14 System Software and Application Software
Activity 1
Task 1
                      Method                                     Pro and con
Drag the selected lines of text to the target          Pro: More intuitive method
location using the mouse.                              Con: Require higher dexterity
Press the ‘Ctrl’ and ‘X’ keys to cut the text. Move    Pro: Shortcut keys are used to
the cursor to the target location. Press the ‘Ctrl’    reduce operation time.
and ‘V’ keys to paste the text.                        Con: Need to memorize shortcut
                                                       keys
Click the ‘Cut’ button on the Ribbon and move          Pro: Users do not need to
the cursor to the target location and click the        memorize shortcut keys.
‘Paste’ button.                                        Con: A slower method than using
                                                       shortcut keys
Task 2
                      Method                                     Pro and con
Click the ‘Close’ button at the top right corner of    Pro: A common method for most
the window.                                            of the Windows applications
                                                       Con: May close the application
                                                       accidentally
Press ‘Close Word’ from the Office button.             Pro: Users do not need to
                                                       memorize shortcut keys.
                                                       Con: Only available for Office
                                                       applications
Press the ‘Alt’ and ‘F4’ keys.                         Pro: A common method for most
                                                       of the Windows applications
                                                       Con: Need to memorize shortcut
                                                       keys.
Right-click the Word tag on the Windows Taskbar        Pro: Users do not need to
and select ‘Close’.                                    memorize shortcut keys.
                                                       Con: A slower method than
                                                       shortcut keys
This can suit the working habits of different users.
Concept Map
1. G
2. F
3. B
4. A
5. C
6. D
7. E
8. H
Concept Checker
1. F
2. T
3. T
4. F
5. T
Multiple Choice questions
1. B
2. A
3. C
4. C
5. A
6. D
7. B
8. C
9. A
10. D
Short Questions
1. Anti-virus software, (1) disk scanning program, (1) and data recovery program
    (or backup utility) (1)
    Before performing any data recovery actions, it is necessary to check and remove
    any computer viruses to avoid further damages to the computer system. (1)
    Corrupted or damaged files can be identified and possibly be fixed by the disk
    scanning program. (1) In case that there are problem unable to resolve, we can
    use data recovery program or backup utility to get back the lost files from the
    backup file. (1)
2.   (a) Bootstrap program (1)
     (b) The bootstrap program recognizes and tests the computer hardware (1); and
         loads the operating system into the main memory. (1)
     (c) ‧Transfer files between the main memory and the secondary storage
            devices.
         ‧Manage file folders.
         ‧Allocate the space for secondary storage devices.
         ‧Provide file protection and recovery.
          (any three  1)
3.           Category                                     Example
     Productivity software     Word processor       Spreadsheet / presentation program /
                                                    database / personal finance software
                                                   (any one  0.5)
     Communication             E-mail program / web browser / FTP program / instant
     software                  messaging program (any two  0.5)
     Multimedia software       Graphics program    Audio and video editing program / web
                                                   authoring software / computer-aided
                                                    design (CAD) software (any one  0.5)
     Entertainment software    Game program         Multimedia program (0.5)
                               (0.5)
     Education software        Electronic dictionary / encyclopedia and reference program /
                               self-learning program (any two  0.5)
     (all correct: 1)
4.   (a) ‧Control peripheral devices.
         ‧Manage files and directories.
         ‧Allocate the main memory.
         ‧Coordinate network communications .
         ‧Provide a platform for application software.
         (any four  1)
     (b) (i) Command-line interface requires less system resources to run. (1)
         (ii) Install more memory modules, replace the old display card with a high
               performance display card. (2)
         (iii) GUI frees the users from learning complex command languages. (1)
5.   (a) (i)     Device driver (1)
         (ii)    Utility program (1)
         (iii)   Device driver (1)
         (iv)    Utility program (1)
     (b) Windows Defender is an anti-virus program. (1) It detects and prevents the
         system from the attack of spyware and malware. (1)
Long Questions
1.   (a) Different computer systems such as network server, workstation, home-use
         desktop computer and mobile computing device require operating systems
         with different characteristics and functions. (2)
     (b) ‧Not many application software/device drivers are developed for Linux.
         ‧Computer manufacturers have contracts with Microsoft Windows such
          that shipped computers have Microsoft Windows pre-installed.
         ‧Microsoft Windows have more extensive customer support than Linux.
          (any two  2)
     (c) Keyboard / mouse / USB controller / ATA controller / infra-red / Bluetooth /
         generic display card
          (any six  1)
2.   (a) ‧The hard disk is highly fragmented.
         ‧The hard disk contains corrupted files.
         ‧Some start-up programs are damaged or missed.
         ‧The computer is infected by malware.
         ‧The hard disk is running out of free space.
         (any three  1)
     (b) ‧Use disk defragmenter to combine fragments into contiguous files.
         ‧Use disk scanning program to amend or delete corrupted files.
         ‧Use program uninstaller to remove damaged startup programs and
          reinstall again.
         ‧Clean up the computer with anti-virus software.
         ‧Use file compression utility to free up more hard disk space.
         (any corresponding three  1)
     (c) Operating system (1) and all device drivers (optionally utility programs
         such as anti-virus software) (1)
     (d) DiskImage / Norton Ghost. (any one  1)
         Peter should use the backup utility immediately to make a copy of the
         current system (1). In case the system has been corrupted again, Peter can
         use the backup utility program to recover the system with the backup image.
         (2)