Preview

03 - Utilities Software

 1. …………are pre written software that are stored in compiled format and can be included by the programmer within one or more programs
e.g: Library function from the mathematics library <cmath> in C++ is sqrt (which is used to calculate a square root)

  FALSE

  TRUE

 2. Utility programs are a range of systems software that are designed to help the ………………….. to manage, maintain and optimise the system.

  CPU

  printer

  monitor

  user

 3. Main functions of utility programs include:

  All of the above are main functions of utility programs

  disk formatting

  data synchronisation, firewall, memory testing

  file compression and anti-virus protection

 4. A utility program is designed to do one or two tasks extremely well and nothing else.

  FALSE

  TRUE

 5. If you wanted to compress a file to let you save it to a flash drive you could use a …..

  None of the above

  file compression utility program (e.g. Windows zip program)

  operating system (like windows)

  CPU driver (inbuilt to all operating systems)

 6. Which of the following, from the list below, are common tasks that are carried out by various utility programs.
File sorting
File renaming
File conversion (e.g. convert a sound file to MP3)
File repair
Disk monitoring and defragmentation (defragging)
Printing jobs
Backing up data.
Anti-Virus

  File repair, and Disk monitoring and defragmentation

  File Sorting and File renaming

  All of them except for File repair (as file repair is not performed by utility software)

  All of the items on the list are valid

 7. …………..involves rearranging the information on a disk so that files appear in continuous sequences of clusters

  Decompression

  Defragmentation

  None of the above

  Debugging

 8. The following excerpt explains what happens when files are deleted. Fill in the blanks
When files are deleted, unused clusters become available for reuse. 
These can end up being distributed across a drive, especially if the 
original files were small.

If a large file is then written to a drive, its data could be spread across 
different clusters leading to ....................................

  Defragmentation

  Debugging

  None of the above

  file fragmentation.

 9. Security utilities include:

  encryption and anti virus software

  All of the above

  user accounts

  firewalls

 10. ……………………….utilities can make a copy of all information stored on a disk, and restore either the entire disk (e.g. in an event of disk failure)

  Archaic

  Firewall

  Antifragmentation

  Backup