Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
3. _________ was the first commercial computer with Graphical User Interface (GUI) and
mouse
a. UNIX OS b. LINUX OS c. MACOS d. WINDOWS
6. Four basic memory management data structures are used in Mach except one.
a. memory object b. address map c. resident page table d. kmap
8. It is often used to define the Bonjour local host name, which again is resolvable only on
the server’s local subnet.
a. Subnets b. Computer name c. Port d. Thread
9. A machine dependent memory mapping data structure (i.e., a hardware defined physical
address map).
a. imap b. emap c. gmap d. pmap
12. The following are the basic Mach abstractions except one.
a. task b. port c. message d. mode
13. The processor mode that forbids execution of privileged instructions and access to
privileged registers.
a. user mode b. supervisor mode c. process mode d. access mode
a. August 24, 2002 b. April 29, 2005 c. July 20,2011 d. July 25, 2012
18. This version of Mac OS X has the codename of “Snow Leopard”. What is it?
19. _________________ is the fourth major release of Mac OS X, Apple’s desktop and
server operating system.
a. March 24, 2001 b. March 04,2001 c. March 14,2001 d. May 24, 2001
21. It is the upcoming eleventh major release of OS X, Apple Inc.’s desktop and server
operating system for Macintosh computers.
22. It was successor of the Mac OS 9’s, as well as all previous Apple operating systems.
24. It is the fifth major release of Mac OS X, Apple’s desktop and server operating system for
Macintosh computers.
26. Fragments of computer code that can piggyback on the normal programs.
27. A computer program that has the ability to copy itself from machine to machine by
taking advantage of the security hole in the system.
28. Is simply a computer program. The program claims to do one thing (it may claim to be a
game) but instead does damage when you run it may erase your hard disk.
a. Virus b. Trojan horse c. Worm d. Spam