Canvas Module 6: Quiz (from Textbook Module 8)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? -a crash -an activation -a patch -piracy

a crash

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? -Waterfall model -Agile development -Rapid application development -Predictive development

Agile development

File transfer programs belong in what software category? -Productivity (business and personal) -Communications -Security -File, disk, and system management

Communications

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. -Activation -Registration -Installation -Upgrading

Installation

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? -Compilers -Debuggers -Interpreters -Eclipse

Interpreters

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? -Antivirus -Antispyware -Antispam -Firewall

Antispyware

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? -Website called FreeAppleApps -App Store for iOS -Flash drive containing apps her friend copied -Email message containing download link

App Store for iOS

What can you do to make sure you are not contributing to software piracy? -Read and accept all software license agreements. -Uninstall apps you are no longer using. -Do not use freeware or shareware. -Buy software only from legitimate resellers or directly from the manufacturer.

Buy software only from legitimate resellers or directly from the manufacturer.

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? -Piracy -License agreement -Digital rights management -Access control

Piracy

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? -Machine language -Assembly language -Procedural language -Fourth generation language

Procedural language

_____ are tools that track the memory usage, status, and errors of currently running software. -System information lists -Auditing instruments -Patch finders -Process managers

Process managers

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? -IT department -Designer -Project manager -Programmer

Project manager

What kind of software products can you download from the Internet without being subjected to copyright restrictions? -Public domain software -Freeware -Open source software -Shareware

Public domain software

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? -Service pack -Patch -Upgrade -Restorer

Service pack

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? -Shareware -Public domain -Open source -Freeware

Shareware

A growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? -Single user license agreement -End user license agreement -Site license -Multiple user license agreements

Site license

_____ is the process of creating programs and apps from the idea stage to distribution to users. -Software development -Cloud computing -System auditing -Object-oriented programming

Software development

Which of the following is not a general guideline for developers? -Group programming activities into phases. -Involve users for whom the program is being developed. -Define the standards, or sets of rules and procedures, for creating the product. -Start programming before creating a proposal.

Start programming before creating a proposal.

Is it advisable to enable automatic updates on security software? -Yes; this helps to catch and quarantine new malware before it harms the computer. -No; automatic updates can cause create problems in security software. -No; automatic updates require excessive storage space and slow the computer. -Yes, though you must pay an additional fee for automatic updates.

Yes; this helps to catch and quarantine new malware before it harms the computer.

The set of activities performed to build a program is called the _____. -integrated development environment (IDE) -software development life cycle (SDLC) -object-oriented programming loop -prototyping

software development life cycle (SDLC)

What do you call the rules each programming language has for writing instructions? -source code -interpreter -syntax -grammar

syntax

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? -whirlpool method -rapid application development -agile development -waterfall method

waterfall method

At what point are you responsible for following the terms in a software license agreement? -when you purchase the software -when you give the software to someone else -when you click or take another action to accept the terms -when you register the software

when you click or take another action to accept the terms

What defines the behavior of an object in object-oriented programming? -Object by itself -Class -Method -Device or platform on which the program runs

Method

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? -Restorers -Auditing tools -Process managers -Patch finders

Patch finders

In which category of software do Microsoft Office Word and Excel belong? -Productivity -Graphics and media -Personal interest -Security

Productivity

During which phase of the SDLC is software tested to make sure each function works as intended? -all phases -design -analysis -implementation

all phases

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? -antispyware -ransomware -firewall -disk cleaner

firewall

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? -Implementation phase -Support and security phase -Design phase -Analysis phase

Support and security phase

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. -code -DevOps -wireframes -documentation

wireframes

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove software or app from a device? -It can be difficult to find the folder containing the program files. -An uninstaller removes the program files and any associated entries in the system files. -An uninstaller moves the program files to the Recycle Bin for safety, but deleting a folder permanently removes them. -An uninstaller makes a backup before removing the program files.

An uninstaller removes the program files and any associated entries in the system files.

Which of the following is an example of an object-oriented programming language? -Fortran -Java -HTML -DevOps

Java

Which of the following programming languages adds interactivity to websites? -HTML -JavaScript -Ruby -C++

JavaScript

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? -Require users to identify themselves using biometrics or passwords. -Require users to install antivirus software on their devices. -Create a strict license agreement for the app. -Display a stern warning on the welcome screen.

Require users to identify themselves using biometrics or passwords.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? -Process managers -Auditing tools -Patch finders -Restorers

Restorers

Which commonly used programming language is used to manage, access, and search for database content? -Java -C++ -SQL -HTML

SQL

_____ are new releases of an app and may require an additional fee before you can install them. -Service Packs -Patches -Upgrades -Restorers

Upgrades

What area of software development focuses on the user's reaction to and interaction with the software product? -Technical feasibility -User experience -System documentation -Quality assurance

User experience

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? -Visit the manufacturer's website and install the latest updates for the app. -Restart the app and close the error message whenever it opens. -Use system software to update the operating system. -Uninstall the app and then reinstall it.

Visit the manufacturer's website and install the latest updates for the app.

Which of the following tools translates the source code of a procedural program into binary code? -debugger -compiler -source code editor -code repository

compiler

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. -intellectual property -copyright -digital rights management -shareware

digital rights management

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? -missing prototype -incomplete documentation -unfinished system proposal -inadequate feasibility study

incomplete documentation

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? -integrated development environment (IDE) -code repository -4GL development tool -cloud development

integrated development environment (IDE)

Which of the following does a software license usually specify? -number of people authorized to use the software -amount of RAM required to run the software -geographic locations where users can run the software -steps for installing and uninstalling the software

number of people authorized to use the software

What type of program would have a class named Student with objects called fullTime and partTime? -machine language program -object-oriented program -markup language program -procedural language program

object-oriented program

What is the goal of a DevOps methodology? -to follow a linear and structured development cycle. -to condense development and create a quality product. -to produce programs quickly and then offer continuous updates -to create a final, functional product in one development cycle

to produce programs quickly and then offer continuous updates

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? -Planning phase -Analysis phase -Design phase -Implementation phase

Analysis phase

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? -public domain software -freeware -Software as a Service (SaaS) -custom software

freeware

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? -Access controls -Intellectual Property rights -Digital Rights Management -License Agreement

Digital Rights Management

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? -Designer -Programmer -Tester -IT member

Tester


Ensembles d'études connexes

ch 7 legal dimensions of nursing practice

View Set

Algebra 2 (2-1 relations and functions)

View Set

JBL Questions Chapter 33 Face and Neck Trauma

View Set

Front & Back of the House Positions

View Set