COLLEGE OF COMPUTING AND INFORMATION SCIENCES MIDTERM EXAMINATION 1st Semester S.Y. 2014-2015 OS_L - Operating Systems Name: _________________________________ Score: ________________________ Section: ________________________________ Date: _________________________ General Directions: Read and understand the instructions carefully. Avoid making erasures or superimpositions on your answers. Any forms of cheating will be dealt with accordingly based on your student manual.
Test 1 Multiple Choice. Encircle the best answer.
SCENARIO 1: Holly Holt is a systems administrator for Lucerne Publishing, a highly recognized publishing company that specializes in barbecue cookbooks. One of the editors was having difficulty printing several chapters of a recent cookbook and contacted Holly to find out what can be done to get the printer to work. This editor also has informed Holly that he is continually getting warnings when he starts his computer in the morning, indicating that his firewall has failed to start, and he is concerned that his computer may be compromised. Holly examines his computer and when she looks at the System Event Log, she notices a Service Control Manager error indicating that the firewall service has failed to start. Holly opens the Services console and starts the Windows Firewall Service without any problem. 1.What can Holly do to ensure that the Windows Firewall Service starts as expected? a. Visit the editors office every morning and manually start the service after the machine has booted. b.Configure the service to have a delayed start temporarily and research why the service isnt starting automatically. c. Ask the editor not to plug into the network until she gets the issue resolved 2. What should Holly do first to troubleshoot the editors printing issues? a. Verify that the Print Spooler status indicates that it is running. b.Check to be sure the printer has paper. c. Ask the editor to email the chapters to her so she can print a copy. 3.After some investigation, Holly notices that the editor attempted to print the same job 20 times after it failed the first time. She cannot delete the print jobs because the queue states that it is Not Responding. What should Holly do to clear the print queue and correct the print issues? a. Reboot the workstation. b. Restart the Print Spooler service from the Services console. c. Unplug the printer, wait several minutes, and plug it back in. SCENARIO 2: Woodgrove Bank is a small community bank with five branch offices. Their loan officers rotate to each branch as needed. They each have laptops running Windows 7 Professional and also have external mobile drives for data storage and backups. Due to the sensitive nature of banking, it is of high importance to Woodgrove Bank to ensure that their customers information is secure. Woodgrove Bank has hired Jeff Price, a security consultant, to perform a security audit and submit his findings and recommendations to the board of directors. This information is vital because the bank will be undergoing a security audit from their governing regulatory agency. 4. Jeffs initial recommendation is to have the laptops secured with BitLocker. What must be done first to make this change? a.Purchase BitLocker because Woodgrove Bank does not have licensing for it. b.Upgrade the laptops to Windows7 Enterprise or Ultimate edition because BitLocker is not available with Windows 7 Professional. c. The bank doesnt have to do anything ;it is ready. 5. What recommendation can Jeff make for securing the removable storage drives? Page 1 of 3
SYSTEMS PLUS COLLEGE FOUNDATION
Balibago, Angeles City a. Secure the drives with Encrypting File System(EFS). b. Secure the drives with BitLockerToGo. c. Make sure that the drives are locked to the desks when they arrive. 6.What hardware must the laptops have to provide better security through BitLocker? a.Security locks on the outside of the laptops, so the loan officers can secure the machine physically. b.Trusted Platform Module (TPM)can be used in addition to BitLocker. c.Smart card readers for authentication. 7.Where can you find the program to help you use a projector connected to your computer? a.The All Programs Accessories folder b.Computer Management console c.Administrative Tools folder d.Windows Media Player 8. Which of the following is not a security or privacy feature of Internet Explorer 9? a.InPrivate Browsing b.Pinned site c.ActiveX Filtering d.Domain highlighting 9.You want to use the Run command, however, the program requires elevated or administrative privileges. When you right-click the program to run it, which command do you select from the shortcut menu? a. Run elevated b. Run protected c. Run with permission d. Run as administrator 10.Where do you configure security zones in Internet Explorer 9? a.Internet Options Security tab b.Internet Options Privacy tab c.Safety menu d.Tracking Protection window 11.Which of the following can you do with the Snipping Tool? a.Annotate an image with the pen tool b.Change the color of a captured image c.Add typed callouts d.Save in PDF format 12.Which of the following is an option in Windows Media Center but not in Windows Media Player? a.Record TV programming b.Watch recorded TV c.Share files over a network d.Create playlists 13.After you compress a folder, in what color does it display in Windows Explorer? a. Blue b. Green c. Black d. Red 14.WhichofthefollowingdoyouaccesstoenterSafeModethenexttimethecomputerstarts? a.The General tab b.The Boot tab c.The Startup tab d.Services console 15.Which of the following can you do in the Programs and Features applet in Control Panel? a.Install an application b.Uninstall an application c.Encrypt an applications files Page 2 of 3
SYSTEMS PLUS COLLEGE FOUNDATION
Balibago, Angeles City d.Compress an applications files Test II. Identification. Identify the term being referred in the sentence. ___________________1. It is also known as the System Configuration utility, lets you enable or disable startup services, set boot options such as booting into Safe Mode, access tools like Action Center and Event Viewer, and more. ___________________2. What blocks ActiveX controls, which are created for interactivity on the Web and commonly used on sites that display animations or offer multimedia such as videos? ___________________3. What helps you control which Web sites can track your online browsing activity and receive that information? ___________________4. What is used to detect threats on Web sites, such as phishing attacks and malware downloads, and prevents them from running? ___________________5. What is used to prevent cross-site scripting attack when you visit a compromised Web site that runs a script that installs a key logger program on your computer? ___________________6. What allows you to write and correct free-hand math equations using your mouse or other pointing device? ___________________7. What is the overall structure your computer uses to name, store, and organize files and folders on a hard disk or partition? ___________________8. What is a virtual folder that can display content from different locations (folders, for example) on your computer or an external drive? ___________________9. What is a popular snap-in that includes several tools such as Disk Management for configuring hard disks and their partitions and Event Viewer, which allows you to view computer event information such as program starting and stopping (including program crashes) and security problems? ___________________10. What allows you to sync any folder in your computer with a folder on an external drive connected to your computers or a network drive? ___________________11. What allows you to control many different computer settings, such as screen brightness, volume, power/battery, WiFi, Bluetooth, sound, and so on? ___________________12.What opens a command window useful for IT professionals? ___________________13.What gives you access to Control Panel, Disk Cleanup, Disk Defragmenter, Resource Monitor, System Restore, and much more ? ___________________14. What is used to prevent some Web sites use deceptive Web addresses, making you think youre visiting a legitimate site when youre actually on a phishing site or another dangerous site? ___________________15. What is a multi-faceted program that provides a complete entertainment system for your computer? ___________________16. What is the process of decreasing the size of files or folders without affecting the files content? ___________________17. What automatically prevents pop-up windows from appearing? ___________________18. What helps prevent personal information and browsing history from being stored by Internet Explorer 9? ___________________19. What is a program that runs on top of the operating system or from a server, and helps a user perform a specific task, such as word processing, appointment scheduling, or accounting? An application ___________________20. What is used to protect the contents of files and folders from unauthorized access? TEST III ENUMERATION. ENUMERATE THE FOLLOWING 1. 2.
List the six (6) parts of Windows Media Player
List at least four (4) parts of Internet Explorer 9