Page 88 - Ai Book - 10
P. 88

8.  How can you check and remove unwanted files to free up disk space on your computer?
              Ans.  Use the Disk Cleanup utility. It scans and allows you to select files to delete, i.e. temporary files and
                   unnecessary system files.
            E.  Long answer type question.

                1.  Explain the role of Memory Management in an Operating System.
              Ans.  Memory Management is crucial for efficient functioning of an OS. It involves handling the computer’s
                   primary memory, known as RAM. The OS keeps track of the memory in use, decides how much memory
                   to allocate when a program runs, and deallocates it when the program is done. This process ensures that
                   programs have the necessary memory to execute, enhancing overall system performance.

                2.  Explain the process of restoring a deleted file using the Recycle Bin in Windows.
              Ans.  When you delete a file, it goes to the Recycle Bin. To restore it, double-click the Recycle Bin icon on your
                   desktop. Inside, find the file, right-click on it, and choose ‘Restore this item.’ This action returns the file
                   to its original location.
                3.  How does physical maintenance contribute to the smooth functioning of a computer system?
              Ans.  Physical maintenance involves keeping the hardware clean and free of dust. Dust accumulation inside
                   components such as the CPU cabinet can lead to overheating, affecting performance. Regular cleaning,
                   using methods such as compressed air, ensures optimal functioning by preventing damage due to heat
                   build-up.
                4.  What are the key steps to be followed when using antivirus software like Seqrite End Point Security for a
                   complete system scan?
              Ans.  To perform a complete system scan using Seqrite End Point Security, start by clicking on the Scan option
                   in the lower right corner. Choose ‘Full System Scan’ in the menu. If you want to scan specific external
                   storage, use ‘Custom Scan.’ Add the items to scan, click ‘Start Scan,’ and close when done. Updating
                   antivirus software regularly is crucial for effective protection.
            F.  Application based questions.
                1.  Imagine you  are running  multiple  applications on  your computer  simultaneously. Explain  how the
                   operating system manages the memory to ensure smooth functioning of these applications. Provide an
                   example scenario.
              Ans.  In a multitasking environment, the operating system handles memory management to allow several
                   applications to run concurrently. For instance, when you open a web browser, a word processor, and a
                   music player simultaneously, the operating system allocates and deallocates memory dynamically. If you
                   close the music player, the operating system frees up the memory it was using, optimizing resources for
                   the remaining applications. This ensures efficient use of memory and responsive performance.

                2.  You are collaborating on a group project, and each team member needs access to specific files. Explain
                   how a network operating system facilitates file sharing and security in such a collaborative environment.
                   Provide an example scenario.

              Ans.  In a collaborative project, a network operating system plays a crucial role in file management. For instance,
                   if the team is using a shared network drive, the operating system ensures that each team member
                   has the necessary access permissions. This means some team members may have read-only access,
                   while others have read-and-write access to specific folders. The network operating system manages
                   these permissions to prevent unauthorized access. If a team member completes their part of the project
                   and no longer requires access, the operating system allows the administrator to modify access rights,
                   enhancing collaboration efficiency and maintaining data security.


                82
                82
   83   84   85   86   87   88   89   90   91   92   93