Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away. True or False |
False |
Because it is so easy to experiment with different numbers, word processing software is particularly useful for what-if analysis. True or False |
False |
Portable software does not require installation. True or False |
True |
Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs. True or False |
False |
There is a universal standard for categorizing software and various categorization schemes have few similarities. True or False |
False |
Like books and movies, software is a type of intellectual property. True or False |
True |
In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula True or False |
True |
Most commercial software is distributed under a single-user license that limits use to one person at a time. True or False |
True |
A local application is installed on a computer’s hard disk. True or False |
True |
The term service pack usually applies to operating system updates. True or False |
True |
Most Web apps require installation on your local computer or handheld device. True or False |
False |
Every peripheral device connected to a computer is regarded as an input or output resource. True or False |
True |
Most handheld devices can use either Web apps or mobile apps but not both. True or False |
False |
Within a single program, multithreading allows multiple commands, or threads, to run simultaneously True or False |
True |
Paragraph style includes the alignment of text within the margins and the space between each line of text. True or False |
True |
Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared. True or False |
True |
Mobile devices tend to be populated by entertainment apps, games, and social media services. True or False |
True |
Every storage device has a directory containing a list of its files. True or False |
True |
Although there are online sources for software, most consumers obtain software offline. True or False |
False |
A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. |
B. word wrap |
The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________. A. arrives only when you use |
A. arrives only when you use the app, downloaded and installed |
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________. A.disk partition |
C.file-naming conventions |
Which OS is installed on more than 80% of the World’s personal computers? A.Microsoft Windows |
A. Microsoft Windows |
Which of the following would be considered essential software for both laptop computers and a tablet computer? |
D. Browser |
Word processing software is likely to include which the following features? A. Search and Replace, |
A. Search and Replace, readability formula |
Which from the following list are an example of productivity software? A.Microsoft Office |
D. All of the above |
Which one of the following types of operating systems would most likely be found on a laptop computer? |
A.desktop operating system |
A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player. A.local |
D.mobile |
A ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location. A.site license |
A. site license |
Which type of software must include the source code, which allows programmers to modify and improve the software? |
C.Open source |
Magnetic and optical media are divided into circular ______ and then further divided into pie-shaped ________. |
C. tracks, sectors |
The main directory on a storage device is referred to as the ________ directory. A.root |
A.root |
Two of the most common open source and free software licenses are ___________. |
A.BSD and GPL |
A new version or edition of a software product is referred to as a software ___________. |
A. upgrade |
Which of the following feature is unique to OS X? |
C.resource fork |
An operating system’s ____________ capability supports a division of labor among all the processing units. A.multithreading |
B.multiprocessing |
Which category of software would programming languages fall into? |
B.Development Software |
In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet. A.what-if analysis |
B.automatic recalculation |
Which of the following is a process for installing software on a PC? A.Scan the hard drive for |
D.None of the above |
In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations. A.record |
D.formula |
Which of the following is not a file-naming convention? A.Avoid using symbols. |
D.Spaces are not allowed |
Which of the following is a file management utility? |
D.Both A and B |
What are the main software categories? A.System, Open Source, and |
C.System, Development, and Application |
The iOS operating system is found on which device? |
B. iPhone |
Which of the following operating systems is found on Macintosh desktop and laptop computers? |
D. OS X |
Software for PCs contains a _________ program that guides you through the installation process. |
D. setup |
__________ software may be freely copied, distributed, and even resold. |
B. Public domain |
Operating systems provide file organization tools called ___________. |
B.file management utilities |
Which of the following would not be considered an operating system resource? |
D.All of the above are actually operating system resources. |
Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers. |
A.thin client |
Similar to a worm, a trojan is not designed to spread itself to other devices. True or False |
False |
The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet. True or False |
False |
The most common types of PUPs and PUAs are toolbars and alternative browsers. True or False |
True |
Spam sent by scammers often uses spoofed email addresses. True or False |
True |
Blacklist and header filtering is usually performed by email clients and Webmail services. True or False |
False |
Android devices automatically encrypt data stored on the device when a user activates the login password. True or False |
False |
Most trojans are not designed to replicate themselves. True or False |
True |
Viruses spread themselves from one device to another. True or False |
False |
Most mass-mailing databases are legitimately compiled from customer lists True or False |
False |
What is the process called when an app from a source other than an official app store is installed on a device? |
A.Side-loading |
__________ changes an originating address or a destination address to redirect the flow of data between two parties. A.Social engineering |
C.Address spoofing |
The best defense against malware is _____________. |
C.antivirus software |
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. |
B.online intrusion |
A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker. |
D.RAT |
Which of the following is not a characteristic of a computer worm? |
D.spread through a process called side-loading |
______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest. |
C.Social engineering |
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option. |
C.password manager |
Which of the following sequence of events best describes an online intrusion? A.Malware enters the device, then opens a backdoor, |
A.Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit |
___________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs. |
B.Safe Browsing |
Which of the following is not an example of an authentication protocol? |
D.all of the above |
Spam accounts for approximately ______ of all email. |
D.70% |
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? |
D.all of the above |
A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus. |
C.hoax |
__________ is the process of modifying an executable file or data stream by adding additional commands |
D.Code injection |
To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection. |
B.Evil Twin |
Which type of device is the top target for ransomware? A.Desktops |
C.Smartphones |
MITM attacks include which of the following? |
D.all of the above |
A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device. |
A.rogue antivirus |
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files. |
A.heuristic analysis |
The current method of encrypting communication between a client and a server depends on a security protocol called _______. |
B.TLS |
Which of the following would be considered spyware? |
A.a keylogger |
A cryptographic __________ is a procedure for encryption or decryption. |
D.algorithm |
When antivirus software detects malware, which of the following would not be a course of action you could take? |
A.Conduct a heuristic analysis. |
If you use a password manager, what do you as the user need to remember? |
B.The master password. |
____________ is a term for a person who devises and carries out a scam in order to accomplish a goal. |
D.none of the above |
Trojans depend on ________ to spread. |
B.social engineering |
A(n) __________ pings a packet of data to a port in order to see if that port is open or not. |
B.port scan |
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications. |
B.firewall |
_____________ software shields certain applications against behaviors commonly exhibited by intrusions. |
B.Anti-exploit |
A password manager can store passwords in an encrypted file located at which of the following storage locations? |
D.all of the above |
A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code. A.zero-day |
A.zero-day |
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. |
B. |
Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols. A.entropy |
D.brute force |
There are various encryption methods, but __________ is the encryption standard currently used worldwide. |
A.AES |
Which of the following is not a characteristic of a weak password? |
A.Eight characters in length and include one or more uppercase letters, numbers, and symbols. |
Which of the following is not a type of spam filter? |
D.Entropy |
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? |
B.PUP |
A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn. |
A.advance fee fraud |
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers. |
B.encryption |
_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service. |
D.All of the above |
Chapter 6 + 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price