0% found this document useful (0 votes)
16 views2 pages

Operating Sytems - Vocabulary Exercise - Student

The document consists of exercises related to computer science concepts, including matching terms with definitions, explaining acronyms, and completing sentences with appropriate terms. It covers topics such as memory management, virtual memory systems, utility programs, and operating systems. The exercises are designed to test understanding of key terminology and their applications in computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Operating Sytems - Vocabulary Exercise - Student

The document consists of exercises related to computer science concepts, including matching terms with definitions, explaining acronyms, and completing sentences with appropriate terms. It covers topics such as memory management, virtual memory systems, utility programs, and operating systems. The exercises are designed to test understanding of key terminology and their applications in computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Ex. 1. Match each term in column A with an appropriate definition from column B.

There are three options in column B that cannot be matched. Write your answers in the
table below.

COLUMN A COLUMN B
1. Memory management a. parts of the operating system which carry out certain functions,
such as virus checking, defragmentation or hard disk formatting
2. 2. Virtual memory systems b. software that makes copies of files on another portable storage
device
3. Utility program c. a place on a computer where programs and routines are stored
which can be freely accessed by other software developers for use
in their own programs
4. Device driver d. file or program identified as being infected by a virus which has
been isolated by antivirus software before it is deleted at a later
stage
5. False positive e. a tested and ready-to-use routine available in the development
system of a programming language that can be incorporated into a
program
6. Disc defragmenter f. a file or program identified by a virus checker as being infected but
the user knows this cannot be correct
7. Program library g. part of the operating system that controls the main memory
8. Memory protection h. utility that checks disk drives for empty space and disk usage by
reviewing files and folders
9. Quarantine i. function of memory management that ensures two competing
applications cannot use same memory locations at the same time
10. Library routine j. utility that reorganises the sectors on a hard disk so that files can be
stored in contiguous data blocks
k. part of the operating system that ensures the integrity,
confidentiality and availability of data
l. memory management (part of OS) that makes use of hardware and
software to enable a computer to compensate for shortage of actual
physical memory.
m. software that communicates with the operating system and
translates data into a format understood by the device

1 2 3 4 5 6 7 8 9 10
Ex. 2. Explain the acronyms below.
1. CMOS
2. HCI
3. GUI
4. CLI
5. WIMP
6. DLL

Ex. 3. Match each term in the table with an appropriate sentence. There are three options in
the table that cannot be matched.

disc antivirus contiguous library Post- process operating


compression software program WIMP management system
bad sector Library memory disc Icon heuristic
routine optimisation formatter checking
1. To improve performance, __________________ ensures that the computer efficiently
allocates and deallocates memory.
2. The operating system handles __________________, allowing multiple applications
to run smoothly at the same time.
3. If a hard drive develops a __________________, it may result in corrupted files or
slow performance.
4. Many users rely on __________________ to detect and remove malicious programs
before they cause damage.
5. By using __________________, modern antivirus programs can identify potential
threats based on suspicious behavior rather than known virus signatures.
6. Since storage space was limited, the IT department recommended
__________________ to reduce file sizes.
7. Developers often use a __________________ to avoid writing repetitive code and
speed up software development.
8. Before installing a new operating system, the technician ran a __________________
to erase all existing data.
9. Unlike traditional graphical user interfaces, __________________ systems rely on
gestures and touch interactions.
10. Without an __________________, a computer would not be able to manage hardware
resources or execute programs effectively.

You might also like