Class 5 Types of Software

Quick Check

Fill in the blanks.

  1. A set of instructions that perform a particular task is called a program.
  2. The function of the operating system that manages the working of the processor is called processor management.
  3. MS-DOS, PC DOS and OS/2 are examples of single-user operating systems.

Select True or False for the following sentence.

  1. Disk Management utility is used to manage files and folders on a computer. False
  2. Virus scanners detect and remove unauthorized software that disrupts the normal functioning of a computer. True
  3. The Backup and Restore utility allow to schedule the day and time of the backup. True
  4. Language processors convert codes of high-level languages into machine code. True

Match the columns.

  1. MS WordWord processing software
  2. Microsoft PowerPointSupports creating presentations with animation effects
  3. Database Management Packages/Software/Systems (DBMS)Used to store, manipulate and process data
  4. DefragmentationThe process of scanning the file system and putting the fragments of the file together
  5. OSSComputer programs used by communication service providers

Time to Perform

A Tick the correct option.

  1. What type of operating systems are MS-DOS, PC DOS and OS/2 examples of?
    a) Multi-user operating system
    b) Single-user operating system
    c) Multitasking operating system
    d) Utility software
  2. Which category best describes devices like printers, disks and tapes?
    a) Input
    b) Output
    c) Processing
    d) Peripheral
  3. By what means memory is allocated to different programs?
    a) Software
    b) Hardware
    c) Utility software
    d) Operating system
  4. How would you best classify a computer virus?
    a) Unauthorized software
    b) Unauthorized backup
    c) Unauthorized FAT
    d) Authorized software
  5. Which of the following are the two classifications of application software?
    a) General Purpose Application Software, Customized Application Software
    b) Word Processing Software, Presentation Software
    c) General Purpose Application Software, Presentation
    d) Customized Application Software, Word Processing Software

B Name the following.

  1. A utility that manages disk-based hardware.
    Disk Management Utility
  2. Three utilities that remove virus.
    Norton Antivirus
    McAfee Antivirus
  3. Types of operating systems.
    Single-user OS
    Multi-user OS
    Multitasking OS
  4. Two functions of operating systems.
    Storage management.
    File management.
  5. Two application software.
    MS Excel
    Microsoft PowerPoint

C Fill in the blanks.

  1. Resources like memory, processor and various input and output devices are managed by the operating system.
  2. Defragmentation takes place on a scheduled basis, but it can also be done manually.
  3. Lotus 123, MS Excel and OpenOffice.org Calc are the spreadsheet programs.
  4. Assemblers translate the assembly language code, which is called mnemonic code into machine language code.
  5. Interpreters are not suitable for most application developments.

E Answer the following questions.

  1. Differentiate between single-user and multi-user operating systems. Give examples of each.
    Single-User OS is designed to be used by a single user. Example: MS-DOS.
    Multi-user OS is designed to be used by multiple users. Example: Windows.
  2. What is the role of Disk Management utility in a computer system?
    It manages the drives like hard disk drives, optical disk drives and flash drives.
  3. Differentiate between interpreters and compilers.
    Interpreters are slower when compared with compilers.
  4. Define Database Management System (DBMS) and provide some examples.
    It is a software that organizes and maintains data in a database. Examples: MS Access, Oracle, Ingres, Sybase, Informix, OpenOffice.org Base.
  5. What is fragmentation and how is it different from defragmentation?
    The process of breaking a file into pieces due to shortage of space is called fragmentation. Defragmentation is the process of scanning the file system and putting the fragments of the file together.

Leave a Reply

Your email address will not be published. Required fields are marked *