Chapter 4 Checkpoint Flashcards
True or False: Application software serves as the interface between the user, teh apps, and the computer’s or mobile device’s hardware.
False
True or False: Each time you start a computer or mobile device, the system software is loaded from storage into memory.
True
True or False: open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users
False
True or False: when downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.
True
True or False: while a computer or mobile device is running, the operating system remains in memory.
False
True or False: with database software, users run functions to retrieve data
True
True or False: software suites offer 3 major advantages; lower cost, ease of use, and integration.
True
True or False: a PDF file can be viewed and printed without the software that created the original document
True
True or False: the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments.
True
True or False: an antivirus program automatically deletes quarantined files.
False
True or False: one of the fastest growing threats in mobile apps is toll fraud malware.
True
True or False: cookies typically are considered a type of spyware.
False
Programs called ______ or ________ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
tools or utilities
________ software performs functions specific to a business or industry
custom
A(n) ________ _________ is the right to use a program or app.
license agreement
____________ software is an application that allows users to organize data in rows and columns and perform calculations on the data
spreadsheet
______ _________ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
CAD software
The term _________ refers to decreasing a photo’s file size.
compress
A _______ _______ is a destructive program disguised as a real program.
trojan horse
A(n) _______ _________ is a known, specific pattern of virus code.
virus nightmare
program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
tools
software provided for use, modification, and redistribution that has no restrictions from the copyright holder regarding modification of the software
open source software
copyrighted software that is distributed at no cost for a trial period
shareware
square-shaped coded graphic that corresponds to a web address or other information
QR code