You are on page 1of 5

14 System Software and Application Software

Activity 1
Task 1
Method Pro and con
Drag the selected lines of text to the target Pro: More intuitive method
location using the mouse. Con: Require higher dexterity
Press the ‘Ctrl’ and ‘X’ keys to cut the text. Move Pro: Shortcut keys are used to
the cursor to the target location. Press the ‘Ctrl’ reduce operation time.
and ‘V’ keys to paste the text. Con: Need to memorize shortcut
keys
Click the ‘Cut’ button on the Ribbon and move Pro: Users do not need to
the cursor to the target location and click the memorize shortcut keys.
‘Paste’ button. Con: A slower method than using
shortcut keys

Task 2
Method Pro and con
Click the ‘Close’ button at the top right corner of Pro: A common method for most
the window. of the Windows applications
Con: May close the application
accidentally
Press ‘Close Word’ from the Office button. Pro: Users do not need to
memorize shortcut keys.
Con: Only available for Office
applications
Press the ‘Alt’ and ‘F4’ keys. Pro: A common method for most
of the Windows applications
Con: Need to memorize shortcut
keys.
Right-click the Word tag on the Windows Taskbar Pro: Users do not need to
and select ‘Close’. memorize shortcut keys.
Con: A slower method than
shortcut keys

This can suit the working habits of different users.

© Pearson Education Asia Limited 2009 1 NSS ICT Compulsory Textbook Answers
Concept Map
1. G
2. F
3. B
4. A
5. C
6. D
7. E
8. H

Concept Checker
1. F
2. T
3. T
4. F
5. T

Multiple Choice questions


1. B
2. A
3. C
4. C
5. A
6. D
7. B
8. C
9. A
10. D

© Pearson Education Asia Limited 2009 2 NSS ICT Compulsory Textbook Answers
Short Questions
1. Anti-virus software, (1) disk scanning program, (1) and data recovery program
(or backup utility) (1)
Before performing any data recovery actions, it is necessary to check and remove
any computer viruses to avoid further damages to the computer system. (1)
Corrupted or damaged files can be identified and possibly be fixed by the disk
scanning program. (1) In case that there are problem unable to resolve, we can
use data recovery program or backup utility to get back the lost files from the
backup file. (1)

2. (a) Bootstrap program (1)


(b) The bootstrap program recognizes and tests the computer hardware (1); and
loads the operating system into the main memory. (1)
(c) ‧Transfer files between the main memory and the secondary storage
devices.
‧Manage file folders.
‧Allocate the space for secondary storage devices.
‧Provide file protection and recovery.
(any three × 1)

3. Category Example
Productivity software Word processor Spreadsheet / presentation program /
database / personal finance software
(any one × 0.5)
Communication E-mail program / web browser / FTP program / instant
software messaging program (any two × 0.5)
Multimedia software Graphics program Audio and video editing program / web
authoring software / computer-aided
design (CAD) software (any one × 0.5)
Entertainment software Game program Multimedia program (0.5)
(0.5)
Education software Electronic dictionary / encyclopedia and reference program /
self-learning program (any two × 0.5)
(all correct: 1)

© Pearson Education Asia Limited 2009 3 NSS ICT Compulsory Textbook Answers
4. (a) ‧Control peripheral devices.
‧Manage files and directories.
‧Allocate the main memory.
‧Coordinate network communications .
‧Provide a platform for application software.
(any four × 1)
(b) (i) Command-line interface requires less system resources to run. (1)
(ii) Install more memory modules, replace the old display card with a high
performance display card. (2)
(iii) GUI frees the users from learning complex command languages. (1)

5. (a) (i) Device driver (1)


(ii) Utility program (1)
(iii) Device driver (1)
(iv) Utility program (1)

(b) Windows Defender is an anti-virus program. (1) It detects and prevents the
system from the attack of spyware and malware. (1)

Long Questions
1. (a) Different computer systems such as network server, workstation, home-use
desktop computer and mobile computing device require operating systems
with different characteristics and functions. (2)

(b) ‧Not many application software/device drivers are developed for Linux.
‧Computer manufacturers have contracts with Microsoft Windows such
that shipped computers have Microsoft Windows pre-installed.
‧Microsoft Windows have more extensive customer support than Linux.
(any two × 2)

(c) Keyboard / mouse / USB controller / ATA controller / infra-red / Bluetooth /


generic display card
(any six × 1)

© Pearson Education Asia Limited 2009 4 NSS ICT Compulsory Textbook Answers
2. (a) ‧The hard disk is highly fragmented.
‧The hard disk contains corrupted files.
‧Some start-up programs are damaged or missed.
‧The computer is infected by malware.
‧The hard disk is running out of free space.
(any three × 1)

(b) ‧Use disk defragmenter to combine fragments into contiguous files.


‧Use disk scanning program to amend or delete corrupted files.
‧Use program uninstaller to remove damaged startup programs and
reinstall again.
‧Clean up the computer with anti-virus software.
‧Use file compression utility to free up more hard disk space.
(any corresponding three × 1)

(c) Operating system (1) and all device drivers (optionally utility programs
such as anti-virus software) (1)

(d) DiskImage / Norton Ghost. (any one × 1)


Peter should use the backup utility immediately to make a copy of the
current system (1). In case the system has been corrupted again, Peter can
use the backup utility program to recover the system with the backup image.
(2)

© Pearson Education Asia Limited 2009 5 NSS ICT Compulsory Textbook Answers

You might also like