Chapter 4 Checkpoint Flashcards
True or False: Application software serves as the interface between the user, teh apps, and the computer’s or mobile device’s hardware.
False
True or False: Each time you start a computer or mobile device, the system software is loaded from storage into memory.
True
True or False: open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users
False
True or False: when downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.
True
True or False: while a computer or mobile device is running, the operating system remains in memory.
False
True or False: with database software, users run functions to retrieve data
True
True or False: software suites offer 3 major advantages; lower cost, ease of use, and integration.
True
True or False: a PDF file can be viewed and printed without the software that created the original document
True
True or False: the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments.
True
True or False: an antivirus program automatically deletes quarantined files.
False
True or False: one of the fastest growing threats in mobile apps is toll fraud malware.
True
True or False: cookies typically are considered a type of spyware.
False
Programs called ______ or ________ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
tools or utilities
________ software performs functions specific to a business or industry
custom
A(n) ________ _________ is the right to use a program or app.
license agreement
____________ software is an application that allows users to organize data in rows and columns and perform calculations on the data
spreadsheet
______ _________ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
CAD software
The term _________ refers to decreasing a photo’s file size.
compress
A _______ _______ is a destructive program disguised as a real program.
trojan horse
A(n) _______ _________ is a known, specific pattern of virus code.
virus nightmare
program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
tools
software provided for use, modification, and redistribution that has no restrictions from the copyright holder regarding modification of the software
open source software
copyrighted software that is distributed at no cost for a trial period
shareware
square-shaped coded graphic that corresponds to a web address or other information
QR code
destructive event or prank a virus was created to deliver
payload
malware that can hide and allow someone to take full control of a computer from a remote location
rootkit
malware that resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system
worm
separate area of a hard disk that holds an infected file until the infection can be removed
quarantine
scam in which a perpetrator sends an official looking email message that attempts to obtain personal and/or financial information
phishing
process of reorganizing a hard disk’s files to that the files are stored in contiguous sectors
defragmenting
What is the difference between software registration and product activation?
Software registration is typically optional and usually involves submitting your name and other personal information to the software manufacturer or developer.
Product Activation is a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed.
What activities does a license agreement restrict?
A license agreement restricts the right to copy, loan, borrow, rent, or in any way distribute programs or apps.
What is the clipboard?
Clipboard is a temporary storage location where cut content is put.
List some uses of the clipboard.
1) Holds copied content
2) Holds cutting content
3) Lets the user paste, transfer content form a clipboard to a specific location
List some security tools you can use to protect your computers and mobile devices.
1) Personal firewall
2) Antivirus programs
3) Malware removers
4) Internet filters
What is a personal firewall?
A personal firewall is a security tool that detects and protects a personal computer and its data from unauthorized intrusions.
Differentiate among a virus, worm, trojan horse, and rootkit.
A virus a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
A worm resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.
A trojan horse is a destructive program disguised as a real program.
A rootkit is a program that easily can hide and allow someone to take full control of your computer from a remote location, often for nefarious purposes.
In reference to malware, what is a quarantine?
Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed.
List the different types of file and disk management tools.
1) File manager
2) Search tool
3) Image viewer
4) Unistaller
5) Disk defragmenter
6) Screen saver
7) File compression tool
8) PC maintenance tool
9) Backup tool
What functions do file and disk management tools provide?
1) Management files
2) Searching
3) Viewing images
4) Uninstalling software
5) Cleaning up disks
6) Defragmenting disks
7) Setting up screen savers
8) Compressing files
9) Maintaining a personal computer
10) Backing up files and disks