i. DTP stands for __________________ ii. The first operating system coded by Microsoft was ______________ iii. An_______________ utility protects the system from virus attack. iv. A set of programs that help in performing various operations on a computer is ________________ v. The process of arranging the files in a sequential order on the disk is known as __________________ II. Multiple choice questions: 1x5=5 1. Which of the following is not an operating system? a) MS-Dos (b) MS-Word (c) Windows (d) Unix 2. GUI stands for ________________ a) Graphical User Interface (b) Graphic User Interface (c) Graphics User Inference (d) Graphic User Inference 3. Which of the following is not a specific purpose software program? a) Billing software (b) Payroll software (c) MS-Access 2007 (d) Reservation software 4. Dos stands for ___________ a) Disk Operating system (b) Data operating system (c) Disk oriented system (d) Disk operation system 5. Norton is an example of which utility? a) Disk Defragmenter (b) Antivirus (c) Decryption (d) File compression III. Answer the following questions 1. What is system software? 2 2. What is decryption? 2 3. Define software? 2 4. Mention the characteristics of a computer? 2 5. What do you mean by operating system? 2 6. What is a program? 4 7. What is the used of backup utility? 4 8. What is the use of E-commerce? 4 9. What is the used of control unit? 6 10. What are the functions of an operating system? 12
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Hacking with Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security. Tools Explanation Included
Python Programming Illustrated For Beginners & Intermediates“Learn By Doing” Approach-Step By Step Ultimate Guide To Mastering Python: The Future Is Here!
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition