Chapter 3
backup
A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.
firewall
A software-based _________ is dedicated to examining and blocking Internet traffic.
virtual machine
A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.
bug
A(n) _________ is just another name for an error in a program.
android
Although Google owns _________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.
malware
Collectively, all malicious programs are referred to as:
device drivers
Operating systems communicate with most hardware components using:
formatting
Preparing a storage device for use by an operating system is known as:
bitmap
Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.
database
Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
beta
Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
compiler
The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU.
clipboard
The _________ is a temporary location for things that are being moved or copied.
files
The most fundamental components of storage that users interact with are the:
algorithm
The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):
PowerPoint
What is an example of presentation software?
unix
_________, which dates back to 1969, runs many of the world's most powerful servers.
true
t/f. A file path is a complete address that describes the exact location of a file.
true
t/f. Antivirus, encryption, and file compression software are all examples of utilities.
true
t/f. Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their DBMS.
true
t/f. Tax preparation software allows individuals to prepare their income taxes and file electronically (e-file) with the IRS.
false
t/f. The macOS operating system has the largest market share for personal computers.
false
t/f. The process of converting algorithms into an actual computer program is known as flowcharting.
false
t/f. While software updates fix security vulnerabilities in software, they rarely address software errors or needed improvements.
false
t/f. the older 64-bit operating systems can only handle 4 GB of RAM.