Deck 2: Introduction to Computer Software
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 2: Introduction to Computer Software
1
Low-level languages include machine and assembly languages.
True
2
A multiple-user license allows an organization to install software on all computers at a site.
False
3
Web apps are stored either on the Web or on a portable storage device.
True
4
Every time you click an icon on your desktop, you are using software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Java is a popular high-level language for Web-based programming.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
To perform a cold boot, use the Restart command on your PC or Mac.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
When you purchase copyrighted software, the copyright protection remains in effect.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Pirated software usually comes with authentic-looking documentation, registration cards, Certificates of Authenticity, and manuals.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Assembly language uses 1s and 0s, or binary code, which can run directly on the processor.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Upgrades are more time sensitive than updates, so you should switch to the newer version as soon as possible.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
A software license is a contract between the software publisher and the user.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Application software performs computer-related operations and maintenance.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Microsoft Internet Explorer is a freeware program.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
When you select a menu option, you give the computer output.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Acquiring custom software is less time consuming and expensive than purchasing packaged software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Embedded software is generally limited in functionality.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
When you have finished working with a program, files you want to keep are usually saved automatically when you close the program.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
If you try to remove unwanted Windows software by dragging a program icon to the Recycle Bin, you may remove the file that runs the program, but not its associated files.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Users can copy, modify, and customize open source software, with certain restrictions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Windows 8.x provides a free security program named Windows Defender.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
____ languages create source code using words and structures similar to spoken language.
A) Low-level
B) High-level
C) Agile
D) Native
A) Low-level
B) High-level
C) Agile
D) Native
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
When coding software, programmers write comments to give other programmers an overview of the program. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Most software uses a ____ user interface.
A) platform
B) utility
C) graphical
D) command-line
A) platform
B) utility
C) graphical
D) command-line
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
If you no longer use certain software, you can remove, or ____, then unwanted programs.
A) unload
B) patch
C) unboot
D) uninstall
A) unload
B) patch
C) unboot
D) uninstall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
The agile software development methodology focuses on planning and preparation to minimize changes later in the development process. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Software publishers periodically introduce new versions, or patches , of their software with new features. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Computers come with ____ software, software that is already on the machine.
A) preinstalled
B) loaded
C) Web-based
D) replicated
A) preinstalled
B) loaded
C) Web-based
D) replicated
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Custom software matches the user's needs exactly and can be modified if those needs change. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
____ software controls a computer and its peripherals, such as its keyboard and mouse.
A) System
B) Application
C) Embedded
D) Productivity
A) System
B) Application
C) Embedded
D) Productivity
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Compilers translate assembly language into machine code. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
When you run a program or app, your computer or mobile device ____, or reads and transfers it, into memory so that you can use it.
A) replicates
B) inputs
C) loads
D) compiles
A) replicates
B) inputs
C) loads
D) compiles
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Software publishers often distribute beta , or test versions of their software to select users so they can help identify problems before final software is released. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
A fast-growing field called informatics combines information technology with social science. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Preinstalled software that takes up a lot of memory and disk space is called ____.
A) Software as a Service
B) malware
C) shareware
D) bloatware
A) Software as a Service
B) malware
C) shareware
D) bloatware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
Horizontal market software is productivity software that is customized for specific industries. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Most software uses a(n) graphical user interface. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Software is written by software ____, using computer-readable code.
A) publishers
B) programmers
C) bots
D) editors
A) publishers
B) programmers
C) bots
D) editors
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Software programs are based on ____.
A) algorithms
B) comments
C) platforms
D) gadgets
A) algorithms
B) comments
C) platforms
D) gadgets
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Software is produced and distributed by software programmers . _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Increasingly, software publishers are creating ____ apps that you can use without installing them.
A) embedded
B) portable
C) site
D) interpreted
A) embedded
B) portable
C) site
D) interpreted
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
____ operating systems use codenames such as Mavericks, Mountain Lion, Snow Leopard, Cheetah, and Kodiak.
A) Windows
B) Mac
C) Linux
D) Chrome
A) Windows
B) Mac
C) Linux
D) Chrome
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Some operating systems use a ____ interface that requires users to type commands.
A) command-line
B) graphical user
C) native
D) custom
A) command-line
B) graphical user
C) native
D) custom
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
System software falls into two categories: operating system software and ____ programs.
A) embedded
B) groupware
C) productivity
D) utility
A) embedded
B) groupware
C) productivity
D) utility
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Program ____ let programmers write code using a word processing-like interface.
A) compilers
B) assemblers
C) debuggers
D) editors
A) compilers
B) assemblers
C) debuggers
D) editors
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
In the software development process, software engineers and systems analysts provide input for the analysis, design, and ____ phases.
A) documentation
B) implementation
C) validation
D) testing
A) documentation
B) implementation
C) validation
D) testing
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
____ software is copyrighted software whose source code is available to the public.
A) Freeware
B) Shareware
C) Packaged
D) Open source
A) Freeware
B) Shareware
C) Packaged
D) Open source
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
____ application software lets you create budgets, data analyses, lists, and schedules.
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
____ application software lets you create large collections of data, including inventories, customer lists, and employee information.
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
____ is the second step of the sofware development process.
A) Analyzing needs
B) Creating a software design
C) Developing
D) Testing
A) Analyzing needs
B) Creating a software design
C) Developing
D) Testing
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Companies either hire outside programmers to write ____ software or use their own internal developers.
A) packaged
B) embedded
C) adaptive
D) custom
A) packaged
B) embedded
C) adaptive
D) custom
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
A ____ is software that takes control of your computer so it can be used by hackers to carry out further attacks.
A) worm
B) keylogger
C) bot
D) virus
A) worm
B) keylogger
C) bot
D) virus
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
____ examine software code line by line to identify errors, such as incorrect formulas or logic errors.
A) Compilers
B) Editors
C) Debuggers
D) Assemblers
A) Compilers
B) Editors
C) Debuggers
D) Assemblers
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Code ____ contain modules of customizable code for common functions such as accessing files or issuing the Print command.
A) development kits
B) assemblers
C) inte rp reters
D) compilers
A) development kits
B) assemblers
C) inte rp reters
D) compilers
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
____ apps are applications you access over the Internet using any computer or mobile device with an Internet connection.
A) Adaptive
B) Open source
C) Web
D) Custom
A) Adaptive
B) Open source
C) Web
D) Custom
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
____ application software lets you create onscreen displays of text, graphics, sound, and video to show to a group.
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
____ translate source code from high-level languages into machine code so it can be understood by the processor.
A) Interpreters
B) Editors
C) Assemblers
D) Debuggers
A) Interpreters
B) Editors
C) Assemblers
D) Debuggers
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
____ is copyrighted software distributed free of charge on a trial basis.
A) Public domain
B) Open source
C) Shareware
D) Custom
A) Public domain
B) Open source
C) Shareware
D) Custom
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
A quality ____ team usually tests an application thoroughly to confirm that it works as advertised.
A) beta
B) coding
C) assurance
D) debugger
A) beta
B) coding
C) assurance
D) debugger
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
____ application software lets you create letters, reports, memos, and contracts.
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
A) Word processing
B) Spreadsheet
C) Database
D) Presentation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
____ apps are installed on a device.
A) Native
B) Web
C) Software as a Service
D) Platform
A) Native
B) Web
C) Software as a Service
D) Platform
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
____ software performs specific tasks.
A) System
B) Application
C) Integrated
D) Agile
A) System
B) Application
C) Integrated
D) Agile
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
To create an iPad or iPhone app, you can use a language called ____, a free development environment for building iOS apps.
Eclipse
A) Notepad
B) Eclipse
C) Visual Studio
D) Objective-C
Eclipse
A) Notepad
B) Eclipse
C) Visual Studio
D) Objective-C
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
A software ____ grants a user rights to use of the software in specified ways.
A) license
B) development kit
C) algorithm
D) certificate
A) license
B) development kit
C) algorithm
D) certificate
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
When troubleshooting a computer problem, it can be important to note whether you can ____ the problem.
A) assemble
B) update
C) authenticate
D) replicate
A) assemble
B) update
C) authenticate
D) replicate
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
____ technologies require users to log in with a valid user ID and password to access Web-based content.
A) Encryption
B) Copy protection
C) Digital watermark
D) Authentication
A) Encryption
B) Copy protection
C) Digital watermark
D) Authentication
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
____ makes digital content unreadable unless viewed with a valid key or authorized hardware device.
A) Encryption
B) Copy protection
C) A digital watermark
D) A uthentica tion
A) Encryption
B) Copy protection
C) A digital watermark
D) A uthentica tion
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
____ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking any suspicious activity.
A) Antispyware
B) Antivirus
C) Antispam
D) Firewall
A) Antispyware
B) Antivirus
C) Antispam
D) Firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
____ is the legal term for ownership of intangible assets such as ideas, art, music, moview, and software.
A) Copyright
B) Intellectual property
C) License
D) Security
A) Copyright
B) Intellectual property
C) License
D) Security
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
____ is the process of restarting your computer.
A) Rebooting
B) Updating
C) Compiling
D) Loading
A) Rebooting
B) Updating
C) Compiling
D) Loading
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Whereas a patch is a single fix, a(n) ____ is a collection of patches or fixes bundled into a single release.
A) upgrade
B) update
C) service pack
D) code library
A) upgrade
B) update
C) service pack
D) code library
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
A ____ license grants one user the right to use the software.
A) site
B) concurrent-use
C) single-user
D) time-limited
A) site
B) concurrent-use
C) single-user
D) time-limited
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) ____ is the legal right to copy, distribute, modify, and sell an original work, including computer software.
A) intellectual property right
B) single-user license
C) certificate of authenticity
D) copyright
A) intellectual property right
B) single-user license
C) certificate of authenticity
D) copyright
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Many utility programs are built into the ____.
A) OS
B) IDE
C) SDK
D) EULA
A) OS
B) IDE
C) SDK
D) EULA
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
A user ____ gives instructions on using the program's features and troubleshooting common problems.
A) algorithm
B) Manual
C) library
D) platform
A) algorithm
B) Manual
C) library
D) platform
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Although no one can apply for a copyright on ____ software, users are free to copy, modify, and resell the software.
A) public domain
B) shareware
C) freeware
D) open source
A) public domain
B) shareware
C) freeware
D) open source
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck