info 1101

¡Supera tus tareas y exámenes ahora con Quizwiz!

Office 365 is an example of

. SaaS.

Chapter 4 states that your computer's performance is largely determined by the processor, the available cache, the bus, and the

. amount of memory installed

According to a survey cited in Chapter 5, more than _____ million Americans play computer and video games, and the average age of gamers is _____ years.

150; 35

The penguin image shown here is the logo an operating system that first appeared in

1991

Chromebooks have a(n) _____ startup time and store settings, applications, and documents _____.

8-second; in the cloud

lines on the telephone network

A DSL modem sends and receives data using

become inefficient or crash.

A DoS attack typically causes an Internet site to

battery backup.

A UPS is a

router

A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection.

blog

A _____ is an online journal that anybody can use to express ideas and opinions.

hub

A _____ is used on older LAN networks to coordinate the message traffic among nodes connected to a network.

. a personal online diary

A blog can be described as

a personal online diary

A blog can be described as

radio waves.

A cellular tower relays

broadband.

A communications medium that is capable of carrying a large amount of data at a fast speed is known as

False

A digital certificate contains a company's private key.

install and run antivirus software.

A good defense to prevent your computer from becoming a zombie is to

True

A hardware firewall does not filter all outgoing traffic.

identify weak spots in their network security

A honeypot is used by companies to

True

A medium in communications is some kind of network.

allows only a limited number of characters per posting.

A microblog

high-frequency radio signal

A microwave is a(n) _____ that is directed from one microwave station tower to another.

botmaster.

A person who runs a botnet is called a

preferences

A predicted development in the future of social technology is that you will have one set of _____ that will apply to all your social sites.

MP3 blog

A site that uses music as a form of blogging is called a

Wikipedia.

A well known example of a wiki site is

True

A wiki is a way to collaborate on a project or online document.

APT

A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.

NIC

A(n) _____ is a type of network adapter.

Which of the following applications provides the same types of functions as salesforce.com?

ACT!

The UNIX operating system was developed by _____ in the 1970s and was written in the _____ programming language.

AT&T Bell Laboratories; C

92; 67

About _____ percent of Internet users aged 18-29 use social networking sites, versus about _____ percent of those in the 50-64 years old category.

What is the name of the database software included in Microsoft Office?

Access

half a second.

According to Chapter 7, somewhere in the world a new blog is created every

1999

According to Chapter 7, when did blogs begin to surface online?

recruiting

According to the movie, colleges are using the social web for

continuous sound waves; fluctuate between high and low

An analog signal is formed by _____ that _____.

suspicious content or unexpected traffic

An anomaly based intrusion detection system is a type of IPS that can detect

Gmail.

An example of a webmail service is

Google Docs

An example of software on demand is

data loss prevention

An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.

_____ currently runs just over 80 percent of the mobile phones on the market.

Android OS

Who makes the Pages software application?

Apple

3

Approximately _____ percent of US adults still access the Internet using a dial-up modem.

both a public key and a private key

Asymmetric encryption uses

Which of the following is an audio software application mentioned in Chapter 5?

Audacity

What is the name of the database software included in OpenOffice?

Base

pound symbol (#)

Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter.

1990s

Blogging began on a small scale in the mid-

hands-free operation.

Bluetooth headsets like the one shown above are popular with smartphone users because they offer

short-range; radio waves

Bluetooth is a network protocol that offers _____ connectivity via _____.

electronics standard.

Bluetooth is a(n)

True

Botnet is short for robot network.

reproduce itself.

Botnets are created using self-propagating software, which means that the software can

True

Businesses use social bookmarking to gain additional visitors to their sites and new customers.

802.16

By what other name is the WiMAX standard known?

_____ memory can be accessed quickly because it sits on the microprocessor.

Cache

_____ memory is a dedicated holding area in which the data and instructions most recently used by the processor are temporarily stored.

Cache

Internet

Chapter 6 discusses a modification of the peer-to-peer network architecture called the _____ peer-to-peer network.

2003

Chapter 7 cites _____ as the year the phenomenon known as social networking exploded, with several sites launching within months of each other.

law enforcement websites.

Chapter 7 discusses several online setting blogging has moved into, including each of the following except

Tumblr.

Chapter 7 lists each of the following as examples of media sharing sites except

user profiles and friends lists

Chapter 7 states that social networking was born when these two features came together in one service.

locks automatically after a period of inactivity

Chapter 8 advises that you should set a password or passcode on your mobile computer and configure it so that it

tax returns

Chapter 8 advises you not to post these on cloud services such as OneDrive and Dropbox.

47

Chapter 8 cites a 2015 study of data breaches which found that _____ percent involved a malicious or criminal attack.

phishing scams.

Chapter 8 discusses social engineers and their involvement in

authenticate users.

Chapter 8 discusses the use of biometrics to

information security

Chapter 8 states that computer security is also referred to as

three or more repeating characters.

Chapter 8 states that strong passwords should not contain

Which of the following operating systems runs on tablets?

Chrome OS

_____ is a(n) Linux-based operating system meant to appeal to people who work primarily in web-based applications.

Chrome OS

False

Cloud-hosted software is stored on your computer.

a communication medium and a common protocol.

Communication involves someone who sends a message and someone who receives a message, as well as

govern the exchange of information.

Communications protocols

posting responses to blogs.

Companies can market in a direct and personal way by

_____ software is designed to store and manage information about the people you work or otherwise interact with.

Contact management

To export a PowerPoint 2016 presentation to a Word outline, you click the FILE tab, click Export, and then click

Create Handouts.

Windows was initially a graphical user interface layered on top of this operating system.

DOS

black screen shot The screenshot above shows an example of output from _____, which stands for _____.

DOS; disk operating system

_____ software is used by design professionals to lay out pages for books, magazines, brochures, product packaging, and other print materials.

Desktop publishing

send and receive data.

Devices use network protocols to

microbrowser.

Devices using WAP to display web content have to contain a(n)

This utility searches for unnecessary files (such as temporary Internet files) and deletes them.

Disk Cleanup

To rid your Windows PC's hard drive of unwanted files, which utility would you use?

Disk Cleanup

cipher text.

Encoded and unreadable plaintext is called

Gbps

Ethernet networks are capable of speeds up to

To use any software application in the cloud you have to install a plug-in on your computer.

False

capture citations. store images. coordinate with online libraries.

Features of social bookmarking that are useful to researchers include the ability to

beams of light.

Fiber-optic cable uses a protected string of glass that transmits

hardware only. software only. a combination of hardware and software.

Firewalls are created by using

In what way do futurists acknowledge the fact that digital technology is easily broken?

Futurists acknowledge that because things are always being broken, they are also always being redesigned and improved.

providing a map of your location.

Geotagging consists of

aggregator

HootSuite is considered a(n) _______ of social content.

True

HootSuite is second only to Twitter as the tool people use to manage their Twitter accounts.

analytical

HootSuite's _____ tools allow you to generate reports on activity.

MAN.

If you connect to a network through your phone or cable company, then you probably connect through a

The presentation software included in the OpenOffice suites is called

Impress.

Friendster

In 2002, _____ became one of the first social networking sites to catch on with the general public.

Florida, Georgia, California

In 2013, these states had the top three per capita rates of identity theft complaints.

80 million

In 2015, the second largest health insurance company experienced a breach that exposed medical IDs and social security numbers of as many as _____ customers.

Tracking and Data Relay Satellite

In January 2014 NASA launched its latest TDRS system into orbit. What does TDRS stand for?

1997

In _____, one of the first true social networking sites, SixDegrees.com, appeared.

server

In a LAN, the _____ houses the networking software that coordinates the data exchange among the devices.

stores programs and files; is a device connected to the network

In a client/server network, the server _____ and the client _____.

the central server.

In a network, the network operating system is installed on

client; server

In a peer-to-peer network, each computer in the network can act as both a _____ and a _____

a key that matches the one used to encrypt the message

In symmetric encryption, devices that are designated as legitimate recipients of an encrypted message are give

HootSuite

In the discussion of social technology trends, this service is cited as one that allows you to gather content from other social networking sites.

one million

In their 2015 Internet Security Threat Report cited in chapter 7, Symantec reported that _____ new malware threats are released every day.

It does not require the user (the target) to do anything.

In what way is a worm different from a virus?

2011

In what year did Google+ launch?

bus

In which topology are all computers connected via a single cable?

star

In which topology do all devices connect to a hub or switch?

ring

In which topology does data travel in one direction in a closed loop until the data reaches its destination?

line of sight

Infrared's chief drawback in the electronics gadget world is that it requires

Which of the following is not true?

It is not possible to share content between other programs in the Microsoft Office suite, only between Word and PowerPoint.

five days

It took Twitter over three years to reach its one billionth tweet, but in early 2014 an average of one billion new tweets were being created every

How will our control of devices and the Internet change in the future, according to experts?

It will become less deliberate.

How is a mobile operating system different from a personal computer operating system?

It's less robust.

J2ME is a _____-based mobile OS.

Java

WiMAX

LTE is generally expected to replace _____ networks in the future.

Who developed Linux?

Linus Torvalds

This operating system is an open source program.

Linux

To a great extent, _____ is based on UNIX.

Linux

pink desktop with icons The desktop pictured above is Ubuntu, which is a "flavor" of

Linux

True

MP3 blogs are sometimes used by record companies to promote their musicians

Automated driver updates on a _____ are accomplished by the Software Update feature.

Mac

Which of the following is not an operating system designed for a smartphone or a tablet?

Mac OS X

According to Chapter 4, the industries of graphic design and photo imaging have been historically strong markets for

Macs.

live media streaming

Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts.

Yosemite is the newest version of which operating system?

OS X

1 Pbps

Of the following bandwidth measurements, which represents the fastest transmission speed?

Friendster

Of the following social networking sites, which launched first?

Chapter 5 notes that these two services allow access to productivity suites from the cloud.

Office 365 and Google Docs

The productivity suite from Microsoft is called

Office.

bandwidth

On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium.

survey what's online about you and remove anything damaging.

On a regular basis you should

energy

One disadvantage of Wi-Fi Direct compared with Bluetooth is that Wi-Fi Direct uses more

a PIN number.

One form of authentication used by some Bluetooth device manufacturers is

disappearing media

One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat.

open source

One of the trends associated with the development of Web 2.0 was the _____ movement, which allowed users to contribute to the code of free software.

carry it from site to site

One predicted trend in social technology is the ability to do this with the profile you create when you join a service.

disable Bluetooth when not in use.

One way to protect yourself from risks of Bluetooth devices is to

posting useful information.

Online marketers often find that a direct sell approach on social networking sites doesn't work as well as

AOL

Online socializing began in the late 1970s with the advent of each of the following services except

cloud storage.

Online storage of your email messages is an example of

The spreadsheet software called Calc is part of the _____ suite.

OpenOffice

Microsoft interface What is the open source option mentioned in Chapter 5 for the type of software pictured above?

OpenProj

40

Over _____ percent of smartphone owners use a social networking site on their phones.

Post Office Protocol.

POP stands for

identity theft.

Phishing is typically used for

being turned down by a school or employer. offline crime. identity theft.

Posting videos that contain personal information online can put you at risk for

very large prime numbers

Public and private keys are created using

Chapter 5 discusses financial software used by accounting professionals, included Sage 50 Accounting and

QuickBooks.

When running several programs at once, your operating system places data that will not fit into _____ into ____ memory.

RAM; virtual

True

RF can work with voice and gesture controls.

These two file formats are discussed in Chapter 5 as means of exporting and importing data between applications.

RTF and CSV

In the software development life cycle, once all tests are complete and the product seems stable, a final _____ version is produced.

RTM

to steal money and credit card information.

Scareware scams are primarily used

_____ is mentioned in Chapter 5 as being useful for those writing software documentation or books about software, programming, or other technology.

Screen capture

_____ features allow you to enter information about a file, such as the date it was last saved, and the operating system helps you locate the file.

Search

Find an app or program by typing the first few letters for the name in the

Search box.

To export a Word outline to PowerPoint, you can add this button on the Word Quick Access toolbar.

Send to Microsoft PowerPoint

You can customize the Windows 10 interface using the new

Settings app.

artblog

Sketchblogs are a category of this type of blog.

This shared feature in Microsoft Office helps you diagram processes and work flow.

SmartArt

Share icon

Social bookmarking is accessed on many websites through the use of a

allow you to share bookmarks of recommended sites with others

Social bookmarking sites

tags; links

Social bookmarking sites save bookmarks as _____ rather than saving _____ in folders as some browsers do.

metadata

Social bookmarking uses _____, which is essentially data about data.

True

Social networking sites are now the number one marketing tool for small businesses.

organizing social events

Social networks are going beyond online communication with sites like Socializr and Punchbowl, which have become popular for

b. may include privacy controls. c. only protect the computer they are installed on. d. can be configured to recognize trusted sources.

Software firewalls

According to the interviewee, how will software change in the future for the user?

Software will become simpler for the user.

record it offline and upload it.

Some media sharing sites allow you to record your media right from the site, while others require that you

authentication

Spoofing is an attempt to get around _____ systems.

better target advertisements to you.

Spyware is sometimes used by legitimate websites to track your browsing habits in order to

Utility that lets you undo changes made to the operating system and programs. - System Restore, Mobile operating system from Apple. - iOS, Operating system originally designed for servers. - UNIX, Files that provide instructions needed to run programs. - system files, Memory that holds data while the computer is in operation. - RAM

Starting a computer from a no-power state. - cold boot, Part of the system software that can be used to perform system maintenance, scan files, and help protect your computer. - utility software, Where data is swapped into when RAM is used up. - virtual memory, The hierarchy of folders that leads to a stored file. - path, Memory that holds instructions the computer uses to start up the OS. - ROM,

social bookmarking

Symbaloo is an example of this form of social networking.

mirroring.

The ability to stream content from a tablet or phone to a TV is called

a hash function

The author of the file creates a digital signature by running a program known as

Chapter 5 discusses the current state of application software. Which of the following is not true of application software today?

The basic categories of application software are the same as existed in the early days of consumer software.

hardware and software

The best type of firewall protection for a network is

4G; 100 Mbps

The current generation of cellular transmissions is called _____ and can transmit digital data at speeds of up to _____.

strings.

The discussion forums that appeared in the 1980s encouraged interaction with posts and responses displayed in discussion series called

the recipient did not open the infected email.

The illustration above shows a virus-infected email attack that was unsuccessful because

time.

The illustrations above depict different types of signals. The arrow represents

Harvard

The initial version of Facebook, which launched in 2004, was available only to student of this university.

BLE.

The latest Bluetooth specification which uses less power is known as Bluetooth Smart or

bad or evil

The mal in malware means _____ in Latin.

late 1990s; MP3 music

The media sharing trend began in the late _____ with _____ file sharing.

peer-to-peer.

The network architecture pictured above is called

transponder

The part of an RFID tag that sends the radio signal is called the

failover

The process of redirecting users to a spare server is called

modem.

The process of tethering essentially turns your mobile phone into a

Simple Mail Transfer Protocol.

The protocol used to deliver messages to the server is

block unwanted information from reaching your computer or computer network.

The purpose of a firewall is to

media sharing; the ability to have a conversation about the media

The site pictured above is discussed in Chapter 7 as an example of one that combines _____ with _____.

microblogging

The social site pictured above is described in Chapter 7 as a combination of _____ and social networking whose customizable format allows users to share text, photos, quotes, music, and videos.

frequency.

The speed at which a signal can change from high to low is called

False

The typical range for consumer Bluetooth devices is 600 feet.

modulate; demodulate

The word modem comes from the combination of the words _____ and _____.

AsianAvenue and BlackPlanet

These two social networking sites initially launched in 1999 and relaunched in 2005.

cookie

This is a type of file that can be stored on your computer for legitimate or illegitimate purposes.

Digg

This site is an example of a social bookmarking site.

rootkit

This type of malware is designed to gain access to the system software and allow the hacker to monitor the user's actions.

TCP/IP

This wired networking standard specifies the order in which data is sent through the network.

make your site private.

To keep strangers from viewing your videos online, you can

Snapchat

Today, the social web has expanded to be accessible by a variety of mobile devices. Which of the following social media services is accessible only via apps on mobile devices?

physical layout of; how data moves around the network

Topology relates to the _____ the network but doesn't reflect _____.

4G stands for the fourth generation in mobile telecommunications standards.

True

A file extension is typically three or four characters long.

True

A medium in communications is some kind of network.

True

A network operating system is what allows resources, such as printers, to be shared by many users.

True

The source code is freely distributed in open source software.

True

What are computer manufacturers starting to use which will eventually replace the aging BIOS firmware?

UEFI

Which of the following operating systems uses a command-line interface?

UNIX

_____ is primarily a server operating system.

UNIX

What does UEFI stand for?

Unified Extensible Firmware Interface

certification authority

Verisign is an example of a(n)

2.0

Web _____ is a phase of the development of the web that is associated with user involvement and collaboration.

turn it off

What does Chapter 8 advise doing with Bluetooth when you're not using it?

scrambles a message so that it's unreadable to anybody who doesn't have the right key

What does encryption do?

share contacts; build a network of friends

What has traditionally differentiated social networking sites from other social sites is the ability to _____ and _____.

Device Manager

What is the name of Android's built in find-and-wipe utility?

to obtain payment from the affected user

What is the objective of ransomware?

6 to 40 Mbps

What is the typical speed range of a DSL network connection?

social journaling

What other term is used in Chapter 7 for microblogging sites such as Twitter.

100%

What percentage of users' time spent on Snapchat is done on a mobile device instead of a desktop or laptop?

marketing tools.

When a retailer includes a Like button (Facebook) or a Pin It button (Pinterest) on its product pages, this is an example of the growing trend of using trend of using social networking sites as

the sender

When sending an email message with public key encryption, who uses the private key?

WEP

When setting up your Wi-Fi router, you should use this form of encryption only as a last resort.

It is designed to gain access to the system software.

Which of the following is not a characteristic of a virus?

installing anti-virus software on your computer

Which of the following is not an example of the use of authentication?

OneDrive

Which of the following products or features is not among those mentioned in Chapter 8's discussion of remote tracking and wiping?

macro virus

Which of the following types of malware is usually hidden in a document such as a word processing or spreadsheet file?

Trojan horse

Which of the following types of malware opens a back door to your computer for malicious hackers?

an Ethernet cable connecting a desktop to a router

Which of the following would not be considered a node on a network?

IMAP

Which retrieval protocol allows you to synchronize mail folders between your email client and the email server?

mesh

Which topology is used on the Internet?

denial-of-service attacks and generating spam

Which two activities are often undertaken by botnets?

adware

Which type of malware has a related type of software that allows shareware writers to offset the cost of developing their software?

your browser

Who or what identifies a secure certificate when you go to a website?

to allow readers to search the blog for specific topics

Why do bloggers assign tags to their content?

802.11

Wi-Fi refers to a network that is based on the _____ standard.

Windows Defender

Windows 8.1 and Windows 10 install this antivirus software automatically.

Boot Camp is a software package that allows you to run _____ on a _____.

Windows; Mac

events.

With HootSuite you can aggregate newsfeeds, photos, videos, and

install desktop application software on your computer.

With cloud computing, you never have to

both sender and recipient

With symmetric encryption a cipher is known to

A docx extension indicates a file created in

Word.

What is the name of the word processor software included in the OpenOffice suite?

Writer

2008

YouTube added video blog features in

ANSI; IEEE

_____ and _____ are organizations that develop standards that address the way devices communicate with one another.

Satellite

_____ communication is typically used for longer range transmissions, for international communications, and for connectivity in rural areas.

TLS

_____ is a protocol that protects data such as credit card numbers as they are being transmitted between a customer and an online vendor.

Cat 5

_____ is an example of twisted-pair cable used in many wired networks.

Open content

_____ is to the social web what open source was to software development--it means that anybody can freely share their knowledge.

The Internet

_____ is, in essence, a giant WAN.

Source code consists of

a collection of statements written by programmers.

As discussed in Chapter 5, a key benefit of a software suite is

a common interface among programs.

Communication involves someone who sends a message and someone who receives a message, as well as

a communication medium and a common protocol.

According to the video, 3G turned your phone into

a mini computer.

In Windows 10, Cortana is

a personal assistant.

The way software is packaged and delivered has changed drastically. Which of the following statements is still true of today's software?

a. All of these Correct Correct b. It comes with very little printed documentation. c. It is often contained on a single DVD.

Which structure is used when creating a program?

a. sequence All of these Correct c. repetition d. selection

Cloud computing involves

accessing software and services from the Internet.

In the software development life cycle, the software involved in the first stage of testing is referred to as the _____ version.

alpha

The change between the first and second generation of mobile telecommunications involved the change from

analog to digital.

According to Chapter 5, productivity software and suites allow you to be productive from anywhere because they

are available for smartphones and other mobile devices

In the early days of consumer software, the offerings consisted mainly of _____ and simple games.

basic business tools

A new specification for _____, called UEFI, is just beginning to be adopted and could make the process much quicker.

booting your computer

In the future, in the interviewee's opinion, who will be able to design new software?

both large corporations and independent coders

What does BYOD stand for?

bring your own device

The ability to estimate standard deviations is an example of spreadsheet software's _____ capabilities.

calculating

Network operating systems support both network servers and user computers, which are referred to as

clients

UNIVAC I was the first _____ produced in the United States.

commercial computer

A computer network consists of two or more computing or other devices connected by a

communications medium.

A user interface is what you see when you look at your

computer screen.

What do the D and M stand for, respectively, in CAD/CAM?

design and manufacturing

Your computer's start screen is also referred to as its

desktop

This is a small program needed by the operating system in order to communicate with a connected device such as a printer.

driver

When a company offers an extension of its internal network for the use of suppliers or customers, this is referred to as a(n)

extranet

In this table, the operating system keeps track of the physical location where a document is saved to the hard disk.

file allocation table (FAT)

Productivity software suites typically include each of the following except _____ software.

financial management

In the _____ step of the booting process, the power supply sends signals to the motherboard.

first

After data has been entered into a database table, the data can be viewed in a tabular list or in a

form.

Communications protocols

govern the exchange of information.

The _____ interface replaced the command-line interface of earlier operating systems.

graphical user

GUI is an acronym for

graphical user interface.

Multitasking involves

handling several requests at one time

The term platform is used to describe the combination of _____ and _____ used to run applications.

hardware architecture; software

Drivers are software that allows an operating system to interface with

hardware.

Storing information in the cloud allows people to

have the same information on multiple devices.

Including a spreadsheet in a report created with a word processor is an example of

how productivity suites can integrate content across programs.

What is Apple's productivity software suite called?

iWork

You can send the following from PowerPoint to Word using the procedures described in this video.

images of slides with lines for notes

4G network improvements allow greater reliability and

improved security

When your computer moves data _____, the file it moves is referred to as a swap file.

into virtual memory

Linux is different from the Mac OS X and Windows operating systems in that it

is open source.

Your computer's OS uses a file allocation table to

keep track of the physical locations where bits of data that make a file are stored.

This feature of word processor software allows you to take a list of names and addresses and print personalized letters.

mail merge

The icons for image files can indicate an associated image viewing program, while icons for sound files can indicate an associated

media player.

In the past, mobile applications typically not as full-featured as their non-mobile counterparts because of the limitations of

memory and screen size.

What does the bus in your computer do?

moves instructions and data around between the components

Who owns open source software?

no one

Where is your computer's firmware stored?

on a ROM BIOS chip

With cloud computing, software is hosted

on an online provider's website.

A computer's OS refers to its

operating system.

The final step in the software development life cycle involves

performing maintenance and fixing bugs.

GIMP is an example of _____ software.

photo editing

A Mac operating system isn't designed to run on a Windows computer. This is called _____ dependency.

platform

This term describes the hardware architecture that software runs on.

platform

Who creates a computer program?

programmer

Software developed and sold by individual companies is called

proprietary.

A cellular tower relays

radio waves.

The operating system on a mobile device is stored in this type of memory.

read-only memory (ROM)

Most devices today work with a feature called Plug and Play, which

recognizes the devices you plug into your computer (for example, into a USB port)

Database software uses look-up fields to reduce

redundant data.

In the spreadsheet example shown in Chapter 5, _____ run from side to side and are designated by a number.

rows

Deciding between alternatives is called

selection.

Software products that are shared for a small payment are called

shareware.

You would find a mobile platform (or mobile operating system) on a

smartphone

When software vendors host software on their sites and users access it, it's referred to as

software as a service.

According to the interviewee, what technology has seen an explosion in the last five years?

software for mobile devices

The end result of running a computer program is a

solution.

The process of _____ your computer, called booting, is handled by instructions that reside on the BIOS.

starting

Network operating systems must keep data secure while it's being transmitted or

stored.

The operating system and utilities are known as

system software.

The operating system and utility software are known collectively as

system software.

Continuum is a feature for tablet users that turns on or off

tablet mode.

Word processor software allows you to use _____, which are pre-designed documents with formatting and graphics already in place.

templates

SDLC illustration In the illustration above, the question mark (?) indicates which of the following steps in the software development life cycle (SDLC)?

testing the software

What license issued in 1989 outlined the requirements of open source software?

the GNU General Public License

Starting a computer when _____ is called a cold boot.

the computer's power is turned off

According to the interviewee, what is one of the things that the original architects of the Internet did not anticipate?

the current amount of mobile Internet activity

An embedded object resides in

the file you have inserted it into.

Chapter 5 gives this example of how managers use spreadsheets.

to track department budgets

You can minimize security risks with cloud computing by

using strong passwords and reputable services.

Operating system packages such as Windows, Mac OS X, and Linux typically combine the OS with

utilities.

Microsoft Expression Web and Adobe Dreamweaver are _____ software.

web authoring

Microsoft Edge is the name of the new Windows

web browser.


Conjuntos de estudio relacionados

HSS&101 Chapter 7 Other Drugs, Other Addictions

View Set

PrepUs for Pediatrics Chapter 24

View Set