficulty: Medium [Question] You cannot simultaneously run multiple virtual machines in a single hypervisor. Answer: False Feedback: If you have enough disk space and memory you can run multiple virtual machines in a single hypervisor. Page: 83 Difficulty: Medium [Question] You cannot install a client into Hyper-V that it does not directly support. Answer: True Feedback: You can only install clients into Hyper-V that are supported by Hyper-V, and you can see a list of those clients at the Microsoft website. Page: 83 Difficulty: Medium [Question] Oracle VirtualBox is the only hypervisor that accepts FreeBSD as a client OS. Answer: False Feedback: Microsoft Hyper-V also accepts FreeBSD as a client OS. No other hypervisors were discussed in any detail in this chapter, so there are no doubt others. Page: 83 Difficulty: Difficult [Question] Hyper-V is a feature of Windows 10 Pro. Answer: True Feedback: Hyper-V is a feature of Windows 10 Pro and must be enabled before it will run. Page: 84 Difficulty: Medium [Question] You can select an avatar to represent you in a virtual world. Answer: True
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Online virtual worlds, like Second Life, allow/encourage you to create an avatar to represent you in that world. Page: 80 Difficulty: Medium [Question] In order to create and prepare a virtual machine for a guest OS you must have the guest OS distribution disc or source files ready. Feedback: When you create a virtual machine in any hypervisor, you do not need to have the installation media handy, but you do need to know something about the memory and storage space needs of the client OS you hope to install. Page: 28 Difficulty: Medium
Multiple Choice Questions [Question] This is a software simulation of computer hardware. A. virtual machine B. dumb machine C. thin client D. hypervisor Answer: A Feedback: A virtual machine is software simulation of computer hardware. Page: 81 Difficulty: Medium [Question] In the 1960s a computer user would interact remotely with a mainframe or minicomputer using one of these. A. virtual machine B. dumb machine C. thin client D. hypervisor Answer: B Feedback: A dumb terminal in the 1960s was little more than a keyboard and display with a connection to a host computer. It had little or no native processing power. Page: 81 Difficulty: Medium [Question] This term describes a dedicated terminal or software installed on a PC and used to connect to a server and work in a server-hosted environment. A. virtual machine B. dumb machine C. thin client D. hypervisor Answer: C Feedback: The defining term here is “PC” because a thin client, while stripped down, is a PC capable of local processing, but it may lack standard components and peripherals. Page: 81 Difficulty: medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] What software emulates the hardware on which an operating system runs? A. hypervisor B. host key C. guest OS D. terminal services Answer: A Another term for this software is virtual machine monitor (VMM). Page: 82 Difficulty: Medium [Question] What can you use to release the mouse and keyboard from control of a virtual machine so that they are available for use in the host OS? A. hypervisor B. host key C. guest OS D. terminal services Answer: B Feedback: This is one of the functions of an operating system. Page: 83 Difficulty: Medium [Question] Which of the following creates a virtual machine that does not run within a host OS? A. avatar B. Type I hypervisor C. Type II hypervisor D. VDI Answer: B Feedback: The term “bare metal” is used for a Type I hypervisor because the virtual machine does not require an OS between it and the hardware. Page: 82 Difficulty: Difficult [Question] Which of the following terms is used for the overall hosting and managing of multiple virtual desktops on network servers? A. avatar B. Type I hypervisor C. Type II hypervisor D. VDI Answer: D This term, virtual desktop infrastructure (VDI), is used to describe both the action and the products involved in managing virtual desktops on servers. Page: 82 Difficulty: Medium [Question] Which of the following creates a virtual machine within a host OS? A. avatar B. Type I hypervisor C. Type II hypervisor
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. VDI Answer: D Feedback: A Type II hypervisor creates a virtual machine within a host OS. Page: 82 Difficulty: Medium [Question] In order to make a virtual machine perform better, take this step after installing a guest OS. A. Install security software B. Reboot the virtual machine C. Install utilities D. Install device driver from hardware manufacturers. Answer: C Feedback: Each hypervisor provider uses a different term to describe the utilities that may be needed for a client OS. Page: 83 Difficulty: Medium [Question] Which of the following is a characteristic of Hyper-V? A. avatar B. Type I hypervisor C. Type II hypervisor D. VDI Answer: B Feedback: Hyper-V is a Type I hypervisor. Page: 84 Difficulty: Easy [Question] This describes a virtual environment into which you can install and run Windows or Linux. A. desktop virtualization B. virtual world C. application virtualization D. storage virtualization Answer: A Feedback: You can install and run Windows or Linux in a desktop virtualization environment. Page: 81 Difficulty: Easy [Question] What type of virtual switch do you need to connect a Microsoft Hyper-V virtual machine to a physical network? A. SLAT B. Private C. External D. Internal Answer: C Feedback: Connect a virtual machine to a physical network using an External virtual switch. Page: 88 Difficulty: Difficult [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Which of the following is an Oracle virtualization product that works in several host OSs including Windows, Linux, and macOS? A. Windows Virtual PC B. Windows XP Mode C. Hyper-V D. VirtualBox Answer: D Feedback: Oracle’s VirtualBox hypervisor works in several host OSs including Windows, Linux, and macOS. Page: 94 Difficulty: Medium [Question] When installing the Oracle VM VirtualBox hypervisor, what component of the host computer is temporarily disconnected? A. storage B. memory C. video adapter D. network Answer: D Feedback: The network connection will temporarily disconnect during the installation of the hypervisor. Page: 97 Difficulty: Medium [Question] The biggest issue preventing the running of macOS in a virtual machine on a Windows computer is ______________. A. hardware support B. interest C. licensing D. cost Answer: C Feedback: Apple does not license their operating system to run devices other than Apple hardware devices. Page: 86 Difficulty: Medium [Question] Hyper-V is a feature of Windows 10 Pro and what other Windows 10 edition? A. Windows 10 Home B. Windows 10 Enterprise C. Windows 10 S Mode D. Windows 10 Basic Answer: B Feedback: Hyper-V is a feature of Windows 10 Pro and Windows 10 Enterprise. Page: 84 Difficulty: Medium [Question] What term describes a computer-generated animation you may select to represent you in a virtual world? A. host B. client C. avatar D. thin client Answer: C
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Select or create an avatar to represent you in a virtual world. Page: 80 Difficulty: Difficult [Question] This type of virtualization involves viewing a scene or object in real time through a camera or other device; the resulting image you see is digitally modified to include virtual effects and objects. A. virtual world B. augmented reality C. thin client D. avatar Answer: B Feedback: Augmented reality involves viewing something in real time through a camera or other device while the image is digitally modified. Page: 80 Difficulty: Medium [Question] When you create a VM using this Windows hypervisor, the VM and Windows OS run in separate virtual machines. A. Windows Virtual PC B. VirtualBox C. Hyper-V D. Boot Camp Answer: C Feedback: When you create a VM using Hyper-V, the VM and “hosting” OS run in separate virtual machines. Page: 83 Difficulty: Easy [Question] When using Hyper-V, you must connect a virtual machine’s network adapter to a/an ______________ in order to access a network from that virtual machine. A. router B. virtual switch C. hotspot D. SLAT Answer: B Feedback: When using Hyper-V, you must connect a virtual machine’s network adapter to a virtual switch in order to access a network from that virtual machine Page: 84 Difficulty: Medium [Question] What CPU feature must be available and enabled on a computer before you can use Hyper-V? A. router B. virtual switch C. hotspot D. SLAT Answer: d Feedback: The SLAT feature must be turned on in a CPU in order to use Windows Hyper-V. Page: 84 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] What utility allows you to create, configure, and manage virtual machines for the Microsoft hypervisor available in Windows 10 Pro? A. Device Manager B. Settings C. Hyper-V Manager D. Windows To Go Virtual Hard Disk Answer: C Feedback: Hyper-V Manager is the utility that allows you to create, configure, and manage virtual machines for the Microsoft hypervisor available in Windows 10—Hyper-V. Page: 92 Difficulty: Medium [Question] Use this feature of Hyper-V to create a portable VM on a USB drive. A. Device Manager B. Settings C. Hyper-V Manager D. Windows To Go Virtual Hard Disk Answer: D Feedback: Use the Windows To Go Virtual Hard Disk (VHD) feature of Hyper-V to create a virtual hard disk on a USB drive. Page: 84 Difficulty: Medium [Question] You want to run Linux in a VM in macOS on an Intel Mac. Which of the following will you use? A. Windows Virtual PC B. VirtualBox C. Hyper-V D. Boot Camp Answer: B Feedback: VirtualBox will run on a macOS host, and it supports Linux. Page: 94 Difficulty: Medium [Question] What form of virtualization gives the participant a feeling of being present in a virtual time and space? A. virtual world B. application virtualization C. virtual reality D. avatar Answer: C Feedback: Virtual reality give the participant a feeling of being present in a virtual time and space. Page: 80 Difficulty: Medium [Question] What utility will you use to enable Hyper-V? A. SLAT B. Windows Features Control Panel C. Hyper-V Manager
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. Quick Create Answer: B Feedback: Enable Hyper-V using the Windows Features Control Panel. Page: 85 Difficulty: Difficult [Question] Select this action from the Hyper-V Manager’s action menu to easily create a VM and automatically install one of a list of client OSs. A. SLAT B. Windows Features Control Panel C. Hyper-V Manager D. Quick Create Answer: D Feedback: The Quick Create action in Hyper-V Manager’s action menu will open a wizard and give you options creating a VM and automatically installing a select client OS. Page: 92 Difficulty: Medium [Question] What wizard offers you a selection of operating systems for Hyper-V to automatically install into a new VM? A. Virtual Machine Connection B. Create Virtual Machine C. Virtual Switch Manager D. Quick Create Answer: B Feedback: The Create Virtual Machine wizard offers you a selection of operating systems for Hyper-V to automatically install into a new VM. Page: 93 Difficulty: Medium [Question] Which of the following is the tool you use to create a means for a VM to connect to a physical network? A. Virtual Machine Connection B. Create Virtual Machine C. Virtual Switch Manager D. Quick Create Answer: C Feedback: Use the Virtual Switch Manager to create a virtual switch. Page: 88 Difficulty: Medium [Question] What type of virtual switch do you need to connect a Microsoft Hyper-V virtual machine to other VMs connected to that switch as well as to the physical computer, but not to a physical network? A. external B. internal C. private D. personal Answer: B Feedback: An internal switch will connect a Microsoft Hyper-V virtual machine to other VMs connected to that switch as well as to the physical computer, but not to a physical network. Page: 89
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium Essay Questions [Question] Describe at least four examples of virtualization given in the chapter. Answer: Examples of virtualization listed in the chapter include virtual world, virtual reality, storage virtualization, network virtualization, server virtualization, desktop virtualization, virtual machine, and application virtualization. (1) A virtual world is a simulated time and place. When a virtual world involves other senses beyond sight and sound, it becomes virtual reality in which the participant feels present in the virtual world. (2) Storage virtualization makes multiple networked storage devices appear to be one. (3) Network virtualization involves creating a network addressing space existing within one or more physical networks. [This definition of network virtualization should be expanded to include the virtual networks created by Hyper-V virtual switches]. (4) Server virtualization and desktop virtualization both create virtual computer hardware in which server or desktop operating systems and their apps can exist. (5) A virtual machine is a simulation of computer hardware. Page: 80 Difficulty: Medium [Question] Explain the difference between virtual reality and augmented reality. Answer: Virtual reality is a complete virtualized environment, with augmented reality involves viewing something real through a camera or other device while the image is digitally modified. Page: 80 Difficulty: Difficult [Question] List at least three of the major sources of hypervisors and point out the ones used in the Step-by-Steps in Chapter 3. If you are aware of the use of hypervisors at school or work, describe them. Answer: Major sources of hypervisors are Citrix, VMware, Parallels, Microsoft, and Oracle. The free hypervisors used in the Step-by-Steps in Chapter 3 are Microsoft Hyper-V, only available for the Pro and Enterprise editions of Windows 10 and Windows 11. Page: 83 Difficulty: Medium [Question] The Step-by-Step exercises in Chapter 3 instructed you to accept the default configuration settings for the virtual machines you created. Describe the virtual hardware components that you can optionally size when you create a virtual machine and why you might choose to do so. Answer: The two virtual hardware components you can optionally size are memory and storage space. I might opt to increase both if I planned to run applications in the VMs that require more memory and storage space. Of course, this would depend on the memory and storage capacity of the host computer. Page: 84 Difficulty: Medium [Question] Describe the two tasks required to connect a virtual machine in Microsoft Hyper-V to a network. Answer: The first task required to connect a VM in Microsoft Client Hyper-V to a network is to create a virtual switch using the Virtual Switch Manager available in the Hyper-V Manager. This step will not be necessary for every VM because a single virtual switch can be used by multiple VMs on the same host, but part of creating a virtual switch is selecting the type of virtual switch (external, internal, or private). An external virtual switch allows the VM clients to access a physical network. An internal virtual switch allows VM clients to connect with other clients running on the same physical computer as the virtual switch with no
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
connectivity to a physical network, but they may also connect to the physical computer hosting the VMs and the switch. A private virtual switch is like an internal virtual switch except the VMs connecting to a private virtual switch cannot connect to the physical computer hosting the VMs. The second step required to connect a VM in Microsoft Client Hyper-V to a network is to connect the VM’s network adapter to a virtual switch. This step is done by opening the Hyper-V Manager. In the Virtual Machines pane, click on the virtual machine you wish to connect. Under Actions in the right pane, avoid the actions at the top, which are for the host computer, and scroll down to the actions for the selected virtual machine and click on Settings. This opens the Setting dialog for the virtual machine. In the left pane click on Network Adapter; in the right-hand pane, click on the dropdown box under Virtual switch, and then click on the switch you created. Click the OK button. Page: 89-91 Difficulty: Difficult [Question] Explain how to enable Client Hyper-V in Windows 10. Answer: Enter “Windows features” in the Taskbar search box. From the results select “Turn Windows features on or off.” This will open the Windows Features Control panel. In the list of features locate “Hyper-V” and click to place a check in the check box. Notice that Hyper-V has a plus sign next to the check box. Click on this to see the two components that are part of Hyper-V: Client Hyper-V Management Tools and Hyper-V Platform. Ensure that each of the three boxes have checks in them. Then click the OK button. Wait for the files to be found and installed. When the Windows Features dialog box prompts with the message that the requested change was completed, select Restart Now. After the restart, sign in and click the Start button. They Hyper-V Manager will appear in the list of programs under Recently added unless it was previously enabled. In that case, look for it in the Start menu’s Apps list under Windows Administrative Tools. Page: 84 Difficulty: Difficult [Question] . Page: 83 Difficulty: Difficult [Question] You have installed a hypervisor, created a virtual machine, installed a client OS, and installed guest utilities. What remains to be done before you work in the guest OS? Answer: Once the client OS is installed and any necessary guest utilities installed into the OS, it is time to install security software, and then the application software needed in the virtual machine—going back to the reason for creating a virtual machine. If it is a test environment for new apps, install them and test them. If it is an environment for a programmer, install the programming tools required. Page: 85 Difficulty: Medium [Question] You have decided to no longer use Hyper-V on a Windows 10 Pro computer. Describe how you would “decommission” Hyper-V. Answer: Decommissioning Hyper-V involves reversing the steps for enabling it. Open Windows Features Control Panel, locate the Hyper-V node, and click to clear the check box. Then click OK to initiate this change. In the resulting message box, click the Restart Now button. After Windows restarts, sign-in. Page: 94 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Describe an exception to the requirement that you use the full retail version of a guest OS for a virtual machine to perform a complete installation. Answer: An exception to this requirement is when you already have a compatible precreated virtual machine; you still must have a legal license or trial version for each guest OS. Page: 83 Difficulty: Medium Survey of Operating Systems 7e - Chapter 4 Windows 10 True/False Questions [Question] The only edition of Windows 10 that supports the Windows Hello biometric sign in feature is Windows 10 Pro. Answer: False Feedback: Both Windows 10 Home and Windows 10 Pro editions support Windows Hello biometric sign in. Page: 106 Difficulty: Medium [Question] If you install Windows 10 on a computer that does not have an Internet connect, you cannot install it because activation must occur before the installation will complete. Answer: False Feedback: While earlier versions of Windows allowed a grace period of up to 30 days before activation, Windows 10 requires immediate activation of the retail products. However, if there is no Internet connection during the installation, Windows 10 will try to activate the first time the computer connects to the Internet. If it fails to activate after several tries, a message will display with instructions on how to manually activate the product—usually via telephone. Page: 109 Difficulty: Medium [Question] Windows 10 supports multitouch only on touch screens. Answer: False Feedback: Windows 10 supports multitouch on touch screens, the touch mouse, and touchpads. Page: 107 Difficulty: Medium [Question] You can configure the Windows 10 Update feature to update all your installed Microsoft software. Answer: True Feedback: You can optionally configure Windows Update to update all your installed Microsoft software. Page: 130 Difficulty: Medium [Question] If a device is not working correctly after Windows 10 Setup completes, install a driver from the manufacturer. Answer: True Feedback: If a device is not working correctly after Windows 10 Setup completes, Windows may have installed a generic driver or one that is outdated. Connect to the manufacturer’s website and see if there is an updated driver that you can install. Page: 121 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] You must use a payment option in Microsoft Store to download and install a free app. Answer: False Feedback: You do not need a payment method to download and install a free app from the Microsoft Store. Page: 143 Difficulty: Medium [Question] By default, Windows Update will automatically install all available updates for Windows 10, including Microsoft apps. Answer: False Feedback: By default, Windows Update automatically updates Windows 10, but you must optionally configure it to automatically update Microsoft apps. Page: 130 Difficulty: Medium [Question] The Windows Firewall feature is not a feature of Windows 10. Answer: False Feedback: Windows Firewall is a feature of Windows 10. It is called Windows Defender Firewall. Page: 145 Difficulty: Easy [Question] On a Windows 10 tablet, the screen will always respond to an orientation change, which can be annoying when you are reading in one orientation and want the screen to remain in that orientation as you recline or lay down. Answer: False Feedback: Although the orientation setting is unavailable on a tablet, if you do not want the screen on a mobile device to respond to an orientation change, turn on Lock rotation in Display settings. Page: 128 Difficulty: Difficult [Question] The brightness level of a Windows 10 laptop or tablet will automatically dim the screen when running on battery, and you cannot change this behavior. Answer: False Feedback: While it is true that the brightness level on a laptop or tablet will automatically dim the screen when running on battery, you can manually adjust the Display Brightness Level setting. This is a good thing because sometimes a device dims the screen to an unacceptable level. Page: 128 Difficulty: Difficult
Multiple Choice Questions [Question] Which of the following is mandatory and occurs early in the installation of a retail edition of Windows 10? A. firmware update B. signing in with a Microsoft account C. registration D. activation
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: D Feedback: Activation is mandatory and occurs early in the installation of a retail edition of Windows 10. Page: 108 Difficulty: Medium [Question] You are no longer required to manually enter this when you install Windows 10. A. user name B. product key C. Microsoft account D. password Answer: B Feedback: You are no longer required to manually enter the product key when you install Windows 10. Page: 108 Difficulty: Medium [Question] What type of account should you use for signing in to your Windows 10 computer if you want to synchronize your settings with those on other devices that use the same sign-in? A. Domain B. Microsoft C. local D. Windows Answer: B Feedback: Sign in with a Microsoft account (MSA) if you want to synchronize your settings with those on your other Windows computers that use the same sign-in. Page: 109 Difficulty: Medium [Question] What feature of Windows 10, long available in Linux and macOS, allows you to organize your open apps within work spaces? A. Task view B. Windows Hello C. Back tip D. Virtual desktop Answer: D Feedback: The virtual desktop feature of Windows 10, long available in Linux and macOS, allows you to organize your open apps within work spaces. Page: 142 Difficulty: Medium [Question] What Windows 10 feature lets you view all your open apps at once. A. Task view B. Windows Hello C. Back tip D. Virtual desktop Answer: A Feedback: Click on the Task view button when you want to see all your open apps at once, represented by thumbnails. Page: 142 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Click this icon on the bottom right of the Sign-In screen to have audio and visual aids. A. Task view B. Windows Hello C. Back tip D. Ease of Access Answer: D Feedback: The Ease of Access button will let you enable audio and visual aids to working with the Windows GUI. Page: 128 Difficulty: Medium [Question] Which of the following is not a Windows 10 backup program? A. Backup and Restore (Windows 7) B. File History C. Continuum D. System image Answer: C Feedback: Continuum is not a Windows 10 backup program. Page: 133 Difficulty: Medium [Question] Create this and use it to boot up Windows in the event the OS fails completely and will not start up in any mode. A. system Repair disc B. Quick link C. retail disc D. System image Answer: D Feedback: Create a System image and you can use it to boot up Windows in the event the OS fails completely and will not start up in any mode. Page: 134 Difficulty: Medium [Question] If you choose to create one of these, consider create one of at least six characters. A. Hey Cortana B. Multitouch C. PIN D. Lock screen Answer: C Feedback: If you choose to create a PIN for signing in to your Windows device, consider creatin one of at least six characters for more security. Page: 117 Difficulty: Medium [Question] What Windows 7 utility, included in Windows 10, can you use to migrate data from a Windows 7 installation to a Windows 10 system? A. Backup and Restore
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
B. System Image Backup C. Reset D. File History Answer: A Feedback: Use Backup and Restore (Windows 7) to migrate data from a Windows 7 installation to a Windows 10 system. Page: 133 Difficulty: Medium [Question] What Windows 10 feature can you use to backup and restore version of files? A. Backup and Restore B. System Image Backup C. Reset D. File History Answer: D Feedback: Use Windows 10 File History to backup and restore versions of files. Page: 133 Difficulty: Medium [Question] If your Windows 10 Pro device is joined to a Windows Server network, you will be required to sign in with this type of account. A. Domain B. Microsoft C. Local D. Windows Answer: A Feedback: To sign in to a Windows 10 Pro device that is joined to a Windows Server network, you will be required to sign in with a Domain account. Page: 109 Difficulty: Difficult [Question] What is the Windows 10 GUI mode in which the Start menu opens full screen? A. Desktop mode B. Character mode C. Tablet mode D. Safe mode Answer: C Feedback: In Windows 10 Tablet mode, the Start menu opens full screen. Page: 136 Difficulty: Medium [Question] What is the name of the Windows 10 file manager? A. Windows Explorer B. File Explorer C. File Manager D. Finder Answer: B Feedback: File Explorer is the name of the Windows 10 file manager. Page: 119
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Easy [Question] What keyboard shortcut opens Windows 10 Settings? A. Windows key + I B. Windows key + Z C. Windows key + Q D. Windows key + M Answer: A Feedback: The shortcut + I opens the Windows 10 Settings utility. Page: 130 Difficulty: Difficult [Question] Double click this Quick link on the Windows 10 Start menu to see the options: Sleep, Shutdown, and Restart. A. Settings B. Start C. Power D. Search Answer: C Feedback: Double click the Power Quick link on the Windows 10 Start menu to see the options: Sleep, Shutdown, and Restart. Page: 119 Difficulty: Medium [Question] On a Windows 10 system with a touch screen what opens when you swipe in from the right side of the screen? A. Charms bar B. Start menu C. Action Center D. Apps list Answer: C Feedback: The Action Center opens on the right when you swipe in from the right side of the screen. Page: 136 Difficulty: Medium [Question] What customizable tile appears on the top of the left column of the Windows 10 Start menu? A. Power B. User C. Settings D. All apps Answer: B Feedback: The User tile appears on the top of the left column of the Windows 10 Start menu. Page: 119 Difficulty: Medium [Question] What type of app will run on any Windows 10 device from PCs to tablets and smartphones? A. Legacy B. Windows Store App
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. 64-bit D. multitouch Answer: B Feedback: A Windows Store Apps runs on any Windows 10 device. Page: 141 Difficulty: Medium [Question] In addition to providing your Microsoft account credentials (email and password), what must you do before you can purchase your first app in the Windows Store? A. Opt-in for in-app purchases B. Redeem a code C. Create a payment method D. Enter a PIN Answer: C Feedback: Before you can purchase your first app in the Microsoft store you must create a payment method. Page: 143 Difficulty: Hard [Question] This Display Setting is normally turned off on a Windows 10 tablet, so that the device can detect and respond to an orientation change. A. Tiles B. Lock rotation C. Identity D. Detect Answer: B Feedback: Lock rotation is normally turned off on a Windows 10 tablet, so that the device can detect and respond to an orientation change and continue to be readable. Page: 128 Difficulty: Difficult [Question] Change the size of items on the desktop with this Display setting A. Orientation B. Size C. Scale and Layout D. Identify Answer: C Feedback: change the size of items on the desktop with the Scale and Layout setting. Page: 128 Difficulty: Medium [Question] What security feature of Windows 10 lets you sign in to your Windows 10 device with a biometric sign-in, providing that appropriate hardware is present? A. Windows Hello B. Windows Defender C. Assigned Access D. Hey Cortana Answer: A Feedback: Windows Hello is a security feature of Windows 10 that lets you sign in to your Windows device with a biometric sign-in, providing the appropriate hardware is present.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 144 Difficulty: Medium [Question] What acronym represents a consortium of companies from many industries who are working together to develop solutions to allow users to reduce the risk of fraud by securely accessing services and conducting financial transactions without using password authentication? A. IoT B. FIDO C. EFS D. SoC Answer: B Feedback: The FIDO Alliance (Fast Identity Online) is a consortium of companies from many industries who are working together to develop solutions to allow users to reduce the risk of fraud by securely accessing services and conducting financial transactions without using password authentication. Page: 145 Difficulty: Difficult [Question] What is the name of Windows 10 virtual assistant’s voice-activation option? A. Windows Hello B. Windows Defender C. Ease of Access D. Hey Cortana Answer: D Feedback: Hey Cortana is the name of the Windows 10 virtual assistant’s voice-activation option. Page: 141 Difficulty: Medium [Question] User Account Control displays this type of prompt when a user who is a member of the Administrators group attempts to install software. A. Sign-in B. MSA C. Consent D. Credentials Answer: C Feedback: User Account Control displays a Consent prompt when a user who is a member of the Administrators group attempts to install software. Page: 148-150 Difficulty: Hard [Question] User Account Control displays this type of prompt when a standard user attempts to install software. A. Sign-in B. MSA C. Consent D. Credentials Answer: D Feedback: User Account Control displays this type of prompt when a standard user attempts to install software. Page: 150 Difficulty: Difficult
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] If your Windows computer is on a corporate or school network, it will be centrally managed, such central management of software and hardware is called _______________. A. local security B. enterprise computing C. Microsoft Passport D. Windows Security Answer: B Feedback: A term for such central management of software and hardware in a large organization is called enterprise computing. Page: 144 Difficulty: Medium [Question] The generic term for configuring the sign-in to your computer, as well as many other settings to make it more secure is ______________. A. local security B. enterprise computing C. Microsoft Passport D. Windows Security Answer: A Feedback: The generic term for security implemented solely on a desktop or laptop computer is local security. Page: 144 Difficulty: Medium [Question] This Microsoft feature, available to a Windows computer that accesses Microsoft’s Azure Active Directory services, allows users to sign in to network resources without sending a password or PIN over the network. A. local security B. enterprise computing C. Microsoft Passport D. Windows Security Answer: C Feedback: The Microsoft Passport feature allows users to sign in to Microsoft’s Azure Active Directory services without having their password or PIN sent over the network. Page: 31 Difficulty: Easy Essay Questions [Question] Describe the pre-keyed feature of Windows 10 retail editions. Answer: Windows 10 retail editions are “pre-keyed.” Thanks to this feature, the product key is automatically provided to Microsoft during setup as part of the activation process. If your computer is not online when you install Windows 10, it will complete the activation process the next time it has Internet access. Page: 108 Difficulty: Medium [Question] Describe the limitations of signing in to Windows 10 using a local account. Answer: If you sign in to Windows 10 with a local account, it only gives you access to local resources. You will need to sign in separately to any Microsoft services you use.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 109 Difficulty: Medium [Question] Describe the advantages of using the Web-based installer to upgrade to a retail edition of Windows 10. Answer: The advantages of using the Web-based installer to upgrade to a retail edition of Windows 10 are that it is quick, requiring very little user input, and the Web-based installer includes the functions of both the Upgrade Advisor as well as the settings and data migration tool. Page: 110 Difficulty: Medium [Question] Describe the default Windows Update settings for the Windows 10 retail editions: Home and Pro. Answer: Windows 10 is configured for automatic Windows updates by default. In fact, at this time, this setting is mandatory for these editions of Windows 10. The authors recommend also configuring Windows update to update all installed Microsoft software, not just Windows Components. Some updates are actually upgrades, and these can be delayed, but Microsoft does not recommend this. Page: 128 Difficulty: Medium [Question] Describe a task you may want to perform on a computer you purchased with Windows 10 preinstalled. Answer: Manufacturers often install software—some useful, and some not-too-useful (known as bloatware). Therefore, you may need remove unnecessary software, uninstalling the software you do not wish to keep. Some may be trial software, requiring that you purchase it after a predetermined trial period after which it will not function. Page: 132 Difficulty: Medium [Question] Describe how you would use Device Manager to detect and resolve driver problems in Windows 10. Answer: Open Device Manager and check for an expanded device type node, indicating that a device is not working properly. If one is indicated respond to the message. If none is detected, browse through the devices. Even if a device seems to be working properly, one with a generic driver may not be using all its function. Try the Device manager Update option to update a problem or generic driver. In the case of a problem driver, if the Rollback button is active, that indicates that the driver was previously updated, try rolling back the driver, in case the updated driver caused problems. Page: 121 Difficulty: Medium [Question] What Control Panel page consolidates links to all settings for making Windows 10 easier to use for someone with special visual or auditory needs? Answer: The Ease of Access Center is the Control Panel page that consolidates links to all the settings for making a computer easier to use for people with visual or hearing challenges. Page: 128 Difficulty: Medium [Question] Describe the appearance of the Start menu in Windows 10 Tablet mode. Answer: In Windows 10 Tablet mode the open Start screen occupies the entire screen area, the taskbar remains on the bottom of the scree, and the column of Quick links that appears on the left in Desktop mode
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
is replaced with a slender bar with a menu button at the top that opens up the Start menu list. At the bottom of this list are the Power and All Apps Quick links. Page: 136 Difficulty: Medium [Question] Describe the Windows 10 default desktop. Answer: The Windows 10 default Desktop shows just the taskbar with the slender taskbar along the bottom of the screen with the Start button on the far left of the taskbar. To the right of the Start button on the taskbar is the Cortana search box, followed by the Cortana button. Next is the Task view button, followed by a few default shortcuts, including those for Microsoft Edge, File Explorer, and Microsoft Store. On the far right of the taskbar is the Notification area, containing several buttons, including Show Hidden Icons, various system icons, the data and time, and the Action Center button that opens the Action Center with various notifications. The recycle bin shortcut sits near the top left of the screen. The rest is fairly clean, with a background image. Page: 118-121 Difficulty: Medium [Question] Describe the Microsoft Store, what it offers, and what happens when you attempt to make a purchase? Answer: The Microsoft Store is an app that connects to Microsoft’s online site for purchasing apps and services, including games, music, and movies. Each purchase requires that you have a payment method configured and that you provide your MSA password before each purchase. Page: 143 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 5 Supporting and Troubleshooting Windows True/False Questions [Question] Security implemented solely on a desktop or laptop computer is local security. Answer: True Feedback: Local security is implemented on a single desktop or laptop computer. Page: 155 Difficulty: Easy [Question] By default, the local Administrator account is enabled in Windows 10. Answer: False Feedback: The Administrator account is disabled by default. Page: 156 Difficulty: Medium [Question] The registry contains both settings and device drivers. Answer: False Feedback: The registry contains settings; it does not contain device drivers. Page: 170 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A specific format of data in a registry value is called a data type. Answer: True Feedback: A specific format of data in a registry value is called a data type. Page: 174 Difficulty: Medium [Question] The only way you can reliably back up the registry is with Regedit. Answer: False Feedback: The registry is backed up by most backup programs and whenever Windows creates a restore point. You can also initiate the creation of a restore point. Therefore, Regedit is not the only way to back up the registry, although the other methods back up more than the registry which is not a bad thing. Page: 174 Difficulty: Medium [Question] You need administrative privileges to connect a device that was previously installed in Windows. Answer: False Administrative privileges are required to install a device and its drivers, but once a device is installed anyone can connect a device with the expectation that it will work. Page: 185 Difficulty: Medium [Question] Manufacturers who preinstall Windows on computers have the option of adding their own repair tools to the Windows Recovery Environment (Windows RE). Answer: True Feedback: Manufacturers who preinstall Windows on computers have the option of adding their own repair tools to the Windows Recovery Environment (Windows RE). Page: 187 Difficulty: Medium [Question] The default Windows 10 startup mode depends on a Hybrid Shutdown. Answer: True Feedback: The default Windows 10 startup mode depends on a Hybrid Shutdown . Page: 181 Difficulty: Medium [Question] The logon phase is the simplest Windows startup phase, only involving the user logon/sign in. Answer: False Feedback: Several things occur during this phase, in addition to loading the Windows Logon service, other services and programs start, and Windows initiates plug and play detection. Page: 181 Difficulty: Medium [Question] Windows PE is a scaled-down Windows operating system that supports the Windows Setup GUI as well as the Windows Recovery Environment. Answer: True Feedback: Windows PE is a scaled-down Windows operating system that supports the Windows Setup GUI as well as the Windows Recovery Environment.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 187 Difficulty: Medium Multiple Choice Questions [Question] Which of the following is not an account type that can be used to sign in to Windows 10? A. local account B. Microsoft account C. Windows Active directory account D. Root Answer: B Feedback: Root, although the name for an administrator account in UNIX and Linux OSs, is not a Windows 10 account type. Page: 156 Difficulty: Difficult [Question] What is the Windows database containing configuration settings in one installation of Windows? A. accounts database B. registry C. binary file D. hive Answer: B Feedback: The registry is the database containing Windows configuration settings. Page: 170 Difficulty: Medium [Question] What type of entry in the Windows registry begins with S-1-5? A. key B. root key C. security ID D. value entry Answer: C Feedback: In the Windows registry an entry called a security ID begins with S-1-5. Page: 174 Difficulty: Medium [Question] What type of Windows registry object is shown as a top level folder in Regedit, contains one or more settings, and is at the top of one of five registry hierarchies? A. key B. root key C. security ID D. value entry Answer: B Feedback: A root key is shown as a top level folder in Regedit. Page: 173 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Which of the following is a tool you can use to back up a portion of the registry? A. Windows Backup B. System Restore C. Device Management D. Regedit Answer: D Feedback: Use Regedit to back up a portion of the registry. Page: 174 Difficulty: Medium [Question] What is the term for an individual setting within a registry key? A. subkey B. value entry C. data type D. active key Answer: B Feedback: A value entry is an individual setting within a registry key. Page: 173 Difficulty: Difficult [Question] When using Regedit to browse through the registry, the key that is highlighted is the ____________. A. subkey B. value entry C. data type D. active key Answer: D Feedback: When using Regedit to browse through the registry, when you click on the folder for a key, that key is highlighted on the left and it is the active key. Page: 173 Difficulty: Medium [Question] What is the term for a registry key within a key? A. subkey B. value entry C. data type D. active key Answer: A Feedback: A subkey is a key that resides within another key. Page: 173 Difficulty: Medium [Question] This term applies to a file that contains a hierarchy of registry keys and is also a part of the permanent registry. A. accounts database B. registry C. binary file D. hive Answer: D
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: A hive is a file that contains a hierarchy of registry keys and is also a part of the permanent registry. Page: 171 Difficulty: Difficult [Question] When using Regedit you select a key on the left; what is visible in the contents pane on the right. A. subkey B. value entries C. data type D. active key Answer: B Feedback: When you select a key on the left in Regedit it becomes the active key and the value entries for that key appear in the contents pane on the right. Page: 173 Difficulty: Medium [Question] What Windows 10 feature examines each of the system files required for the boot process before each file can be loaded into memory? A. Trusted Boot B. ELAM C. Fast Boot D. Secure Boot Answer: A Feedback: Trusted Boot examines each system file required for the boot process before it loads into memory to ensure that the system files have not been altered. Page: 181 Difficulty: Medium [Question] This UEFI firmware feature loads only trusted operating system bootloaders. A. Trusted Boot B. ELAM C. Fast Boot D. Secure Boot Answer: D Feedback: Secure Boot is the UEFI firmware feature that loads only trusted operating system bootloaders. Page: 180 Difficulty: difficult [Question] What is the full name of the MSCONFIG utility? A. Windows Memory Diagnostic B. Safe Mode C. Microsoft Console D. System Configuration Answer: D Feedback: The full name of the MSCONFIG utility is System Configuration. Page: 198 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
What Windows 10 feature brings the hibernated system session from a Hybrid Shutdown out of hibernation to speed up Windows startup? A. Trusted Boot B. ELAM C. Fast Boot D. Secure Boot Answer: C Feedback: Fast Boot brings the hibernated system session from a Hybrid Shutdown out of hibernation to speed up Windows startup. Page: 181 Difficulty: Medium [Question] Which of these registry hive files is saved in a folder named config? Select all that apply? A. BCD B. software C. system D. ntuser.dat Answer: B and C Feedback: The software and system registry hive files are saved in the config folder. Page: 171 Difficulty: Difficult [Question] Which of these registry hive files is saved in the Boot folder in the hidden system partition? Select all that apply. A. BCD B. software C. system D. ntuser.dat Answer: A Feedback: The BCD (Boot Configuration Database)file is saved in the Boot folder in the hidden system partition. Page: 171 Difficulty: Difficult [Question] Use this feature of Device Manager when an updated device driver causes problems. A. Disable B. Update Driver C. Roll Back Driver D. Uninstall Answer: C Feedback: Use the Roll Back feature of Device Manager when an updated device driver causes problems. Page: 189 Difficulty: Hard [Question] If your computer shows symptoms of instability, what simple solution should you try first? A. restart B. Enable Boot Logging C. Safe Mode D. Reset this PC
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: A Feedback: If your computer shows symptoms of instability, first try a restart, which reloads Windows components and gives you a fresh start. Page: 188 Difficulty: Medium [Question] Which of the following is a time consuming Recovery option, that effectively reinstalls Windows 10, giving you a fresh start? A. restart B. Enable Boot Logging C. Safe Mode D. Reset this PC Answer: D Feedback: Reset this PC is a time consuming Recovery option, that effectively reinstalls Windows 10, giving you a fresh start. Page: 193 Difficulty: Medium [Question] What do you need to type at the Command Prompt in order to load the Device Manager utility in Safe Mode with Command Prompt? A. compmgmt.msc B. devmgmt.msc C. compmgmt.exe D. devmgmt.exe Answer: B Feedback: Enter devmgmt.msc from the Command Prompt in order to load the Device Manager utility. Page: 189 Difficulty: Hard [Question] When troubleshooting Windows startup problems use this utility to modify and test startup configuration settings. A. System Configuration Utility B. BCDedit C. Regedit D. Windows RE Answer: A Feedback: Use the System Configuration Utility (MSCONFIG) to modify and test startup settings. Page: 198 Difficulty: Medium [Question] if you are having trouble starting Windows 10 in Safe Mode, you can configure this utility to start Windows in Safe Mode the next time it restarts. A. Control Panel B. Task Manager C. MSCONFIG D. Advanced Boot Options Answer: C Feedback: Use the MSCONFIG utility to start Windows in Safe Mode the next time it restarts. Page: 198
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Use this Windows 10 Settings page to add someone else to your installation of Windows 10. A. Email & accounts B. Family & other users C. Personalization D. Privacy Answer: B Feedback: Use the Windows 10 Family & other users Settings page to add a new account to your installation of Windows 10. Page: 158 Difficulty: Medium [Question] The 64-bit versions of Windows 10 stores 64-bit programs in the ______________ folder. A. bin B. personal C. Program Files (x64) D. Program Files Answer: D Feedback: The 64-bit versions of Windows 10 store 64-bit programs in the Program Files folder. Page: 163 Difficulty: Medium [Question] What method of writing to DVDs and CDs in Windows allows you to add files at any time, as long as the disc has room? A. CDFS B. UDF C. Live File System D. Mastered Answer: C Feedback: The Live File System allows you to add files at any time to a DVD or CD, as long as the disc has room. Page: 168 Difficulty: Hard [Question] Where do local Windows 10 user accounts reside? A. users folder B. memory C. local accounts database D. Active Directory database Answer: A Feedback: Windows 10 user accounts reside in the local accounts database, a part of the registry. Page: 156 Difficulty: Difficult [Question] You can only do this when logged on with an account that is a member of the Administrator’s group. A. Open the Computer Management console. B. Open the Users & Groups folder.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. Manage and create other local accounts. D. Change your password. Answer: C Feedback: You can only manage and create other local accounts when logged on with an account that is a member of the Administrators groups. Page: 156 Difficulty: Medium [Question] What is the Windows 10 utility for managing files? A. Internet Explorer B. Microsoft Edge C. File Explorer D. Windows Explorer Answer: C Feedback: File Explorer is the Windows 10 file management utility. Page: 161 Difficulty: Medium [Question] Each folder and file on an NTFS volume has a table of users and/or groups and their permissions to that folder or file. What is this table called? A. Access Control Entry (ACE) B. permissions list C. rights database D. Access Control List (ACL) Answer: D Each folder and file on an NTFS volume has an Access Control List (ACL), which is a table of users and/or groups and their permissions to that folder or file. Page: 169 Difficulty: Medium [Question] This is a record in a tiny database that contains just one user or group account name and the permissions assigned to this account for access to a file or folder. A. Access Control Entry (ACE) B. permissions list C. rights database D. Access Control List (ACL) Answer: A Feedback: An Access Control Entry (ACE)is a record in a tiny database that contains just one user or group account name and the permissions assigned to this account for access to a file or folder. Page: 169 Difficulty: Easy Essay Questions [Question] Describe what you need to do in order to reset your PC if your storage device is encrypted with BitLocker. Answer: If your storage device is encrypted with BitLocker you will need the BitLocker key before you can reset that Windows 10 PC. Page: 193 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] You believe one of the programs loaded during Windows 10 startup is causing a problem. Describe how to temporarily disable a program that normally loads during Windows startup so that you can determine if that program is the cause of problems. Answer: Open Windows 10 Task Manager and then open the Startup tab. Select the program you believe is the cause of the problem, and then click the disable button. The next time you start up the computer, that program will not be started. Page: 198 Difficulty: Medium [Question] Explain what is so unique about the local Administrator account that it would be disabled by default in Windows. Answer: The local Administrator account is disabled by default in Windows because it is all powerful. Just one example is that it is immune to the User Account Control (UAC) security features, while other accounts that are simply members of the local Administrator's group are not immune to UAC. Therefore, when the Administrator account is logged on, the computer is more vulnerable to a malware attack because UAC will not alert the user to potentially malicious activity. Page: 156 Difficulty: Medium [Question] Name at least four actions that trigger automatic registry changes. Answer: The Windows registry automatically changes whenever: (1) Windows starts up or shuts down, (2) Windows Setup runs, (3) changes are made through a Control Panel applet, (4) a new device is installed, (5) changes are made to the Windows configuration, (6) changes are made to a user's desktop preferences, (7) an application is installed or modified, or (8) changes are made to user preferences in an application. Page: 170 Difficulty: Difficult [Question] Describe an indirect method of backing up the registry that backs up much more, as it creates a snapshot of the Windows installation minus the user's data. This also occurs on a regular basis by default in Windows. Answer: When you use System Restore to create a restore point it backs up the registry, all system files, and program files . Page: 174 Difficulty: Medium [Question] In your own words define the Windows registry . Answer: The Windows registry is a database of all configuration settings that frequently changes as new devices, services, and applications are installed or uninstalled and as operating system components are added and removed and users make changes to their preferences. Page: 170 Difficulty: Medium [Question] Describe and compare Sleep and Hibernate. Answer: The Sleep power option maintains the computer in a very-low-power mode, saving the system state and user session in memory and turning off the screen. Hibernate, does not require any power because it saves an image of the contents of RAM, including the OS, open apps, and the associate data on the local
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
hard drive or other storage media. When you resume from either state you may need to enter your password before returning to Windows. Page: 178 Difficulty: Difficult [Question] Describe a safe method to modify the system startup settings for Windows. Answer: Open the System Properties dialog box on the Desktop. To do that, open the Run box and type sysdm.cpl. Click OK. In System Properties select the Advanced tab. Locate Startup and Recovery at the bottom of this page and click Settings where you can modify the System startup settings. Page: 182 Difficulty: Difficult [Question] Your computer will not boot up normally and boots into Safe Mode. You suspect the problem is with a new device you installed. What utility should you open in Safe Mode and what should you look for? Answer: In Safe Mode open the Device Manager utility and look for a node with a yellow exclamation mark. Then either simply disable the device and try to restart normally or uninstall the device and try to restart normally. Page: 188 Difficulty: Medium [Question] Define the term “file system” and explain the statement, “Windows supports several file systems. Answer: A file system is the logical structure on a storage device for storing and managing files. Windows include code to support several file systems, including (but not limited to) various local and removable storage devices. Some of the file systems supported by Windows are: the FAT file systems (FAT12, FAT16, FAT32, and exFAT), NTFS, CD-ROM File System (CDFS), and Universal Disk Format (UDF). Page: 167-168 Difficulty: Difficult
Survey of Operating Systems 7e - Chapter 6 Apple macOS on the Desktop True/False Questions [Question] While Microsoft Windows has a menu bar at the top of every open window, macOS has a menu bar at the top of the screen, not attached to a window. It contains the menu for the current (active) window. Answer: True Feedback: While Microsoft Windows has a menu bar at the top of every open window, macOS has a menu bar at the top of the screen, not attached to a window. It contains the menu for the current (active) window. Page: 213 Difficulty: Easy [Question] A new Mac comes with macOS preinstalled, and the first time you start it up a series of dialog boxes request information to complete the setup and configuration. Answer: True Feedback: A new Mac comes with macOS preinstalled, and the first time you start it up you must provide information to complete the setup and configuration. Page: 206 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] The icon on the Dock that appears to be a box containing a gear opens the Utilities folder. Answer: False Feedback: The icon on the Dock that appears to be a box filled with gears opens System Preferences. Page: 214 Difficulty: Easy [Question] Notification Center displays all current status messages, such as email, text messages, and system updates. Answer: True Feedback: Notification Center displays all current status messages, such as email, text messages, and system updates. Page: 218 Difficulty: Medium [Question] Control Center lets you organize your open apps into virtual desktops, saving each grouping as a Space. Answer: False Feedback: Control Center does not let you organize your open apps into virtual desktops. It is a panel of quick settings for networking, display, sound, and other features. Page: 219 Difficulty: Medium [Question] Mission Control offers handy quick controls for network connections, display, and sound. Answer: False Feedback: Mission control is a windows management program for navigating among all open apps and for organizing them into virtual desktops, called Spaces. Page: 217 Difficulty: Medium [Question] The Shortcuts tab of the Keyboard pane in System Preferences contains a list of all macOS keyboard and mouse shortcuts. Answer: True Feedback: The Shortcuts tab of the Keyboard pane in System Preferences contains a list of all macOS keyboard and mouse shortcuts. Page: 218 Difficulty: Medium [Question] Gatekeeper guards against malicious programs from locally-connected sources such as USB drives. Answer: False Feedback: Gatekeeper guards against malicious programs downloaded and installed from online sources. Page: 227 Difficulty: Medium [Question] If you select the Firewall setting to block all incoming connections, you will not be able to browse the Web because web pages will not be downloaded to your computer. Answer: False
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: The setting to block all incoming connections only blocks connections initiated outside the computer; it does not block traffic that was requested, such as that generated by browsing the Web. Page: 227 Difficulty: Difficult [Question] If an item has disappeared from the Finder Sidebar, it will reappear the next time you restart macOS. Answer: False Feedback: If an item has disappeared from the Sidebar, use the Finder Preferences pane to select that item and it will display again. Page: 235 Difficulty: Medium
Multiple Choice Questions [Question] You can quickly launch a program from an icon sitting on this GUI object on the macOS desktop. A. Apple menu B. Dock C. Control Center D. Finder Answer: B Feedback: You can quickly launch a program from an icon sitting on the Dock. Page: 213 Difficulty: Medium [Question] What type of OS is Darwin, the core of macOS? A. Linux B. Windows C. UNIX D. DOS Answer: C Feedback: The macOS kernel is built on the UNIX-derived Darwin. Page: 237 Difficulty: Medium [Question] What is the name of the macOS file manager? A. Apple menu B. Dock C. Mission Control D. Finder Answer: D Feedback: Finder is the macOS file manager. Page: 221 Difficulty: Easy [Question] What feature of macOS allows you to manage Spaces? A. Apple menu B. Dock
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. Mission Control D. Finder Answer: C Feedback: Mission Control allows you to manage Spaces. Page: 217 Difficulty: Medium [Question] Check the version of macOS by opening this desktop object and select About This Mac. A. Apple menu B. Dock C. Mission Control D. Finder Answer: A Feedback: Open the Apple menu and select About This Mac to see the version of the macOS. Page: 208 Difficulty: Medium [Question] What program automatically runs the first time you power on a new Mac? A. AirPlay B. Spaces C. macOS Setup Assistant D. Spotlight Answer: C Feedback: The first time you power on a new Mac the macOS Setup Assistant runs, guiding you through the final stages of configuring and personalizing your new Mac. Page: 206 Difficulty: Medium [Question] From this menu you can shut down your computer, access configuration settings, update software, put your Mac to sleep, restart, log out, access recent items, and learn about your Mac. A. System Preferences B. Apple Menu C. mac OS Setup Assistant D. Control Center Answer: B Feedback: Open the Apple menu when you want to shut down your computer, access configuration settings, update software, put your Mac to sleep, restart, log out, access recent items, and learn about your Mac. Page: 209 Difficulty: Medium [Question] What is the macOS equivalent of the Windows Settings app where you can make many configuration changes to your system? A. System Preferences B. Apple menu C. mac OS Setup Assistant D. Control Center Answer: A Feedback: System Preferences is the macOS equivalent of the Windows Settings app where you can make many configuration changes to your system.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 214 Difficulty: Medium [Question] Using this feature of macOS, you can have separate sets of open program windows for the desktop. It is a handy way to organize different projects or to keep your personal work separate from your professional work in separate desktops. A. AirPlay B. Spaces C. macOS Setup Assistant D. Spotlight Answer: B Feedback: Using the macOS Spaces feature you can have separate sets of open program windows for the desktop. Page: 217 Difficulty: Medium [Question] Use this Finder view if you need to see information about files and folders at a glance, including date modified, size, and kind of object (folder or type of file). A. Icons B. List C. Columns D. Gallery Answer: B Feedback: Use the Finder List view if you need to see information about files and folders at a glance, including date modified, size, and kind of object. Page: 222 Difficulty: Easy [Question] What keyboard shortcut opens the folder containing files and folders that appear on your macOS Desktop? A. Command+Shift+H B. Command+Shift+D C. Command+Spacebar D. Command+Option+Esc Answer: B Feedback: Command+Shift+D opens the Desktop folder. Page: 221 Difficulty: Medium [Question] Use this macOS feature to configure automatic backups to a dedicated drive. A. Disk Utility B. Terminal C. Backup D. Time Machine Answer: D Feedback: Time Machine is the macOS feature you can use to automate backups to a dedicated drive. Page: 209 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
In the Finder Sidebar, what folder is represented by an icon resembling a house? A. Desktop B. Documents C. Home D. Applications Answer: C Feedback: The Home folder is represented in the Finder Sidebar with an icon resembling a house. Page: 221 Difficulty: Easy [Question] The Utilities folder contains handy troubleshooting programs. What folder contains the Utilities folder? A. Desktop B. Documents C. Home D. Applications Answer: D Feedback: The Utilities folder resides in the Applications folder. Page: 229 Difficulty: Hard [Question] When you open the General preferences pane, which of the following will quickly return you to the main System Preferences pane? A. Command key B. Show All Button C. control key D. Option key Answer: B Feedback: The Show-All Button will quickly return you to the main System Preferences window. Page: 214 Difficulty: Medium [Question] What key combination will quickly open the macOS Spotlight search utility? A. Command+Shift+H B. Command+V C. Command+Space bar D. Command+X Answer: C Feedback: the Command+Space bar key combination will quickly open the macOS Spotlight search utility. Page: 213 Difficulty: Medium [Question] what key combination will cut a selection? A. Command+Shift+H B. Command+V C. Command+Space bar D. Command+X Answer: D Feedback: The Command+X combination will cut a selection. Page: 223
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Hard [Question] Where can you configure the macOS Firewall settings? A. Network preferences B. Security & Privacy preferences C. Firewall app in Utilities folder D. Account preferences Answer: B Feedback: configure the macOS Firewall settings in Security and Privacy preferences. Page: 227 Difficulty: Medium [Question] What macOS feature encrypts a disk? A. keychain B. FileVault C. Master Password D. Secure Virtual Memory Answer: B Feedback: FileVault is the macOS disk encryption utility. Page: 228 Difficulty: Medium [Question] Which of the following keyboard shortcuts will switch among desktop spaces in macOS? A. Command+Shift+? B. Command+Space bar C. CTRL+Right Arrow D. Command+Option+Esc Answer: C Feedback: CTRL+Right Arrow will switch among desktop spaces in macOS. Page: 217 Difficulty: Hard [Question] This macOS feature protects the swap file from malicious software. A. keychain B. FileVault C. Master Password D. Secure Virtual Memory Answer: D Feedback: Secure Virtual memory protects the swap file from malicious software. Page: 228 Difficulty: Easy [Question] What macOS feature is a secure database of a user’s passwords? A. keychain B. FileVault C. Master Password D. Secure Virtual Memory Answer: keychain
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Keychain is a secure database of a user’s password. Page: 228 Difficulty: Easy [Question] The first account you create on a new macOS computer is this type, with the ability to create other accounts and to change all system preference settings and install software. A. Administrator B. Standard C. Root D. Super user Answer: A Feedback: the first account you create on a new macOS computer is an Administrator type account, able to create other accounts and to change all system preference settings and install software. Page: 231 Difficulty: Medium [Question] This all-powerful account is disabled by default; Apple has tried to ensure that you should rarely need to use it. A. Administrator B. Standard C. Root D. Super user Answer: C Feedback: The root account is the all-powerful account disabled by default. Page: 231 Difficulty: Medium [Question] You have forgotten the password for your local account on your MacBook running a recent version of macOS and FileVault is off. Which of the following will allow you to reset the password so that you can log on again? A. System Preferences B. Apple menu C. Apple ID and password D. Command key Answer: B Feedback: Reset your password on your MacBook using your Apple ID and password. Page: 235 Difficulty: Medium [Question] What must you have to run an iPhone app on a Mac or MacBook? A. FileVault turned off B. macOS version 14 or greater C. M1 Mac D. iOS emulator Answer: C Feedback: You need an M1 Mac (MacBook or Mac) to run an iOS app on a Mac. Page: 212 Difficulty: Hard
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] What macOS feature—first available on iPhones—gives you quick controls for changing settings, such as network connections, volume, and others? A. Apple menu B. Dock C. Control Center D. Finder Answer: C Feedback: Control Center opens on the upper right side of the screen when you click the Control Center button on the menu bar. The button resembles a pair of slider controls like those in Control Panel. In Control Panel you can quickly switch networks, adjust the volume, change the display and/or keyboard brightness, and more. Page: 220 Difficulty: Medium [Question] What Apple feature, enabled under your apple ID in System Preferences, allows you to share selected Apple services with family members? A. M1 Mac B. Family Sharing C. Control Center D. Screen Time Answer: C Feedback: In 1991 Linus Benedict Torvalds invited other programmers to work together to create an opensource operating system for modern computers. Page: 229 Difficulty: Medium [Question] If you are concerned about the strain on your eyes from long hours of using multiple Apple devices, use this Apple feature to first track your usage across your devices, and then set time limits in the app at which you will notified. A. M1 Mac B. Family Sharing C. Control Center D. Screen Time Answer: D Feedback: The Screentime feature allows you to track your usage across your Apple devices and set limits. Page: 229 Difficulty: Easy [Question] What is the latest file system, optimized for solid-state drive (SSD) storage on Apple devices? A. APFS B. exFAT C. HFS+ D. NTFS Answer: B Feedback: Apple File System (APFS) is Apple’s latest files system. It is optimized for SSD storage. Page: 236 Difficulty: Medium Essay Questions
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Describe the Full Screen and Split View features of macOS, how to access them, and how to close one of these views. Answer: The Full Screen feature is app-related, meaning that a macOS must be capable of opening full screen and taking up the entire desktop, including covering the menu bar. The Split View feature allows two Full Screen apps to share the macOS desktop. The key to using these features is the green menu button on the top left of an app window. Click this button once to make the app full screen. Both the menu bar and the green button disappear when an app is in full screen mode. Move the cursor to the top edge of the screen to access the menu bar. Here, you can access the menus or exit full-screen view by clicking the green button on the app window. To enter Slit View mode, click and hold the green button and select a screen position from the drop-down menu: Tile Windows to Left of Screen or Tile Windows to Right of Screen. Page: 218 Difficulty: Difficult [Question] Describe how to add a program to the Dock. Answer: To add a program to the Doc, locate the program in the Applications folder in finder, then drag and drop the program’s icon onto the Dock. Page: 215 Difficulty: Medium [Question] Consider a scenario in which you have an M1 MacBook Pro and a recent model Apple iPhone as well as a new iPad. How can you determine what Apple apps from your mobile devices will run on the MacBook, and how will you install those apps? Answer: Most Apple mobile apps will run on an M1 Mac. First, you must have installed the apps on the iPhone or iPad using the same Apple ID as the one used on your MacBook. Then, on the MacBook open the App Store. Click on the user tile at the bottom of the Sidebar to open the Apple ID Account page. The contents page contains two tabs—one contains a list of the Mac apps you have purchased and the other contains the iPhone and iPad apps you have purchased. Click the tab labeled iPhone & iPad Apps. Each app includes a description, such as “Designed for iPad” or “Designed for iPhone.” These should install and run on the M1 Mac. Some will also state: “Not verified for MacOS.” These may or may not actually install and run on the M1 Mac. The author has had good luck installing these. Click on an app to open its detail page. From there, click to download and install. Page: 212 Difficulty: Medium [Question] An Account Name is the user name for logging in to macOS. When you create a new account in System Preferences Users & Groups, how is your account name created? Answer: When creating a new account enter the Full Name and press the Tab key. macOS will generate an account name derived from the Full Name. At that point, you can change the account name, but once you click the Create User button whatever is in the Account Name text box is permanent. Page: 232 Difficulty: Difficult [Question] You are creating an account for a child to use a Mac and want to protect the child from inappropriate Web sites, limit the hours during which the child may log in, and limit the applications the child can use. How will you do this? Answer: First create the child account as a Standard Account in Users & Groups in System Preferences. Then, click the Show All button and return to the System Preferences home page. Open the Family Sharing
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
preferences from your Apple ID. From this pane you can add the child to your Family Sharing account. From there you can select the services to share and control some settings for the child. Page: 229 Difficulty: Hard [Question] Normally, when you wish to both log out and shut your Mac, you select Shut Down from the Apple menu. When this and other actions, such as using the Force Quit tool, fail to work, what action should you take? Answer: When a Mac will not allow you to log out and shut down—even when you attempt to Force Quit applications—the action of last resort is a hard power-down. Do this by pressing and holding the power button for several seconds until the system shuts down. Page: 234 Difficulty: Medium [Question] Identify and describe the macOS search feature and explain how to use it and what a "live search” is. Answer: The macOS search feature is Spotlight. It is accessed from the menu bar by clicking the button resembling a magnifying glass. This opens the Spotlight Search box on the desktop. As you type in this box, Spotlight does a live search, showing results that change as you enter more text in the box. Page: 213 Difficulty: Medium [Question] You have opened the Security & Privacy preferences pane, but some of the settings are grayed out (unavailable), so that you cannot change them. What do you need to do? Answer: Click on the lock icon on the bottom left of the pane and, when prompted, enter your password (assuming you are an administrative user). Now you can make changes to the formerly unavailable settings. Page: 227 Difficulty: Medium [Question] You are having difficulty connecting to the Internet from home and you called the help desk of your Internet server provider (ISP). They ask for information about your computer's network connection. Where can you find this information in macOS? Answer: In macOS find network connection information in Network Preferences (select the Network icon in System Preferences). Select the network connection in question in the sidebar and click the Advanced button. Now click the appropriate tab for the requested information. This may be the TCP/IP tab or the Wi-Fi tab. Page: 237 Difficulty: Medium [Question] An application is displaying the spinning "busy" icon for no apparent reason, and when you attempt to quit the application, it does not close. What should you do? Answer: Open the Apple menu and select Force Quit; this will open the Force Quit Applications box with a list of open applications. Select the problem application and click the Force Quit button. Page: 234 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 7 Linux on the Desktop True/False Questions
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] GNU was formed to develop a commercial version of a UNIX-like operating system. Answer: False GNU was formed to develop a free version of a UNIX-like operating system. Page: 248 Difficulty: Medium [Question] Ubuntu and Fedora are the only sources of Linux distributions. Answer: False Feedback: Ubuntu and Fedora are just two of hundreds of Linux distributions . Page: 250 Difficulty: Medium [Question] It is impossible to start a live image of Linux in a virtual machine. Answer: True Feedback: It is possible to start a live image of Linux in a virtual machine. In fact, the author recommends using a virtual machine when starting Linux from a live image. This will give you access to your computer (via the host OS) for taking screen shots, notes, and doing other tasks while running a Linux live image. Page: 258 Difficulty: Medium [Question] Because Linux is basically a non-GUI OS, the Ubuntu Linux distribution does not include a GUI. Answer: False Feedback: While Linux is basically a non-GUI OS, it can support a GUI shell, and many distributions of Linux, including those from Ubuntu, include a GUI shell. Page: 255 Difficulty: Medium [Question] When working in a live image of Linux, you are logged in with an administrator user account. Answer: False Feedback: When you run a live image of Linux you are automatically logged in as the Guest—the least privileged account. Page: 24 Difficulty: Medium [Question] Linux is case-sensitive. Answer: True Feedback: Linux is case-sensitive in two ways. First, it preserves the case used in the characters of a file name or directory when created and requires that you enter the correct case to open or manage the file or directory. Second, Linux shell commands are case-sensitive. Commands are entered in lowercase, and so are most command-line options and parameters. Page: 261 & 269 Difficulty: Medium [Question] The various versions of Linux have little in common with one another. Answer: False
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: The various versions of Linux have many things in common, and what you learn about one version will carry over to another version, especially at the CLI. Page: 267 Difficulty: Medium [Question] The Ubuntu shell command sudo does not require the root password, even though it gives the user temporary root account privileges for administrative tasks. Answer: True Feedback: The Ubuntu shell command sudo does not require the root password, even though it gives the user temporary root account privileges for administrative tasks. However, it does require that the current user be logged on with an administrator type account and it prompts for the user’s password before activating sudo. Page: 280 Difficulty: Easy [Question] As in Windows, if you are logged on to Ubuntu Linux as an administrator-type you must provide your own password before doing an administrative task. Answer: True Feedback: If you are logged on to Ubuntu Linux as an administrator-type account you must provide your own password before doing an administrative task. Page: 280 Difficulty: Medium [Question] The word burn is used to describe the act of creating a bootable image on a hard drive. Answer: False Feedback: The word burn is used to describe the act of creating a bootable image on a CD or DVD. Page: 254 Difficulty: Medium
Multiple Choice Questions [Question] When you open a Linux terminal window the prompt you see ends with which of the following characters? A. $ B. ? C. # D. ~ Answer: A Feedback: The Linux CLI prompt is often called the $ prompt. Page: 268 Difficulty: Medium [Question] Which of the following is the short name for a very popular Web server first develop for UNIX, but available for Linux and other operating system? A. sudo B. launcher C. Apache D. RHEL
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: B Feedback: Apache is the short name for Apache HTTP Server. Page: 249 Difficulty: Medium [Question] What organization was created in 1988 to lobby for an open UNIX? A. GNU B. OSF C. Open SUSE D. Linux Answer: B Feedback: The OSF was formed in 1988 to lobby for an open UNIX after AT&T formed a partnership with Sun Microsystems to develop a commercial, proprietary UNIX. Page: 249 Difficulty: Medium [Question] Despite his key role in the development of Linux, this person receives no direct financial gain. A. Linus Torvalds B. Steve Jobs C. Dennis Ritchie D. Fred Linux Answer: A Feedback: Linus Torvalds has never benefited from direct financial gain from his role in the development of Linux. Page: 249 Difficulty: Medium [Question] This is a bootable image of the operating system. It will run from a disc or other bootable media without requiring that the OS be installed on the local computer. A. boot image B. disk image C. live image D. distribution Answer: C Feedback: A live image is a bootable image of the operating system that will run from dis or other bootable media without requirement that the OS be installed on the local computer. Page: 255 Difficulty: Medium [Question] What is the generic term for the user interface to an OS that accepts commands and displays error messages and other screen output? A. CLI B. shell C. GNOME D. BASH Answer: B Feedback: The generic term for the user interface to an OS that accepts commands and displays error messages is shell. Page: 250
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Using a special symbol, such as the tilde (~) or two dots (..), as an option to certain shell commands, you can move around directories in Linux using __________________. A. root B. relative path C. absolute path D. command-line history Answer: B Feedback: Using special symbols as shorthand, you can direct commands to directories that are relative to the current directory. Page: 274 Difficulty: Medium [Question] The shell command cd/usr/sbin is an example of the use of a/an __________________ to point a command to a directory. A. root B. relative path C. absolute path D. command-line history Answer: C Feedback: The shell command cd/usr/sbin is an example of the use of a/an absolute path in pointing a command to a directory. Page: 273 Difficulty: Difficult [Question] Which of these shell commands will display the current directory? A. chgperm B. pwd C. chmod D. cp Answer: B Feedback: The pwd (print working directory)command will display the current (working) directory. Page: 272 Difficulty: Medium [Question] Which of the following would you enter at the Linux CLI to shut down Linux immediately and power off the computer? A. shutdown B. sudo shutdown now C. exit -r D. shutdown -r Answer: B Feedback: the shell command sudo shutdown now causes Linux to shut down and power off the computer. Page: 268 Difficulty: Difficult [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Which of the following will result in an error message if you enter it at the Linux command line? A. shutdown-h now B. shutdown -h now C. man ls D. date Answer: A Feedback: If you enter shutdown-h now at the Linux command line the result will be an error message because it was entered incorrectly without a space between the command (shutdown) and the option (-h). Page: 7 Difficulty: Difficult [Question] Everything in Linux is a __________________. A. driver B. program C. mode D. file Answer: D Feedback: Everything in Linux, is a file, identified within the file system. Page: 260 Difficulty: Medium [Question] This is the one place in Linux where an ordinary user has full control. A. prompt B. mode C. home directory D. GUI shell Answer: C Feedback: A user’s home directory is the one place in Linux where that person has full control. Page: 260 Difficulty: Medium [Question] What directory contains many of the Linux commands and is create when Linux installs? A. /etc B. /bin C. /home D. / Answer: B Feedback: The /bin directory contains many of the Linux commands and is created when Linux installs. Page: 260 Difficulty: Difficult [Question] What directory contains settings and configuration data and is create when Linux installs? A. /etc B. /bin C. /home D. / Answer: A Feedback: The /etc directory contains settings and configuration data and is created when Linux installs. Page: 260
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Use this shell command to modify file permissions. A. chgperm B. pwd C. chmod D. cp Answer: C Feedback: Use the chmod shell command to modify file permissions. Page: 272 Difficulty: Difficult [Question] Use this shell command to copy files. A. chgperm B. pwd C. chmod D. cp Answer: D Feedback: Use the cp shell command to copy files. Page: 272 Difficulty: Medium [Question] Which of the following options for the ls command will show a listing of all files, including hidden files? A. -F B. -l C. -a D. -S Answer: C Feedback: The -a option for the ls command will show a listing of all files, including hidden files. Page: 272 Difficulty: Medium [Question] Which command and option combination will change focus to the user’s home directory, regardless of the current directory? A. cd .. B. cd ~ C. cd / D. cd root Answer: B Feedback: Enter cd ~ to quickly change back to your personal home directory from any other directory. Page: 273 Difficulty: Medium [Question] What command display the entire contents of a file, pausing when the screen is full and waiting for a keystroke to continue? A cd B. sudo C. cp
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. more Answer: D Feedback: Microsoft and IBM introduced this operating system in 1987. Page: 272, 274 Difficulty: Medium [Question] To run a Linux shell command that requires administrative privileges, precede the command with this command, entered as the first command on the same line. A. cd B. sudo C. cp D. userdel Answer: B Feedback: To run a Linux shell command that requires administrative privileges, precede the command with the sudo, entered as the first command on the same line. Page: 280 Difficulty: Medium [Question] A distribution of Ubuntu Linux labeled _________________ will be supported for up to five years with free updates. A. LTS B. live image C. GNOME D. Unity Answer: A Feedback: A distribution of Ubuntu Linux labeled LTS will be supported for up to five years with free updates. Page: 255 Difficulty: Medium [Question] Which command will delete a user? A. su B. sudo C. useradd D. userdel Answer: D Feedback: The command userdel, preceded by sudo will delete a user. Page: 255 Difficulty: Medium [Question] What permissions are assigned by the access mode number 6? A. read only B. read and write C. read and execute D. read, write, and execute Answer: B Feedback: The access mode number 6 assigns read and write permissions. Page: 282 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following is true when you delete a user in Linux? A. The user’s home directory is deleted. B. The user’s home directory is not deleted. C. The user’s home directory is moved. D. The user’s home directory is renamed. Answer: B Feedback: When you delete a user in Linux the home directory is not deleted. Page: 281 Difficulty: Medium [Question] What is the keyboard shortcut for opening a terminal window in the default GUIs for Ubuntu Linux and Raspberry Pi Linux? A. CTRL+L B. CTRL+T C. CTRL+C D. Windows key Answer: B Feedback: The CTRL+T keyboard shortcut will open a terminal windows in Ubuntu Linux and Raspberry Pi. Page: 267 Difficulty: Medium [Question] What is the term for software that is distributed with uncompiled, viewable, and editable program statements? A. daemon B. open-source software C. source code D. object code Answer: B Feedback: Open source software is distributed with uncompiled, viewable, and editable program statements. Page: 249 Difficulty: Medium [Question] Uncompiled program statements are known as __________________. A. daemon B. open-source software C. source code D. object code Answer: C Feedback: Uncompiled program statements are known as source code. Page: 249 Difficulty: Medium [Question] __________________ is an executable program written in machine language; it can be interpreted by a computer’s CPU and loaded into memory as a running program. A. daemon B. open-source software C. source code
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. object code Answer: D Feedback: Object code is an executable program written in machine language; it can be interpreted by a computer’s CPU and loaded into memory as a running program. Page: 249 Difficulty: Medium [Question] A/an __________________ is a program that runs in background until it is activated by a specific command. A. daemon B. open-source software C. source code D. object code Answer: A Feedback: Object code is an executable program written in machine language; it can be interpreted by a computer’s CPU and loaded into memory as a running program. Page: 249 Difficulty: Medium Essay Questions [Question] Explain Ken Thompson’s role in the evolution of Linux. Answer: In the early 1970s, Ken Thompson, a developer working at Bell Labs, was criticized for playing a computer game on company equipment. Thompson’s response to the criticism was to find an unused computer and write an operating system that would run his game. This operating system became the foundation of UNIX. UNIX is the OS on which Linus Torvalds modeled the OS that eventually became known as Linux. Page: 248 Difficulty: Medium [Question] Describe what the trade press called the “UNIX wars” and the organizations involved. Answer: What became known as the UNIX wars was competition between two groups. The one group of UNIX licensees formed the Open System Foundation (OSF) in 1988 to lobby for an “open” UNIX in opposition to the actions of AT&T and Sun Microsystems, who developed a single proprietary UNIX. AT&T and other licensees then formed UNIX International to oppose the OSF. Page: 249 Difficulty: Difficult [Question] Defend or dispute the statement: When you start Linux, if you do not see a log in screen or prompt, you are not logged in as a user. Answer: I dispute the statement because in Linux you are always logged in as a user—even when you do not see a login page or prompt and do not enter a username and credentials. For instance, when you run a live image of Linux, you are automatically logged in as the Guest. Another example is when, during Linux install, you create a user and provide a password for that user but opt for the Automatic Login option. Then, you will not need to enter a password to log in and will go directly to the desktop (or command prompt). However, if you attempt to make a significant settings change or install software, you will be prompted for the password for the currently logged in user (you). Page: 259 Difficulty: Difficult
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] You have installed Ubuntu Linux with the GNOME GUI. Describe the command-line interface (CLI) you will use in this GUI. Answer: The CLI I will use in Ubuntu GHOME is a terminal windows, similar to the Apple macOS Terminal window or the terminal windows that support the Windows Command Prompt and Windows PowerShell. The Ubuntu Linux terminal windows has a $ prompt. Page: 267 Difficulty: Medium [Question] Describe how you would shut down Linux from the Ubuntu GNOME GUI. Answer: To shut down Linux from the Ubuntu GNOME GUI I would first open the System menu by clicking on the top right of the menu bar. From the System menu I would select the Power Out/Log Out option, which expands the system menu to show Power options. Then, I would select the Power Off option, which opens a small dialog box with the choices Cancel, Power Off, or Restart. If I do nothing, it will power off in 60 seconds. Page: 267 Difficulty: Difficult [Question] Describe the purpose of a CLI shell and describe a traditional Linux CLI shell. Answer: A shell is a user interface. A CLI shell is a command-line interface shell. BASH is a traditional Linux CLI shell. Page: 250 Difficulty: Medium [Question] Discuss the notion of command-line history, its use, how to take advantage of it, and where Linux stores command-line history. Answer: Command-line history is a cache or all the commands you enter in a single session. You can access this command-line history to keep from having to repeat previous commands. Browse through these commands using the down and up arrow keys. Then you can simply hit enter to use a command exactly as it was, or you can use the backspace to remove the options and parameters and enter new ones. Command line history is saved in the file named .bash_history. Page: 270-271 Difficulty: Difficult [Question] Describe the LivePatch service for Ubuntu and the problem it solves. Answer: LivePatch is a service provided by Ubuntu to solve the problem resulting from the need for a user to initiate a restart before an update can be installed—even a security update. The LivePatch service requires that you enter the user password for that installation of Linux (first user), and it required that the user has an Ubuntu Single Sign-On Account. Page: 258 Difficulty: Medium [Question] In Linux, who is the owner of a file or folder? Answer: In Linux, the owner of a file or folder is the user who created that file or folder. Page: 281 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A file has the Linux permissions rwxr-xr-x. Describe what these permissions are and to whom they apply. Answer: Each group of three characters in a set of permissions applies to an entity. In order from left to right, they show the permissions for owner, the group the owner belongs to, and all other users. So, this set of permissions would give the owner read, write, and execute permissions, the group read and execute, and all others read and execute. Page: 281 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 8 Chromebooks and Chrome OS True/False Questions [Question] When using a Chromebook, you work entirely within the Chrome browser. Answer: False Feedback: The Chrome OS runs on the Chromebook. This OS, while based on the Chrome browser, does have a desktop with GUI objects, such as the Launcher and the shelf, and the Chrome browser runs in a window, as do other apps. Page: 290 Difficulty: Easy [Question] When working on a Chromebook, your data and apps must reside exclusively in the Google cloud. Answer: False Feedback: Chrome OS is the OS on Chromebooks. Google has moved from their original plan for a browser-based OS environment in which all apps and data reside in the Google cloud. The Chrome OS file manager, Files, supports files residing in many locations, including on the local device. Page: 307 Difficulty: Medium [Question] A browser extension is a type of app. Answer: False Feedback: A browser extension is an add-on to a browser that runs within the browser, adding features to the browser while the browser accesses various websites. Page: 302 Difficulty: Medium [Question] A web app runs in its own window on the desktop. Answer: False Feedback: A web app runs from a website and within a browser, not in its own window. It is not installed into the OS. Page: 302 Difficulty: Medium [Question] You cannot print to a local printer when using the Chrome OS. Answer: False Feedback: You can print to a local printer from the Chrome OS unless you have a very old version of Chrome OS (not likely, as it updates automatically). Previously you had to go through the Google Cloud
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Print service to print to your local printer because printer manufacturers were reluctant to provide Chrome OS drivers for their printers. Page: 299 Difficulty: Medium [Question] Closing the lid on your Chromebook is quick way to power off. Answer: False Feedback: Closing the lid on your Chromebook will put the OS to sleep. That is the default settings. In fact, that is the default setting on many laptops. Page: 297 Difficulty: Medium [Question] Google’s Security Checkup will report on the devices you have recently logged into with your Google account, plus other helpful information. Answer: True Feedback: Google Security Checkup tracks the devices from which you have logged in to your Google Account. Page: 310 Difficulty: Medium [Question] To use 2-Step Verification you need a way of receiving a code at the time you (or someone) attempt to sign in to a new device. Answer: True Feedback: When you enable 2-Step Verification, you must provide a method for Google to send a one-time verification code back to you via email, voice message, or text message. Page: 310 Difficulty: Medium [Question] The Chrome OS shelf can be positioned on the sides or bottom of the screen, but not at the top of the screen. Answer: True Feedback: The Chrome OS shelf can be positioned on the sides or bottom of the screen, but not at the top of the screen. Page: 298 Difficulty: Medium [Question] If your Chromebook is configured to connect to a cellular network (Verizon, T-Mobile, etc), you do not need to enter a network name. Answer: True Feedback: Most Chromebooks do not have cellular hardware (a cellular modem) and rely on connecting to a Wi-Fi network, which requires entering a network name (SSID) as well as the password for the Wi-Fi network. Page: 290 Difficulty: Medium Multiple Choice Questions
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following is the Chrome OS app for managing local files on a Chromebook as well as those in Google Drive? A. Finder B. File Explorer C. Files D. Docs Answer: C Feedback: The Chrome OS includes the Files app for managing both local files and those stored on Google Drive. Page: 307 Difficulty: Medium [Question] You need one of these to sign into a Chromebook. A. Google Account B. Passcode C. Keyboard D. Administrator Answer: A Feedback: You need a Google Account to sign in to a Chromebook. Page: 290 Difficulty: Medium [Question] Click or tap on this object located on the bottom right of the Chrome OS screen to see the status of network connections, battery life, and more. A. Shelf B. Launcher C. Chromebit D. Status tray Answer: D Feedback: When you click or tap the Status tray a pop-up displays with status information, such as battery life, network and Bluetooth connections, screen brightness, speaker volume, Accessibility, Night Light, and day and date. Page: 296 Difficulty: Medium [Question] This screen object contains shortcuts to features and apps and appears as a bar in the default position at the bottom of the screen. A. Shelf B. Launcher C. Notification Area D. Status tray Answer: A Feedback: The Chrome OS Shelf contains shortcuts to features and apps and appears as a bar in the default position at the bottom of the screen. Page: 294 Difficulty: Medium [Question] Pressing this keyboard shortcut on a Chromebook locks the screen.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. CTRL+Switcher B. CTRL+SHIFT+SWITCHER C. SWITCHER D. SEARCH+L Answer: B Feedback: Pressing the SEARCH+L keyboard shortcut on a Chromebook locks the screen. Page: 297 Difficulty: Medium [Question] Add _______________ to the shelf so that you can quickly launch your favorite apps. A. Android apps B. browser extensions C. files D. shortcuts Answer: D Feedback: Add shortcuts to the shelf so that you can quickly launch your favorite apps. Page: 294 Difficulty: Medium [Question] Verifying your identity with this option is sometimes referred to as Over the Phone (OTP). A. email B. touch ID C. text message D. video Answer: C Feedback: Verifying your identity with a text message is sometimes referred to as Over the Phone (OTP). Page: 310 Difficulty: Medium [Question] What is the name of the portion of the shelf that contains shortcuts of apps that display status information? A. tote B. notification area C. Launcher D. status tray Answer: B Feedback: The notification area is the portion of the shelf that contains shortcuts of apps that display status information. Page: 296 Difficulty: Medium [Question] What does the small solid white button on the right side of the Launcher page represent? A. Most frequently used app B. Explore C. current page D. notification area Answer: C Feedback: The small solid white button on the right side of the Launcher page represents the current page, while each button with a simple white circle represents another page. Page: 294
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Which of the following actions causes the current user to be signed out? A. Switch user B. Sleep C. Lock screen D. Settings Answer: A Feedback: When a user selects Switch user, that user is signed out of Chrome OS. Page: 297 Difficulty: Medium [Question] What should you select from the Settings options to see the Chrome OS version information? A. On Startup B. Reset Settings C. Accessibility D. About Chrome OS Answer: D Feedback: To see the current Chrome OS version information select the About Chrome OS option from the Settings options. Page: 298 Difficulty: Medium [Question] Personalize your desktop by positioning this screen object on the left, right, or bottom of the screen. A. Shelf B. Launcher C. Wallpaper D. Status tray Answer: A Feedback: Personalize your desktop by positioning this screen object on the left, right, or bottom of the screen. Page: 298 Difficulty: Medium [Question] Change this desktop setting in Chrome OS to have the greatest visual impact. A. Shelf B. Launcher C. Wallpaper D. Status tray Answer: C Feedback: Change this desktop setting in Chrome OS to have the greatest visual impact. Page: 298 Difficulty: Medium [Question] It is easy to confuse the Chrome OS Settings with the __________________ settings. A. Google Account B. Chrome browser C. Network
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. Launcher Answer: B Feedback: It is easy to confuse the Chrome OS Settings with the Chrome browser settings. Page: 313 Difficulty: Medium [Question] While not an actual app, one of these will add features and functionality to your browser. A. Web app B. extension C. Android app D. Linux app Answer: B Feedback: While not an actual app, an extension will add features and functionality to your browser. Page: 302 Difficulty: Medium [Question] Where can you acquire browser extensions for Chrome? A. Google Play Store B. Settings app C. Chrome Web Store D. Accessibility Answer: C Feedback: Acquire browser extension for Chrome in the Chrome Web Store. Page: 302 Difficulty: Medium [Question] Where will you configure settings to secure a Chromebook? Select all that apply. A. Google account settings B. Cloud C. Notification area D. Chrome OS Settings Answer: A & D Feedback: Configure settings to secure a Chromebook in your Google account settings and Chrome OS Settings. Page: Difficulty: Medium [Question] Look for one of these after you install an extension. A. Shortcut in the Launcher B. New desktop window C. icon on the browser toolbar D. shortcut on shelf Answer: C Feedback: Look for an icon on the browser toolbar after installing an extension. Page: 302 Difficulty: Medium [Question] What is the official source for Android apps for your Chromebook?
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. Play Store B. Settings C. Chrome Web Store D. Accessibility Answer: A Feedback: The official source for Android apps for a Chromebook is Play Store. Page: 306 Difficulty: Medium [Question] Use this option to respond with a Yes or No on your phone when you attempt to sign in with your Google account on a new device. A. Over the Phone (OTP) B. Google Prompts C. Passwords and Forms D. 2-Step Verification Answer: B Feedback: Use the Google Prompts app to simply respond with a Yes or No on your phone when you attempt to sign in with your Google account on a new device. Page: 310-311 Difficulty: Hard [Question] Go into your Google Account settings and run this to see if there are any security problems you should address. A. Security Checkup B. 2-Step Verification C. Find your phone D. My activity Answer: A Feedback: Go into your Google Account settings and run Security Checkup to see if there are any security problems you should address within your Google account. Page: 310 Difficulty: Medium [Question] This Chrome OS utility is useful when you need to test for hardware problems. A. Powerwash B. Security Checkup C. Diagnostics D. Switcher Answer: C Feedback: The Diagnostics app is useful for testing your Chromebook hardware. Page: 314 Difficulty: Medium [Question] If a diagnostics test of your Chromebook shows that this (percentage) measurement of the health of one component has declined, you may need to have the Chromebook serviced. What is this component? A. CPU B. touch screen C. battery D. memory
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: C Feedback: If a diagnostics test of a Chromebook shows that the battery health (measured as a percentage) is declining you may need to have it serviced to replace the battery. Page: 314 Difficulty: Medium [Question] The diagnostics of these two hardware components reflect the number and behavior of the apps you are running. A. CPU B. touch screen C. battery D. memory Answer: A & D Feedback: An increase in the usage of both the CPU and memory on a Chromebook is affected by the number and behavior of the apps that are currently running. Page: 314 Difficulty: Easy [Question] When you have taken steps to resolve a problem with your Chromebook, but the problem persists, especially if it is related to performance, what drastic step should you consider? A. Powerwash B. Security Checkup C. Diagnostics D. Switcher Answer: A Feedback: When all else fails consider doing a Powerwash of your Chromebook. Page: 314 Difficulty: Hard [Question] You have bought a new Chromebook and would like to donate the older one to a school. What feature of Chrome OS should you take before doing this? A. Powerwash B. Security Checkup C. Diagnostics D. Switcher Answer: B Feedback: Before donating a Chromebook (or discarding or repurposing it) do a Powerwash to return it to its “out of box” state. The next time it is powered up the new user can sign in with their own Google account and configure and personalize it. Page: 315-316 Difficulty: Hard [Question] In the Chrome OS Advanced settings, which category do you select to access the Powerwash option? A. Print and scan B. Developers C. Diagnostics D. Reset settings Answer: D Feedback: The Powerwash option is located under the Advanced category labeled Reset Settings.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 315 Difficulty: Medium [Question] Of the following, which are processor metrics, measure by the Chrome OS Diagnostics utility? Select all correct answers. A. cycle count B. GB available C. temperature D. current speed Answer: C & D Feedback: The Chrome OS Diagnostics utility measures these processor metrics: current usage, temperature, and current speed. Only (C)temperature and (D)current speed are listed above. Page: 315 Difficulty: Difficult [Question] The Chrome OS Diagnostics utility measures __________________ for memory. A. cycle count B. GB available C. temperature D. current speed Answer: B Feedback: The Chrome OS Diagnostics utility measure memory space available, shown as GB available. Page: 315 Difficulty: Medium [Question] When working in the Chrome OS Files app, files on this location will be read-only. A. Google Drive B. Non-Google cloud storage C. CD and DVD drives D. USB flash drives Answer: C Feedback: Files on CD or DVD drives will be read-only. Page: 307 Difficulty: Difficult Essay Questions [Question] What settings should you configure to protect your data and your Chromebook? Answer: You should configure both your Google Account settings and your Chrome OS Security and Privacy Settings to protect your data and Chromebook. Page: 310-313 Difficulty: Medium [Question] Describe the limits that may prevent you from locating a lost Chromebook through your Google Account. Answer: While your Google Account includes a list of all devices from which you have signed into your Google Account to access Google services, it can only track the location of an Android device. Even then, it can be tracked only IF the Find Your Phone option is enabled on the Android device. This is not (presently)
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
available on Chromebooks. One reason for this is that most Chromebooks and other laptops do not have GPS and other location services available. Page: 310 Difficulty: Medium [Question] Why was it complicated to print from Chrome OS to local printer on your desk, and why is this no longer a problem? Answer: For years it was difficult to print to a local printer because there were no (or very few) printer drivers for printing in Chrome OS to many printers. This was because printer manufacturers were reluctant to invest time and money in developing printer drivers for a new, unproven operating system. Therefore, you had to print via Google Cloud Print, a Google Cloud services that was retired December 31, 2020. That has changed with the popularity of Chromebooks in education, and there are now printer drivers available for many popular printers and you can configure your Chromebook to connect to a USB or Wi-Fi printer. Page: 299 Difficulty: Medium [Question] Explain the significance of the first account used to sign in to a Chromebook. Answer: As with Windows and macOS on their respective devices, the first person to sign into a Chromebook is the owner. This person is the only user who can make significant changes to the Chromebook settings. Page: 291 Difficulty: Medium [Question] Describe the steps to take to discover the version information for Chrome OS. Answer: To see the Chrome OS version information begin by clicking or tapping the Status bar. Then, click or tap the Settings button (identified by the gear icon). After the Settings app opens, scroll down the sidebar on the left and click or tap About Chrome OS. The pane on the right will now contain the About Chrome OS information, including the version information, which appears just under the title. Page: 298 Difficulty: Medium [Question] Now that you have installed apps onto a Chromebook, you would like to synchronize the different types of data across all your devices that use this account. How can you enable this? Answer: This is a Google Account setting. To change it from Chrome OS, first click or tap the Chrome OS status. From the Status menu select Settings (gear icon); select Accounts (previously labeled “People.” Under Accounts select Sync and google services. Then select Manage what you sync. This opens the list of data types you can manage across your devices. Page: 305 Difficulty: Medium [Question] One reason you acquired a Chromebook is because you have an Android phone with many apps that you frequently use. Discuss how to install these apps on your Chromebook and also discuss how the apps will appear. Answer: You will be able to install the apps on your Chromebook, assuming they are available in the Google Play store. Once installed, it may have the same appearance as it does on the Android phone—right down to the small screen size, but more and more Android apps can be resized once they are installed in Chrome OS. In Chrome OS the maximize button on the window for the Android app may expand the window containing the app, but in many cases, the Android app may display in smartphone size within the window.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 306 Difficulty: Hard [Question] You have 2-Step Verification turned on and Google prompts is then enabled by default. Describe what will happen if someone attempts to sign in to a new device with your Google credentials. Answer: With 2-Step Verification and Google prompts, if someone uses your Google Account credentials to sign in to a device, you will get a Google prompts message on every phone you are signed into, and you can review the message and accept or reject the sign-in, which will lock them out of your account. Page: 310-311 Difficulty: Medium [Question] Describe the contents of the My Files folder in the Files app. Answer: The contents of the My Files folder in the Files app are local files, organized into categories. The example Figure 8-21 shows that My files contains a Downloads folder and a Play files folder. The Play files folder contains separate folders for Movies, Music, and Pictures. You may also have a Camera folder under My files. Page: 308 Difficulty: Difficult [Question] Does the My files app allow you to manage your cloud-based files? Describe what you see in the Files app that supports your answer. Answer: The Files app supports cloud-based files, as evidenced in Figure 8-21 in which there are folders for two cloud storage services, Google Drive, and OneDrive. Page: 308 Difficulty: Medium Survey of Operating Systems 7e - Chapter 9 Connecting Desktops and Laptops to Networks True/False Questions [Question] An IP address is not assigned to a computer but to each network interface card (NIC), and there can be more than one NIC in a computer, each with a unique IP address. Answer: True An IP address is not assigned to a computer but to each network interface card (NIC), and there can be more than one NIC in a computer, each with a unique IP address. Page: 323 Difficulty: Medium [Question] A computer that provides services to other computers over a network is a client. Answer: False Feedback: A computer that provides services is a server; it “serves” its clients running on other computers. Page: 321 Difficulty: Medium [Question] Only an advanced user should change network configuration settings. Answer: True
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Most desktop systems will by default automatically install and configure support for a network adapter card, including the TCP/IP protocol and the IP configuration. Only an advanced user should change network configuration settings. Page: 326 Difficulty: Medium [Question] An Internet service provider (ISP) may specialize in one Internet WAN connection type. Answer: True Feedback: An Internet service provider (ISP) may specialize in one Internet WAN connection type. Some specialize in satellite connections; phone companies often specialize in dial-up and DSL, although some also offer cable service. Virtually all cable television services also provide Internet connection service. Page: 333 Difficulty: Medium [Question] Wi-Fi is an example of a wireless wide area network (WWAN) technology. Answer: False Feedback: Wi-Fi is an example of a wireless wide area network (WWAN) technology. Page: 334 Difficulty: Medium [Question] As a rule, a desktop computer in a Microsoft domain should not have File and Printer Sharing turned on. Answer: True Feedback: As a rule, a desktop computer in a Microsoft domain should not have File and Printer Sharing turned on. Page: 354 Difficulty: Medium [Question] The encapsulation of a VPN tunnel fully protects communications over the VPN. Answer: False Feedback: The encapsulation of a VPN tunnel does not fully protect communications over a VPN. The data that travels within the tunnel should be encrypted. This is sometimes referred to as point-to-point encryption. Page: 389 Difficulty: Medium [Question] Windows Network Troubleshooter, a GUI tool included with Windows, will diagnose a network problem, and instruct you on how to solve the problem. Answer: True Feedback: Windows Network Troubleshooter, a GUI tool included with Windows, will diagnose a network problem, and instruct you on how to solve the problem. Page: 355 Difficulty: Medium [Question] When using Web mail, you must use email client software. Answer: False Feedback: When using Web mail, you do not need email client software. Web mail uses your browser to connect to an email server. Page: 349
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] A Windows desktop computer cannot play the file and printer sharing server role. Answer: False Feedback: A Windows desktop computer is capable of play the file and printer sharing server role is that service is turned on in Windows. Page: 353 Difficulty: Medium
Multiple Choice Questions [Question] In computing a ____________ is both a set of rules, usually formalized in a published standard, as well as an implementation of that set of rules. A. Router B. zone C. protocol D. stack Answer: C Feedback: In computing a protocol is both a set of rules, usually formalized in a published standard, as well as an implementation of that set of rules. Page: 322 Difficulty: Medium [Question] An IPv6 address is this size. A. 32 bits B. 128 bits C. 256 bits D. 512 bits Answer: B Feedback: An IPv6 address is 128 bits. Page: 324 Difficulty: Medium [Question] An IPv4 address is this size. A. 32 bits B. 128 bits C. 256 bits D. 512 bits Answer: B Feedback: An IPv4 address is 32 bits. Page: 323 Difficulty: Medium [Question] This version of Internet Protocol (IP) has been the prevailing version since 1983, but it is being phased out. A. IPv2 B. IPv5 C. IPv4
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. IPv6 Answer: C Feedback: The IPv4 version of Internet Protocol (IP) has been the prevailing version since 1983, but it is being phased out. Page: 322 Difficulty: Medium [Question] What version of Internet Protocol (IP) is this address: 2002:470:b8f9::20c:29ff:fe53:45ca? A. IPv2 B. IPv5 C. IPv4 D. IPv6 Answer: D Feedback: The address 2002:470:b8f9::20c:29ff:fe53:45ca is an example of an IPv6 address. Page: 325 Difficulty: Medium [Question] What organization oversees the registrar who administer domain names for the Internet? A. IANA B. ICANN C. ISP D. ADSL Answer: B Feedback: ICANN oversees the registrar who administer domain names for the Internet. Page: 328 Difficulty: Difficult [Question] Which of these choices is the correct command for viewing the IP configuration of all your network connections in a Windows CLI? A. ifconfig -a B. ipconfig /all C. netstat D. ping Answer: B Feedback: The command for viewing the IP configuration of all network connections using a Windows CLI is ipconfig /all. Page: 331 Difficulty: Medium [Question] Which of these choices is the correct command for viewing the IP configuration of all your network connections in a Linux BASH or macOS terminal window? A. ifconfig -a B. ipconfig /all C. netstat D. ping Answer: A Feedback: The ifconfig -a command is the correct command for viewing the IP configuration of all your network connections in a Linux BASH or macOS terminal window.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 332 Difficulty: Medium [Question] A connection to the Internet is a __________________ connection. A. WAN B. LAN C. VLAN D. Wi-Fi Answer: A Feedback: A connection to the Internet is a WAN connection. It may be either wired or wireless. Page: 333 Difficulty: Medium [Question] To see if there are Microsoft File and Printer Servers on your network, open the Windows 10 File Explorer and browse to the ______________ folder. A. Windows Server B. Microsoft Domain C. Network D. Shared Answer: C Feedback: To see if there are Microsoft File and Printer Servers on your network, open the Windows 10 File Explorer and browse to the Network folder. Page: 353 Difficulty: Easy [Question] This slow wired WAN technology uses the phone line; an inexpensive ISP subscription should be the only additional cost, but you cannot connect to the Internet and use your phone on the same line simultaneously. A. Wi-Fi B. dial-up C. Ethernet D. DSL Answer: B Feedback: Dial-up uses the phone line; an inexpensive ISP subscription should be the only additional cost, but you cannot connect to the Internet and use your phone on the same line simultaneously. Page: 334 Difficulty: Easy [Question] The Institute of Electrical and Electronics Engineers (IEEE) standards for wireless Wi-Fi networks are identified as the _______________ standards. A. IEEE 802.2 B. IEEE 802.11 C. IEEE 802.3 D. IEEE 802.5 Answer: B Feedback: The Institute of Electrical and Electronics Engineers (IEEE) standards for wireless Wi-Fi networks are identified as the 802.11 standards. Page: 334 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] The ______________ for Microsoft file and printer sharing is installed and enabled by default on a Windows desktop computer. A. Folder B. Client C. Server D. Permissions Answer: B Feedback: The ______________ for Microsoft file and printer sharing is installed and enabled by default on a Windows desktop computer. Page: 354 Difficulty: Medium [Question] This digital service, offered by telephone companies, can simultaneously transmit voice and data over a single phone line, but it transfers data at a maximum of 128 Kbps. A. DSL B. ISDN C. dial-up D. cable Answer: B Feedback: The ISDN digital service, offered by telephone companies, can simultaneously transmit voice and data over a single phone line, but it transfers data at a maximum of 128 Kbps . Page: 335 Difficulty: Medium [Question] This digital service, offered by telephone companies, can simultaneously transmit voice and data over a single phone line with speeds up to 24 Mbps, uses advanced digital signal processing to compress signals, and requires component changes in the telephone network. A. DSL B. ISDN C. dial-up D. cable Answer: A Feedback: The DSL digital service, offered by telephone companies, can simultaneously transmit voice and data over a single phone line with speeds up to 24 Mbps, uses advanced digital signal processing to compress signals, and requires component changes in the telephone network. Page: 335 Difficulty: Medium [Question] Using this wired communications service, data and television signals are transmitted over different channels on the same media simultaneously. A. DSL B. ISDN C. dial-up D. cable Answer: B Feedback: Using the cable wired communications service, data and television signals are transmitted over different channels on the same media simultaneously. Page: 336 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following is an example of a type of WWAN? A. dial-up B. cellular C. cable D. Wi-Fi Answer: B Feedback: Cellular is an example of a type of WWAN. Page: 336 Difficulty: Hard [Question] This service may be the most important service on the Internet because many people who have no other use for the Internet use it. A. World Wide Web B. email C. File sharing D. IMAP Answer: B Feedback: Email may be the most important service on the Internet, because many people who have no other use for the Internet use it. Page: 340 Difficulty: Medium [Question] This protocol allows users to maintain messages stored on an email server without removing them from the server. A. World Wide Web B. email C. File sharing D. IMAP Answer: D Feedback: The IMAP protocol allows users to maintain messages stored on an email server without removing them from the server. Page: 349 Difficulty: Medium [Question] Chrome and Firefox are examples of clients for this service. A. World Wide Web B. email C. File sharing D. IMAP Answer: A Feedback: Chrome and Firefox are examples of clients for this service. Page: 340 Difficulty: Medium [Question] This browser security feature (with different names in various browsers) allows you to browse the Web without saving browsing history. A. Browsing history
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
B. Private browsing C. Cookies D. Masking Answer: B Feedback: Private browsing is a browser security feature that allows you to browse the Web without saving browsing history. Page: 346 Difficulty: Easy [Question] A file server allows you to share both files and __________________. A. permissions B. workgroups C. printers D. services Answer: C Feedback: A file server allows you to share both files and printers. Page: 353 Difficulty: Medium [Question] Connect to a website, then open a Windows CLI and run this command to discover the IP address of the website. A. ping B. tracert C. ipconfig D. netstat Answer: D Feedback: Connect to a website, then open a Windows CLI and run the netstat command to discover the IP address of the website. Page: 361 Difficulty: Medium [Question] This is the connecting point to which a network client connects to a shared folder or printer using the Microsoft file and printer service. A. share B. folder C. HomeGroup D. Home folder Answer: A Feedback: A share is the connecting point to which a network client connects to a shared folder or printer using the Microsoft file and printer service. Page: 353 Difficulty: Medium [Question] Test the ability to communicate with another host over a TCP/IP network with this simple Windows CLI command that sends a small request to an IP address simply asking for a response. A. ping B. tracert C. ipconfig D. netstat
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: B Feedback: Use the Windows CLI ping command to test the ability to communicate with another host over a TCP/IP network. Page: 355 Difficulty: Medium [Question] Verify your Windows computer's IP configuration with this CLI utility. A. ping B. tracert C. ipconfig D. netstat Answer: C Feedback: Verify your Windows computer's IP configuration with the ipconfig CLI utility. Page: 355 Difficulty: Hard [Question] Discover the bottleneck between your Windows computer a server using this CLI utility. A. ping B. tracert C. ipconfig D. netstat Answer: B Feedback: Discover the bottleneck between your Windows computer and a server using the tracert CLI utility. Page: 359 Difficulty: Medium [Question] Which Web browser is distributed by a company known for its popular search engine, popular email service, as well as many other services and online apps? A. Microsoft Edge B. Firefox C. Safari D. Chrome Answer: D Feedback: The Chrome Web browser is distributed by a company known for its popular search engine, popular email service, as well as many other services and online apps. Page: 340 Difficulty: Medium [Question] Both Chrome and Microsoft Edge are based on software from this open-source project. A. Windows B. DOS C. macOS D. Linux Answer: D Feedback: Both Chrome and Microsoft Edge are based on software from the Chromium open-source project. Page: 340 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Firefox is a product of the __________________ Foundation. A. Bluetooth B. Mozilla C. Chromium D. IANA Answer: B Feedback: Firefox is a product of the Mozilla Foundation. Page: 341 Difficulty: Medium Essay Questions [Question] When you view the network connection settings in the operating system explored in this book often include settings for two versions of IP. What are these versions and why are they both present? Answer: The two IP versions visible in the network connection settings for the operating systems used as examples in this text are IPv4 and IPv6. Because they are both present on the Internet, they commonly exist for network connections. Page: 322 Difficulty: Medium [Question] Why do desktop operating systems support two versions of IP? Answer: Desktop OSs support two versions of IP because the Inte3rnet is in transition from IPv4 to IPv6. Until this transition is complete, desktop OSs and all other systems connecting to the Internet will need to support both versions. Page: 322 Difficulty: Medium [Question] How can you make a WAN connection more secure for mobile users and remote workers that need secure communications over a WAN (often over the Internet) to their home office network? Describe the solution and why it is necessary. Answer: You can secure a WAN connection for mobile users and remote workers who need to connect to home office network by using a virtual private network (VPN) service. A VPN is a simulated private network that runs inside a simulated tunnel from end point to end point. Further, this service must include the end-toend encryption of the data over the VPN. Page: 339 Difficulty: Medium [Question] Your computer has a Wi-Fi adapter. Explain how you would connect to the Internet from this computer. Explain what more is needed to make the connection to the Internet. Answer: Wi-Fi is not a technology that connects directly to an ISP, but you can use it to connect to another LAN or device that, in turn has an Internet connection. This is what happens when you go to a coffee shop and connect to their wireless network, which connects through a router to the Internet. This is also true in homes and businesses. There must be a Wi-Fi router that your Wi-Fi adapter connects to. If there are several Wi-Fi routers within range, you will need see several SSID names. Select the correct router by this name. For a secure Wi-Fi connection, the router must require a password. Everyone connected to the router that requires a password will use the same password, but data is encrypted between your device and the router.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 330 Difficulty: Medium [Question] Describe how tracert helps you to find the source of a slow Internet connection. Answer: The command tracert traces the route taken by packets to a destination. Enter the command followed by either the IP address or the domain name of the target host. It will then ping each of the intervening routers, from the nearest to the farthest, showing the length of the delay at each router. From this you can determine the location of the bottleneck, as it will be the router with the longest delay. Page: 359 Difficulty: Medium [Question] Describe the differences between POP and IMAP email clients. Answer: A POP email client deletes messages from the email server every time it picks up messages and stores and manages the messages on the local computer; an IMAP email client leaves messages on the server, storing and managing the messages on the server. Page: 349 Difficulty: Medium [Question] What types of email accounts can you manage in the Microsoft Outlook email client? Answer: You can manage POP, IMAP, and Web mail accounts in the Microsoft Outlook email client. Outlook includes the correct protocols for the popular email services, such as Gmail and Apple, but you may need to provide configuration information for others. Page: 349 Difficulty: Medium [Question] Describe the Windows Network Troubleshooter tool. Answer: The Windows Network Troubleshooter is a tool found in the Windows Settings app under Network and Internet settings. It opens to a wizard that guides you through the troubleshooting process, beginning with selecting the network adapter to diagnose (you can select all network adapters. It runs a series of diagnostics, identifies a problem, and then offers actions you can take to resolve it. Page: 355 Difficulty: Medium [Question] Describe the IP addresses needed on a router to connect two networks. Answer: A router connecting two networks would have two IP addresses—one on each network, and each would be the default gateway on its side of the router, with a net ID matching that of the other IP addresses on the network. Therefore, the network adapter connected to a network with a net ID of 192.168.1 would also have that net ID. Page: 356 Difficulty: Hard [Question] Explain how you can use the nslookup command to help you determine if the inability to connect to a Web server is a naming problem. Answer: Run nslookup from the command prompt in Windows and it will attempt to connect to the nameserver address in your IP configuration. If you see an error message stating that it can't find the server, then either the server is down, or you have the wrong DNS address in your IP configuration. The second is more likely.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Page: 361 Difficulty: Medium Survey of Operating Systems 7e - Chapter 10 Mobile Operating Systems: iOS and Android True/False Questions [Question] BYOD is practiced by employees in many organizations, with or without the employers' approval of this practice. Answer: True Feedback: People bring their own devices to work regardless of the employers’ approval. Page: 369 Difficulty: Easy [Question] All popular mobile devices require a user account associated with the operating system. Answer: True Feedback: All popular mobile devices require a user account associated with the operating system. Page: 371 Difficulty: Medium [Question] Employers who require the use of personal mobile devices in the workplace must also reimburse the employees for cellular voice and data usage. Answer: False Feedback: Strategies and policies for BYOD vary widely from one organization to another. Page: 369 Difficulty: Medium [Question] An administrator can turn off the broadcasting of a network’s SSID. Answer: True Feedback: An administrator can turn off the broadcasting of a network’s SSID, which hides the network from casual viewers. Only people who know the name and enter the SSID and password will be able to access the network. Page: 379 Difficulty: Medium [Question] Both iOS and Android devices can be configured to connect to an Exchange mail server. Answer: True Feedback: Both iOS and Android devices can be configured to connect to an Exchange mail server. Page: 383 Difficulty: Medium [Question] Mobile Devices are immune to Security threats. Answer: False Feedback: Like modern desktop OSs, mobile OSs are targeted by security threats and have many built-in security features. Page: 388
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Easy [Question] You can easily disable the Emergency 911 (E911) location service on a mobile device. Answer: False Feedback: You cannot disable the Emergency 911 (E911) location service on a mobile device. Page: 390 Difficulty: Medium [Question] One reason many organizations do not manage their employees’ personal mobile devices is due to the lack of available software to aid in this huge undertaking. Answer: False Feedback: The mobile device management market is huge with many software products and companies offering MDM as a service. Page: 370 Difficulty: Medium [Question] If you use an Android device, you can only use Google services from that device; you cannot connect to social media or to cloud services offered by Apple, Microsoft, or other providers. Answer: True Feedback: Mobile devices are designed for portability, requiring lightweight components, such as SSD storage. Page: 29 Difficulty: Medium [Question] When manually configuring an IMAP email account, you need the host name of an incoming mail server, as well as that of an outgoing mail server. Answer: True Feedback: When manually configuring an IMAP email account, you need the host name of an incoming mail server, as well as that of an outgoing mail server. Page: 382 Difficulty: Medium
Multiple Choice Questions [Question] Which of the following resembles the name of an outgoing mail server for an IMAP account? A. pop.domainname.com B. imap.domainname.com C. outgoing.domainname.com D. smtp.domainname.com Answer: D Feedback: The URL smtp.domainname.com resembles the name of an outgoing mail server for an IMAP account Page: 282 Difficulty: Medium [Question] Which of the following is not an advantage of BYOD practices to an employer?
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. Quicker response to communications by the employee. B. Some job tasks require the use of mobile devices. C. Terminated employees may leave with work-related data on mobile devices. D. Employees may work beyond normal work hours. Answer: C Feedback: If not properly managed terminated employees may leave with work-related data on mobile devices. Page: 369 Difficulty: Medium [Question] Which of the following is an acronym for a category of software used to enforce policies for BYOD? A. NFC B. MDM C. SIM D. IANA Answer: B Feedback: MDM is the acronym for mobile device management, a category of software (and services) used to enforce policies for BYOD. Page: 370 Difficulty: Easy [Question] The ability to track the whereabouts of a device is enabled and configured in the settings for __________________. A. Network & Internet B. Wi-Fi C. Location D. Cellular Answer: C Feedback: The ability to track the whereabouts of a device is enabled and configured in the settings for Location. Page: 370 Difficulty: Medium [Question] When you purchase an iOS device, you use an existing or new account of this type, which is associated with a variety of services. A. Microsoft account B. Apple ID C. Google account D. Domain account Answer: B Feedback: When you purchase an iOS device, you use an existing or new account of this type, which is associated with a variety of Apple services. Page: 373 Difficulty: Medium [Question] Pairing is the term used when two devices connect using this type of wireless connection. A. Wi-Fi B. Cellular C. Bluetooth
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
D. NFC Answer: C Feedback: When two devices connect using a Bluetooth wireless connection, it is called pairing. Page: 379 Difficulty: Medium [Question] Which of the following terms best describes a scenario in which an employer subsidizes the purchase of an employee's personal mobile device, giving the employee the option of buying a more expensive device if the employee pays the difference? A. BYOD B. Security policy C. MDM D. shared ownership Answer: D Feedback: Shared ownership describes the scenario in which an employer subsidizes the purchase of an employee’s personal mobile device, giving the employee the option of buying a more expensive device, if the employee pays the difference. Page: 369 Difficulty: Medium [Question] What type of account is required on a mobile device using the Android OS? A. Microsoft account B. Apple ID C. Google account D. Domain account Answer: C Feedback: A Google account is required on a mobile device using the Android OS. Page: 372 Difficulty: Medium [Question] Which wireless standard is often used to connect peripherals, such as headsets, speakers, and keyboards? A. Wi-Fi B. Cellular C. Bluetooth D. NFC Answer: C Feedback: Bluetooth is the wireless standard often used to connect peripherals such as headsets, keyboards, and speakers. Page: 379 Difficulty: Medium [Question] Apple uses this wireless technology in their Apple Pay automatic payment system. A. Wi-Fi B. Cellular C. Bluetooth D. NFC Answer: D Feedback: Apple uses NFC in their Apple Pay automatic payment system. Page: 381
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] What option on a mobile device turns off all wireless signals? A. MDM B. Location C. Tethering D. Airplane mode Answer: D Feedback: Airplane mode turns off all wireless signals without powering off a device. Page: 381 Difficulty: Easy [Question] Save money on your data plan by using this type of connection to access the Internet whenever possible. A. Bluetooth B. cellular C. Ethernet D. Wi-Fi Answer: D Feedback: Connect to the Internet through a Wi-Fi hotspot and save on cellular costs. Page: 377 Difficulty: Medium [Question] Which type of wireless network uses a name, a Service Set ID (SSID), to identify an individual network? A. Bluetooth B. cellular C. Ethernet D. Wi-Fi Answer: D Feedback: A Wi-Fi network uses a name (SSID) to identify an individual network. Page: 378 Difficulty: Medium [Question] Depending on your cellular plan, this service can be enabled on a mobile device, often with an extra fee, to share a cellular data connection with other devices via Wi-Fi. A. Airplane mode B. NFC C. BYOD D. mobile hotspot Answer: D Feedback: Depending on your cellular plan, this service can be enabled on a mobile device, often with an extra fee, to share a cellular data connection with other devices via Wi-Fi. Page: 377 Difficulty: Medium [Question] What wireless standard is used by an Apple use to make payments at retailers with systems that support the Apple Pay feature? A. Airplane mode B. NFC
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. BYOD D. mobile hotspot Answer: B Feedback: The NFC wireless standard is used by an Apple use to make payments at retailers with systems that support the Apple Pay feature. Page: 381 Difficulty: Medium [Question] With this option enabled on your mobile device you cannot do tasks that require a wireless connection. A. Airplane mode B. NFC C. BYOD D. mobile hotspot Answer: A Feedback: When Airplane mode is enabled on a mobile device you cannot do tasks that require a wireless connection. Page: 381 Difficulty: Medium [Question] Open this iOS feature by swiping down from the upper right on the Home screen. From here you can control sound, brightness, the clock, and the camera. A. Settings B. iCloud C. Notification Center D. Control Center Answer: D Feedback: Swipe down from the upper right of the Home screen on an iOS device to open Control Center. Page: 382 Difficulty: Medium [Question] What is your first email account on an Android device? A. POP3 B. Gmail C. Hotmail D. Outlook.com Answer: B Feedback: Your first email account on an Android device is a Gmail account. Page: 382 Difficulty: Medium [Question] This Google app allows you to use payment methods saved in your Google Account to pay bills and make purchases. A. Wallet B. Google Pay C. Google Account D. Android Pay Answer: B Feedback: Google Pay is the combined and renamed Android Pay and google Wallet services. Page: 384
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Open the ___________________ app on your Apple mobile device to buy and download apps. A. Play Store B. Apple Store C. App Store D. iTunes Answer: C Feedback: Open the App Store on your Apple mobile device to buy and download apps. Page: 383 Difficulty: Medium [Question] If you have an Android device, backup and sync your contacts to __________________ rather than to your cellular provider. A. Android B. Google C. iTunes D. iCloud Answer: B Feedback: If you have an Android device, backup and sync your contacts to Google rather than to your cellular provider. Page: 385 Difficulty: Medium [Question] Use this app to synchronize data on your iOS device with a Mac or PC. A. Android B. Google C. iTunes D. iCloud Answer: C Feedback: Use the iTunes app to synchronize data on your iOS device with a Mac or PC. Page: 30 Difficulty: Easy [Question] Turn on the option for Wi-Fi sync in __________________ to enable an iPhone to sync with a PC or Mac every time both devices are connected to the same Wi-Fi network. A. Android B. Google C. iTunes D. iCloud Answer: C Feedback: Turn on the option for Wi-Fi sync in iTunes to enable an iPhone to sync with a PC or Mac every time both devices are connected to the same Wi-Fi network. Page: 386 Difficulty: Medium [Question] Use this service to backup data from your Apple mobile device to a central location. A. Android
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
B. Google C. iTunes D. iCloud Answer: D Feedback: Use iCloud to back up your data from your Apple mobile device to a central location. Page: 386 Difficulty: Medium [Question] What extreme measure can you take when a mobile device is lost or stolen, and you want to ensure that data on the device is not available to anyone? A. passcode lock B. remote wipe C. lock screen D. play a sound Answer: B Feedback: The extreme measure you can take when a mobile device is lost or stolen is remote wipe. This ensures that data on the device is not available to anyone. Page: 391 Difficulty: Medium [Question] Your iPhone is missing, and you regret not having set a passcode on the device. What is your best option, via an iCloud service, to protect the data on the phone? A. Backup the data to OneDrive. B. Remotely dial 911 on the device. C. Use Lost Mode to remotely set a passcode. D. Remotely ring the phone. Answer: C Feedback: Your best option is to use Lost Mode to remotely set a passcode. Page: 394 Difficulty: Hard [Question] Complete the following sentence: Android and iOS have … A. passcode lock turned on by default. B. emergency 911 disabled by default. C. location services turned on and mandatory. D. automatic update enabled by default. Answer: D Feedback: Android and iOS have automatic update enabled by default. Page: 388 Difficulty: Medium [Question] What iCloud service will help you locate a lost or stolen Apple mobile device? A. iCloud Manager B. Find my iOS C. Find My iPhone D. Lost Mode Answer: C Feedback: Find My iPhone will help you locate a lost or stolen Apple mobile device. Page: 392
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] When you purchase a mobile device, you activate the device with __________________. A. Microsoft B. Google C. a cellular provider D. Apple Answer: C Feedback: When you purchase a mobile device, you activate the device with a cellular provider. Page: 372 Difficulty: Medium [Question] Configure this for your mobile device to prevent other people from unlocking it. A. Passcode lock B. AirDrop C. Apple ID D. Google Pay Answer: B Feedback: Configure a passcode lock for your mobile device to prevent other people from unlocking it. Page: 388 Difficulty: Easy Essay Questions [Question] Briefly explain how virtualization may be used in mobile device management (MDM). Answer: Virtualization can be used to isolate work apps and data from personal apps and data. It can be in the form of a virtual machine running on a remote device or some variation of application virtualization. Processing occurs on the remote servers. An administrator can remove a user’s access to the virtual apps and data, a handy tool for when an employee leaves a company or moves to another department in a company and does not need to access the same apps and data. Page: 370 Difficulty: Medium [Question] Describe how and why a web-based portal is used from employees’ phones. Answer: A Web-based portal requires only using a web browser on the employees devices but gives them access to their work apps and data. Page: 370 Difficulty: Medium [Question] Define BYOD. Answer: BYOD, an acronym for bring your own device, describes the practice of employees bringing their personal mobile devices to work and using them for accessing work email, text messages, and data. Page: 369 Difficulty: Medium [Question] Describe a mobile device feature, enabled by default in most mobile devices, which can save you money by avoiding expensive cellular data fees.
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Answer: A money-saving feature that is enabled in most cellular mobile devices is the use of a Wi-Fi network, when available, to reduce the cost of downloading data when browsing or using apps on the mobile device. Page: 377 Difficulty: Medium [Question] You need to connect to a Wi-Fi network, but its name is not visible in the list of Wi-Fi networks. Describe what may be happening here and how you can connect to this network Answer: If a network's name is not visible it may be hidden. In that case you will need to ask the administrator of that Wi-Fi network for permission to connect and the name of the network as well as the password required to connect. Once you enter the name and password for a given Wi-Fi network, your mobile device will save that information, and connect to it automatically any time you are in range, if you allow it to automatically connect to known networks. Page: 378 Difficulty: Hard [Question] Describe tethering of mobile devices. Answer: The tethering feature allows you to share your mobile device's cellular data connection with a single computer or other mobile device. Android makes a distinction between connecting to a Wi-Fi hotspot via WiFi and connecting via another method. They use the term tethering for non-Wi-Fi connections to the hotspot device itself. Page: 378 Difficulty: Medium [Question] Describe what you should do about the Bluetooth feature when a Bluetooth device is not connected to your mobile device. Answer: The Bluetooth pairing process is a security vulnerability because someone with a Bluetoothenabled device can connect and install malware if Bluetooth is enabled on your device when you are not using it. When a Bluetooth device is not in range of your mobile device you should turn it off or install a battery management app (if not part of your mobile OS) that will turn it off whenever you disconnect a Bluetooth device. Page: 381 Difficulty: Medium [Question] Describe Apple’s Two-Step Verification versus its Two-Factor Authentication. Answer: Two-Step Verification has been available for several years in Apple ID Security settings. The user must register one or more devices that can receive verification codes from Apple. You will receive a Recovery Key for use if you lose the registered device or forget your Apple ID password. Whenever you sign in using a device that is not trusted by your account, you will need to enter your account password, plus a code sent to your trusted device by Apple. The newer feature, Two-Factor Authentication is available after you have a qualifying device registered with your account (running iOS 9 or greater or OS X 10.11 or greater. Then Two-Factor Authentication appears as an option in Settings. If enabled, anytime someone tries to sign in with your account from an unknown device you will receive two dialog boxes on a trusted device. The first informs you that your Apple ID is being used to sign in to a new device. If you allow it, a second dialog box provides the single-use verification code. Page: 376 Difficulty: Difficult [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Describe how an iPhone user can control usage of cellular data to avoid unnecessary charges. Answer: An iPhone user can control usage of cellular data to avoid unnecessary charges by configuring Cellular Settings on the iPhone. Enable Wi-Fi Calling which will use Wi-Fi when it is available for calls. The Cellular Settings page also shows the user’s data usage for the current billing period. This is important when a plan has limits on the amount of data used. Control just which apps can use cellular data by scrolling down through the list of apps under the Cellular settings. Near the bottom, below the list of apps, there is a setting called Wi-Fi Assist. Enabling this means that when Wi-Fi connectivity is poor, the phone will use the cellular connection for apps with cellular data turned on Page: 379 Difficulty: Medium [Question] Describe where you would find the settings for configuring Wi-Fi calling on an Android phone. Answer: The Android settings Wi-Fi calling may differ depending on the cellular service and version of Android. Open Settings | Network & Internet | Mobile network and look for Wi-Fi Calling under Advanced. Then move the slider to enable it. Page: 397 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 11 File Management in the Cloud True/False Questions [Question] The Google Drive storage space for shared files only counts against the owner’s limit. Answer: True Feedback: The Google Drive storage space for shared files only counts against the owner’s limit. Page: 419 Difficulty: Medium [Question] Files you create with Google Docs, Sheets, or Slides do not count against your Google Drive storage limit. Answer: False Feedback: Beginning with June 1, 2021, any files you create with Google productivity apps (Docs, Sheets, or Slides) do count against your Google Drive storage limit. Page: 419 Difficulty: Medium [Question] Photos or videos you save or back up in Google Drive’s Storage saver format count against your Google Drive storage limit. Answer: True Feedback: Photos or videos you save or back up in Google Drive’s Storage saver format count against your Google Drive storage limit. Page: 419 Difficulty: Easy [Question] Google’s Original format file saving option refers to the file format preferred by professional photographers Answer: False Feedback: Original format lets you save your images in the format saved in a digital camera. A digital camera may be set to save in one of several formats—some of which may be processed and not as large as
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
other camera formats. The format preferred by photographers is RAW, which is unprocessed data and may not be the default format of a camera. Page: 418 Difficulty: Medium [Question] You can only share a file or folder stored in Google Drive with another Google subscriber. Answer: False Feedback: You can share a file or folder stored in Google Drive with either a Google subscriber or a nonGoogle subscriber. In the latter case, you can share using Link sharing. Page: 430 Difficulty: Medium [Question] Anyone with a link to a Google file or folder can edit the contents. Answer: False Feedback: A Google Drive link can be protected. The type of protection, in the form of permissions/roles, depends on the link option. Page: 430 Difficulty: Medium [Question] You cannot assign the same permissions/roles to an unrestricted Google link that you can assign to a Google share. Answer: False Feedback: You can assign the same permissions/roles to an unrestricted Google link that you can assign to a Google share. Page: 430 Difficulty: Medium [Question] The App Store is the official source for the Drobox app for an Android device. Answer: False Feedback: Download the Dropbox app to an Android device from Google Play. Page: 412 Difficulty: Easy [Question] Dropbox Basic allows an individual to share their Dropbox storage with up to five other people. Answer: False Feedback: Dropbox Basic does not allow an individual to share their storage space with other people. Page: 403 Difficulty: Medium [Question] To synchronize files between a cloud service and your PC or Mac, you do not need to install special software. Answer: False Feedback: To synchronize files between a cloud service and your PC or Mac, you do need to install special software that interacts with the local file system. Page: 402 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Multiple Choice Questions [Question] If your school offers network services, such as data storage and online apps, these services are said to run in a/an _____________. A. Chromebook B. private cloud C. operating system D. public cloud Answer: B Feedback: If your school offers network services, such as data storage and online apps, these services are said to run in a private cloud. Page: 400 Difficulty: Medium [Question] Which of the following is a Link sharing option for sharing files in Google Drive with someone who does not have a Google account? Select all that apply. A. Restricted B. Time-limited C. Full Control D. Anyone with the link Answer: A & D Feedback: Restricted and Anyone with the link are both link sharing options in Google. Page: 430 Difficulty: Medium [Question] When accessing Google Drive in a browser from a new device, you may need to enter a/an __________________ if you have enabled two-step verification in your Google account. A. verification code B. password C. passcode D. CAPTCHA Answer: A Feedback: When accessing Google Drive from your browser for the first time on a device, you may need to enter a verification code if you have enabled two-step verification. Page: 427 Difficulty: Medium [Question] Cloud services owned or managed for the benefit of a single organization is an example of a/an ___________________. A. private cloud B. CAPTCHA C. public cloud D. intranet Answer: A Feedback: Cloud services owned or managed for the benefit of a single organization is an example of a private cloud. Page: 400 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] The Viewer role/permission is automatically assigned to which of the following. A. Dropbox Copy Link B. Dropbox shared folder C. Google Restricted Link D. Google shared folder Answer: C Feedback: The Viewer role/permission is automatically assigned to a Google Restricted Link. Page: 430 Difficulty: Medium [Question] Which of the following is a Dropbox plan that allows an individual subscriber to share their storage with up to five other people? A. Dropbox Plus B. Dropbox Basic C. Dropbox D. Dropbox Family Answer: D Feedback: Dropbox Family allows an individual subscriber to share their storage with up to five other people. Page: 403 Difficulty: Difficult [Question] Google uses this type of test to ensure that someone creatin a new account is not a bot. A. verification code B. password C. passcode D. CAPTCHA Answer: D Feedback: Google uses a CAPTCHA test to ensure that someone creatin a new account is not a bot. Page: 419 Difficulty: Medium [Question] How much cloud storage does Dropbox Basic offer? A. 2 GB B. 15 GB C. 5 TB D. 100 GB Answer: A Feedback: Dropbox Basic offers 2 GB of storage. Page: 402 Difficulty: Medium [Question] How much free cloud storage does Google offer to an individual? A. 2 GB B. 15 GB C. 5 TB D. 100 GB Answer: C
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Google offers 15 GB of free cloud storage to an individual. Page: 418 Difficulty: Medium [Question] What is the largest file size that an individual can store in Google Drive? A. 2 GB B. 15 GB C. 5 TB D. 100 GB Answer: C Feedback: An individual can store a file in Google Drive up to 5 TB in size. Page: 418 Difficulty: Medium [Question] Which camera format has the potential of creating the largest photo files? A. Original B. High Quality C. RAW D. Storage saver Answer: C Feedback: The RAW format has the potential of creating the largest photo files because it is unprocessed image data. Page: 419 Difficulty: Easy [Question] Which of the following is a Dropbox individual fee-based plan that includes 2 TB of cloud storage from multiple devices, limited to one user? A. Dropbox Backup B. Dropbox Plus C. Dropbox Basic D. Dropbox Family Answer: B Feedback: The Dropbox Plus plan includes 2 TB of cloud storage from multiple devices, limited to one user. Page: 403 Difficulty: Medium [Question] Which of the following plans, described in this chapter, is a free plan with the greatest amount of free storage? A. Google One B. Google C. Dropbox Basic D. Dropbox Plus Answer: B Feedback: Of the free plans described in this chapter, Google Drive is the one with the greatest amount of free storage at 15 GB. Page: 418 Difficulty: Medium [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Which of the following is a role that has full control over a file or folder in Google Drive? A. Viewer B. Owner C. Editor D. Commenter Answer: B Feedback: The owner of a file or folder in Google Drive has full control. Page: 429 Difficulty: Hard [Question] Which of the following can assign permissions to a share or link in Google Drive? A. Viewer B. Owner C. Editor D. Commenter Answer: B Feedback: In Google Drive the owner can assign permissions to a share or link. Page: 429 Difficulty: Medium [Question] You have signed in to Google in your browser. What is the name of the page where you manage your files and folders? A. My Drive B. Home C. Editor D. Viewer Answer: A Feedback: Manage your files and folder on the My Drive page in Google Drive on the Web. Page: 429 Difficulty: Medium [Question] You can initiate sharing of your Google Drive files and folders from this location. A. My Drive page B. Google Docs app C. Sheets app D. Slides app Answer: A, B, C, & D Feedback: You can initiate sharing of your Google Drive files and folders from the My Drive page, Google Docs app, Sheets app, and Slides app. Page: 418 Difficulty: Hard [Question] You have signed in to Dropbox in your browser. What is the name of the page where you manage your files and folders? A. My Drive B. Home C. Editor D. Viewer Answer: B
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback: Manage your files and folder on the Home page in Dropbox on the Web. Page: 429 Difficulty: Medium [Question] What are your two options for giving someone access to a file or folder in Dropbox? A. Copy Link B. More C. Restricted Link D. Share Answer: A & D Feedback: Select either the Copy ink or Share option to give someone access to a file or folder in Dropbox. Page: 318 Difficulty: Medium [Question] Which sharing option can only be used with other Dropbox members? A. Copy Link B. More C. Restricted Link D. Share Answer: D Feedback: The Share option is the only sharing option that can only be used with other Dropbox members. Page: 418 Difficulty: Medium [Question] If you have this type of account, you automatically have 15 GB of free cloud storage space. A. Gmail B. Hotmail C. Apple ID D. Dropbox Basic Answer: 418 Feedback: This version of Windows also included changes to the appearance of the desktop. Page: 27 Difficulty: Easy [Question] Working in the Dropbox app, when you want to upload files from your device, start on this page. A. My Drive B. Home C. Editor D. Viewer Answer: B Feedback: Working in the Dropbox app, when you want to upload files form your devices, start on the Home page. Page: 413 Difficulty: Medium [Question] Which of the listed operating systems are supported by Dropbox? A. Windows B. macOS
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. Linux D. Android Answer: A, B, C, & D Feedback: All four of the listed operating systems (as well as Apple iOS) are supported by Dropbox. Page: 402 Difficulty: Medium [Question] Which of the listed operating systems are supported by Google Drive? A. Windows B. macOS C. Linux D. Android Answer: A, B, & D Feedback: Google Drive supports Windows, macOS, and Android (as well as Apple iOS), but it does not support Linux. Page: 419 Difficulty: Medium [Question] Which of the listed browsers are supported by Google Drive? A. Chrome B. Firefox C. Microsoft Edge D. Apple Safari Answer: A, B, C, & D Feedback: All the listed browsers are supported by Google Drive. However, Microsoft Edge is only supported on Windows and Apple Safari is only supported on macOS. Page: 419 Difficulty: Medium [Question] What type of Dropbox app will work on in ChromeOS? A. Chrome OS B. macOS C. Linux D. Android Answer: D Feedback: Install the Dropbox Android app in ChromeOS. Page: 402 Difficulty: Medium [Question] Which of the following is a Dropbox feature that is not available in the Dropbox Basic plan? A. Backup B. Smart Sync C. camera uploads D. free storage Answer: B Feedback: The Smart Sync feature is not available in the Dropbox Basic plan. Page: 402 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following features is available with the Dropbox Basic plan? A. Backup B. Smart Sync C. camera uploads D. free storage Answer: A, C, and D Feedback: Backup, camera uploads, and free storage (2GB) are available with the Drobox Basic plan. Page: 402 Difficulty: Medium [Question] Once you install Dropbox into macOS, manage your Dropbox files in this app. A. Dropbox B. Files C. Finder D. File Explorer Answer: C Feedback: Once Dropbox is installed into macOS manage Dropbox files in the Finder app. Page: 408 Difficulty: Medium [Question] Once you install Google Drive for Desktop on a Windows computer, manage your Dropbox files in this app. A. Google Desktop B. Files C. Finder D. File Explorer Answer: D Feedback: Once you install Google Drive for Desktop on a Windows computer, manage your Google Drive files in File Explorer. Page: 423 Difficulty: Easy Essay Questions [Question] Describe Storage saver, the cloud storage service that uses this format, the types of files it applies to, and how it works. Answer: Storage saver is the renamed High Quality format of Google Drive. Before June 1, 2021, any photos or videos saved or backed up in this format did not count against your Google Drive storage limit. Since then, they do. The resolution of the images must be 16 megapixels or less and videos must be 1080p or lower. Any photos or videos that exceed this limit will be compressed when synced to the original device that uploaded them. Page: 419 Difficulty: Medium [Question] Describe the RAW format. Answer: The RAW format is just one of several formats available in a digital camera. The RAW format is the unprocessed data format available in digital cameras and preferred by professional photographers. Other formats process the image, while RAW leaves it in an unprocessed state, creating very large files. Page: 419
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] Describe how to share a folder in Google Drive with someone who is not a Google subscriber. Answer: Share a folder in Google Drive with someone who is not a Google subscriber. From My Drive select a file or folder to share and click or tap the Share button. Enter the email address of the non-Google subscriber. Select Get link and email the link. Page: 430 Difficulty: Medium [Question] Explain how to share a file or folder stored in your Google Drive with another Google subscriber. Answer: From My Drive select a file or folder. From the menu that opens select Share with Others. Then in the Share with Other box enter the email address of the other Google subscriber (a gmail address), select the role (permission) and click Send. Page: 429 Difficulty: Medium [Question] Describe and contrast Google’s Original format versus a camera’s unprocessed format. Answer: Original format lets you save your images in the format saved in a digital camera, but that format varies, based on what default the photographer has set for the camera. The unprocessed format, RAW, is just one of several formats—the others are processed. Page: 419 Difficulty: Hard [Question] Describe what you consider the pros and cons of Google’s Storage saver format for storage of photos and videos. Answer: The Storage saver file format for photos and videos option comes with a maximum resolution of 16 megapixels for photos and 1080p for videos. Photos and videos that exceed these limits will be compressed. The advantage (pro) of this behavior is that is saves space; the disadvantage (con) of this behavior is that the resolution may be lower than what the user desires for photos and videos. Page: 419 Difficulty: Medium [Question] Describe how consumer-level data storage services in the public cloud fit into the larger picture of cloud services. This can be based on your own observations of online experiences at home, school, and/or work. Answer: Consumer-level data storage services in the public cloud fit into the larger picture of cloud services as a loss leader, similar to the bargains retail stores offer to get you in the door. Cloud providers offer private cloud services to consumer—some level of service for free, but I assume they do not realize as much income from these services as the do from private cloud services. Page: 399-402 Difficulty: Difficult [Question] Define the term cloud, as used in this textbook. Answer: The term cloud, as used in this textbook encompasses the online environment in which many services are hosted. The image of a cloud gives a simple visual representation of all the internetworks of the world. Page: 399 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Define collaboration services in the public cloud versus in the private cloud. Answer: Collaboration services at the public cloud level allow people to work at the document level, sharing and working in files. Collaboration services at the private cloud level is broader and feature-rich to allow collaboration on entire projects. Page: 401 Difficulty: Medium [Question] Define and compare the terms online and offline in the context for cloud storage. Answer: In the context of cloud storage, an online file remains online until you download it to work on it. When you save it from your app, it is saved in the cloud. In the same context, a file designated as offline (if the cloud storage service includes this option), is downloaded from the cloud storage to local storage. This allows you to work on the file, even when you do not have Internet access. The next time your device is connected, the offline file is synchronized with the cloud storage. Page: 401 Difficulty: Medium
Survey of Operating Systems 7e - Chapter 12 Windows 11 True/False Questions [Question] You can install Windows 11 on any Windows 10 tablet. Answer: False Feedback: You can only install Windows 11 on a Windows 10 device that meets the requirements. Even if it meets all other requirements, if a tablet has a screen smaller than 9” diagonally, Windows 11 will not install. Page: 4 Difficulty: Easy [Question] After upgrading from Windows 10 to Windows 11 you can continue to use PC Health Check to monitor the health of your Windows 11 system. Answer: False Feedback: PC Health Check is only available for Windows 10, as a tool to determine the status of a Windows 10 computer and if it can upgrade to Windows 11. Page: 3 Difficulty: Medium [Question] If you install Windows 11 on a computer that does not have an Internet connection, you cannot complete the installation. Answer: True Feedback: Windows 11 requires an Internet connection and a sign-on to a Microsoft account to complete installation. Page: 4 and 10 Difficulty: Medium [Question] Windows 11 supports multitouch only on touchscreens. Answer: False
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Feedback Windows 11 supports multitouch on touch screens, the touch mouse, and touchpads. Page: 2 Difficulty: Medium [Question] The Windows Hello biometric sign-in feature is not supported by Windows 11 Home. Answer: False Feedback: Windows Hello biometric sign-in is available in both Windows 11 Home and Windows 11 Pro. Page: 3 Difficulty: Medium [Question] You can configure the Windows 11 Update feature to update all your installed Microsoft software. Answer: True Feedback: One of the Advanced options for Windows 11 Update is Receive updates for other Microsoft products. Page: 34 Difficulty: Medium [Question] If a device is not working correctly after Windows 11 Setup completes, install a driver from the manufacturer. Answer: True Feedback: If a device is not working correctly after Windows 11 Setup completes, Windows may have installed a generic driver or one that is outdated. Connect to the manufacturer’s website and see if there is a Windows 11 driver that you can install. Page: 8 Difficulty: Medium [Question] You must use a payment option in the Microsoft Store for Windows 11 to download a free app. Answer: False Feedback: You do not need a payment method to download a free app from the Microsoft Store for Windows 11. Page: 25 Difficulty: Easy [Question] The Windows Defender Firewall is not included in Windows 11. Answer: False Feedback: Windows Defender Firewall is included in Windows 11, but will be disabled if you install a thirdparty software firewall. Page: 37 Difficulty: Medium [Question] Hyper-V Host is supported on both Windows 11 Home and Windows 11 Pro. Answer: False Feedback: Hyper-V Host is supported on Windows 11 Pro, but not on Windows 11 Home. Page: 3 Difficulty: Medium
Multiple Choice Questions
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following is mandatory to complete the installation of a retail edition of Windows 11 Pro? A. firmware update B. sign-in with an MSA C. registration D. activation Answer: B Feedback: A sign-in with a Microsoft account is required to complete the installation of a retail edition of Windows 11 Pro. Page: 8 Difficulty: Medium [Question] Which of the following is an antipiracy tool? A. Microsoft Product Activation B. product key C. Microsoft account D. password Answer: A Feedback: Microsoft Product Activation (MPA) is an antipiracy tool, ensuring that the Windows OS is licensed. Page: 8 Difficulty: Medium [Question] Windows 11 includes a data and system backup utility for backing up the entire contents (at a single point in time) or a system image, and it originated with which of the following operating systems? A. Windows 7 B. macOS C. Windows 8 D. Linux Answer: A Feedback: The utility included in Windows 11 for the more conventional data and system backup is Backup and Restore (Windows 7). Page: 23 Difficulty: Medium [Question] What feature of Windows 11 allows you to organize your open apps within workspaces? A. Desktops B. Task view C. Snap Layouts D. Ease of Access Answer: A Feedback: The Desktops feature allows you to organize your open apps within workspaces. Page: 30 Difficulty: Medium [Question] What features allows you to view thumbnails of all your open apps and workspaces? A. Desktops B. Task view
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
C. Snap Layouts D. Ease of Access Answer: B Feedback: Task view allows you to see view thumbnails of all your open apps and workspaces. Page: 30 Difficulty: Medium [Question] Click this shortcut on the bottom right of the Sign-In screen to quickly enable audio and visual aids. A. Desktops B. Task view C. Snap Layouts D. Ease of Access Answer: D Feedback: Click the Ease of Access shortcut on the bottom right of the Sign-In screen to quickly enable audio and visual aids. Page: 9 Difficulty: Difficult [Question] This feature, renamed and improved in Windows 11, gives you a choice of multi-window layouts to quickly choose for organizing your open apps. A. Desktops B. Task view C. Snap Layouts D. Ease of Access Answer: C Feedback: Snap Layouts. Page: 33 Difficulty: Medium [Question] Which of the following is not a Windows 11 backup option? A. Backup and Restore (Windows 7) B. File History C. Continuum D. System image Answer: C Feedback: Continuum is not a Windows 10 backup option. Page: 23 Difficulty: Medium [Question] This is a backup of an entire Windows installation. A. System Repair disc B. Quick link C. File History D. System image Answer: D A System image is a backup of an entire Windows installation. Page: 23 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Create this ahead of time so that you can boot up a Windows system that has failed and restore a complete backup (also created ahead of time). A. System Repair disc B. Quick link C. File History D. System image Answer: A Create a system Repair disc ahead of time so that you can boot up a Windows system that has failed and restore a complete backup (also created ahead of time). Page: 23 Difficulty: Medium
[Question] When creating one of these, consider creating one of at least six characters. A. password B. Multitouch C. PIN D. Lock screen Answer: C Feedback: When creating a PIN for signing in to your Windows device, consider creating one of at least six characters for more security. Page: 35 Difficulty: Easy What Windows 7 utility, included in Windows 10 and Windows 11, can you use to backup data from a Windows 10 installation and restore it to a Windows 11 system? A. Backup and Restore B. System Image Backup C. Reset D. File History Answer: A Feedback: Use Backup and Restore (Windows 7) to backup data from a Windows 10 installation to a Windows 11 system. Page: 8 Difficulty: Medium
[Question] What Windows 11 feature can you use to backup and restore versions of files? A. Backup and Restore B. System Image Backup C. Reset D. File History Answer: D Feedback: Use Windows 11 File History to backup and restore versions of files. Page: 23 Difficulty: Medium [Question] What is the name of the Windows 11 file manager? A. Windows Explorer
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
B. File Explorer C. File Manager D. Finder Answer: B Feedback: File Explorer is the name of the Windows 11 file manager. Page: 22 Difficulty: Easy [Question] What keyboard shortcut opens Windows 11 Settings? A. Windows key + I B. Windows key + Z C. Windows key + W D. Windows key + A Answer: A Feedback: The shortcut Windows key + I opens the Windows 10 Settings utility. Page: 19 Difficulty: Difficult [Question] What keyboard shortcut will display a selection of window layouts, as part of the Windows 11 Snap Layout feature? A. Windows key + I B. Windows key + Z C. Windows key + W D. Windows key + A Answer: B Feedback: The shortcut Windows key + Z displays a selection of window layouts. Page: 33 Difficulty: Difficult [Question] What keyboard shortcut opens Quick Settings in Windows 11? A. Windows key + I B. Windows key + Z C. Windows key + W D. Windows key + A Answer: B Feedback: The Windows key + A opens Quick Settings in Windows 11. Page: 15 Difficulty: Difficult
[Question] Click or tap this button on the Windows 11 Start menu to see the options: Sleep, Shutdown, and Restart. A. Settings B. Start C. Power D. Search Answer: C Feedback: Double click the Power button on the Windows 11 Start menu to see the options: Sleep, Shutdown, and Restart. Page: 16
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Difficulty: Medium [Question] What keyboard shortcut opens the Widgets pane in Windows 11? A. Windows key + I B. Windows key + Z C. Windows key + W D. Windows key + A Answer: C Feedback: Windows key + W opens widgets pane in Windows 11. Page: 16 Difficulty: Difficult
[Question] Click a status icon on the taskbar to open this in Windows 11. A. Task view B. Quick Settings C. Desktops D. Snap layouts Answer: B Feedback: Click or tap a status icon on the taskbar to open Quick Settings in Windows 11. Page: 15 Difficulty: Medium [Question] In addition to providing your Microsoft account credentials (email and password), what must you do before you can purchase your first app in the Microsoft Store for Windows 11? A. Opt-in for in-app purchases B. Redeem a code C. Create a payment method D. Enter a PIN Answer: C Feedback: Before you can purchase your first app in the Microsoft store for Windows 11 you must create a payment method. Page: 25 Difficulty: Hard [Question] What security feature of Windows 11 lets you sign in to your Windows 11 device with a biometric sign-in, providing that appropriate hardware is present? A. Windows Hello B. Windows Defender C. Assigned Access D. Hey Cortana Answer: A Feedback: Windows Hello is a security feature of Windows 11 that lets you sign in to your Windows device with a biometric sign-in, providing the appropriate hardware is present. Page: 9 Difficulty: Medium [Question] What are the two methods for opening the Power User Menu?
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
A. Double-tap the desktop B. Press and hold the Start button on a touch screen C. Double-click the Start button D. Right-click the Start button Answer: C Feedback: Two methods for opening the Power User Menu are: 1) Press and hold the Start button on a touch screen, 2) Right-click the Start button. Page: 16 Difficulty: Medium [Question] What shortcut opens both the calendar and notifications. A. Windows Key + R B. Windows Key + A C. Windows Key + N D. Windows Key + W Answer: C Feedback: The Windows Key + N opens both the calendar and notifications . Page: 17 Difficulty: Medium [Question] This feature of File Explorer contains unlabeled buttons for file and folder actions. A. Title bar B. Command bar C. Ribbon bar D. App Apps Answer: B Feedback: The command bar contains unlabeled buttons for file and folder actions. Page: 22 Difficulty: Medium [Question] What keyboard action opens a context menu for an object. A. Double-click the Start button B. Right-click the object C. Click the Start button D. Click the object Answer: B Feedback: Right-click on an object to open a context menu for that object. Page: 22 Difficulty: Hard [Question] Which of the following is included in Windows 11 Pro but not in Windows 11 Home? A. BitLocker Drive Encryption B. Hyper-V client C. Snap Layouts D. Hyper-V client Answer: A Feedback: BitLocker Drive Encryption is included in Windows 11 Pro but not in Windows 11 Home. Page: 3 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
[Question] Which of the following is a Windows 11 app for running command-line tools and shells? A. Power User Menu B. Windows Terminal C. Windows Subsystem for Linux D. Command Prompt Answer: B Feedback: Windows Terminal is an app for running command-line tools and shells. Page: 16 Difficulty: Medium [Question] Which of the following is like a small window that serves as a portal to a service or app? A. Notification B. Windows Terminal C. Status icon D. Widget Answer: D Feedback: A widget is a small window that serves as a portal to a service or app. Page: 17 Difficulty: Medium [Question] On a laptop, in the Power and sleep Options, you should configure what happens when you press the physical power button, as well as when you take this action. A. Log out. B. Close the lid. C. Shut down. D. Sleep. Answer: B Feedback: Configure what happens when you close the lid on a laptop. Page: 21 Difficulty: Medium Essay Questions [Question] Explain the significance of the Windows 11 announcement and rollout and why it is a departure from expectations created by the 2015 introduction of Windows 10. Answer: Since the release of Windows 10 in 2015, Microsoft had provided monthly patches and security updates. In addition, they provided twice-yearly feature updates, creating the expectation the Windows 10 was the last-named version. Page: 1 Difficulty: Medium [Question] Describe the system requirements for Windows 11 and what may have prompted Microsoft to require certain hardware features. Answer: Wile some of the system requirements; such as for the processor, RAM, graphics support, and storage space; are a logical progression to faster operation, other hardware requirements are obviously due to increasing security threats. They include UEFI firmware with Secure Boot enabled and Trusted Platform
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
Module (TPM) 2.0. These hardware-level security features have been available for several years, but they are now required to run Windows 11. Page: 4 Difficulty: Medium [Question] Describe the sync options available to you when you access the Windows backup settings under Accounts. Answer: The sync options available to you when you access the Windows backup settings under Accounts are designed for the use with Microsoft cloud storage service, OneDrive. They include folder syncing of the Desktop, Documents, and Pictures folders across all devices. In addition, the option Remember my apps syncs your Windows Store apps across all Windows devices. Further, the Remember my preferences settings allows you to sync passwords, language preferences, and other Windows settings across devices. Page: 23 Difficulty: Medium [Question] Describe the differences between a system image and a system repair disc and how you can use both to recover from a system failure. Answer: A system image is a backup of an entire Windows installation. A system repair disc is a disc that can be used to boot up a computer if the system fails. From the repair disc you can fix many system problems, but if none of the options work, you can then restore the system image. Page: 23 Difficulty: Medium [Question] You would like to do a conventional backup of data from your Windows 11 computer to external storage. Describe how you would do this. Answer: To backup data from a Windows 11 computer, I would first connect the external storage device, open the Control Panel, and navigate to System and Security | Backup and Restore (Windows 7). Then I would set up a backup of local data to the external drive. Page: 23 Difficulty: Medium [Question] Describe the Power and Sleep Options on a Windows 11 laptop and the importance of knowing how they are configured. Answer: The default Power and Sleep Options on a laptop are for Windows to go into sleep mode whenever the power button is pressed. Sleep is also the default action when you close the lid on a laptop. It is important to know this because you may be assuming that these actions result in a power off. Check out these settings in the Control Panel app. Search on Power and Sleep Options. Page: 21 Difficulty: Medium [Question] Describe the purpose of the Device usage setting under Personalization in Windows 11. Answer: With Device usage, Microsoft is acknowledging that you may use your Windows 11 computer for gaming, creativity, school, entertainment, business, or privacy. Device usage lets you select one of these usage types to optimize Windows for that type of usage. Page: 21 Difficulty: Hard [Question]
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
After completing an upgrade from Windows 10 to Windows 11, you notice many unfamiliar icons in the Pinned section of the Start menu. Describe what these are, how they got there, and what actions you can take. Answer: Microsoft includes extraneous apps and app stubs (links that will install apps if you click on them). These may be for both Microsoft apps and third-party apps. If you know you do not want an app, simply right-click the icon and select uninstall from the context menu. If you want time to consider an app, but do not want it cluttering the Start menu Pinned section, right-click and select Unpin from Start. It will remain in your All Apps list when you wish to try it. Page: 24 Difficulty: Medium [Question] Describe a Windows 11 feature that allows you to quickly view news stories on your desktop. Describe how to access this feature and how to navigate it. Answer: The Windows 11 Widgets pane contains both widgets (small apps that are windows to a service) and updated news stories. To access the Widgets pane on a device with a touchscreen simply swipe in from the left, click or tap the Widgets button on the taskbar, or use the shortcut: Windows key + W. Once in Widgets, the news stories at the bottom of the pane may scroll out of view. When that happens, hover the mouse over the right side of the pane or tap on the right until the scrollbar appears. Then use the scroll bar to navigate through the news stories. Page: 16-17 Difficulty: Medium [Question] You have a Windows 11 Home laptop. You have been told that you should encrypt your data. You know there are two encryption features for Windows 11. Describe these features, and whether they can be used on your laptop. Answer: The two encryption features that come with Windows 11 are BitLocker Drive Encryption and Device Encryption. BitLocker Drive Encryption is not available for Windows 11 Home. Device Encryption is available for Windows 11 Home, so I will use that encryption method to encrypt my Windows 11 laptop. Page: 3 Difficulty: Medium
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.