Chapter 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

backup

A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.

firewall

A software-based _________ is dedicated to examining and blocking Internet traffic.

virtual machine

A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.

bug

A(n) _________ is just another name for an error in a program.

android

Although Google owns _________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.

malware

Collectively, all malicious programs are referred to as:

device drivers

Operating systems communicate with most hardware components using:

formatting

Preparing a storage device for use by an operating system is known as:

bitmap

Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.

database

Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.

beta

Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.

compiler

The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU.

clipboard

The _________ is a temporary location for things that are being moved or copied.

files

The most fundamental components of storage that users interact with are the:

algorithm

The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):

PowerPoint

What is an example of presentation software?

unix

_________, which dates back to 1969, runs many of the world's most powerful servers.

true

t/f. A file path is a complete address that describes the exact location of a file.

true

t/f. Antivirus, encryption, and file compression software are all examples of utilities.

true

t/f. Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their DBMS.

true

t/f. Tax preparation software allows individuals to prepare their income taxes and file electronically (e-file) with the IRS.

false

t/f. The macOS operating system has the largest market share for personal computers.

false

t/f. The process of converting algorithms into an actual computer program is known as flowcharting.

false

t/f. While software updates fix security vulnerabilities in software, they rarely address software errors or needed improvements.

false

t/f. the older 64-bit operating systems can only handle 4 GB of RAM.


Conjuntos de estudio relacionados

Nursing 212 Fluids and Electrolytes

View Set

Locked Out: Roots of the Arab Spring

View Set

AP Chemistry~First Semester Final Examination & Entailment (Nolan)~(2020-2021)

View Set

Prep U 47 Management of Patients With Gastric and Duodenal Disorders

View Set

8. Third month to Birth: The fetus and placenta

View Set