mid term matching questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

EULA

An end-user license agreement, or ____, grants one user the right to use the software. ELUA property piracy installation DRM

embedded

Electronic devices such as card readers use ____ operating systems. personal or desktop embedded network mobile multipurpose

installation

For downloaded software, the details of the software license usually appear during ____. ELUA property piracy installation DRM

malware

Hackers create ____ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. malware device drivers utility platform trojan horses

property

Intellectual ____ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software. ELUA property piracy installation DRM

trojan horses

Often used as keyloggers to steal passwords to online accounts, ____ disguise themselves as useful programs like utilities. malware device drivers utility platform trojan horses

platform

Operating system software, also called a(n) ____, manages computer hardware and software. malware device drivers utility platform trojan horses

personal or desktop

Operating systems installed on a single computer are called ____ operating systems. personal or desktop embedded network mobile multipurpose

piracy

The illegal copying and distribution of copyrighted software is known as ____. ELUA property piracy installation DRM

multipurpose

UNIX is called a(n) ____ operating system because it can run on a desktop PC or a server. personal or desktop embedded network mobile multipurpose

device drivers

Unlike application software programs, which run in a window on your desktop, ____ usually run in the background whenever they're needed. malware device drivers utility platform trojan horses

file compression

Use a ____ utility to reduce the size of a file so it takes up less storage space on a disk disk cleanup defragmentation file compression file management search

utility

Widgets or Gadgets are ____ programs that appear on the desktop and display little pieces of information such as a calendar. malware device drivers utility platform trojan horses

DRM

____ technologies help to fight software piracy and prevent unauthorized copying of digital content. ELUA property piracy installation DRM

disk cleanup

A ____ utility finds and removes unnecessary files such as those stored in the Recycling Bin or Trash. disk cleanup defragmentation file compression file management search

search

A ____ utility finds files that meet criteria you specify, such as characters in a file name. disk cleanup defragmentation file compression file management search

file management

A ____ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders. disk cleanup defragmentation file compression file management search

defragmentation

A ____ utility reorganizes the files on a hard drive so the OS accesses data more quickly. disk cleanup defragmentation file compression file management search

network

A server, also called a(n) ____, operating system is a multiuser operating system because it controls a central computer that can support many users. personal or desktop embedded network mobile multipurpose

moble

A(n) ____ operating system has features similar to a desktop operating system, but is simpler and significantly smaller. personal or desktop embedded network mobile multipurpose


Ensembles d'études connexes

Week 8-9 CH: 9 The Problem of Evil: Is there Evidence against God's Existence?

View Set

chapter 23:goat breed identification and production mangement

View Set