mid term matching questions
EULA
An end-user license agreement, or ____, grants one user the right to use the software. ELUA property piracy installation DRM
embedded
Electronic devices such as card readers use ____ operating systems. personal or desktop embedded network mobile multipurpose
installation
For downloaded software, the details of the software license usually appear during ____. ELUA property piracy installation DRM
malware
Hackers create ____ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. malware device drivers utility platform trojan horses
property
Intellectual ____ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software. ELUA property piracy installation DRM
trojan horses
Often used as keyloggers to steal passwords to online accounts, ____ disguise themselves as useful programs like utilities. malware device drivers utility platform trojan horses
platform
Operating system software, also called a(n) ____, manages computer hardware and software. malware device drivers utility platform trojan horses
personal or desktop
Operating systems installed on a single computer are called ____ operating systems. personal or desktop embedded network mobile multipurpose
piracy
The illegal copying and distribution of copyrighted software is known as ____. ELUA property piracy installation DRM
multipurpose
UNIX is called a(n) ____ operating system because it can run on a desktop PC or a server. personal or desktop embedded network mobile multipurpose
device drivers
Unlike application software programs, which run in a window on your desktop, ____ usually run in the background whenever they're needed. malware device drivers utility platform trojan horses
file compression
Use a ____ utility to reduce the size of a file so it takes up less storage space on a disk disk cleanup defragmentation file compression file management search
utility
Widgets or Gadgets are ____ programs that appear on the desktop and display little pieces of information such as a calendar. malware device drivers utility platform trojan horses
DRM
____ technologies help to fight software piracy and prevent unauthorized copying of digital content. ELUA property piracy installation DRM
disk cleanup
A ____ utility finds and removes unnecessary files such as those stored in the Recycling Bin or Trash. disk cleanup defragmentation file compression file management search
search
A ____ utility finds files that meet criteria you specify, such as characters in a file name. disk cleanup defragmentation file compression file management search
file management
A ____ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders. disk cleanup defragmentation file compression file management search
defragmentation
A ____ utility reorganizes the files on a hard drive so the OS accesses data more quickly. disk cleanup defragmentation file compression file management search
network
A server, also called a(n) ____, operating system is a multiuser operating system because it controls a central computer that can support many users. personal or desktop embedded network mobile multipurpose
moble
A(n) ____ operating system has features similar to a desktop operating system, but is simpler and significantly smaller. personal or desktop embedded network mobile multipurpose