Cs100 midterms Flashcards

1
Q

consists of programs designed to make users more productive and/or assist with personal tasks

A

Application Software:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 Categories of application software:

A

> Business
Graphics and Multimedia
Home / Personal / Educational
Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public-domain software is _________ available to the public for a fee.

A

NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

serves as the interface between the user, the application software, and the computer’s hardware

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

type of system software that assists users with controlling or maintaining the operation of a computer its devices or its software.

A

Utility Programs-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • type of malicious software
A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is application that assists people while performing business activities

A

Business software:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

allows user to create and manipulate documents

A

Word processing software (word processor) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a collection of electronic drawings, photo and other images.

A

Clip art -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allows users to organize data in rows and columns and perform calculations

A

Spreadsheet software -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

depicts data in a spreadsheets in graphical form

A

Charting -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a collection of data organized in a manner that allows access, retrieval, and use of that data

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • allows users to crate visual aids for presentation to communicate ideas, messages and other information to a group
A

Presentation software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is application software that enables users to enter typed text, hand written comments, drawings, or sketches anywhere on a page

A

Note taking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collection of individual programs available together as a unit

A

Software suite -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is application software that includes appointment calendar, address book and notepad

A

Personal information manager (PIM) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project

A

Project management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

helps companies record and report their financial transactions

A

Accounting software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user

A

Document management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

typically require special computing solutions for various functional units

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

help users of all skill levels create web pages that include multimedia and interactive content.

A

Web page authoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is a website that allows users to access and interact with software from any computer or device that is connected to the internet.

A

Web application (web app)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a electronic equivalent of a user manual

A

Online Help -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

provides updates and more comprehensive resources to respond to technical issues about software

A

Web-based help -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is a type of cbt(computer based training) that uses internet technology and consists of application software on the web

A

Web-based training -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is the delivery of education at one location while the learning takes place at other locations

A

Distance learning (DL) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Consists of the programs that control or maintain the operations of the computer and its devices.

A

System software -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources

A

Operating system (os) (platform) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

the process of staring and restarting a computer

A

Booting (cold boot)-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • using the OS to restart the software
A

warm Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • is the core of an operating system that manages memory and devices,
A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  • saves open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low power state
A

Sleep mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

saves any open documents and programs to a hard disk before removing power from the computer

A

Hibernates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

control show you enter data and instructions and how information is displayed on the screen

A

User interface -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  • you interact with menus and visual images
A

graphic user interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

a user uses the keyboard to enter data and instructions

A

Command-line interface,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  • enables two or more users to run programs simultaneously.
A

A multiuser operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

supports two or more processors running programs at the

A

Multiprocessing operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

optimizes the use of RAM

A

Memory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

is a portion of storage medium functioning as additional RAM

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

can allocate up to 4 gb of removable flash memory devices as additional memory cache

A

Window ready Boost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  • is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
A

Buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  • is the process of sending documents to be printed to a buffer instead of sending them immediately to the printer.
A

Spooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

small program that tells the operating system how to communicate with a specific device

A

Driver -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

automatically configures new devices as you install them

A

Plug and play

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

automatically provides updates to the program

A

Automatic update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  • organizes and coordinates how multiple users access and share resources on a network.
A

Server operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

uses the server operating system to:
> add and remove users, computers and other devices
> Install software and administer network security

A

Network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  • identifies a specific user
A

Username or User ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  • is a private combination of characters associated with the user name
A

A Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  • is a complete operating system that works on a desktop computer, notebook computer, and some tablets
A

Stand-alone operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

is a multitasking operating system developed in the early 1970s

A

Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

is a open source popular, multitasking unix-type operating system

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

is a linux based operating system designed to work primarily with web apps

A

Chrome Os

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The operating system on mobile devices and many consumers electronics called a __________ and reside on firmware

A

mobile operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

is a open source, linux based mobile operating system designed by google for smartphones and tablets

A

Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

, developed by Apple, is a proprietary mobile operating system specifically made for Apple’s mobile devices

A

iOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

, which means they Recognize and work with applications written for an earlier version of the operating system

A

Backward compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

meaning it may or may not run on new versions of the operating system.

A

upward compatible,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

is a type of system software that allows a user to perform maintenance type tasks

A

utility program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

is a utility that performs functions related to file management

A

File manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

is a program that attempts to locate a file on your computer based criteria you specify

A

Search utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

removes a program as well as any associated entries in the system files

A

Uninstaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

allows user to display, copy, and print the content of graphics file

A

Image viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

utility searches for and removes unnecessary files

A

Disk cleanup

66
Q

reorganizes the files nad unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster

A

Disk defragmenter

67
Q

allows users to copy files to another medium

A

Backup utility

68
Q

reverses the process and returns backed up files to their original form

A

Restore utility

69
Q

is a specific named location on a storage medium that contains related documents.

A

folder

70
Q

is the process of reorganizing the disk so that the files are stored in contiguous sectors

A

Defragmenting

71
Q

copies Itself repeatedly in memory or over a network

A

worm

72
Q

describes a potentially damaging computer program that affects a computer negatively

A

virus

73
Q

hides within or looks like a Legitimate Program

A

Trojan horse

74
Q

protects a Computer against viruses

A

antivirus program

75
Q

is a program placed on a computer without the user’s knowledge that secretly collects information about the user

A

Spyware

76
Q

detects and deletes spyware and other similar programs

A

spyware remover

77
Q

displays an online advertisement in a banner or pop-up window

A

Adware

78
Q

is a program that detects and deletes adware

A

adware remover

79
Q

are programs that remove or block certain items from being displayed

A

Filters

80
Q

shrinks the size of a file(s)

A

file compression utility

81
Q

frees up room on the storage media

A

Compressing files

82
Q

Compressed files sometimes are called

A

zipped files

83
Q

is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.

A

Spam

84
Q

is a scam in which a perpetrator attempts to obtain your personal and/or financial information

A

Phishing

85
Q

s an Internet advertisement that suddenly appears in a new window in the foreground of a Web page displayed in your browser.

A

Pop-up ad

86
Q

writes text, graphics, audio, and video files on a recordable or rewritable optical disks

A

Disk burning software

87
Q

identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance

A

Personal computer maintenance utility

88
Q
  • mass produced, copyright retail software that meets the needs of a wide variety of users, not just a single user or company available on the web
A

Packaged software

89
Q
  • Performs functions specific to business or industry
A

Custom software

90
Q
  • website that allows users to access and interact with software from any computer or devices that is connected to the internet
A

Web application

91
Q
  • is a software provided for use specification and distribution this software has (no restrictions) from the copyright holder regarding modification of the software’s internal instructions and redistribution
A

Open source software

92
Q
  • copyrighted software that is distributed at no cost for a trial period
A

Shareware

93
Q
  • copyrighted software that provided at no cost to a user by an individual or company that retains all rights to the software
A

Freeware

94
Q
  • software has been donated for public use and has no copyright restrictions, anyone can copy and distribute public domain software
A

Public Domain software

95
Q
  • assists the user with controlling or maintaining the operation of a computer its devices or its software utility
A

Utility program

96
Q
  • users can easily change what they have written, many features to make its professional and visually appealing
A

Advantage of Word processing software

97
Q
  • shows trend during period of time
A

Line chart

98
Q
  • displays a bar of various length to show the relationship of data
A

Column chart

99
Q

relationships of part to a whole

A

Pie Chart -

100
Q

3 popular chart types

A

Line chart
Column chart -
Pie Chart -

101
Q
  • software is a sophisticated type of application software that assists a professional user in creating engineering, architectural and scientific designs
A

Computer-aided design (CAD)

102
Q
  • enables professional designers to create sophisticated documents that contain text graphics and many colors
A

Desktop Publishing software (DTP software)

103
Q

to create and modify graphical images

A

Paint / Image editing software -

104
Q

type of image edtiitng software that allows photographers, engineers and scientists to edit and customize digital photos

A

Professional Photo editing software -

105
Q

Allows professionals to modify a segment of video called a clip it also includes audio editing

A

Video and audio editing software -

106
Q

Allows users to modify texts, graphics, audio, video and animation in an interactive application

A

Multimedia authoring software -

107
Q

simplified accounting programs, helps balance their checkbooks, pay bills, track personal income and expenses

A

Personal Finance software -

108
Q

assist in the preparation of legal documents and provides legal information

A

Legal software -

109
Q

can guide individual through the process of filing taxes

A

Tax preparation software -

110
Q

create newsletters, brochures, flyers, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages

A

Personal DTP software -

111
Q

includes various simplified tools that allows you to draw pictures shapes and other images

A

Personal paint / image editing software -

112
Q

allows user to edit digital photos

A

Personal photo editing software -

113
Q

collection of clip art and photo

A

Clip art / image gallery -

114
Q

for small scale movie making projects

A

Video and audio editing software -

115
Q
  • assist with design remodeling or improvement of a home deck
A

Home design / Landscaping software

116
Q

determine routes directions and local points of interest

A

Travel and mapping software -

117
Q

provides valuable and thorough information for all individuals

A

Reference software -

118
Q

teaches a particular skill

A

Educational software -

119
Q

Designed to support a hobby or provide enjoyment

A

Entertainment software -

120
Q
  • often store users data and information on their servers
A

Web application hosts

121
Q

delivery of education via some electronic method such as the internet

A

E-learning (electronic learning) -

122
Q

-Time-stamped articles, or posts, in a diary or journal format usually listed in reverse chronological order.

A

Blogging

123
Q

Web browser - It allows users to access and view Web pages on the Internet.

A

Web browser

124
Q
  • A named collection of stored data, instructions, or information
A

File

125
Q

allows users to interact with the operating system by executing commands and launching applications.

A

shell in an operating system

126
Q

Protection from hostile forces that intends to compromise the normal state of being of something

A

security

127
Q

What does CIA Mean?

A

C: Confidentiality of data
I: Integrity of data
A: Availability of data

128
Q

is the state of being safe from malicious actors

A

Security

129
Q

is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

A

Risk

130
Q

An intentional breach of digital security often involves a deliberate act that is against the law

A

Cybercrime

131
Q

: A formal and umbrella term for anyone who maliciously acts upon a computer system

A

Threat Actors

132
Q

: are individuals who want to attack computers but lack the knowledge of computers and networks needed to do so. Usually downloads pre-made hacking tools coded by other hackers.

A

Script Kiddies

133
Q

A threat actor that breaks through a computer security without required permission

A

Hacker:

134
Q

Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

A

Cracker:

135
Q

: See Discussion / Activity on Module 1 about hacktivists

A

Hacktivists

136
Q

Attack a nation’s national computer systems, mostly power grids and tech infrastructure that compromises national security, to instill fear and insecurity

A

Cyberterrorists:

137
Q

threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network - if they are not paid a sum of money

A

Cyberextortionist:

138
Q

Types of Cybercriminals

A

Threat Actors
Script Kiddies
Hacker:
Cracker
Hacktivists:
Cyberterrorists:
Cyberextortionist:

139
Q

is a common way to trick people to entering their passwords and other info to websites controlled by threat actors.

A

Phishing

140
Q

An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes

A

RA 10175 - Anti-Cybercrime Act of 2012

141
Q

is the discovery, collection, and analysis of evidence found on computers and networks
involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks

A

Digital Forensics

142
Q

A contraction of the words “malicious” and “software”
A general term for software that are intended to disrupt computer security

A

Malware

143
Q

is a group of compromised computers or mobile devices connected to a network,

A

Botnets

144
Q

a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services

A

Denial of Service (DoS)

145
Q

What is DOS called when the botnet executed it?

A

Distributed DoS (DDoS)

146
Q

Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

A

Backdoor

147
Q

a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

A

Spoofing

148
Q

is a category of attacks that attempts to trick the victim into giving valuable information to the attacker relies on an attacker’s clever manipulation of human nature in order to persuade the victim to provide information or take actions

A

Social Engineering

149
Q

Detects and automatically takes action against malicious code that attempts to run through a computer

A

Antivirus

150
Q

Protects network resources from outsiders and to restrict employees’ access to sensitive data

A

Firewall

151
Q

a private, secure path across a public network that allows authorized users secure access to a company or other network

A

Virtual Private Networks (VPN)

152
Q

Prevent other users from accessing your computer by implementing access controls

A

Proper Access Controls

153
Q

If your data is backed up, threats of a cyberextortionist / cracker deleting the data won’t be a huge deal

A

Data Backups

154
Q

Usually, in public places, threat actors creates a WiFi access point of the same name as the one existing in public

A

Avoid Evil Twins

155
Q

is a period of time during which an individual refrains from using technolog

A

Digital Detox

156
Q

more time it would take to brute-force it, therefore increased security
Should always have

A

Strong passwords =

157
Q

give a One-Time Password (OTP) you would provide on top of your additional password

A

Two-Factor Authentication

158
Q

Would require a part of your body to be scanned

A

Biometrics

159
Q

Requires a user to answer a prompt to prove the user’s humanity

A

Captcha

160
Q

A stolen encrypted data is just as worthless as 983j984hd027897634hwtyewisjo8we if a threat actor cannot decipher what it means

A

Encryptions

161
Q

An operating system resides on a ROM chip on a mobile device or consumer electronic device

A

Embedded/Mobile OS