Chapter 4 Checkpoint Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

True or False: Application software serves as the interface between the user, teh apps, and the computer’s or mobile device’s hardware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Each time you start a computer or mobile device, the system software is loaded from storage into memory.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: when downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: while a computer or mobile device is running, the operating system remains in memory.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: with database software, users run functions to retrieve data

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: software suites offer 3 major advantages; lower cost, ease of use, and integration.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: a PDF file can be viewed and printed without the software that created the original document

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: an antivirus program automatically deletes quarantined files.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: one of the fastest growing threats in mobile apps is toll fraud malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: cookies typically are considered a type of spyware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Programs called ______ or ________ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.

A

tools or utilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ software performs functions specific to a business or industry

A

custom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ________ _________ is the right to use a program or app.

A

license agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____________ software is an application that allows users to organize data in rows and columns and perform calculations on the data

A

spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______ _________ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.

A

CAD software

18
Q

The term _________ refers to decreasing a photo’s file size.

A

compress

19
Q

A _______ _______ is a destructive program disguised as a real program.

A

trojan horse

20
Q

A(n) _______ _________ is a known, specific pattern of virus code.

A

virus nightmare

21
Q

program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices

A

tools

22
Q

software provided for use, modification, and redistribution that has no restrictions from the copyright holder regarding modification of the software

A

open source software

23
Q

copyrighted software that is distributed at no cost for a trial period

A

shareware

24
Q

square-shaped coded graphic that corresponds to a web address or other information

A

QR code

25
Q

destructive event or prank a virus was created to deliver

A

payload

26
Q

malware that can hide and allow someone to take full control of a computer from a remote location

A

rootkit

27
Q

malware that resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system

A

worm

28
Q

separate area of a hard disk that holds an infected file until the infection can be removed

A

quarantine

29
Q

scam in which a perpetrator sends an official looking email message that attempts to obtain personal and/or financial information

A

phishing

30
Q

process of reorganizing a hard disk’s files to that the files are stored in contiguous sectors

A

defragmenting

31
Q

What is the difference between software registration and product activation?

A

Software registration is typically optional and usually involves submitting your name and other personal information to the software manufacturer or developer.

Product Activation is a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed.

32
Q

What activities does a license agreement restrict?

A

A license agreement restricts the right to copy, loan, borrow, rent, or in any way distribute programs or apps.

33
Q

What is the clipboard?

A

Clipboard is a temporary storage location where cut content is put.

34
Q

List some uses of the clipboard.

A

1) Holds copied content
2) Holds cutting content
3) Lets the user paste, transfer content form a clipboard to a specific location

35
Q

List some security tools you can use to protect your computers and mobile devices.

A

1) Personal firewall
2) Antivirus programs
3) Malware removers
4) Internet filters

36
Q

What is a personal firewall?

A

A personal firewall is a security tool that detects and protects a personal computer and its data from unauthorized intrusions.

37
Q

Differentiate among a virus, worm, trojan horse, and rootkit.

A

A virus a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
A worm resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.
A trojan horse is a destructive program disguised as a real program.
A rootkit is a program that easily can hide and allow someone to take full control of your computer from a remote location, often for nefarious purposes.

38
Q

In reference to malware, what is a quarantine?

A

Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed.

39
Q

List the different types of file and disk management tools.

A

1) File manager
2) Search tool
3) Image viewer
4) Unistaller
5) Disk defragmenter
6) Screen saver
7) File compression tool
8) PC maintenance tool
9) Backup tool

40
Q

What functions do file and disk management tools provide?

A

1) Management files
2) Searching
3) Viewing images
4) Uninstalling software
5) Cleaning up disks
6) Defragmenting disks
7) Setting up screen savers
8) Compressing files
9) Maintaining a personal computer
10) Backing up files and disks