Chapter 1 : Software (ALA)

Ace your homework & exams now with Quizwiz!

Which two of the following methods will uninstall a program from a Macintosh computer? - Hold down the icon until the icon jiggles - Go to the Launchpad, hold the program icon - Go to the control panel, select Programs - Drag the program icon to the trash, click the Finder

- Go to the Launchpad, hold the program icon - Drag the program icon to the trash, click the Finder

Common presentation programs include which of the three of the following? - Google Slides - OpenOffice Base - Microsoft PowerPoint - Keynote for Mac

- Google Slides - Microsoft PowerPoint - Keynote for Mac X OpenOffice Base : this is a database program.

One way to uninstall programs from a Windows computer is to navigate through the Control Panel. Place the following steps in order to uninstall a program using the Control Panel of a Windows computer placing the first step at the top.

1 - Open the Start menu and type "Control Panel" in the search window 2 - Click Programs or Programs and Features 3 - Select the program 4 - Select Uninstall

Place the following steps in an order that would allow you to uninstalling an app from an Android-based tablet, with the first step at the top.

1 - Tap the Settings icon 2 - Select Apps & Notifications 3 - Select see all apps 4 - Select the appropriate app 5 - Select Uninstall

Where in the profile and settings area of Twitter where would you click to protect tweets so that manual approval is needed to view them? 1. Account 2. Security and Privacy 3. Web notifications 4. Your Twitter data

2. Security and Privacy

Field (Match the definition to the correct database term)

A column in a relational database table.

Record (Match the definition to the correct database term)

A row in a relational database table.

Query (Match the definition to the correct database term)

A set of criteria used to extract data from a database.

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ___ use policy.

Acceptable/AUP

When referring to cell phones or tablets, the term "apps" is short for ___.

Applications/Application

Reports (Match the definition to the correct database term)

Data extracted from a database and structured for printing and data interpretation.

When referring to management systems, DSS stands for:

Decision Support Systems

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

Enterprise Resource Planning (ERP)

Major corporation CEOs often rely on ___ to provide them with a birds-eye view of their entire organizations.

Enterprise Resource Planning (ERP) Systems

When referring to management information systems, ESS stands for ___ support systems.

Executive

When referring to management information systems, ESS stands for:

Executive Support Systems

Snaps are temporary and cannot be saved and forwarded to others. (T/F)

False

One method of uninstalling a program from a Macintosh computer is to first ___.

Go to the Launchpad

Because it is a Google product, downloading an app from the Play Store might require a(n):

Google login//VIE

Adding a driver to a digital device, such as a printer, is called ___.

Installing

Putting software on a digital device, or adding hardware components and drivers to a digital device is called ___.

Installing/Installation

One method of finding and downloading programs for a windows computer is to download the program from the ___.

Internet/Web/World Wide Web

It is a good idea to edit or remove skills endorsements from your ___ (professional social media site) account that do not accurately reflect your skill set or experience.

LinkedIn

The world's most popular social network site for business professionals is ___.

LinkedIn

The search feature in the Apple app store is represented by a(n) ___ glass icon.

Magnifying

When referring to management information systems, SCMA stands for supply chain ___ software.

Management

Sometimes used in smaller business networks, employee ___ software is used to track employee activities while online.

Monitoring

A driver software that allows a peripheral device, such as a printer or a monitor, to work smoothly with your computer's ___ system.

Operating

Computer games, also referred to as _____ games, allow players to interact with objects displayed on a screen for entertainment purposes. - PC - CP - VG - HD

PC

Applications that enable a user to create visual aids that can be projected on a screen or displayed on a digital display are called ___ software.

Presentation/PowerPoint

Apps designed to make individuals or businesses more efficient are categorized as:

Productivity

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called:

Remote desktop

The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

Separation

The first social media site to allow users to create profiles, organize groups, and invite friends was called _____.

SixDegrees.com

With over 6 billion image and video views per day ___ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

Used to format and display numbers and text in cells, ___ programs are used to preform calculations and structure data and are widely used in by organizations.

Spreadsheet/Spreadsheets/Excel/Microsoft Excel/Spread sheet

Which category of management information systems (MIS) combines the forecasting of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

Supply Chain Management Systems (SCMS)

Similar to the Windows control panel, the system management tool in the macOS is called ___.

System preferences

US-CERT classifies the risks of online computer gaming into two categories: Technological risks and social risks. Categorize each item as a Technological or Social risk. - Identity theft - Viruses, worms, and malware - Virtual mugging, cyber prostitution, and protection schemes - Insecure or compromised game servers - Computer/game addiction

Technological Risk: - Viruses, worms, and malware - Insecure or compromised game servers Social Risk - Identity theft - Virtual mugging, cyber prostitution, and protection schemes - Computer/game addiction

To download an app onto your Android-based smartphone or tablet, you first click on ___.

The Play Store icon

You hold your finger on an icon on an iPhone and the icon jiggles. If a small black X on the jiggling app appears, this means that ___ just by tapping the X.

The app can be uninstalled

Table (Match the definition to the correct database term)

The default view of a relational database. Organized in rows and columns.

Primary Key (Match the definition to the correct database term)

The field that uniquely identifies each record in a database.

When referring to management information systems, TPS stands for:

Transaction Processing Systems

A video game is essentially the same thing as a computer game, but refers not only to games played on a personal computer (PC), but also to games played on video game consoles. (T/F)

True

If you do not adjust your privacy settings on Instagram anyone can follow you. T/F

True

Tweets can be made up of text, images, and video. (T/F)

True

You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information. (T/F)

True

Removing unwanted software from a digital device, such as a tablet or laptop computer, is called ___.

Uninstalling

Some apps that use a surprising amount of data are those that include embedded ___ .

Video

Based on current trends, it's likely that future apps will be more engaging and include more ___.

Videos

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

Because it is a Google product, downloading an app from the Play Store might require ___.

a Gmail account

Because it is an Apple product, downloading an app onto your iPhone will require ___.

an Apple ID

Most refer to a software application on a mobile device, such as an iPhone, as a(n) ___.

app/apps

One method of uninstalling an app from an Android device is to first tap the Settings Icon and then open the ___ & notification menu.

apps/app/application

The system management tool in the windows operating system is referred to as the ___.

control panel or Windows Settings

Every action you make online leaves a cyber or ______ footprint.

digital/cyber

When you purchase a peripheral, such as a printer to go with your home computer, you will usually have to download important software from the printer's manufacturer in order to ensure that the printer software works well with your computer's operating system. This important software is called a ___.

driver/drivers

One method of uninstalling a program from a Macintosh computer is to first ___.

go to the Launchpad

One way to uninstall an app from an iPhone is to start by ___.

holding down the app's icon until it jiggles

Xcode and Swift are good programs to start with if you wish to create an app for the:

iPhone

While many third-party apps are available through its App Store, apps for ___ must first be tested and approved before they are made available for down loading.

iPhones

To post content to Pinterest, you start with a(n) _____ or a photo.

image

Because unwanted toolbars and other software may accompany downloaded games and software, take your time and read carefully as you ___ software on your computer.

install/update

Toolbars, adware, and extra software may accompany downloaded games and software, particularly if the manufacturer offers free downloads. Because of this, it is important to read closely when ___ .

installing software

When referring to business information technology, MIS stands for ___ information systems.

management/manager

MMORPG stands for ___ Multiplayer Online Role Playing Games.

massive/mass

To install software onto a Macintosh computer, most use one of two methods. One method is to find the desired software on the Internet and then download and install it onto the Mac. Another method is to purchase the software on a DVD or CD and install the software using the computer's ___ drive.

optical/DVD/disc/optical disk/disk

Instagram is generally considered a ___-sharing app.

photo

When you personally share an image on Pinterest it is known as a _____.

pin

One method of uninstalling an app from a Macintosh computer is to click on the Launchpad icon. This icon has a ___ on it.

rocket/rocket ship/spaceship

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your ___ to access the security settings.

settings

The practice of using social media to expand the number of business and contacts people have is called ___ networking.

social/media/social media

To download an app onto your Android-based smartphone or tablet, you first click on ___ .

the Play Store icon

Twitter is an information network made up of 280-character messages called ___.

tweets

The most downloaded cross-platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging) is ___.

whatsapp

Which of the following statements are true about Instagram? - Instagram charges a fee to download the app. - According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." - It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. - Instagram is a subsidiary of (is owned by) Facebook.

- According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." - It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. - Instagram is a subsidiary of (is owned by) Facebook.

Which of the following are ethical concerns when using social media? - Often unknowingly, every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. - Every action you make online leaves a cyber footprint. Information is collected by nearly all online companies including Google, Apple, Facebook, Instagram, Twitter, and thousands of other companies. - The data collected from social media sites are beneficial to marketers, businesses, and any entity that needs data on online behavior. - All of the above

- All of the above

Which of the following statements are true about acceptable use policy (AUP)? - An AUP often accompanies most software applications - A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources - AUP covers a broad spectrum of computer resources - End user license agreement (EULA) and AUP are the same thing

- An AUP often accompanies most software applications - A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources - AUP covers a broad spectrum of computer resources

Based on current trends, what will be seen in future apps? - Conglomerated sites - More video - Less video - More engaging games

- Conglomerated sites - More video - More engaging games

Which of the following statement is true about Facebook? - You can permanently erase your profile and associated information from Facebook - Cyberstalking and online predators are a real problem on Facebook - Photo tagging does not create a link to your Facebook timeline - Anything posted on Facebook is private once even when it is shared with others

- Cyberstalking and online predators are a real problem on Facebook

You have decided to remove some software from your Dell laptop in order to free up space on your hard drive. Which two of the following, if uninstalled, may cause problems with your computer's normal operation? - Dell Touchpad - Microsoft Visual C++ 2017 Redistributable (x86) - Garmin Express - TurningPoint

- Dell Touchpad - Microsoft Visual C++ 2017 Redistributable (x86)

Two common ways of installing software onto a Macintosh computer include: - Send the program to the Macintosh computer via an SMS. - Download the program from the internet and install the software onto the Macintosh computer. - Install the software using a CD or DVD (if the Mac has an optical drive) - Upload the program from an Android device such as a Samsung Galaxy.

- Download the program from the internet and install the software onto the Macintosh computer. - Install the software using a CD or DVD (if the Mac has an optical drive)

Which of the following statements are true about Facebook? - Every time you post something on any social media site, you are impacting your online identity. - Facebook does not share information - Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. - Unless you specify differently, photo tagging creates a link to your Facebook timeline.

- Every time you post something on any social media site, you are impacting your online identity. - Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. - Unless you specify differently, photo tagging creates a link to your Facebook timeline.

Rank these by placing the most actively used categories at the top. Business & Education, Games, Entertainment, and Lifestyle

- Games - Business & Education - Lifestyle - Entertainment

Which of the following should be considered when using Twitter? - If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. - Most of the communication taking place on Twitter is viewable by everyone - Twitter accounts contain personal information - You cannot protect tweets so that manual approval is required to view them

- If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. - Most of the communication taking place on Twitter is viewable by everyone - Twitter accounts contain personal information

Social media integrates a variety of multimedia including which three of the following? - Images - Video - Messages - Laptops

- Images - Video - Messages

Which of the following two statements about Instagram security are true? - It is important to adjust your privacy settings so you can determine who follows you. - The profile section on Instagram lists your name, birthday, gender, and phone number. - Instagram guarantees the privacy of all posted photos - If you do not want to be tracked, turn off geo-tagging in the settings under location services.

- It is important to adjust your privacy settings so you can determine who follows you. - If you do not want to be tracked, turn off geo-tagging in the settings under location services.

Which of the following statements are true about LinkedIn? - LinkedIn never charges for any services. - It is a good idea to post family reunion photos on LinkedIn to personalize your profile. - LinkedIn should be used as an integrated component of creating your professional brand identity. - LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities.

- LinkedIn should be used as an integrated component of creating your professional brand identity. - LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities.

There are a variety of selections in the online gaming environment. One popular genre is called Massive Multiplayer Online Role Playing Games (MMORPG), which are also known as _____. - MMO - MCA - MOG - MOOC

- MMO

Which two of the following are applications? - MS Excel - Android - Instagram - Windows 10

- MS Excel - Instagram

Which three of the following statements are true about the Snipping Tool included in Microsoft Windows 10? - Once you have captured the image you can annotate, save, or share the image. - You can capture a snip of any object on your computer screen. - The Snipping Tool can be used capture a screenshot or snip. - The snipping tool automatically scales images to their best fit.

- Once you have captured the image you can annotate, save, or share the image. - You can capture a snip of any object on your computer screen. - The Snipping Tool can be used capture a screenshot or snip.

Which two of the following are commonly used database programs? - Microsoft Excel - OpenOffice Base - Microsoft Access - Google Sheets

- OpenOffice Base - Microsoft Access X Microsoft Excel/Google Sheets - Both of these are popular spreadsheet programs.

Which three of the following may be included when installing a program onto your computer? - RAM (random access memory) - Toolbars - Spyware - Adware

- Toolbars - Spyware - Adware

Examples of management information systems (MIS) include which of the following? - Central Support Systems (CSS) - Transactional Processing Systems (TPS) - Executive Support Systems (ESS) - Decision Support Systems (DSS)

- Transactional Processing Systems (TPS) - Executive Support Systems (ESS) - Decision Support Systems (DSS)

Which of the following statements are true about WhatsApp Messenger? - WhatsApp messenger is only available for Android operating system. - WhatsApp has over 2 billion users worldwide. - Whats App is a popular way to make phone calls and send text messages via mobile app. - WhatsApp uses your cellular data plan to exchange messages and cannot be used with Wi-Fi connections.

- WhatsApp has over 2 billion users worldwide. - Whats App is a popular way to make phone calls and send text messages via mobile app.

What is the correct order of steps to access the snipping tool in windows 10?

1 - Click the Cortana or Search button 2 - Type "snipping Tool" 3 - Select the Snipping Tool desktop app 4 - Click "New" to start the capture of an image

Place the following steps in order if you use the Microsoft Store to download and install Tumblr on a Windows computer. Place the first step at the top.

1 - Click the Start button to open the Start Menu 2 - Scroll to the Microsoft Store icon and click it on 3 - Click Search (magnifying glass) 4 - Type Tumblr 5 - Click the Tumblr icon 6 - Click Get 7 - Follow the instructions to install the program

One method of uninstalling a program from a Windows computer is to use the Settings button. Place the following steps in order if you wanted to delete Facebook from a Windows computer. Place the first step at the top.

1 - Click the Start button to open the Start menu 2 - Click the Settings button 3 - Click Apps 4 - Click the desired program 5 - Click uninstall


Related study sets

Everfi Employment & Taxes / Basic Banking

View Set

Texas Statues & Rules Common to Life and Health Quiz Questions

View Set

Social Studies Quarter 1: The People of Phoenicia

View Set

ACC 3033 intermediate Accounting II Exam 2

View Set

IGGY for Exam 4 (part 1)- Endocrine

View Set

AP Calculus: Basic Integration Formulas

View Set