

Computer Science Fundamentals
Test Preparation
Course Introduction
Computer Science Fundamentals provides an introduction to the core concepts of computer science, including problem-solving techniques, algorithms, data structures, and basic programming principles. This course covers the foundational theories underpinning computer operations, logical reasoning, and computational thinking. Students will explore concepts such as abstraction, recursion, and modularity, gaining practical experience through hands-on programming exercises. By the end of the course, students will have a solid understanding of how computers process and store information, and will be prepared for more advanced study in the computer science field.
Recommended Textbook
Understanding Operating Systems 7th Edition by Ann McHoes
Available Study Resources on Quizplus
16 Chapters
646 Verified Questions
646 Flashcards
Source URL: https://quizplus.com/study-set/1969

Page 2

Chapter 1: Introducing Operating Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39155
Sample Questions
Q1) When executing a job,the File Manager determines whether a user request requires that a file be retrieved from storage or whether it is already in memory.
A)True
B)False
Answer: False
Q2) The most common mechanism for implementing multiprogramming was the introduction of the ____ concept,whereby the CPU was notified of events needing operating systems services.
A) paging
B) sharing
C) messaging
D) interrupt
Answer: D
Q3) General-purpose operating systems such as Linux or Windows are used in embedded systems.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
3

Chapter 2: Memory Management: Simple Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39156
Sample Questions
Q1) Single-user systems in a non-networked environment allocate,to each user,access to all available main memory for each job,and jobs are processed sequentially,one after the other.
A)True
B)False
Answer: True
Q2) Single-user contiguous allocation schemes have the problem of partition intrusion..
A)True
B)False
Answer: False
Q3) In a relocatable dynamic partition scheme,the ____ contains a value that must be added to each address referenced in a program so that the system will be able to access the correct memory addresses after relocation.
A) bounds register
B) load register
C) relocation register
D) compaction register
Answer: C
To view all questions and flashcards with answers, click on the resource link above.
4

Chapter 3: Memory Management: Virtual Memory Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39157
Sample Questions
Q1) The primary advantage of storing programs in noncontiguous locations is that
A) multiple programs can run at the same time
B) every program will be able to run
C) secondary storage is accessed more quickly
D) main memory is used more efficiently
Answer: D
Q2) A variation of the LRU page replacement algorithm known as the ____ replacement policy is implemented with a circular queue.
A) clock page
B) round robin
C) performance page
D) bit shifting
Answer: A
Q3) In demand paging,pages are ____ between main memory and secondary storage.
A) swapped
B) traded
C) allocated
D) faulted
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Processor Management
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39158
Sample Questions
Q1) As a process moves through the system,its status changes.Possible process statuses include FINISHED,HOLD,READY,RUNNING,and WAITING.
A)True
B)False
Q2) Each thread in a process is represented by a data structure called a ____ that contains basic information such as the thread's unique identification,state,and priority.
A) Thread Control Block
B) Thread State Block
C) Thread Pointer
D) Thread Queue
Q3) It is possible to minimize response time by running only interactive jobs and letting batch jobs wait until the interactive load ceases.
A)True
B)False
Q4) A job's state moves from HOLD to WAITING when it's ready to run but is waiting for the CPU.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Chapter 5: Process Management
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39159
Sample Questions
Q1) Database locking should be done only at the level of the entire database.
A)True
B)False
Q2) A race introduces the element of chance,which is a highly desirable attribute,in database management.
A)True
B)False
Q3) ____ is the policy of allowing only one process to have access to a dedicated resource.
A) No preemption
B) Circular wait
C) Resource holding
D) Mutual exclusion
Q4) According to the Banker's Algorithm,an unsafe state always leads to deadlock.
A)True
B)False
Q5) In general,operating systems must either choose avoidance or recovery as a strategy for dealing with deadlocks.
A)True
B)False

Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Concurrent Processes
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39160
Sample Questions
Q1) In general,parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism.
A) resource
B) register
C) data
D) task
Q2) Java uses both a compiler and an interpreter.
A)True
B)False
Q3) The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting.
A)True
B)False
Q4) The only tangible benefit of parallel processing systems is faster processing.
A)True
B)False
Q5) The master/slave configuration is a symmetric multiprocessing system.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39161
Sample Questions
Q1) Nested RAID levels,also called hybrid levels,are complex RAID configurations created by combining multiple standard levels.
A)True
B)False
Q2) The USB controller assigns bandwidth to each device depending on its priority.The ____ priority is assigned to real-time exchanges where no interruption in the data flow is allowed,such as video or sound data.
A) highest
B) medium
C) lowest
D) standard
Q3) ____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.
A) Rotational ordering
B) SSTF
C) C-SCAN
D) LOOK and SCAN
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39162
Sample Questions
Q1) Within a file,variable-length records are easier to access directly than fixed-length records.
A)True
B)False
Q2) ____ text compression builds on the previous data element.The first data element in a list is not compressed but each entry after that takes a given number of characters from the previous entry that they have in common and then adds the characters that make it unique.
A) Repeated-terms
B) Front-end
C) Repeated-characters
D) Lossy
Q3) A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc.The first entry is a forward slash ( / )representing the master directory,called the ____ directory.
A) root
B) main
C) branch
D) working
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Network Organization Concepts
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39163
Sample Questions
Q1) Bridging between two homogeneous networks occurs at Layer 2 of the OSI transport protocol model,the data link layer.
A)True
B)False
Q2) The tree topology is a collection of rings.
A)True
B)False
Q3) In the routing information protocol (RIP),the entire routing table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.
A)True
B)False
Q4) Which characteristic is true of packet switching?
A) Preferred in low volume networks
B) Easily overloaded
C) Preferred for voice communications
D) Transmits in batches
Q5) Ethernet is the most widely known CSMA/CD protocol.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Management of Network Functions
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39164
Sample Questions
Q1) The find-and-copy technique isn't considered true file sharing because all users wanting access to the data file must copy the file onto their own systems,thereby duplicating the code and wasting space.
A)True
B)False
Q2) In process-based DO/S,resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control,processing each request fairly,providing service to the requestor,and returning to serve others.
A) kernels
B) guardians
C) spoolers
D) nodes
Q3) The biggest limitation of a network operating system (NOS)is ____ in terms of memory,process,device,and file management.
A) lack of scalability
B) lack of global control
C) lack of security
D) prohibitive cost
To view all questions and flashcards with answers, click on the resource link above.
Page 12
Chapter 11: Security and Ethics
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39165
Sample Questions
Q1) A gap in system security in always indicative of malicious activity.
A)True
B)False
Q2) A firewall typically sits between a network and its individual computers.
A)True
B)False
Q3) A ____ combines into one program the characteristics of other attacks.
A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
Q4) A virus is defined as a small program written to alter the way a computer operates,without the permission or knowledge of the user.
A)True
B)False
Q5) As an alternative to passwords,some systems have integrated use of a ____.
A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner

Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: System Management
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39166
Sample Questions
Q1) Blocking I/O requests to optimize access times increases the number of physical I/O requests.
A)True
B)False
Q2) System efficiency is affected primarily by two major components: user programs and operating system programs.
A)True
B)False
Q3) The first thing to do upon notification of a new software patch is to____.
A) identify the criticality of the patch
B) deploy the patch
C) test the patch
D) run automatic updating
Q4) As memory management algorithms grow more complex,____.
A) CPU use decreases
B) CPU overhead increases
C) buffers are required
D) system performance improves
To view all questions and flashcards with answers, click on the resource link above.
Page 14

Chapter 13: Unix Operating Systems
Available Study Resources on Quizplus for this Chatper
46 Verified Questions
46 Flashcards
Source URL: https://quizplus.com/quiz/39167
Sample Questions
Q1) In UNIX,a ____ table is allocated to each active process that includes information such as the user and group identification numbers to determine file access privileges.
A) process
B) subtext
C) user
D) database
Q2) The command,____ ,will copy the contents of chapt1 and chapt2 into a file named section_a.
A) section_a = chapt1 + chapt2
B) cp chapt1 section_a, cp chapt2 section_a
C) cat chapt1 chapt2 > section_a
D) ls chapt1, chapt2, section_a
Q3) A ____ may occur if an event happens during the process's transition between deciding to wait for the event and entering the WAIT state.
A) race
B) deadlock
C) starvation event
D) synchronization problem
To view all questions and flashcards with answers, click on the resource link above.
15

Chapter 14: Windows Operating Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39168
Sample Questions
Q1) In a Windows device driver,the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.
A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
Q2) Windows is a non-preemptive multitasking,multithreaded operating system.
A)True
B)False
Q3) To accommodate the various needs of its user community,and to optimize resources,the Windows team identified the following design goals:____.
A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
Q4) Much of Windows is written in assembly language,a programming language that's standardized and readily available.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Linux Operating Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39169
Sample Questions
Q1) The name Linux is a contraction of Linus and UNIX.
A)True
B)False
Q2) A page's middle directory contains a pointer to the actual page frame.
A)True
B)False
Q3) In Linux,the three levels of file access are ____,____,and ____.
A) owner; domain; group
B) owner; group; administrator
C) administrator; owner others
D) owner; group; others
Q4) ____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced.
A) OS
B) Patch
C) VFS
D) Kernel
Q5) Filenames are not case sensitive in Linux.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 17
Chapter 16: Android Operating Systems
Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/39170
Sample Questions
Q1) Android is designed to run ____.
A) desktop computers
B) telephones
C) mobile devices
D) laptop computers
Q2) Android divides screen sizes into five size categories.
A)True
B)False
Q3) The ____ state is a formal indication that an activity is terminated and will be removed completely from system memory.
A) Destroyed
B) Stopped
C) Terminated
D) Removed
Q4) An alternative to password protection is Android's pattern recognition tool.
A)True
B)False
Q5) Google purchased Android in 2011.
A)True
B)False

Page 18
To view all questions and flashcards with answers, click on the resource link above.