Introduction to Software and Apps(Chapter 2)

Ace your homework & exams now with Quizwiz!

Spyware

A form of malware installed on networked computers to track and transmit personal data

Public domain software

A program that is public property and is available at no cost

Software

A set of instructions that tells a computer what to do, how to do it. and where to send the output

Concurrent user license

Allows a specified number of copies of the software to be used anytime in an organization

Site license

Allows organization software on all computers at a site

Productivity software

Automates common or repetitive tasks

Antispam software

Blocks spam, or electronic junk mail, from your email inbox

Service pack

Collection of patches bundled into single use

Code libraries

Contains modules of customizable code for common functions such as accessing files or issuing the Print command

Shareware

Copyrighted software distributed free of charge on a trial basis

Open source software

Copyrighted software whose source code is available to the public

Firewall software

Creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking any suspicious activity

Custom software

Designed to meet the unique needs of an organization or business

Antivirus software

Finds and removes viruses, Trojan horses, worms, and bots from your computer and scans incoming and outgoing email messages

Predictive methodology

Focuses on planning and preparation to minimize changes later in the development process

Single user license

Grants one user the right to use the software end user license agreement (EULA)

Time limited licenses

Grants usage of software rights for a fixed period of time

Command line interface

Have to physically type in a command

Virus

Installs itself on your computer and alters its operations

Service patches

Larger fixes

Multiple user license

Lets multiple users use the software

Graphical user interface

Lets you manipulate objects to issue commands

Intellectual software

Ownership of tangible assets, ideas, art, music etc.

Antispyware

Prevents spyware from installing itself on your computer and removes any existing spyware

Vertical market software

Productivity software that is customized for specific industries

Horizontal market software

Productivity software that performs tasks that are common across industries

Low level languages

Programming languages designed to speak to hardware

High level languages

Programming languages designed to translate human language to bit/bytes

Adaptive methodology

Programming methodology focuses on flexibility; program designs and specifications change and evolve as a project moves forward

Software development methodology

Provides a framework for designing, writing, and testing software

Worm

Self-replicating program that eats up system resources

Patches

Small fixes

Freeware

Software distributed free of charge, typically via the Internet

Utility software

Software that performs maintenance related tasks on a computer

Application software

Software that performs specific tasks

System software

Software that provides user interface, controls a computer and its peripherals

Bot

Software that takes control of your computer so it can be used by hackers to carry out further attacks

Embedded software

Software typically stored on a computer chip inside the appliance

Trojan horses

Steal passwords to online accounts, disguise themselves as useful programs, such as utilities

Algorithms

Step by Step procedures for solving specific problems

Operating system software

System that manages hardware and software

Authentication

Technologies require users to log in with a valid user ID and password to access Web-based content

Rebooting

The process of restarting your computer, either from a powered-down state or with the power on

Piracy

Unauthorized use of copyrighted software

Software as a Service

When you can use Web apps or portable apps without installing them

Input

When you issue a command to a computer

Malware

Written by hackers to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance


Related study sets

Protein: Biochemical theory and physiology

View Set

Unit10 - Business Rules Management (BRM)

View Set

Psychology Chapter 1 Test: What is Psychology?

View Set

Chapters 18 and 19 Cardiovascular system and blood vessels

View Set