Chapt 5 Flashcards
peripheral hardware requires a(n) _______ to be installed
driver (or device driver)
word processing and spreadsheet programs are considered _____ software
productivity
conferencing and instant messaging are considered ______ software
collaboration
if you want to protect your computer against bad software you should install ______ software.
anti-malware
to make a file smaller in size or to package multiple files together into one archive, use _______ software
compression
the three application delivery methods are ________, _________, and _________.
locally installed, local network hosted, and cloud hosted
when assessing software compatibility, check what two things?
make sure it runs on your OS, and make sure you meet the minimum hardware requirements
to install or run a purchased application, you need a(n) _________ _______
product key
__________ is the process of letting you use the software by linking it to your computer
activation
__________ is the process by which you provide your name and contact info to the software manufacturer.
registration
in windows, the best way to uninstall applications is through _____
control panel
if you want your windows OS to be continually updated, what do you need to configure?
windows update
to make your hardware work, what type of software do you need?
a driver (or device driver)
who should you contact to get updated device drivers?
the hardware manufacturer
to use purchased software you need a(n) _____ _______, which stipulates the conditions of use.
software license
how often should you update your security software?
at least once a week
what are two locations from which you might receive an installation file?
a CD-ROM from the manufacturer, or download from the internet
to ensure that your OS gets the most important security updates, even if you don’t know they were released, you should enable _________.
automatic updates (or windows update or software update)
the three tiers of a three-tier application architecture are what?
database layer
business logic layer
presentation layer
to remove temporary internet files from your web browser, you should _______
clear the cache
if you want to prevent a button on a web page from working on a web browser, what should you do?
deactivate client-side scripting or use a script blocker
what adds functionality to a web browser?
add-on or extension
what allows you to browse the internet without your normal browser settings and identification?
private browsing
what settings would you configure if your web server needs to go through a secure server to access the internet?
proxy settings
a secure website requires a(n) _____
valid certificate
how do you prevent extra web browser windows from appearing when a website wants them to?
pop-up blocker
what type of software is not free and requires a license?
proprietary ( or commercial)
what type of software license requires you to pay every year?
subscription
access the database layer directly through the application layer
one tier, two tier, or three tier
two tier
stores data in a database or file system securely
one tier, two tier, or three tier
three tier
processes commands, performs calculations, and can make decisions
one tier, two tier, or three tier
three tier
presents data to the user and allows the user to interact with the system
one tier, two tier, or three tier
three tier
runs all components of the application from a single computer
one tier, two tier, or three tier
one tier
hosts the other layers through the server, having UI in the workstation
one tier, two tier, or three tier
two tier
serves users with the features of a software but without its source code
freeware, open-source, shareware, single-use, concurrent, corporate
freeware
shares the source code with the user for further improvement of the software
freeware, open-source, shareware, single-use, concurrent, corporate
open-source
provides a free trial with full or limited version of the software to users
freeware, open-source, shareware, single-use, concurrent, corporate
shareware
restricts usage of multiple instance of the application simultaneously
freeware, open-source, shareware, single-use, concurrent, corporate
single-use
allows the software to be installed on many PC’s but accessed by few users simultaneously
freeware, open-source, shareware, single-use, concurrent, corporate
concurrent
permits an organization to install the application on a specific number of PCs
freeware, open-source, shareware, single-use, concurrent, corporate
corporate
a(n) ______ is a piece of software written to tell the operating system how to communicate with a specific piece of hardware.
driver, patch, update
driver
a(n) ________ is a set of changes to a computer program or its supporting data designed to update, fix or improve it.
driver, patch, update
patch
a(n) ____________ is applied to whatever version you use to avoid problems due to viruses, worms and other exploits
driver, patch, update
update
instructs the OS to run the program
.exe .msi .app .bat .scexe
.exe
used for installation and removal of software within windows
.exe .msi .app .bat .scexe
.msi
executes a program within macOS
.exe .msi .app .bat .scexe
.app
executes multiple commands form the windows command prompt within one file
.exe .msi .app .bat .scexe
.bat
used as self extracting firmware updates produced by HP
.exe .msi .app .bat .scexe
.scexe
name the software type that does the following:
spreadsheet software, presentation software, web browser
productivity, collaboration, business
productivity
name the software type that does the following:
online workspace, document sharing, conferencing software
productivity, collaboration, business
collaboration
name the software type that does the following:
database software, project management, accounting software
productivity, collaboration, business
business
gives your browser additional functionality
plugin, cookie, pop-up, proxy server
plugin
refers to a plain text file that a web page stores on your
hard disk
plugin, cookie, pop-up, proxy server
cookie
appears as an extra browsing window when you display a certain web page
plugin, cookie, pop-up, proxy server
pop-up
makes requests on behalf of other computers
plugin, cookie, pop-up, proxy server
proxy server
john purchases a single-use software license for an application and installs it on his desktop. then he installs it on his laptop. in this scenario which of the following statements is true?
a) john can share the app with his friends to install on their computers
b) john can use the app only on one of the computers
c) john can use the app on both computers but only one at a time
d) john can use the app on both computers at the same time
c) john can use the app on both computers but only one at a time
what software is designed to let the OS talk to the hardware
application, patch, virtual, driver
driver
which of the following is NOT an example of productivity software?
conferencing software, word processing software, visual diagramming software, web browser
conferencing software
you are trying to enter registration info into a website. when you click the submit button, nothing happens. you try again and still nothing. what is the most likely cause of this problem?
pop-up blocker, script blocker, invalid certificate, disabled browser extension
script blocker
your boss calls you on the phone while he is trying to install software. it is telling him that he needs a product key. where should you tell him to look for it? choose two:
on the package the installation CD came in
in windows update
on the screen in the options menu
in an email from the manufacturer
on the package the installation CD came in
in an email from the manufacturer
you want to visit a web page and make sure that the website does not steal any info about your identity. in that scenario, which of the following should you use?
extension disabler, private browsing, script blocker, certificate validator
private browsing
rose opens her software app and gets a message stating that she has only 16 more uses of the product available. given this scenario, what is her best course of action to use it more than 16 additional times?
activate the software, register the software, uninstall and reinstall the software, no longer close the application
activate the software
which of the following is not generally included in a two tier architecture model?
database layer
application layer
client-side layer
business logic layer
business logic layer
you have just plugged in a new HP printer to your mac. you cant find a printer driver. what should you do given the circumstances?
use the default HP printer driver for macOS
run software update to install the printer driver automatically
visit HP’s website to download the printer driver
visit apple’s website to download the printer driver
visit HP’s website to download the printer driver
you have just purchased licensed software and want to install it. which of the following are you required to enter to install this software?
your name and contact info
none of the above
serial # of your processor
the product key
the product key
which of the following application delivery methods requires internet access?
cloud hosted, three tier, local network hosted, locally installed
cloud hosted
which of the following types of software licenses requires the user to pay yearly?
single-use, recurring, subscription, open source
subscription
you are visiting a website to order a product, but you keep seeing old information that you know is outdated. which of the following will most likely fix the problem?
configure proxy settings, clear the cache, disable browser extensions, deactivate client-side scripting
clear the cache
you need to set up software for 5 users on a network. they all need to have access to and edit the same excel files. which is the best type of software for them to use?
online workspace, project management software, document sharing, conferencing software
online workspace
which of the following does not require users to pay for the software?
single use, proprietary, open-source, concurrent license
open source
a user calls to tell you that every time he browses the internet, multiple browser windows keep appearing on his screen even though he has not opened them. in this scenario, what should you do to fix the problem?
disable browser extensions
clear the cache
deactivate client-side scripting
configure a pop-up blocker
configure a pop-up blocker
you visit a website that is supposed to be secure. your web browser shows the web address in a red font, and you do not see the lock icon. what is the most likely cause of this?
incorrect proxy setting
deactivated client-side scripting
invalid certificate
incompatible browser for the application
invalid certificate
word processing, spreadsheets and presentation software are examples of what?
collaboration software, productivity software, operating system add-ins, utility software
productivity software
you just installed an antivirus program on your laptop computer. given a scenario in which you want to maintain proper levels of security, how often should you update the software?
at least once a year
only when a new virus is discovered
at least once a week
at least once a month
at least once a week
when thinking of software compatibility, which two factors matter most? choose 2:
a) if the software comes with auto updates
b) if the software will work with other software on the computer
c) if the software will work with the operating system
d) if the minimum hardware requirements are met
c) if the software will work with the operating system
d) if the minimum hardware requirements are met
desktop publishing software, personal information manager, and remote desktop software are examples of which of the following software?
A) utility
B) collaboration
C) productivity
D) specialized
productivity
which of the following file extensions is associated with video files?
A) .mp4
B) .msi
C) .wav
D) .m4a
A) .mp4
when you visit a website, it remembers your name from a previous visit. what enables this to happen?
A) cookies
B) cache
C) certificates
D) proxy server
a) cookies
you want to share 30 files to your client but you don’t want to attach them separately in an email. which of the following file type extensions will you use for consolidating these 30 files? choose all that apply.
A) .tiff
B) .jar
C) .tar
D) .iso
E) .exe
.jar
.tar
.iso
B,C,D
which of the following is NOT considered productivity software?
A) Jive
B) KOffice
C) Zoho
D) ThinkFree
Jive - web based suite for integrating forums, blogs, wiki, chat and VOIP
what is a common compression format file extension seen on UNIX and Linux computers?
A) .iso
B) .dmg
C) .rar
D) .gz
D) .gz
which type of language is most likely to be used to write a web page?
A) scripted
B) assembly
C) compiled
D) interpreted
interpreted
a scripted language is often used to modify video games.
which data type is used as control logic within a program?
A) string
B) boolean
C) binary
D) char
boolean - data type is true or false
which of the following notational systems is the number 1001 written in?
A) binary
B) decimal
C) hexadecimal
D) unable to determine
unable to determine