John, a project manager at Dion Training, wants to terminate a resource-hungry application. Which of the following would BEST help achieve this? Memory management, process management / scheduling, access control/protection, disk management
Application and softwares set #1 (IT fundamentals)

Flashcard
•
Computers
•
11th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

14 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
process management / scheduling
Answer explanation
Process management/scheduling is an operating system feature that handles application execution, allowing John to terminate a resource-intensive application. Memory management controls how system memory is assigned and used, but doesn't specifically allow for application termination. Access control/protection governs user rights and permissions, but it does not give the ability to terminate applications. Disk management handles how storage is allocated and used, not controlling running applications.
2.
FLASHCARD QUESTION
Front
Which software type is tailored to meet a company's unique requirements and help streamline its operations? Options: Instant Message Software, email client, business-specific applications, conferencing software
Back
business-specific applications
Answer explanation
Business-specific applications are typically bespoke, designed specifically for a company's needs, enabling them to streamline their unique operations. Customer relationship management (CRM) software helps businesses manage their customer interactions. It can be used to track customer leads, sales opportunities, and customer support tickets. While useful for business interactions, conferencing software doesn't deliver customization unique to each company's operational needs. Email clients are predominantly for sending, receiving, and organizing emails. They do not typically provide business-specific functionalities designed for any unique operational needs a company may have. Instant messaging software is largely for communication in real-time—rapidly and efficiently—but it doesn't focus on unique operational needs of a company.
3.
FLASHCARD QUESTION
Front
What are folders/directories primarily used for?
Back
organizing files within a system
Answer explanation
The principal function of folders/directories is to create an organized structure within a file system for easy navigation and management, hence the correct answer. While permissions can be assigned to directories, their primary purpose is not to set file permissions, but rather to provide an organizational structure within a file system. Folders don't primarily serve to encrypt files. Even though certain systems allow entire directories to be encrypted, this is not the fundamental role of a directory. Folders/directories do not modify file extensions. File extensions are defined when a file is created and can be changed or managed independently of their location in directories.
4.
FLASHCARD QUESTION
Front
What is the primary benefit of file encryption? Options: increase processing speed, protection from unauthorized access, reduce file sizes, facilitate data recovery
Back
protection from unauthorized access
Answer explanation
Encryption provides a high level of security by scrambling the data in a file to prevent unauthorized access, keeping it safe in the network. Encryption does not reduce file size, it encrypts or scrambles the data to provide security. Compression, not encryption, is used to reduce the file size. Encryption does not typically impact system speed in a positive way. Actually, it could slightly slow down the process since the system has to encrypt and decrypt files. While encryption can protect data from unauthorized access, it doesn't inherently facilitate data recovery. However, combined with a backup strategy, it can contribute to a holistic data protection plan.
5.
FLASHCARD QUESTION
Front
Which licensing model would you likely encounter when subscribing to a Software as a Service (SaaS) product?
Back
subscriptions
Answer explanation
n a subscription model, users pay a recurring fee to access the software, often on a monthly or yearly basis. This payment structure is typically characteristic of SaaS offerings, where the software is hosted remotely. A group use or site license enables use of the software for multiple users within a specified location, but doesn't inherently align with recurring fees, as required in a subscription-based model. Thus, while it could sometimes apply to SaaS products, it doesn't by definition. Under a one-time purchase model, users pay a flat fee for permanent access to the software. While this may be applicable to some software applications, it is less common for SaaS products which require regular updates and ongoing support. Open source licenses allow users to freely use, modify, or distribute the software. This is not typically characteristic of SaaS products, which more commonly operate on a subscription model.
6.
FLASHCARD QUESTION
Front
What could be responsible for Lisa not being able to utilize the productivity extension she uploaded to her browser? Options: the cache has not been cleared, certificate is invalid, incorrect proxy setting, the extension is disabled
Back
the extension is disabled
Answer explanation
If Lisa has installed the extension but can’t use it, it is possible that the extension is disabled. Enabling it in her browser's settings should resolve the issue. Clearing the browser cache would help in loading updated website content but wouldn't affect the functionality of an installed extension. An invalid certificate would cause security warnings when visiting secured web pages but wouldn't limit the use of a browser extension. Setting Incorrect proxy settings would generally interrupt the internet connection entirely and wouldn't specifically degrade the functionality of a browser extension.
7.
FLASHCARD QUESTION
Front
Which aspect of an operating system ensures that resources are used only in ways that satisfy predetermined policies?
Back
access control
Answer explanation
Access control is a part of the operating system design that ensures resources are used only in ways that satisfy predetermined policies. It restricts system access to authorized users, apps, or other systems, providing a key role in maintaining the system's security. Whereas a firewall aids in preventing unauthorized access to or from a private network, it does not inherently deal with the management of resource usage according to predefined policies. While a security patch can remedy a specific vulnerability in an operating system or an application, it doesn't necessarily manage usage in accordance to predetermined policies. While data encryption secures data and information by translating it into a secret code, it doesn't specifically control the ways resources are utilized.
Create a free account and access millions of resources
Similar Resources on Quizizz
14 questions
Application and software IV

Flashcard
•
11th Grade
13 questions
L2 ICT U1 Online Storage Flashcard

Flashcard
•
11th Grade
9 questions
IST, Final Exam

Flashcard
•
10th Grade
9 questions
Virtual Private Networks (VPN)

Flashcard
•
10th - 12th Grade
9 questions
Microsoft Word: Tabs and Groups

Flashcard
•
11th Grade
15 questions
Slides and Master Slides Powerpoint

Flashcard
•
11th Grade
8 questions
Database Fundamentals (part 2). second set

Flashcard
•
11th Grade
14 questions
Application and software III

Flashcard
•
11th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University