ITE 100

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

@Project ____ software is an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.

Management

@____ software allows users to combine text, graphics, audio, video, and animation in an interactive application.

Multimedia authoring

A(n) ____ license is a legal agreement that allows multiple users to access the software on the server simultaneously.

Network

@____ software is an application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook.

Notetaking

@A popular electronic image file format that document management software uses to save converted documents is ____, developed by Adobe Systems.

PDF

@Which of the following is NOT an example of a communications applications?

PDF

A ____ is the destructive event or prank malware is intended to deliver.

Payload

@____ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.

Phising

@When you purchase a digital camera, it usually includes ____ software.

Photo editing

@A single ____, used to measure font size, is about 1/72 of an inch in height.

Point

_@___ applications can assist you in becoming more effective and efficient while performing daily activities at work, school, and home.

Productivity

@A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them.

Program

A wireless network should be configured so that it does not broadcast a network name, known as a(n) ____.

SSID

@A(n) ____ is a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

Screen saver

@A(n) ____ is a program, usually included with an operating system, that attempts to locate a file on your computer or mobile device based on criteria you specify.

Search tool

@____ is copyrighted software that is distributed at no cost for a trial period.

Share

@Presentations can be viewed as slides, sometimes called a _______, that are displayed on a large monitor or on a projection screen from a computer or mobile device.

Slideshow

@____ typically is optional and usually involves submitting your name and other personal information to the software manufacturer or developer.

Software registration

____ occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.

Software theft

@____ is an unsolicited email message or posting sent to many recipients or forums at once.

Spam

____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Spoofing

@____ software is an application that allows users to organize data in rows and columns and perform calculations on the

Spreadsheet

@A software ____ is a collection of individual applications available together as a unit.

Suite

@The operating system and other tools are collectively known as ____ software because they consist of the programs that control or maintain the operations of the computer and its devices.

System

@____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.

Adware

@A(n) ____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

Antivirus program

@Many programs have a(n)____ feature that saves open projects at specified time intervals.

Autosave

Programmers often build ____ into programs during system development in order to bypass security controls while writing and testing programs.

Back doors

@You should ____ files and disks regularly in the event your originals are lost, damaged, or destroyed.

Back up

@A ____ allows users to copy selected files or the contents of an entire storage medium to another storage location, such as another hard disk, optical disc, USB flash drive, or cloud storage.

Back up tool

Examples of ____ and systems include fingerprint readers, face recognition systems, hand geometry systems, voice verification systems, and retinal scanners.

Biometric devices

The ____ was formed to promote a better understanding of software piracy problems.

Business Software Alliance (BSA)

A ____ displays an image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.

CAPTCHA

The ____ requires that schools and libraries use content filtering software in order to receive certain federal funds.

Children's internet protection Act

@____ software is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.

Computer-aided design

@____ gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials.

Copyright

@When you ________ a project, you enter text or numbers, insert images, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.

Create

@____ software performs functions specific to a business or industry.

Custom

The term, ____, describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

Cyberwarefare

@____ software is an application that enables designers to create sophisticated publications that contain text, graphics, and many colors.

Desktop publishing

@____ software writes text, graphics, audio, and video files on a recordable or rewritable disc.

Disc burning

@A(n) ____ tool searches for and removes unnecessary files.

Disk cleanup

@____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Ergonomics

Today, combating cybercrime is one of the ____'s top priorities.

FBI

@A personal ____ is a security tool that detects and protects a personal computer and its data from unauthorized intrusions.

Firewall

@When users ____ a project, they change its appearance.

Format

The term, ____, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.

Hacker

@____ software provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.

Legal

@A(n) ____ is the right to use a program or app.

License agreement

@Each time you start a computer or mobile device, the operating system is ____ (copied) from the computer's hard disk or mobile device's storage media into memory.

Loaded

Which of the following is NOT a symptom of a computer or mobile device functioning as a zombie?

Low audio quality

@A ____ is a destructive program disguised as a real program, such as a screen saver.

Trojan Horse

A ____ is a program that hides within or looks like a legitimate program.

Trojan horse

@A(n) ____ is a tool that removes a program, as well as any associated entries in the system files.

Uninstaller

@A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the user's knowledge or permission.

VIrus

@________ software is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics.

Word processing

@A feature called ____ allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line.

Wordwrap

@In a spreadsheet, a ____ is the intersection of a column and row.

Worksheet

@A ____ resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.

Worm

@Compressed files sometimes are called ____ files.

Zipped

A compromised computer or device, known as a ____, is one whose owner is unaware the computer or device is being controlled remotely by an outsider.

Zombie

An organization's ____ should specify rules regarding use of technology by employees for personal reasons.

acceptable use policy (AUP)

A(n) ____ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

access control

In a three-generation backup plan, the most recent copy of the file is the ____.

child

In the encryption process, the encrypted (scrambled) data is called ____.

ciphertext

Data____software can eliminate duplicate database records, located missing data, and correct discrepancies.

cleaning

With ____, an object that can be tapped or clicked on a website, pop-up ad, or in an email message or text message contains a malicious program.

clickjacking

A(n) ____ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

code of conduct

A small text file that a web server stores on your computer is called a ____.

cookie

A ____ protects any tangible form of expression.

copyright

Unauthorized use and system failure are both examples of a ____.

digital security risk

A(n) ____ is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

digital signature

A more devastating type of DoS attack is the ____ DoS attack in which a zombie army is used to attack computers or computer networks.

distributed

A(n) ____ might contain your age, address, spending habits, and other data direct marketers can use.

electronic profile

@Bold, italic, underline, and color are examples of ____.

font styles

Web addresses of secure websites often begin with ____.

https

@Paint software is another name for ____ software.

illustration

The right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them is referred to as ____.

information privacy

____ refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.

intellectual property

Encryption programs typically use more than one encryption algorithm, along with an encryption ____.

key

A program called a(n) ____ creates software registration numbers and sometimes access codes.

keygen

@What are CBT applications used for?

learning

Some viruses are hidden in ____, which are instructions saved in software such as a word processing program or spreadsheet program.

macros

____ is a program that displays advertisements on a mobile device.

madware

@A PC ____ tool is a program that identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.

maintenance

@To use applications, such as a browser or email program on a personal computer, your computer must be running a(n) ____.

operating system

A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources.

password

A(n)____firewall detects and protects a personal computer and its data from unauthorized intrusions.

personal

Software ____ is the unauthorized and illegal duplication of copyrighted software.

pirarcy

Any item that you must carry to gain access to a computer or computer facility is called a(n) ____ object.

possessed

With ____ encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data.

private or symmetric

A(n) ____ server is a server outside the organization's network that controls which communications pass in and out of the organization's network.

proxy

@A _______ is a request for specific data from the database.

query

In the case of system failure or the discovery of corrupted files, you ____ the files by copying the backed up files to their original location on the computer or mobile device.

restore

With a(n) ____ backup, users choose which folders and files to include in a backup.

selective

The most common type of license included with software purchased by individual users is a ____ license agreement.

single-user

____ is defined as gaining unauthorized access to or obtaining confidential information.

social engineering

If you log into a website or app and must enter a code that you receive via email or text, you are using a(n)____ verification process.

two-step

____ is the use of a computer or its data for unapproved or possibly illegal activities.

unauthorized use

A(n) ____ provides a mobile user with a secure connection to a company network server.

virtual private network


संबंधित स्टडी सेट्स

Chapter 13 - Efficient Capital Markets and Behavioral Challenges

View Set

Wk 5 - Apply: Best Buy Case Study

View Set

pediatric fluid requirements based on weight in kg

View Set

Money and Banking Chapter 4 Review

View Set

NCLEX Comprehensive Exam Practice Questions2

View Set

Microeconomics Exam 2 Chapter 11

View Set