Unit 2
2. A signal from a device or source seeking the attention of the processor: interrupt ping time-slice quantum
3. More than one program in memory appearing to operate simultaneously: multi-tasking multi-user multi-programming virtual memory
4. Processing carried out from beginning to end without user interaction: real-time OS interactive OS on-line processing batch processing
5. Making copies of data or programs in case the originals are corrupted or lost: virus protection archive backup file encryption
6. The operating system functions in such a way as to hide from the user all the complexities of the hardware. This is known as: multi-tasking multi-programming virtual memory virtual machine
7. The operating system schedules jobs in order to make the best possible use of computer resources. This is known as: resource allocation memory management backing store management interrupt handling
8. Which of the following is not a type of applications software: operating system word processor spreadsheet graphics package
9. The use of virtual memory: results in faster execution speeds creates the illusion that the computer has more memory than it actually has ensures that disk space is used efficiently ensures that all programs are relocatable
10. Which of the following is not a method of biometric security? password protection fingerprint recognition voice recognition face recognition