Top-Rated Free Essay
Preview

is fake

Powerful Essays
908 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is fake
14 System Software and Application Software
Activity 1
Task 1
Method

Pro and con

Drag the selected lines of text to the target location using the mouse.

Pro: More intuitive method
Con: Require higher dexterity

Press the ‘Ctrl’ and ‘X’ keys to cut the text. Move the cursor to the target location. Press the ‘Ctrl’ and ‘V’ keys to paste the text.

Pro: Shortcut keys are used to reduce operation time.
Con: Need to memorize shortcut keys Click the ‘Cut’ button on the Ribbon and move the cursor to the target location and click the
‘Paste’ button.

Pro: Users do not need to memorize shortcut keys.
Con: A slower method than using shortcut keys

Task 2
Method

Pro and con

Click the ‘Close’ button at the top right corner of the window.

Pro: A common method for most of the Windows applications
Con: May close the application accidentally Press ‘Close Word’ from the Office button.

Pro: Users do not need to memorize shortcut keys.
Con: Only available for Office applications Press the ‘Alt’ and ‘F4’ keys.

Pro: A common method for most of the Windows applications
Con: Need to memorize shortcut keys. Right-click the Word tag on the Windows Taskbar and select ‘Close’.

Pro: Users do not need to memorize shortcut keys.
Con: A slower method than shortcut keys

This can suit the working habits of different users.

© Pearson Education Asia Limited 2009

1

NSS ICT Compulsory Textbook Answers

Concept Map
1. G
2. F
3. B
4. A
5. C
6. D
7. E
8. H
Concept Checker
1. F
2. T
3. T
4. F
5. T
Multiple Choice questions
1. B
2. A
3. C
4. C
5. A
6. D
7. B
8. C
9. A
10. D

© Pearson Education Asia Limited 2009

2

NSS ICT Compulsory Textbook Answers

Short Questions
1. Anti-virus software, (1) disk scanning program, (1) and data recovery program
(or backup utility) (1)
Before performing any data recovery actions, it is necessary to check and remove any computer viruses to avoid further damages to the computer system. (1)
Corrupted or damaged files can be identified and possibly be fixed by the disk scanning program. (1) In case that there are problem unable to resolve, we can use data recovery program or backup utility to get back the lost files from the backup file. (1)

2.

(a) Bootstrap program (1)
(b) The bootstrap program recognizes and tests the computer hardware (1); and loads the operating system into the main memory. (1)
(c) ‧Transfer files between the main memory and the secondary storage devices. ‧Manage file folders.
‧Allocate the space for secondary storage devices.
‧Provide file protection and recovery.
(any three × 1)

3.

Category
Productivity software

Example
Word processor

Spreadsheet / presentation program / database / personal finance software
(any one × 0.5)

Communication software E-mail program / web browser / FTP program / instant

Multimedia software

Graphics program

messaging program (any two × 0.5)
Audio and video editing program / web authoring software / computer-aided design (CAD) software (any one × 0.5)

Entertainment software

Game program
(0.5)

Multimedia program (0.5)

Education software

Electronic dictionary / encyclopedia and reference program / self-learning program (any two × 0.5)

(all correct: 1)

© Pearson Education Asia Limited 2009

3

NSS ICT Compulsory Textbook Answers

4.

(a) ‧Control peripheral devices.
‧Manage files and directories.
‧Allocate the main memory.
‧Coordinate network communications .
‧Provide a platform for application software.
(any four × 1)
(b) (i) Command-line interface requires less system resources to run. (1)
(ii) Install more memory modules, replace the old display card with a high performance display card. (2)
(iii) GUI frees the users from learning complex command languages. (1)

5.

(a) (i) Device driver (1)
(ii) Utility program (1)
(iii) Device driver (1)
(iv) Utility program (1)
(b) Windows Defender is an anti-virus program. (1) It detects and prevents the system from the attack of spyware and malware. (1)

Long Questions
1.

(a) Different computer systems such as network server, workstation, home-use desktop computer and mobile computing device require operating systems with different characteristics and functions. (2)
(b) ‧Not many application software/device drivers are developed for Linux.
‧Computer manufacturers have contracts with Microsoft Windows such that shipped computers have Microsoft Windows pre-installed.
‧Microsoft Windows have more extensive customer support than Linux.
(any two × 2)
(c) Keyboard / mouse / USB controller / ATA controller / infra-red / Bluetooth / generic display card
(any six × 1)

© Pearson Education Asia Limited 2009

4

NSS ICT Compulsory Textbook Answers

2.

(a) ‧The hard disk is highly fragmented.
‧The hard disk contains corrupted files.
‧Some start-up programs are damaged or missed.
‧The computer is infected by malware.
‧The hard disk is running out of free space.
(any three × 1)
(b) ‧Use disk defragmenter to combine fragments into contiguous files.
‧Use disk scanning program to amend or delete corrupted files.
‧Use program uninstaller to remove damaged startup programs and reinstall again.
‧Clean up the computer with anti-virus software.
‧Use file compression utility to free up more hard disk space.
(any corresponding three × 1)
(c) Operating system (1) and all device drivers (optionally utility programs such as anti-virus software) (1)
(d) DiskImage / Norton Ghost. (any one × 1)
Peter should use the backup utility immediately to make a copy of the current system (1). In case the system has been corrupted again, Peter can use the backup utility program to recover the system with the backup image.
(2)

© Pearson Education Asia Limited 2009

5

NSS ICT Compulsory Textbook Answers

You May Also Find These Documents Helpful

  • Good Essays

    The hardware used in the computers are equally important as the software and therefore if there are corruption issues on the hard disk drive then the users require to search for ways, means to resolve it. Unless that is done, the applications that are stored in the disk drive of the PC won’t work properly, exhibit errors. The user needs to run the chkdsk utility to fix the hard disk related issues. For other hard ware components they may take expert…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Genuine Cannon

    • 4900 Words
    • 20 Pages

    Read "Lab 3: Biodiversity." This lab will allow you to investigate how various organisms alter their environments. Additionally, it will allow you to assess the health of ecosystems based upon their biodiversity. Then, you will utilize this information and your eScience lab kit to complete Demonstration 1 and Experiment 1 on the Week Three Lab Reporting Form. Make sure to complete all of the following items before submission:…

    • 4900 Words
    • 20 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stephen Glass: In May 1998, it was discovered that many of his published articles was fabricated.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Isllc

    • 4100 Words
    • 17 Pages

    As a leader today, there are many challenges that you are faced with. The Interstate School Leaders Licensure Consortium (ISLLC) is a program that has standards for school leaders to follow. The six standards are to be used as guides to make sure the organization runs smoothly. If ever the organization gets off track, the ISLLC standards can also be used as tools to get the organization back on track. These standards also keep the community informed and a part of the decision making process.…

    • 4100 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Apollo 11: Fake or Not?

    • 1175 Words
    • 5 Pages

    They collected 21.7 kg of moon rock for samples while they were up there. The ship was called the U.S.S Hornet, and they spent 195 hours, 18 minutes, and 35 seconds from the time that they lifted off until the time that they landed. These men were all very brave, considering that there had already been a few failed launches by other countries, and they were in great danger when they decided to go, because one screw up in the structure could cause the ship to explode, or throw them off course. It has been 42 years since the mission took place. They had decided to launch the ship just months before the launch actually took place.…

    • 1175 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Is this real?

    • 421 Words
    • 2 Pages

    Before I began writing this paper I was neutral on the subject of natural gas fracking, I had never heard of it and had no idea how destructive this process of extraction was. The further I got on this report, the more furious I became that this was happening on US soil, and not only that but people in the highest levels of government were not only sanctioning it, but using their power in public office to advance the agenda of companies that they were either running before they cae into office, or companies that friends were running, or were just giving them kickbacks, which would be the only reason that anyone would let this go on. After doing just a small amount of research you realize rather quickly how detrimental this process is, not only to the environment, but to the helpless animals who had had wells built in their migration patterns. Not to mention the helpless children whos parents had no idea what the were getting themselves and their families into when they signed what appeared to be a harmless contract allowing a drilling company to put up a small rig on their property. Who didn’t realize that in a short amount of time they would be able to light the water coming out of their faucet on fire, that their animals would loose their hair, have problems eating and die. The fact that any human being would allow this to be done to other human beings all in the name of money is beyond me, but I’ll get into that later. What is hydraulic fracturing anyway? The U.S. contains gas fields that rival the oil fields sizes in Saudi Arabia. Ironically, it’s because of fracking that the United States now has enough oil and gas to potentially meet what has been an insatiable need for energy. Fracking enables operators to capture enormous amounts of oil and gas previously inaccessible. The only problem is that it’s not as simple as just drilling into these pockets and extracting the gas. The problem is this gas is contained in geologic formations, such as tight…

    • 421 Words
    • 2 Pages
    Good Essays
  • Good Essays

    the fake

    • 322 Words
    • 2 Pages

    The Iliad. Translated by Robert Ragles. Yes homer is honorable. Honor: honesty, fairness, or integrity in one's beliefs and actions; this is the definition by which Achilles, ought to be judged. Throughout the Iliad, Achilles acts on rage and revenge. “Rage-Goddess, sing the rage of Peleus’ son Achilles, murderous, doomed, that cost the Achaens countless losses, hurling down to the House of Death so many sturdy souls, great fighters’ souls, but made their bodies carrion, feasts for the dogs and birds…” (1, 1-5) From the beginning of the epic the reader learns of Achilles rage and wants for blood. Achilles fights only for himself and his own glory.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Website Credibility

    • 266 Words
    • 2 Pages

    Anyone can publish on the Web; with this being said, at times it becomes difficult to decipher between what is credible and what is not. There is so much information on the Web, good and bad, finding what we want is not an exact science and can be time consuming, there has been a many time even myself have fallen victim to this. The credibility of source is based on the subject, audience, source of publication, and documentation of supporting evidence. Today we have many domains as in .edu - education sites .gov - government sites .org - organization sites .com - commercial sites .net - network infrastructures. There are also many different types of websites for example, Personal sites, Special interest sites, Professional sites, News and Journalistic sites, Commercial sites, and Educational sites.…

    • 266 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Website Credibility

    • 344 Words
    • 2 Pages

    * According to the history on the “About the Union-Tribune” page, the newspaper won numerous awards over the years, including four Pulitzer Prizes.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    seeing is believing

    • 556 Words
    • 2 Pages

    In class today each student got assigned a certain topic to write about. The topic that i was assigned is “Many people believe strongly in the notion that “seeing is believing,” However, research has shown that perceptual sets can cause people to “see” things that aren't really there, or not to see things that are. Why do you think people have so much confidence that what they see reflects reality? Is it simply that they are ignorant of the research, , or do you think that most people would continue to think that “seeing is believing” even if they were aware of the perceptual sets? Defend your answer with reasoned arguments.”…

    • 556 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cad lecture 1

    • 802 Words
    • 6 Pages

    AutoCAD INTERFACE Properties Toolbar Styles Toolbar Title Bar Pull-down Menu Bar Standard Tool Bar Layer Toolbar Draw Tool Bar Modify Tool Bar Model Space Command Icon Crosshair User Coordinate Scroll Bars System (UCS)…

    • 802 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Seeing Is Believing

    • 880 Words
    • 4 Pages

    Seeing is believing is an idiom first recorded in this form in 1639 that means "only physical or concrete evidence is convincing". In life we always use the rule until I see with my own eyes I will not believe. People are so accustomed to trust their feelings perception of objects, which often do not even realize whether feelings deceive?…

    • 880 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Counterfeit Brands

    • 585 Words
    • 3 Pages

    First of all it is important to say that there are two types of counterfeit product purchases by consumers. Deceptive counterfeiting takes place where the consumer does not know that they have purchased a counterfeit product. In contrast, non-deceptive purchases of counterfeit products take place where the consumer willingly buys the counterfeit products. We’re dealing here with the latter type of purchase. If lawmakers and the producers of genuine branded goods want to take action against counterfeits as well as dealing with the suppliers they may need to consider why the demand exists. Much in the same way as health campaigns against cigarette smoking were based on understanding the various reasons why people smoke, so it is also clear that the consumption of counterfeits is a complex activity which has many causes that need to be understood.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    the fake

    • 448 Words
    • 2 Pages

    The real bottle label of Heinz Apple Cider Vinegar is much clear both in colors and writing.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    sham

    • 3021 Words
    • 13 Pages

    As America continues in its frenzy over the now $640-million jackpot up for grabs in tonight's Mega Millions lottery—have you bought your ticket yet? Have you bought a hundred?—we feel it is our duty to inform you that actually, you really probably don'twant to win the lottery. Even if you think you do.…

    • 3021 Words
    • 13 Pages
    Good Essays