Ch.3 and 4 Computer Concepts
The main directory maintained by your computer's operating system is the ____ directory.
root
The process of overcoming limitations imposed by mobile service providers on an Android phone is called ____.
rooting
To get rid of software you no longer want from a PC, you ____.
run an uninstall routine
The file system used by Mac OS is ____.
HFS+
n the accompanying figure, Reggae is an example of a ____.
secondary folder
A virus signature is a ____.
section of program code used to identify a known malicious program
As shown in the accompanying figure, a(n) ____ is a legal contract that defines the ways in which you may use a computer program.
softwar license
A command to print a document is relayed through various levels of ____.
software
The term rootkit refers to ____.
software tools used to conceal malware and backdoors
An extension of .wav designates a ____ type of file.
sound
A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.
submenu
An extension of .ocx designates a ____ type of file.
support
In the accompanying figure, the files marked C is a(n) ____.
support program file
A file ____, in the context of Windows, is a piece of information that describes a file.
tag
One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.
tree
To delete data from a disk in such a way that no one can ever read it, you should ____.
use special file shredder software
____ may be sold or distributed free of charge in compiled form but must always include the source code.
Open source software
Adobe Reader works with files stored in standard ____ format.
____ simply requires you to fill out a form with the type of data you want to locate in a database.
QBE
The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
utility
The Windows ____ is a database that keeps track of your computer's peripheral devices, software, preferences, and settings.
Registry
In the accompanying figure, the item marked C is a(n) ____.
value
VMWare and Parallels Desktop software are examples of ____.
virutal machine software
Spreadsheets are particularly useful for ____.
what-if analysis
3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.
wireframes
A General Purpose License, or GPL, allows anyone to make copies for their own use or to give or sell to others.
TRUE
A jailbreak lasts until you accept a software update from Apple.
TRUE
A new version update usually installs in a similar way as you installed the original version.
TRUE
A quarantined file is generally encrypted before storing.
TRUE
A root directory can be subdivided into smaller lists.
TRUE
A zombie is a computer under the control of a bad bot.
TRUE
CAD software is designed to be used by architects and engineers.
TRUE
During a typical computing session, your computer might run an average of 50 processes.
TRUE
In a dual boot system, to change operating systems, you have to reboot.
TRUE
In the GUI shown in the accompanying figure there are two application windows: calculator and word processor.
TRUE
Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks.
TRUE
Often file management is represented by a tree metaphor.
TRUE
On PCs, executable files have an .exe extension.
TRUE
Open source software is copyrighted.
TRUE
Spreadsheet software provides built-in formulas.
TRUE
The sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process.
TRUE
Third-party software companies offer additional products that extend and improve upon those supplied by the operating system.
TRUE
Today's Windows operating systems do not require a kernel that accesses DOS.
TRUE
Utility software includes diagnostics that track down and fix disk errors.
TRUE
Viruses can damage files to the point that your computer can't access any data on its hard disk.
TRUE
When you use Windows, Mac OS, or a Linux graphical file manager, each subdirectory is depicted as a folder.
TRUE
Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.
word processing
An example of software most commonly associated with productivity software is ____.
word processing software
Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document.
wrap
The operating system that was developed in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is ____.
UNIX
An easy way to back up your important data is simply by copying selected files to a ____.
USB flash drive
In the accompanying figure, the word "Calculator" appears in ____.
an Application window
In the accompanying figure, "Untitled" Word Document appears in a(n) ____.
application window
To avoid security threats, a user can ____.
avoid opening suspicious email attachments
You can use the results from a search on a database in all of these ways EXCEPT to ____.
create records
In a(n) ____ installation, the setup program displays a list of software features for your selection.
custom
In the accompanying figure, the item marked A represents ____.
data
In the accompanying figure, the file marked A is a(n) ____.
data file
Portable software is ____.
designed to run from removable storage
Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.
desktop publishing
The operating system, application software, and ____ are organized similar to the chain of command in an army.
device drivers
A ____ displays the options associated with a command.
dialog box
A(n) ____ backup contains any files that were added or changed since the last full backup.
differential
The item shown in the accompanying figure is ____.
displayed on-screen when you first install software
A Linux ____ contains the Linux kernel, system utilities, GUI, applications, and installation routine.
distribution
In the accompanying figure, the icons at the bottom of the screen appear in the ____.
dock
In the accompanying figure, C: is an example of a(n) ____.
drive
The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.
encrypted
During product activation, you must ____.
enter a product key
In the accompanying figure, the file marked B is a(n) ____.
executable file
Most hard disks are formatted by the ____.
factory
In the accompanying figure, the items marked C represent ____.
fields
An optional file identifier that is separated from a main file name by a period is a ____.
file extension
In the accompanying figure, mp3 is an example of a ____.
file extension
The accompanying figure is an example of a(n) ____ utility.
file management
In the accompanying figure, Marley One Love is an example of a ____.
file name
A computer file's location is defined by a ____.
file specification
In the Mac OS, the data ____ contains data or the commands for a program.
fork
In the Mac OS, the resource ____ stores information about the data.
fork
Files maintained by the Macintosh operating system can have two parts, called ____.
forks
Files stored in noncontiguous clusters are ____.
fragmented
A(n) ____ installation gives you access to all features of the software.
full
A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.
full
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.
fully justified
Software considered to be utility software is ____.
hard disk backup software
Product activation can create a ____ based on your validation code and your computer's internal serial number.
hash value
At the upper-right corner of the accompanying figure, the object labeled "Macintosh HD" is an example of a(n) ____.
icon
A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
image
A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.
incremental
Activities associated with resource management by an operating system include all of the following EXCEPT ____.
installing new memory
Indicators of pirated software include all of the following EXCEPT software that ____.
is downloaded
The strengths of Mac OS do NOT include ____.
its use of resource forks
iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.
jailbreak
In the accompanying figure, the item marked B is a(n) ____.
label
Weaknesses of Mac OS include ____.
limited selection of applications
If your backups are ____, keep them in a safe place.
local
Utilities, like the one shown in the accompanying figure, often use some sort of storage metaphor to help you visualize and mentally organize the files on your disks. The metaphors are called ____ storage models.
logical
Through many editions, the Windows user interface was characterized by a colorful Start button in the ____ corner of the screen.
lower-left
An operating system's ____ capability supports a division of labor among all the processing units.
multiprocessing
Within a single program, ____ allows multiple parts to run simultaneously.
multithreading
Web sites that offer storage space for backups are called ____ backup services.
online
A shrink-wrap license goes into effect as soon as you ____.
open it
A(n) ____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.
operating
In relation to disks, ____ is a recording technology that lets you record in multiple sessions.
packet writing
A description of what actually happens on the disk and in the circuits is represented by a ____.
physical storage model
RIM is the ____ company that developed the BlackBerry smartphone.
Canadian
In the accompanying figure, Music is an example of a ____.
primary folder
A service pack ____.
provides updates to the operating system
Software that may be freely copied, distributed, and even resold is ____.
public domain
To find a particular record or group of records in a database, you use a(n) ____.
query
When using word processing software to analyze the reading level of your document, you should use a ____.
readability formula
Application software is designed to accomplish ____ tasks.
real-world
In the accompanying figure, the index card represents a single database ____.
record
A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard disk as it existed when the computer was new.
recovery
The strengths of Microsoft Windows include all of the following EXCEPT ____.
reliability
Security suites can be ____.
all of the above
The difference between the Save and the Save As commands is that ____.
all of the above
You should consider making backups of your ____.
all of the above
____ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.
Disc mastering
File management capabilities available from application software include ____ files.
all of the above
Support program files for PC applications often have a(n) ____ extension.
.dll
Current versions of Windows support file names up to ____ characters long.
255
Microsoft Windows is installed on more than ____ of the world's personal computers.
80%
____ utilities alter a user's interface to create an accessible environment.
Adaptive
Most applications for PCs consist of multiple files. Additional files contain support modules called ____.
All of the above
All of the following are examples of resources EXCEPT ____.
All of the above are resources
____ is typically sold in computer stores or at Web sites.
Commercial software
____ is typically available as a trial version
Demoware
A button allows you to select one item from several options.
FALSE
A file extension is always the same as a file format.
FALSE
A virus signature is a digitally signed certificate that certifies the file is virus-free.
FALSE
Antivirus software does not require any updates.
FALSE
By using spell checkers and grammar checkers, you are assured your document will be error-free.
FALSE
During the boot process, RAM is loaded into the operating system kernel.
FALSE
Even after the media containing portable software is removed from a computer, some traces of the software are left there.
FALSE
File management utilities usually retain the files within a folder when that folder is deleted.
FALSE
Files that are zipped contain consolidated files that are compressed and ready to execute.
FALSE
Folders cannot be created within other folders.
FALSE
If you purchase software, it belongs to you, and you can do what you want, including copying it.
FALSE
Local applications are installed on a local file server.
FALSE
Most Web apps, like the one shown in the accompanying figure, require installation on your local computer or handheld device.
FALSE
One of the primary strengths of Windows is security.
FALSE
Payroll software is an example of vertical market software.
FALSE
Some systems streamline the backup process by restoring a computer's operating system, device drivers, settings, and data in a single step - a process called restore pointing.
FALSE
To be certain a file can be opened by the recipient, simply save it as an .exe; then anyone can open it.
FALSE
When devices record your location, there is no possibility of abuse.
FALSE
With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection.
FALSE
In the accompanying figure, the item marked B represents ____.
a record
DVD authoring software offers tools for creating DVDs with ____-style menus.
Hollywood
____ searches are simply a collection of words relevant to a search.
Keyword
____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.
LINUX
____ applications are software that is installed on a computer's hard disk.
Local
An example of mathematical modeling software is ____.
Mathcad
A page layout includes ____.
all of the above
All the following are examples of portable applications EXCEPT ____.
Microsoft Internet Explorer
Popular presentation software products include all of the following EXCEPT ____.
Movie Maker
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
Multitasking
The file system used by Windows 8 is ____.
NTFS
The file system used by Windows Vista is ____.
NTFS
____ queries are questions stated in a language such as English, rather than an esoteric query language.
Natural language
____ is typically copyrighted software that is marketed under a try-before-you buy policy.
Shareware
____ compares the content of files on two devices and makes them the same.
Synchronization
The number and variety of programs that run on ____ are unmatched by any other operating system.
Windows
Web applications are ____.
accessed and run on the Web
In the accompanying figure, the item marked A is a(n) ____.
active cell
If virus protection software identifies a virus, it can try to ____.
all of the above
Mobile apps ____.
all of the above
A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.
bot
When installing a PC application, most ____ for new software are placed in the folder you specify.
both a and b
A security suite will typically include all of the following EXCEPT ____ software.
browser
The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
buffer
The intersection of a column and a row on a spreadsheet is called a ____.
cell
A formula can contain ____ and mathematical operators.
cell references
Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are not listed consecutively, ____.
click on each file while holding down the Ctrl key
Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are listed consecutively, ____.
click on the first and last file while holding down the Shift key
A group of sectors is called a ____.
cluster
System software is designed to accomplish ____ tasks.
computer-centric
An extension of .sys designates a ____ type of file.
configuration
When you install a local application, all of its files are placed in the appropriate folders on your computer's hard disk, and then your computer performs any software or hardware ____ necessary to make sure the program is ready to run.
configurations
It is illegal to do all the following with software EXCEPT ____.
copy and keep as backup