Chapter 4 - Software
Chapter 4 - Software
1 Tick (/) the appropriate column, in the following table, to indicate whether the named software is an
example of system software or application software.
✓)
Software System ( Application (✓)
Photo editing software
Graphics manipulation software
Compiler
Spreadsheet software
Printer driver
QR code reader
Anti-virus software
Screensaver
1 ....................................................................................................................................................................
2 .............................................................................................................................................................
3 ..............................................................................................................................................................
1 ....................................................................................................................................................................
2 ..............................................................................................................................................................
3 ..............................................................................................................................................................
c Give three examples of utility programs.
1 .............................................................................................................................................................
2 .............................................................................................................................................................
3 ..............................................................................................................................................................
3 Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all.
» anti-virus » disk defragmenter » infected » security system
» background » file compression » locked » smaller
» blocks » file management » quarantine » tracks
» bootstrap » head movements » screensavers » user
» contiguous » heuristic checking » sectors » utility
for virus attacks. Many ....................................utilities check software for certain behaviour which would
indicate a possible virus; this is known as .........................................Any possible files or programs which
are infected are put into..................................until deleted by the ..................................... or automatically
deleted.
As a hard disk drive (HDD) becomes full,......................................... used for data and files will become
scattered over different...................................and................................... on the disk surface. A ..............
...........................will rearrange the.................................. of data and files into................................... sectors
wherever possible, thus reducing the scattering of data. It also reduces the number of HDD
been inactive for a period of time. They form part of the.......................................... , so that a user is
automatically logged out after a certain period of time and the............................................. will indicate that
1 ....................................................................................................................................................................
2 .............................................................................................................................................................
3 .................................................................................................................................................................
................................................................................................................................................................ z
4 .................................................................................................................................................................
b The interface between a computer and a user is either a command line interface (CLI) or graphical user
interface (GUI).
CLI:
ii In the table below, six statements about interfaces are given. Tick (/) the appropriate box to indicate
whether each statement refers to a CLI or GUI interface.
✓
Statement CLI ( ) GUI (✓)
The user is in direct communication with the computer
The user is limited to the icons shown on the screen
The user needs to learn a number of commands to carry out any operation
Commands need to be typed in using the correct format and spelling
There is no need for the user to learn any commands to use the interface
The interface needs a complex operating system, such as Windows, to operate, which uses
considerable amounts of memory
a Multitasking management
c Security management
1 .............................................................................................................................................................
2 ..............................................................................................................................................................
3 ..............................................................................................................................................................
c The flowchart shows the use of interrupts and buffers when printing out a document. Some of the boxes in
the flowchart are blank. Use each of the following statements to complete the flowchart. In each case, only
write the number of the correct statement in the appropriate box.
1 Meanwhile, the processor is able to carry out other tasks while the (printer) buffer is being emptied.
4 The contents of the (printer) buffer are emptied to the printer and the data from the document is
printed.
5 When all the data has been printed, the (printer) buffer becomes empty; an interrupt signal is then sent
to the processor requesting its attention.
6 Data from the document to be printed is sent to the (printer) buffer from the computer memory.
7 Memory management, security management and hardware management are three functions of an
operating system. The following table shows eight statements. By ticking (/) the appropriate box, indicate
which statements refer to memory, security or hardware management.
Management type
Statement Memory (/) Security (/) Hardware (/)
Keeps a track of all memory locations
Ensures that anti-virus software is regularly updated
Prevents competing applications using the same memory locations at the
same time
Ensures that the appropriate device driver takes data from memory/file
and translates it into a format the device can understand
Manages RAM and allows data to be moved between RAM and devices,
such as HDD or SSD
Maintains access rights for all users of a computer system
c Explain the role of a descriptor when a new device is plugged into a USB port of a computer for the first
time.
1 .............................................................................................................................................................
2 .............................................................................................................................................................
1 .............................................................................................................................................................
2 ....................................................................................................................................................................
3 .............................................................................................................................................................
b Explain why a programmer would choose to write a program in a low-level programming language.
c Steve is writing a program to use his laptop to control the lighting system in his
house. State, with reasons, which type of programming language would be most suitable for him to use.
Type of language:..........................................................................................................................................
Reasons: .......................................................................................................................................................
11 Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all.
assembler machine code
compilers programmer
high-level programs
interpreters translates
language translators
13 A program is being developed in a high-level language. Both a compiler and an interpreter are being used
for translation.
1 ..............................................................................................................................................................
2 .............................................................................................................................................................
1 ....................................................................................................................................................................
2 .............................................................................................................................................................
14 a Describe the purpose of an IDE.
1 ....................................................................................................................................................................
2 ..............................................................................................................................................................
3 .............................................................................................................................................................
c State the purpose of error diagnostics in an IDE. Give an example of its use.