STUDY GUIDE CHAPTER 3



Similar documents
Chapter 3 Software. Computer Concepts Chapter Contents. 3 Section A: Software Basics

Chapter 3. Application Software. Chapter 3 Objectives. Application Software

CSCA0101 Computing Basics CSCA0101 COMPUTING BASICS. Chapter 7 Software

Discovering Computers Chapter 3 Application Software

Desktop and Laptop Security Policy

ESET NOD32 ANTIVIRUS 8

ESET SMART SECURITY 9

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

ESET NOD32 ANTIVIRUS 9

ESET SMART SECURITY 6

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Quick Heal Exchange Protection 4.0

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Oregon State Bar Software Standards Software Proficiency Expectations (Items in bold are to be demonstrated)

Chapter 3. Application Software. Chapter 3 Objectives. Application Software. Application Software. Application Software. What is application software?

Chapter Topics. Technology in Action. Productivity Software. Application Software 12/18/2008. System Software vs. Application Software

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

McAfee Internet Security Suite Quick-Start Guide

CHAPTER 5: PRODUCTIVITY APPLICATIONS

DESKTOP PRODUCTIVITY SOFTWARE

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

HP ProtectTools Embedded Security Guide

Software, Shareware and Opensource CSCU9B2

Mobile Print/Scan Guide for Brother iprint&scan

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Word Processing Features. Creating Tables. Steps to Create a Table. Word Processing Features PowerPoint Handout 3.A.1

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Installation and Administration Guide

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Symantec LiveUpdate Administrator. Getting Started Guide

FileMaker Pro and Microsoft Office Integration

Common Cyber Threats. Common cyber threats include:

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

SSL VPN Technology White Paper

Airtel PC Secure Trouble Shooting Guide

Systems and Principles Unit Syllabus

Word Processing programs and their uses

Computer Viruses: How to Avoid Infection

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

Securing end-user mobile devices in the enterprise

Sage 100 ERP. Installation and System Administrator s Guide

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Curriculum Map (Computer Technology 9 th grade)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

COMPUTER SKILLS PLACEMENT TEST QUESTIONS MS OFFICE 2010/WINDOWS 7

C6 Easy Imaging Total Computer Backup. User Guide

Protect & License an Excel Workbook

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

How to Print Using the PrinterOn Hosted Service & FAQs

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

What you need to know to keep your computer safe on the Internet

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Applications Software: Getting the Work Done. Chapter 2

Google Apps to Office 365 for business

Symantec AntiVirus Corporate Edition Patch Update

System Administrator Guide

Spyware Doctor Enterprise Technical Data Sheet

Windows Operating Systems. Basic Security

Free and Legal Software You Can Download By Tom Krauser

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

Mobile Print/Scan Guide for Brother iprint&scan

Junos Pulse for Google Android

Salesforce Classic Guide for iphone

ADP Workforce Now V3.0

Norman Security Portal

EZblue BusinessServer The All - In - One Server For Your Home And Business

Ricoh HotSpot. Printing App. User s Guide. HotSpot Printing App supports:

isecur User Guide for iphone

Serif PagePlusX4. Group Listing

Pcounter Mobile Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Symantec Mail Security for Domino

Table of Contents. Part I Welcome. Part II Introduction. Part III Getting Started. Part IV The User Interface. Part V Quick Start Tutorials

How To Use The Policy Patrol Archiver Server

the computer manufacturer that distributes the software with the computer, or

Computer Skills Checklist 1

AD Self-Service Suite for Active Directory

WHAT S NEW IN WORD 2010 & HOW TO CUSTOMIZE IT

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.

Sophos Computer Security Scan startup guide

Avira Rescue System. HowTo

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

PrinterOn Mobile App for ios and Android

Question: 1 You type a document and you want to insert header from third page. Which of the following technique will you use to accomplish the task?

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

VERITAS Backup Exec TM 10.0 for Windows Servers

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

Free Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) Presentations started on Dec 1, 2010 in AZ

Transcription:

STUDY GUIDE CHAPTER 3 True/False Indicate whether the statement is true or false. 1. Stereographical applications typically display satellite, aerial, or street maps used to locate places and get directions between two addresses. 2. Mobile devices typically pinpoint your location using built-in GPS or triangulating your distance from nearby cell towers. 3. Vertical market software is designed to automate specialized tasks in a specific market or business. 4. Utilities are an example of application software. 5. A(n) device driver is software that helps a peripheral device establish communication with a computer 6. Utility software refers to a type of application software that has the potential to help people get work done 7. A typical software package contains many files. 8. A(n) compressed file is designed to be started by users or automatically launched by the operating system. 9. Most Web apps work on any device with a compatible browser. 10. A(n) trademark is a form of legal protection that grants the author of the original work exclusive rights to copy, distribute, sell, and modify. 11. Public domain software has restrictions on its use. 12. Hackers can use rootkits to cloak their work. 13. A virus hoax usually arrives as a(n) e-mail. 14. A security package integrates several security modules to protect against malware. 15. Leading refers to the vertical spacing between lines in a document. 16. CAD software is designed to be used by architects and engineers. 17. When devices record your location, there is no possibility of abuse. 18. Payroll software is an example of vertical market software. 19. Third-party software companies offer additional products that extend and improve upon those supplied by the operating system. 20. Utility software includes diagnostics that track down and fix disk errors. 21. By using spell checkers and grammar checkers, you are assured your document will be error-free. 22. Spreadsheets have built-in formulas. 23. A jailbreak lasts until you accept a software update from Apple. 24. If you purchase software, it belongs to you, and you can do what you want, including copying it. 25. Local applications are installed on a local file server.

26. Executable files have an.exe extension. 27. Files that are zipped contain consolidated files that are compressed and ready to execute. 28. Even after the media containing portable software is removed from a computer, some traces of the software are left there. 29. A new version update usually installs in a similar way as when you installed the original version. 30. Open source software is copyrighted. 31. A zombie is a computer under the control of a bad bot. 32. A virus signature is a digitally signed certificate that certifies the file is virus-free. 33. Antivirus software does not require any updates. 34. A quarantined file is generally encrypted before storing. Multiple Choice Identify the choice that best completes the statement or answers the question. 35. A EULA is. a. an end-user license agreement for using software b. a warranty offered to customers who purchase software c. a copyright notice on software d. software supplied on a trial basis that expires, usually after a 30-day period 36. For which one of the following tasks would you be most likely to use database software? a. Keeping track of the grades you get in a c. Helping your friend who runs a preschool course and working out how well you to keep track of student names, have to do on remaining exams to get an birthdates, parents' names, addresses, A. and phone numbers. b. Creating a personal Web site that d. Managing the playlists for your ipod. contains a list of your top ten movies. 37. software is an example of utility software. a. Graphics c. Desktop publishing b. Anti-virus d. Word processing 38. When composing a document, you can use the feature to find each occurrence of frequently used words and decide whether you want to substitute a different word. a. Auto-correct c. Commenting b. Search and Replace d. Edit and Merge 39. By default, a cell reference in spreadsheet software is a(n) reference. a. absolute c. recalculated b. relative d. functional 40. software is able to access your current location and use it to show you the closest shops, restaurants, and theaters, as well as information about each location. a. Mobile c. Cloud-based b. Crowd-based d. Location-based

41. Both open source and can be copied an unlimited number of times, distributed for free, sold, and modified. a. proprietary software c. shareware b. free software d. demoware 42. The files supplied on software distribution disks and downloads are often to consolidate them into one large file. a. reconstituted c. uncompressed b. stripped d. zipped 43. System software is designed to accomplish tasks. a. real-world c. gaming b. computer-centric d. only operating system 44. Application software is designed to accomplish tasks. a. real-world c. gaming b. computer-centric d. only operating system 45. Examples of DVD authoring software include all the following EXCEPT. a. Roxio Creator c. ULead DVD Movie Factory b. Apple idvd d. Windows DVD Maker 46. 3-D graphics software provides a set of tools for creating that represent three-dimensional objects. a. stereoscopes c. wireframes b. prototypes d. photos 47. An example of mathematical modeling software is. a. SPSS Statistics c. Quicken b. Mathcad d. all answers are correct 48. Productivity software that has sophisticated features to help you produce professional-quality output is considered software. a. word processing c. Web authoring b. desktop publishing d. spreadsheet 49. Software considered to be utility software is. a. the Windows operating system c. spell check b. word processing d. hard disk backup software 50. The type of system software designed to help you monitor and configure settings for your computer system equipment is software. a. settings set c. utility b. execution d. config 51. Adobe Reader works with files stored in standard format. a. PDF c. HTML b. GIF d. both a and c 52. Word determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document. a. placement c. format b. wrap d. authoring 53. utilities alter a user's interface to create an accessible environment. a. Shareware c. Collaborative b. Adaptive d. Functional

54. An example of software most commonly associated with productivity software is. a. the Windows operating system c. word processing software b. a real-time player d. a browser 55. Productivity software that provides you with the ability to create, spell-check, edit, and format is considered software. a. word processing c. Web authoring b. desktop processing d. spreadsheet 56. When using word processing software to analyze the reading level of your document, you should use a. a. thesaurus c. readability formula b. grammar checker d. paragraph checker 57. The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is. a. both align c. fully justified b. paragraph justify d. page align 58. A page layout includes. a. headers and footers c. margins b. page numbers d. all answers are correct 59. The intersection of a column and a row on a spreadsheet is called a. a. formula c. number b. value d. cell 60. Spreadsheets are particularly useful for. a. what-if analysis c. creating tables b. use as a calculator d. none of the above 61. A formula can contain and mathematical operators. a. manipulatives c. cell references b. labels d. locations 62. To find a particular record or group of records in a database, you use a(n). a. find c. inquiry b. query d. search 63. You can use the results from a search on a database in all of these ways EXCEPT to. a. print reports c. convert formats b. export data d. create records 64. queries are questions stated in a language such as English, rather than an esoteric query language. a. Natural language c. QBE b. Keyword d. Notational 65. searches are simply a collection of words relevant to a search. a. Natural language c. QBE b. Keyword d. Notational 66. simply requires you to fill out a form with the type of data you want to locate in a database. a. Natural language modification c. QBE b. Keyword searching d. Notational resonance 67. Popular presentation software products include all of the following EXCEPT. a. Microsoft PowerPoint c. LibreOffice Impress b. iwork Keynote d. Movie Maker

68. Web applications are. a. installed locally and run on the Web c. installed on the Web and run locally b. accessed and run on the Web d. all answers are correct 69. Mobile apps. a. are usually small c. often cost less than $5.00, or are even free b. typically are sold through an App store d. all answers are correct 70. ipads, iphones, and ipods are only allowed to download apps from the itunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n). a. protocol breach c. android b. factory reset d. jailbreak 71. The process of overcoming limitations imposed by mobile service providers on a mobile device is called. a. jailbreaking c. breaching protocol b. factory reset d. rooting 72. The Windows is a database that keeps track of your computer's peripheral devices, software, preferences, and settings. a. BIOS c. CD-ROM b. ROM d. Registry 73. applications are software that is installed on a computer s hard disk. a. Help c. Data b. Resident d. Local 74. When you install a local application, all of its files are placed in the appropriate folders on your computer's hard disk, and then your computer performs any software or hardware necessary to make sure the program is ready to run. a. authentications c. configurations b. reboots d. verifications 75. Support programs have a(n) extension. a..exe c..dll b..hlp d..spt 76. Data files containing on-screen help most likely have the file extension. a..exe c..doc b..hlp d..xls 77. Software requires many files because. a. there is too much data to store on one file c. it allows for easy maintenance b. it allows flexibility and efficiency d. it allows for quicker installation 78. A(n) installation gives you access to all features of the software. a. custom c. activated b. hash d. full 79. In a(n) installation, the setup program displays a list of software features for your selection. a. custom c. activated b. hash d. full

80. All the following are examples of portable applications EXCEPT. a. Firefox c. Thunderbird b. FileZilla d. Microsoft Internet Explorer 81. Portable software is. a. lighter than local software c. designed to run from removable storage b. licensed only for portable devices d. designed to run on portable devices 82. A service pack. a. unlocks computer services b. requires a service call to a technician c. provides updates to the operating system d. repairs and fixes the hardware 83. To get rid of software you no longer want, you. a. delete the icon c. run an uninstall routine b. delete the files d. both a and b 84. It is illegal to do all the following with software EXCEPT. a. copy and sell to a friend c. copy and keep as backup b. copy and give to a friend d. modify 85. Indicators of pirated software include all of the following EXCEPT software that. a. is marked as an academic product, but not purchased through an authorized dealer b. is downloaded c. has photocopied software manuals d. has CD-ROMs with handwritten labels 86. A shrink-wrap license goes into effect as soon as you. a. use it c. open it b. purchase it d. register it 87. Software that may be freely copied, distributed, and even resold is. a. shareware c. public domain b. open source d. GPL 88. is typically sold in computer stores or at Web sites. a. Commercial software c. Shareware b. Open source software d. Freeware 89. is typically available as a trial version. a. Commercial software c. Demoware b. Open source software d. Shareware 90. is typically commercial software that is marketed under a try-before-you buy policy. a. Commercial software c. Shareware b. Open source software d. Freeware 91. may be sold or distributed free of charge in compiled form but must always include the source code. a. Commercial software c. Shareware b. Open source software d. Sourceware 92. Product validation can create a(n) based on your validation code and your computer s internal serial number. a. Trojan horse c. hash value b. blueprint d. hash brown

93. During product activation, you must. a. run the program c. enter a product key b. create a password d. none of the above 94. A is any software that can automate a task or autonomously execute a task when commanded to do so. a. virus c. Trojan horse b. worm d. bot 95. The term rootkit refers to. a. a program that repairs the computer s hardware core b. a program that repairs the kernel c. software tools used to conceal malware and backdoors d. software tools used to conceal security tools 96. To avoid security threats, a user can. a. store all data on a thumb drive b. enable the Hide extensions option c. read email as soon as it comes in d. avoid opening suspicious email attachments 97. A security suite will typically include all of the following EXCEPT software. a. antivirus c. antispyware b. firewall d. browser 98. Security suites can be. a. downloaded from the Web c. purchased at electronics stores b. purchased at computer stores d. all answers are correct 99. A virus signature is a. a. type of utility that looks for and eradicates viruses b. unique series of instructions to defend against malicious code c. section of program code used to identify a known malicious program d. the personal identifier of the author of the virus 100. If virus protection software identifies a virus, it can try to take all of the following actions except. a. remove the infection c. delete the file b. put the file in quarantine d. shut down the computer