STUDY GUIDE CHAPTER 3 True/False Indicate whether the statement is true or false. 1. Stereographical applications typically display satellite, aerial, or street maps used to locate places and get directions between two addresses. 2. Mobile devices typically pinpoint your location using built-in GPS or triangulating your distance from nearby cell towers. 3. Vertical market software is designed to automate specialized tasks in a specific market or business. 4. Utilities are an example of application software. 5. A(n) device driver is software that helps a peripheral device establish communication with a computer 6. Utility software refers to a type of application software that has the potential to help people get work done 7. A typical software package contains many files. 8. A(n) compressed file is designed to be started by users or automatically launched by the operating system. 9. Most Web apps work on any device with a compatible browser. 10. A(n) trademark is a form of legal protection that grants the author of the original work exclusive rights to copy, distribute, sell, and modify. 11. Public domain software has restrictions on its use. 12. Hackers can use rootkits to cloak their work. 13. A virus hoax usually arrives as a(n) e-mail. 14. A security package integrates several security modules to protect against malware. 15. Leading refers to the vertical spacing between lines in a document. 16. CAD software is designed to be used by architects and engineers. 17. When devices record your location, there is no possibility of abuse. 18. Payroll software is an example of vertical market software. 19. Third-party software companies offer additional products that extend and improve upon those supplied by the operating system. 20. Utility software includes diagnostics that track down and fix disk errors. 21. By using spell checkers and grammar checkers, you are assured your document will be error-free. 22. Spreadsheets have built-in formulas. 23. A jailbreak lasts until you accept a software update from Apple. 24. If you purchase software, it belongs to you, and you can do what you want, including copying it. 25. Local applications are installed on a local file server.
26. Executable files have an.exe extension. 27. Files that are zipped contain consolidated files that are compressed and ready to execute. 28. Even after the media containing portable software is removed from a computer, some traces of the software are left there. 29. A new version update usually installs in a similar way as when you installed the original version. 30. Open source software is copyrighted. 31. A zombie is a computer under the control of a bad bot. 32. A virus signature is a digitally signed certificate that certifies the file is virus-free. 33. Antivirus software does not require any updates. 34. A quarantined file is generally encrypted before storing. Multiple Choice Identify the choice that best completes the statement or answers the question. 35. A EULA is. a. an end-user license agreement for using software b. a warranty offered to customers who purchase software c. a copyright notice on software d. software supplied on a trial basis that expires, usually after a 30-day period 36. For which one of the following tasks would you be most likely to use database software? a. Keeping track of the grades you get in a c. Helping your friend who runs a preschool course and working out how well you to keep track of student names, have to do on remaining exams to get an birthdates, parents' names, addresses, A. and phone numbers. b. Creating a personal Web site that d. Managing the playlists for your ipod. contains a list of your top ten movies. 37. software is an example of utility software. a. Graphics c. Desktop publishing b. Anti-virus d. Word processing 38. When composing a document, you can use the feature to find each occurrence of frequently used words and decide whether you want to substitute a different word. a. Auto-correct c. Commenting b. Search and Replace d. Edit and Merge 39. By default, a cell reference in spreadsheet software is a(n) reference. a. absolute c. recalculated b. relative d. functional 40. software is able to access your current location and use it to show you the closest shops, restaurants, and theaters, as well as information about each location. a. Mobile c. Cloud-based b. Crowd-based d. Location-based
41. Both open source and can be copied an unlimited number of times, distributed for free, sold, and modified. a. proprietary software c. shareware b. free software d. demoware 42. The files supplied on software distribution disks and downloads are often to consolidate them into one large file. a. reconstituted c. uncompressed b. stripped d. zipped 43. System software is designed to accomplish tasks. a. real-world c. gaming b. computer-centric d. only operating system 44. Application software is designed to accomplish tasks. a. real-world c. gaming b. computer-centric d. only operating system 45. Examples of DVD authoring software include all the following EXCEPT. a. Roxio Creator c. ULead DVD Movie Factory b. Apple idvd d. Windows DVD Maker 46. 3-D graphics software provides a set of tools for creating that represent three-dimensional objects. a. stereoscopes c. wireframes b. prototypes d. photos 47. An example of mathematical modeling software is. a. SPSS Statistics c. Quicken b. Mathcad d. all answers are correct 48. Productivity software that has sophisticated features to help you produce professional-quality output is considered software. a. word processing c. Web authoring b. desktop publishing d. spreadsheet 49. Software considered to be utility software is. a. the Windows operating system c. spell check b. word processing d. hard disk backup software 50. The type of system software designed to help you monitor and configure settings for your computer system equipment is software. a. settings set c. utility b. execution d. config 51. Adobe Reader works with files stored in standard format. a. PDF c. HTML b. GIF d. both a and c 52. Word determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document. a. placement c. format b. wrap d. authoring 53. utilities alter a user's interface to create an accessible environment. a. Shareware c. Collaborative b. Adaptive d. Functional
54. An example of software most commonly associated with productivity software is. a. the Windows operating system c. word processing software b. a real-time player d. a browser 55. Productivity software that provides you with the ability to create, spell-check, edit, and format is considered software. a. word processing c. Web authoring b. desktop processing d. spreadsheet 56. When using word processing software to analyze the reading level of your document, you should use a. a. thesaurus c. readability formula b. grammar checker d. paragraph checker 57. The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is. a. both align c. fully justified b. paragraph justify d. page align 58. A page layout includes. a. headers and footers c. margins b. page numbers d. all answers are correct 59. The intersection of a column and a row on a spreadsheet is called a. a. formula c. number b. value d. cell 60. Spreadsheets are particularly useful for. a. what-if analysis c. creating tables b. use as a calculator d. none of the above 61. A formula can contain and mathematical operators. a. manipulatives c. cell references b. labels d. locations 62. To find a particular record or group of records in a database, you use a(n). a. find c. inquiry b. query d. search 63. You can use the results from a search on a database in all of these ways EXCEPT to. a. print reports c. convert formats b. export data d. create records 64. queries are questions stated in a language such as English, rather than an esoteric query language. a. Natural language c. QBE b. Keyword d. Notational 65. searches are simply a collection of words relevant to a search. a. Natural language c. QBE b. Keyword d. Notational 66. simply requires you to fill out a form with the type of data you want to locate in a database. a. Natural language modification c. QBE b. Keyword searching d. Notational resonance 67. Popular presentation software products include all of the following EXCEPT. a. Microsoft PowerPoint c. LibreOffice Impress b. iwork Keynote d. Movie Maker
68. Web applications are. a. installed locally and run on the Web c. installed on the Web and run locally b. accessed and run on the Web d. all answers are correct 69. Mobile apps. a. are usually small c. often cost less than $5.00, or are even free b. typically are sold through an App store d. all answers are correct 70. ipads, iphones, and ipods are only allowed to download apps from the itunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n). a. protocol breach c. android b. factory reset d. jailbreak 71. The process of overcoming limitations imposed by mobile service providers on a mobile device is called. a. jailbreaking c. breaching protocol b. factory reset d. rooting 72. The Windows is a database that keeps track of your computer's peripheral devices, software, preferences, and settings. a. BIOS c. CD-ROM b. ROM d. Registry 73. applications are software that is installed on a computer s hard disk. a. Help c. Data b. Resident d. Local 74. When you install a local application, all of its files are placed in the appropriate folders on your computer's hard disk, and then your computer performs any software or hardware necessary to make sure the program is ready to run. a. authentications c. configurations b. reboots d. verifications 75. Support programs have a(n) extension. a..exe c..dll b..hlp d..spt 76. Data files containing on-screen help most likely have the file extension. a..exe c..doc b..hlp d..xls 77. Software requires many files because. a. there is too much data to store on one file c. it allows for easy maintenance b. it allows flexibility and efficiency d. it allows for quicker installation 78. A(n) installation gives you access to all features of the software. a. custom c. activated b. hash d. full 79. In a(n) installation, the setup program displays a list of software features for your selection. a. custom c. activated b. hash d. full
80. All the following are examples of portable applications EXCEPT. a. Firefox c. Thunderbird b. FileZilla d. Microsoft Internet Explorer 81. Portable software is. a. lighter than local software c. designed to run from removable storage b. licensed only for portable devices d. designed to run on portable devices 82. A service pack. a. unlocks computer services b. requires a service call to a technician c. provides updates to the operating system d. repairs and fixes the hardware 83. To get rid of software you no longer want, you. a. delete the icon c. run an uninstall routine b. delete the files d. both a and b 84. It is illegal to do all the following with software EXCEPT. a. copy and sell to a friend c. copy and keep as backup b. copy and give to a friend d. modify 85. Indicators of pirated software include all of the following EXCEPT software that. a. is marked as an academic product, but not purchased through an authorized dealer b. is downloaded c. has photocopied software manuals d. has CD-ROMs with handwritten labels 86. A shrink-wrap license goes into effect as soon as you. a. use it c. open it b. purchase it d. register it 87. Software that may be freely copied, distributed, and even resold is. a. shareware c. public domain b. open source d. GPL 88. is typically sold in computer stores or at Web sites. a. Commercial software c. Shareware b. Open source software d. Freeware 89. is typically available as a trial version. a. Commercial software c. Demoware b. Open source software d. Shareware 90. is typically commercial software that is marketed under a try-before-you buy policy. a. Commercial software c. Shareware b. Open source software d. Freeware 91. may be sold or distributed free of charge in compiled form but must always include the source code. a. Commercial software c. Shareware b. Open source software d. Sourceware 92. Product validation can create a(n) based on your validation code and your computer s internal serial number. a. Trojan horse c. hash value b. blueprint d. hash brown
93. During product activation, you must. a. run the program c. enter a product key b. create a password d. none of the above 94. A is any software that can automate a task or autonomously execute a task when commanded to do so. a. virus c. Trojan horse b. worm d. bot 95. The term rootkit refers to. a. a program that repairs the computer s hardware core b. a program that repairs the kernel c. software tools used to conceal malware and backdoors d. software tools used to conceal security tools 96. To avoid security threats, a user can. a. store all data on a thumb drive b. enable the Hide extensions option c. read email as soon as it comes in d. avoid opening suspicious email attachments 97. A security suite will typically include all of the following EXCEPT software. a. antivirus c. antispyware b. firewall d. browser 98. Security suites can be. a. downloaded from the Web c. purchased at electronics stores b. purchased at computer stores d. all answers are correct 99. A virus signature is a. a. type of utility that looks for and eradicates viruses b. unique series of instructions to defend against malicious code c. section of program code used to identify a known malicious program d. the personal identifier of the author of the virus 100. If virus protection software identifies a virus, it can try to take all of the following actions except. a. remove the infection c. delete the file b. put the file in quarantine d. shut down the computer