BISM Chapter 3 Review
Individuals who purchase a Mac cite some key advantages of owning these types of computers. List and briefly describe these advantages.
(1) Mac computers seem to be more stable and suffer from fewer issues than PCs. (2) Macs rarely get infected by computer viruses and other malicious programs. (3) OS X includes various applications that a wide-range of individuals find very useful. (4) Apple's various devices work well with each other and all of your data is seamlessly synchronized to the cloud using Apple's iCloud service. (5) Excellent customer support, especially at Apple's stores. (6) You can run Windows on a Mac computer.
Briefly describe four reasons why many companies decide to offer their software or apps for free.
(1) The free version is used to promote a paid version that has more features. (2) Some free software is required to view files or content created by the paid version. (3) They include advertisements or 3rd-party toolbars. (4) They offer users the chance to make in-app purchases.
A(n) _________ is just another name for an error in a program. A. bug B. virus C. algorithm D. widget
A
Federal _________ law gives software creators a variety of rights and privileges over their creative work. A. copyright B. license C. SDLC D. EULA
A
Large organizations use _________ systems because they bring together many types of business functions into one software solution. A. ERP B. SDLC C. IDE D. CAD
A
Modern operating systems have a ________, allowing users to communicate via graphical elements on the screen. A. GUI B. command-line interface C. CAD D. flowchart
A
One of the most famous _________ licenses is GPL, which ensures that a particular program remains free to distribute and allows its code to be examined and modified by anyone. A. open source B. shareware C. system D. EULA
A
Preparing a storage device for use by an operating system is known as: A. formatting B. compiling C. installing D. coding
A
The _________ is a temporary location for things that are being moved or copied. A. clipboard B. path C. library D. directory
A
Which of the following is an example of a cloud-based backup utility? A. Carbonite B. TrueCrypt C. VMware D. LastPass
A
Which of the following is an example of audio editing and production software? A. Pro Tools B. Maya C. Dreamweaver D. AutoCAD
A
Which of the following is an example of spreadsheet software? A. Excel B. Word C. Access D. PowerPoint
A
With the _________ operating system, you will be fully immersed in Google's ecosystem of apps and services. A. Chrome B. Mac C. Windows D. Unix
A
________ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals. A. Project management B. CRM C. CAD D. Virtualization
A
________ software is created for a specific industry such as health care or insurance. A. Vertical market B. CRM C. IDE D. SDLC
A
________ software provides tools for creating and editing all kinds of text-based documents such as letters, resumes, and reports. A. Word processing B. Spreadsheet C. DBMS D. Presentation
A
_________ backup providers are companies which provide utility software that creates automated backups to an online account. A. Cloud B. Virtual C. Open source D. Media
A
_________ is a software that is completely free to use without any specified time restrictions. A. Freeware B. Shareware C. Subscription software D. Open source software
A
_________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key. A. Encryption B. Formatting C. Virtualization D. Partitioning
A
_________ software aids architects, engineers, and many others who need to create a digital model of an object. A. CAD B. Graphics editing C. ERP D. Video editing
A
_________ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks. A. Application B. System C. Utility D. Virtual
A
A(n) _________ is a special environment that allows you to run an operating system on top of another operating system. A. firewall B. virtual machine C. IDE D. SDLC
B
Although Google owns _________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices. A. iOS B. Android C. Linux D. Blackberry
B
Collectively, all malicious programs are referred to as: A. vectors B. malware C. suites D. bugs
B
Computers that have the same operating system are said to be _________ with each other because they can support the same software. A. distributed B. compatible C. formatted D. extensible
B
Once a computer program is compiled, the IDE will produce a(n) _________ file that can be run by the operating system on a user's computer. A. beta B. executable C. alpha D. algorithm
B
Operating systems typically contain a disk _________ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other. A. formatting B. defragmentation C. cleanup D. compression
B
Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records. A. algorithm B. database C. CAD D. spreadsheet
B
Some ERP systems integrate _________ capabilities that allow sales departments to manage call centers, support customers, and keep track of sales commissions. A. project management B. CRM C. IDE D. vertical market
B
The purpose of _________ software is to keep you, your computer, and your personal information safe from a variety of threats. A. application B. security C. virtual D. SDLC
B
The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n): A. compiler B. algorithm C. IDE D. partition
B
To keep using _________ after the trial period, you must purchase a full version or a code that can be entered into the software. A. freeware B. shareware C. volume licenses D. open source software
B
When you no longer need a file or a folder you can use the _________ command to remove it from your drive. A. cleanup B. delete C. install D. backup
B
Which of the following Adobe products would be the best choice for editing bitmap images? A. Illustrator B. Photoshop C. Premiere D. Dreamweaver
B
Which of the following is NOT a popular computer programming language? A. C++ B. Xero C. Visual Basic D. Java
B
Which of the following is an example of desktop publishing software? A. Adobe Premiere B. Adobe InDesign C. Apple Final Cut Pro D. iWork Keynote
B
Which of the following is an example of word processing software? A. Excel B. Word C. Access D. PowerPoint
B
________ software refers to any software that is created for the operation, maintenance, and security of a computer. A. Application B. System C. PIM D. Virtualization
B
________, which dates back to 1969, runs many of the world's most powerful servers. A. Windows RT B. Unix C. Mac OS D. Linux
B
_________ software is used for entering, calculating, and analyzing sets of numbers. A. Word processing B. Spreadsheet C. DBMS D. Presentation
B
A _________ license allows companies to install the software on multiple (or all) the machines that they own. A. freeware B. shareware C. volume D. subscription
C
A(n) _________ is a graphical representation of a file, folder, or drive. A. widget B. path C. icon D. directory
C
A(n) _________ on Android provides automatically-updating information without the need to open an app. A. GUI B. icon C. widget D. live tile
C
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility. A. formatting B. defragmentation C. cleanup D. compression
C
Many users choose to _________ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message. A. encrypt B. format C. compress D. defragment
C
Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG. A. PIM B. 3D C. bitmap D. vector
C
Which of the following is an example of accounting software for businesses? A. Access B. Mint C. QuickBooks D. GIMP
C
Which of the following is an example of web development software? A. Pro Tools B. Premiere C. Dreamweaver D. InDesign
C
Which of the following operating systems is NOT likely to be running on a server? A. Windows server B. Unix C. iOS D. Linux
C
________ applications allow you to play games, edit documents, and even create basic drawings without leaving your web browser. A. Virtual B. Shareware C. Web-based D. Open source
C
________ software is used to create and manage complex databases. A. Word processing B. Spreadsheet C. DBMS D. Presentation
C
A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged. A. path B. file system C. firewall D. backup
D
A software _________ is a contract from the software creator that specifies the rules for using this software. A. copyright B. algorithm C. subscription D. license
D
A software-based _________ is dedicated to examining and blocking Internet traffic. A. algorithm B. IDE C. virtual machine D. firewall
D
Many programmers today use a(n) ________, which is a software that helps them build their computer programs. A. EULA B. CAD C. SDLC D. IDE
D
Often times, several office programs are bundled as a unit known as an office: A. utility B. IDE C. license D. suite
D
Operating systems communicate with most hardware components using: A. a file hierarchy B. encryption C. widgets D. device drivers
D
Programs that are based on _________ graphics rely on mathematics to generate and manipulate a variety of shapes. A. compressed B. compiled C. bitmap D. vector
D
Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered. A. bug B. SDLC C. IDE D. beta
D
The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU. A. installer B. executable C. coder D. compiler
D
The ability to run multiple programs at the same time is known as: A. partitioning B. formatting C. defragmenting D. multitasking
D
The most fundamental components of storage that users interact with are the: A. widgets B. icons C. programs D. files
D
To create successful software, computer programmers go through a series of steps known as the: A. EULA B. ERP C. IDE D. SDLC
D
Which of the following is an example of password management software? A. Carbonite B. TrueCrypt C. VirtualBox D. LastPass
D
Which of the following is an example of presentation software? A. Excel B. Word C. Access D. PowerPoint
D
________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets. A. 3D modeling software B. Integrated development environment C. Computer-aided design D. Virtual reality
D
________ players refer to applications that allow you to listen to music and play videos. A. Vector B. Virtual C. File D. Media
D
________ software enables users to create electronic slideshows that are used to present information. A. Word processing B. Spreadsheet C. DBMS D. Presentation
D
_________ can run mobile-style apps in the area known as the Start screen, while running traditional software in the more familiar desktop. A. OS X Mavericks B. OS X Mountain Lion C. Windows 7 D. Windows 8
D
_________ is an open source operating system with hundreds of distributions that are available commercially or as a free download. A. Windows RT B. Unix C. Mac OS D. Linux
D
_________ utilities allow parents to set a variety of limits on their children's Internet usage. A. Defragmentation B. Firewall C. Encryption D. Parental control
D
List and define the typical components of a file hierarchy.
Drives, which refer to storage devices. Folders, which are containers that can store files or other folders. Files, which are the most fundamental components of storage that users interact with. Files can be located inside drives, folders, or subfolders.
FinalEssay", "Birthday2014", and "Attachment_3" are all examples of file extensions.
F
In Windows, files are managed with a tool known as Finder. On a Mac, that tool is known as Explorer.
F
In order to make a second copy of a file, you would first use the "cut" command followed by the "paste" command.
F
Since the NTFS file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such SD cards and USB flash drives.
F
T or F The older 64-bit operating systems can only handle 4 GB of RAM.
F
T or F Mac OS has the largest market share for personal computers.
F
The process of converting algorithms into an actual computer program is known as flowcharting.
F
The software that allows you to run a virtual machine is usually referred to as virtual reality software.
F
When a folder is located inside another folder, it is referred to as a file.
F
While software updates fix security vulnerabilities in software, they rarely address software errors or needed improvements.
F
Windows 8 can run mobile-style apps in the area known as the "desktop," whereas traditional Windows software runs in the area known as the "Start screen."
F
With the subscription model of software licensing, companies pay for software solely during the time an employee is actively using it.
F
What is file compression? What are the two reasons why an individual might choose to compress files? What are two of the most popular compressed file types?
File compression is the process of making a file smaller than its original size. Compression utilities use a variety of techniques that can ''squeeze'' one or more files into a smaller, compressed file. They are often unusable when compressed, but they definitely occupy less space on your storage devices. Many users choose to compress several files into one for the sake of easy transport, especially when attaching them to an email message. Two popular file types are ZIP and RAR.
Briefly describe the various stages of the software development life cycle (SDLC).
Planning: Programmers must come up with a detailed description of the tasks they want their software to accomplish. Coding: The programmer will begin the process of converting the algorithms and flowcharts into an actual computer program, a process known as coding. Testing: A programmer will look for errors, or bugs, by testing the software under a series of conditions. Once this phase is over, a programmer might want to test the software in real-world conditions. Maintenance: Errors and security vulnerabilities will continue to be found and programmers will patch them up by offering software updates to users.
3D modeling software is typically used by professional artists and animators who need to create three-dimensional graphics and characters for advertisements, video games, cartoons, and movies.
T
A file path is a complete address that describes the exact location of a file.
T
After software is acquired, it must typically be installed before it can be used.
T
An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement.
T
Antivirus, encryption, and file compression software are all examples of utilities.
T
Dividing a hard drive into multiple sections is known as partitioning.
T
Many employees use Microsoft Outlook as their PIM software, which allows them to manage their contacts, create appointments, and send email.
T
T or F Ubuntu makes a free distribution of Linux that offers a friendly interface for desktop computers.
T
T or F Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their DBMS.
T
T or F The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer.
T
Tax preparation software allows individuals to prepare their income taxes and file electronically (e-file) with the IRS.
T
The operating system must be loaded before any other software during a computer's boot process.
T
When files are located on a drive without being inside any folder, they are often said to be in the root directory of that drive.
T
Which of the following is an example of video editing software? A. Pro Tools B. Final Cut Pro C. Audacity D. Visual Studio
b