top-rated free essay

is fake

By setonlai Oct 23, 2014 908 Words
14 System Software and Application Software
Activity 1
Task 1
Method

Pro and con

Drag the selected lines of text to the target
location using the mouse.

Pro: More intuitive method
Con: Require higher dexterity

Press the ‘Ctrl’ and ‘X’ keys to cut the text. Move
the cursor to the target location. Press the ‘Ctrl’
and ‘V’ keys to paste the text.

Pro: Shortcut keys are used to
reduce operation time.
Con: Need to memorize shortcut
keys

Click the ‘Cut’ button on the Ribbon and move
the cursor to the target location and click the
‘Paste’ button.

Pro: Users do not need to
memorize shortcut keys.
Con: A slower method than using
shortcut keys

Task 2
Method

Pro and con

Click the ‘Close’ button at the top right corner of
the window.

Pro: A common method for most
of the Windows applications
Con: May close the application
accidentally

Press ‘Close Word’ from the Office button.

Pro: Users do not need to
memorize shortcut keys.
Con: Only available for Office
applications

Press the ‘Alt’ and ‘F4’ keys.

Pro: A common method for most
of the Windows applications
Con: Need to memorize shortcut
keys.

Right-click the Word tag on the Windows Taskbar
and select ‘Close’.

Pro: Users do not need to
memorize shortcut keys.
Con: A slower method than
shortcut keys

This can suit the working habits of different users.

© Pearson Education Asia Limited 2009

1

NSS ICT Compulsory Textbook Answers

Concept Map
1. G
2. F
3. B
4. A
5. C
6. D
7. E
8. H
Concept Checker
1. F
2. T
3. T
4. F
5. T
Multiple Choice questions
1. B
2. A
3. C
4. C
5. A
6. D
7. B
8. C
9. A
10. D

© Pearson Education Asia Limited 2009

2

NSS ICT Compulsory Textbook Answers

Short Questions
1. Anti-virus software, (1) disk scanning program, (1) and data recovery program (or backup utility) (1)
Before performing any data recovery actions, it is necessary to check and remove any computer viruses to avoid further damages to the computer system. (1) Corrupted or damaged files can be identified and possibly be fixed by the disk scanning program. (1) In case that there are problem unable to resolve, we can use data recovery program or backup utility to get back the lost files from the backup file. (1)

2.

(a) Bootstrap program (1)
(b) The bootstrap program recognizes and tests the computer hardware (1); and loads the operating system into the main memory. (1)
(c) ‧Transfer files between the main memory and the secondary storage devices.
‧Manage file folders.
‧Allocate the space for secondary storage devices.
‧Provide file protection and recovery.
(any three × 1)

3.

Category
Productivity software

Example
Word processor

Spreadsheet / presentation program /
database / personal finance software
(any one × 0.5)

Communication
software

E-mail program / web browser / FTP program / instant

Multimedia software

Graphics program

messaging program (any two × 0.5)
Audio and video editing program / web
authoring software / computer-aided
design (CAD) software (any one × 0.5)

Entertainment software

Game program
(0.5)

Multimedia program (0.5)

Education software

Electronic dictionary / encyclopedia and reference program / self-learning program (any two × 0.5)

(all correct: 1)

© Pearson Education Asia Limited 2009

3

NSS ICT Compulsory Textbook Answers

4.

(a) ‧Control peripheral devices.
‧Manage files and directories.
‧Allocate the main memory.
‧Coordinate network communications .
‧Provide a platform for application software.
(any four × 1)
(b) (i) Command-line interface requires less system resources to run. (1) (ii) Install more memory modules, replace the old display card with a high performance display card. (2)
(iii) GUI frees the users from learning complex command languages. (1)

5.

(a) (i) Device driver (1)
(ii) Utility program (1)
(iii) Device driver (1)
(iv) Utility program (1)
(b) Windows Defender is an anti-virus program. (1) It detects and prevents the system from the attack of spyware and malware. (1)

Long Questions
1.

(a) Different computer systems such as network server, workstation, home-use desktop computer and mobile computing device require operating systems with different characteristics and functions. (2)

(b) ‧Not many application software/device drivers are developed for Linux. ‧Computer manufacturers have contracts with Microsoft Windows such that shipped computers have Microsoft Windows pre-installed. ‧Microsoft Windows have more extensive customer support than Linux. (any two × 2)

(c) Keyboard / mouse / USB controller / ATA controller / infra-red / Bluetooth / generic display card
(any six × 1)

© Pearson Education Asia Limited 2009

4

NSS ICT Compulsory Textbook Answers

2.

(a) ‧The hard disk is highly fragmented.
‧The hard disk contains corrupted files.
‧Some start-up programs are damaged or missed.
‧The computer is infected by malware.
‧The hard disk is running out of free space.
(any three × 1)
(b) ‧Use disk defragmenter to combine fragments into contiguous files. ‧Use disk scanning program to amend or delete corrupted files. ‧Use program uninstaller to remove damaged startup programs and reinstall again.

‧Clean up the computer with anti-virus software.
‧Use file compression utility to free up more hard disk space. (any corresponding three × 1)
(c) Operating system (1) and all device drivers (optionally utility programs such as anti-virus software) (1)
(d) DiskImage / Norton Ghost. (any one × 1)
Peter should use the backup utility immediately to make a copy of the current system (1). In case the system has been corrupted again, Peter can use the backup utility program to recover the system with the backup image. (2)

© Pearson Education Asia Limited 2009

5

NSS ICT Compulsory Textbook Answers

Cite This Document

Related Documents

  • the fake

    ...April 3, 2013 Fake Alert!!! Heinz Apple Cider Vinegar (what are you eating!!!) Hi girls, We know many of you girls are using Apple Cider Vinegar for weight loss.It is really hard to find this vinegar in our country.Most of us are buying it from Almas,Priyo,CSD,Gulshan DCC market and from  many other superstores.And the only available brand ...

    Read More
  • fake

    ...Imma boss ass bitch. The U.S. Bureau of Labor Statistics reports that 66.2 percent of the high school graduates last year went on to higher education (U.S. Dept. of Labor). When these students graduate from college they have, on average, about $27,000 in student loan debt (Walia). It is expected that there will be 1.8 million undergraduates...

    Read More
  • the fake

    ... The Iliad. Translated by Robert Ragles. Yes homer is honorable. Honor: honesty, fairness, or integrity in one's beliefs and actions; this is the definition by which Achilles, ought to be judged. Throughout the Iliad, Achilles acts on rage and revenge. “Rage-Goddess, sing the rage of Peleus’ son Achilles, murderous, doomed, that cost the A...

    Read More
  • .... fake

    ...The reason for me to be writing this essay is for not being to attend to my first formation. The reason for that to happen is that I never woke up, never heard my alarm. There is no excuse for that I was being irresponsible. The first formation is one of the most important things in the military. Because is us for accountability and to brief the...

    Read More
  • fake

    ...Time Management 1 The importance of time management. 2 Developing prioritisation skills 3 Delegation 4 Other people's time management problems Introduction In the last lecture we asked the question: what makes a good manager? We listed a number of different management attributes. However a manager should be able to deploy hi...

    Read More
  • A Fake Paper

    ...A recent survey by RIM found an average BlackBerry user converts one hour of downtime to productive time each day and ups their overall team efficiency by 38 percent. All of ZDNet.co.uk's sister site silicon.com's 12-strong CIO Jury IT user panel agreed that BlackBerry devices and smartphones have improved their productivity but warned it can...

    Read More
  • Why Be Fake?

    ...Suwaira Iqbal Ms. Shelly Sanders EN 1113- 05 26 September 2012 Why be Fake? People often call others fake without giving it a second thought. Human beings are capable of changing and adjusting themselves according to their environment. There are people all around the world who try really hard to blend into their surroundings, and mostly en...

    Read More
  • Fake Currency

    ...Money as a means of payment, consists of coins, paper money and withdrawable bank deposits. Today, credit cards and electronic cash form an important component of the payment system. For a common person though, money simply means currency and coins. This is so because in India, the payment system, especially for retail transactions still revolve...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.