CS101 midterms Flashcards

1
Q

consists of programs designed to make users more productive and/or assist with personal tasks

A

Application Software:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 Categories of application software:

A

> Business
Graphics and Multimedia
Home / Personal / Educational
Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public-domain software is _________ available to the public for a fee.

A

NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

serves as the interface between the user, the application software, and the computer’s hardware

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

type of system software that assists users with controlling or maintaining the operation of a computer its devices or its software.

A

Utility Programs-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • type of malicious software
A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is application that assists people while performing business activities

A

Business software:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

allows user to create and manipulate documents

A

Word processing software (word processor) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a collection of electronic drawings, photo and other images.

A

Clip art -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allows users to organize data in rows and columns and perform calculations

A

Spreadsheet software -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

depicts data in a spreadsheets in graphical form

A

Charting -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a collection of data organized in a manner that allows access, retrieval, and use of that data

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • allows users to crate visual aids for presentation to communicate ideas, messages and other information to a group
A

Presentation software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is application software that enables users to enter typed text, hand written comments, drawings, or sketches anywhere on a page

A

Note taking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collection of individual programs available together as a unit

A

Software suite -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is application software that includes appointment calendar, address book and notepad

A

Personal information manager (PIM) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project

A

Project management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

helps companies record and report their financial transactions

A

Accounting software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user

A

Document management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

typically require special computing solutions for various functional units

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

help users of all skill levels create web pages that include multimedia and interactive content.

A

Web page authoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is a website that allows users to access and interact with software from any computer or device that is connected to the internet.

A

Web application (web app)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a electronic equivalent of a user manual

A

Online Help -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

provides updates and more comprehensive resources to respond to technical issues about software

A

Web-based help -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is a type of cbt(computer based training) that uses internet technology and consists of application software on the web
Web-based training -
26
is the delivery of education at one location while the learning takes place at other locations
Distance learning (DL) -
27
Consists of the programs that control or maintain the operations of the computer and its devices.
System software -
28
is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system (os) (platform) -
29
the process of staring and restarting a computer
Booting (cold boot)-
30
- using the OS to restart the software
warm Boot
31
- is the core of an operating system that manages memory and devices,
Kernel
32
- saves open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low power state
Sleep mode
33
saves any open documents and programs to a hard disk before removing power from the computer
Hibernates
34
control show you enter data and instructions and how information is displayed on the screen
User interface -
35
- you interact with menus and visual images
graphic user interface (GUI)
36
a user uses the keyboard to enter data and instructions
Command-line interface,
37
- enables two or more users to run programs simultaneously.
A multiuser operating system
38
supports two or more processors running programs at the
Multiprocessing operating system
39
optimizes the use of RAM
Memory management
40
is a portion of storage medium functioning as additional RAM
Virtual memory
41
can allocate up to 4 gb of removable flash memory devices as additional memory cache
Window ready Boost
42
- is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
Buffer
43
- is the process of sending documents to be printed to a buffer instead of sending them immediately to the printer.
Spooling
44
small program that tells the operating system how to communicate with a specific device
Driver -
45
automatically configures new devices as you install them
Plug and play
46
automatically provides updates to the program
Automatic update
47
- organizes and coordinates how multiple users access and share resources on a network.
Server operating system
48
uses the server operating system to: > add and remove users, computers and other devices > Install software and administer network security
Network administrator
49
- identifies a specific user
Username or User ID
50
- is a private combination of characters associated with the user name
A Password
51
- is a complete operating system that works on a desktop computer, notebook computer, and some tablets
Stand-alone operating system
52
is a multitasking operating system developed in the early 1970s
Unix
53
is a open source popular, multitasking unix-type operating system
Linux
54
is a linux based operating system designed to work primarily with web apps
Chrome Os
55
The operating system on mobile devices and many consumers electronics called a __________ and reside on firmware
mobile operating system
56
is a open source, linux based mobile operating system designed by google for smartphones and tablets
Android
57
, developed by Apple, is a proprietary mobile operating system specifically made for Apple's mobile devices
iOS
58
, which means they Recognize and work with applications written for an earlier version of the operating system
Backward compatible
59
meaning it may or may not run on new versions of the operating system.
upward compatible,
60
is a type of system software that allows a user to perform maintenance type tasks
utility program
61
is a utility that performs functions related to file management
File manager
62
is a program that attempts to locate a file on your computer based criteria you specify
Search utility
63
removes a program as well as any associated entries in the system files
Uninstaller
64
allows user to display, copy, and print the content of graphics file
Image viewer
65
utility searches for and removes unnecessary files
Disk cleanup
66
reorganizes the files nad unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster
Disk defragmenter
67
allows users to copy files to another medium
Backup utility
68
reverses the process and returns backed up files to their original form
Restore utility
69
is a specific named location on a storage medium that contains related documents.
folder
70
is the process of reorganizing the disk so that the files are stored in contiguous sectors
Defragmenting
71
copies Itself repeatedly in memory or over a network
worm
72
describes a potentially damaging computer program that affects a computer negatively
virus
73
hides within or looks like a Legitimate Program
Trojan horse
74
protects a Computer against viruses
antivirus program
75
is a program placed on a computer without the user's knowledge that secretly collects information about the user
Spyware
76
detects and deletes spyware and other similar programs
spyware remover
77
displays an online advertisement in a banner or pop-up window
Adware
78
is a program that detects and deletes adware
adware remover
79
are programs that remove or block certain items from being displayed
Filters
80
shrinks the size of a file(s)
file compression utility
81
frees up room on the storage media
Compressing files
82
Compressed files sometimes are called
zipped files
83
is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
Spam
84
is a scam in which a perpetrator attempts to obtain your personal and/or financial information
Phishing
85
s an Internet advertisement that suddenly appears in a new window in the foreground of a Web page displayed in your browser.
Pop-up ad
86
writes text, graphics, audio, and video files on a recordable or rewritable optical disks
Disk burning software
87
identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance
Personal computer maintenance utility
88
- mass produced, copyright retail software that meets the needs of a wide variety of users, not just a single user or company available on the web
Packaged software
89
- Performs functions specific to business or industry
Custom software
90
- website that allows users to access and interact with software from any computer or devices that is connected to the internet
Web application
91
- is a software provided for use specification and distribution this software has (no restrictions) from the copyright holder regarding modification of the software’s internal instructions and redistribution
Open source software
92
- copyrighted software that is distributed at no cost for a trial period
Shareware
93
- copyrighted software that provided at no cost to a user by an individual or company that retains all rights to the software
Freeware
94
- software has been donated for public use and has no copyright restrictions, anyone can copy and distribute public domain software
Public Domain software
95
- assists the user with controlling or maintaining the operation of a computer its devices or its software utility
Utility program
96
- users can easily change what they have written, many features to make its professional and visually appealing
Advantage of Word processing software
97
- shows trend during period of time
Line chart
98
- displays a bar of various length to show the relationship of data
Column chart
99
relationships of part to a whole
Pie Chart -
100
3 popular chart types
Line chart Column chart - Pie Chart -
101
- software is a sophisticated type of application software that assists a professional user in creating engineering, architectural and scientific designs
Computer-aided design (CAD)
102
- enables professional designers to create sophisticated documents that contain text graphics and many colors
Desktop Publishing software (DTP software)
103
to create and modify graphical images
Paint / Image editing software -
104
type of image edtiitng software that allows photographers, engineers and scientists to edit and customize digital photos
Professional Photo editing software -
105
Allows professionals to modify a segment of video called a clip it also includes audio editing
Video and audio editing software -
106
Allows users to modify texts, graphics, audio, video and animation in an interactive application
Multimedia authoring software -
107
simplified accounting programs, helps balance their checkbooks, pay bills, track personal income and expenses
Personal Finance software -
108
assist in the preparation of legal documents and provides legal information
Legal software -
109
can guide individual through the process of filing taxes
Tax preparation software -
110
create newsletters, brochures, flyers, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages
Personal DTP software -
111
includes various simplified tools that allows you to draw pictures shapes and other images
Personal paint / image editing software -
112
allows user to edit digital photos
Personal photo editing software -
113
collection of clip art and photo
Clip art / image gallery -
114
for small scale movie making projects
Video and audio editing software -
115
- assist with design remodeling or improvement of a home deck
Home design / Landscaping software
116
determine routes directions and local points of interest
Travel and mapping software -
117
provides valuable and thorough information for all individuals
Reference software -
118
teaches a particular skill
Educational software -
119
Designed to support a hobby or provide enjoyment
Entertainment software -
120
- often store users data and information on their servers
Web application hosts
121
delivery of education via some electronic method such as the internet
E-learning (electronic learning) -
122
-Time-stamped articles, or posts, in a diary or journal format usually listed in reverse chronological order.
Blogging
123
Web browser - It allows users to access and view Web pages on the Internet.
Web browser
124
- A named collection of stored data, instructions, or information
File
125
allows users to interact with the operating system by executing commands and launching applications.
shell in an operating system
126
Protection from hostile forces that intends to compromise the normal state of being of something
security
127
What does CIA Mean?
C: Confidentiality of data I: Integrity of data A: Availability of data
128
is the state of being safe from malicious actors
Security
129
is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
Risk
130
An intentional breach of digital security often involves a deliberate act that is against the law
Cybercrime
131
: A formal and umbrella term for anyone who maliciously acts upon a computer system
Threat Actors
132
: are individuals who want to attack computers but lack the knowledge of computers and networks needed to do so. Usually downloads pre-made hacking tools coded by other hackers.
Script Kiddies
133
A threat actor that breaks through a computer security without required permission
Hacker:
134
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
Cracker:
135
: See Discussion / Activity on Module 1 about hacktivists
Hacktivists
136
Attack a nation's national computer systems, mostly power grids and tech infrastructure that compromises national security, to instill fear and insecurity
Cyberterrorists:
137
threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network - if they are not paid a sum of money
Cyberextortionist:
138
Types of Cybercriminals
Threat Actors Script Kiddies Hacker: Cracker Hacktivists: Cyberterrorists: Cyberextortionist:
139
is a common way to trick people to entering their passwords and other info to websites controlled by threat actors.
Phishing
140
An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes
RA 10175 - Anti-Cybercrime Act of 2012
141
is the discovery, collection, and analysis of evidence found on computers and networks involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks
Digital Forensics
142
A contraction of the words "malicious" and "software" A general term for software that are intended to disrupt computer security
Malware
143
is a group of compromised computers or mobile devices connected to a network,
Botnets
144
a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services
Denial of Service (DoS)
145
What is DOS called when the botnet executed it?
Distributed DoS (DDoS)
146
Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Backdoor
147
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Spoofing
148
is a category of attacks that attempts to trick the victim into giving valuable information to the attacker relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions
Social Engineering
149
Detects and automatically takes action against malicious code that attempts to run through a computer
Antivirus
150
Protects network resources from outsiders and to restrict employees' access to sensitive data
Firewall
151
a private, secure path across a public network that allows authorized users secure access to a company or other network
Virtual Private Networks (VPN)
152
Prevent other users from accessing your computer by implementing access controls
Proper Access Controls
153
If your data is backed up, threats of a cyberextortionist / cracker deleting the data won't be a huge deal
Data Backups
154
Usually, in public places, threat actors creates a WiFi access point of the same name as the one existing in public
Avoid Evil Twins
155
is a period of time during which an individual refrains from using technolog
Digital Detox
156
more time it would take to brute-force it, therefore increased security Should always have
Strong passwords =
157
give a One-Time Password (OTP) you would provide on top of your additional password
Two-Factor Authentication
158
Would require a part of your body to be scanned
Biometrics
159
Requires a user to answer a prompt to prove the user's humanity
Captcha
160
A stolen encrypted data is just as worthless as 983j984hd027897634hwtyewisjo8we if a threat actor cannot decipher what it means
Encryptions
161
An operating system resides on a ROM chip on a mobile device or consumer electronic device
Embedded/Mobile OS