Deck 2: Introduction to Software and Apps
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
Play
Full screen (f)
Deck 2: Introduction to Software and Apps
1
Every time you click an icon on your desktop, tap commands on a touch screen, or follow a link on your tablet, you are using software.
True
2
When you purchase copyrighted software, the copyright protection remains in effect.
True
3
When you select a menu option, you give the computer output.
False
4
Upgrades are more time sensitive than updates, so you should switch to the newer version as soon as possible.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
Most software uses a graphical user interface.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Application software performs computer-related operations and maintenance.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
A fast-growing field called informatics combines information technology with social science.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Web applications, or web apps, are applications you access over the Internet using a computer or mobile device with an Internet connection.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
If you try to remove unwanted Windows software by dragging a program icon to the Recycle Bin, you may remove the file that runs the program but not its associated files.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
To perform a cold boot, use the Restart command on your PC or Mac.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
Users can copy, modify, and customize open source software, with certain restrictions.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
Low-level languages include machine and assembly languages.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
Acquiring custom software is less time consuming and expensive than purchasing packaged software.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
Java is a popular high-level language for web-based programming.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
Windows 10 provides a free security program named Windows Defender, which protects against malware.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
Horizontal market software is productivity software that is customized for specific industries.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
Assembly language uses 1s and 0s, or binary code, which can run directly on the processor.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
A multiple-user license allows an organization to install software on all computers at a site.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
A software license is a contract between the software publisher and the user.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Software publishers often distribute beta, or test, versions of their software to select users so they can help identify problems before final software is released.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
Software is written by software ____, using computer-readable code.
A) publishers
B) developers
C) bots
D) editors
A) publishers
B) developers
C) bots
D) editors
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
____ software is copyrighted software whose source code is available to the public.
A) Freeware
B) Shareware
C) Packaged
D) Open source
A) Freeware
B) Shareware
C) Packaged
D) Open source
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
A quality ____ team usually tests an application thoroughly to confirm that it works as advertised.
A) beta
B) coding
C) assurance
D) debugger
A) beta
B) coding
C) assurance
D) debugger
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
____ languages create source code using words and structures similar to spoken language.
A) Low-level
B) High-level
C) Agile
D) Native
A) Low-level
B) High-level
C) Agile
D) Native
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ is the legal right to copy, distribute, modify, and sell an original work, including computer software.
A) intellectual property right
B) single-user license
C) certificate of authenticity
D) copyright
A) intellectual property right
B) single-user license
C) certificate of authenticity
D) copyright
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
System software falls into two categories: operating system software and ____ programs.
A) embedded
B) groupware
C) productivity
D) utility
A) embedded
B) groupware
C) productivity
D) utility
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
Code ____ contain modules of customizable code for common functions such as accessing files or issuing the Print command.
A) development kits
B) libraries
C) inte rp reters
D) compilers
A) development kits
B) libraries
C) inte rp reters
D) compilers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
____ software controls a computer and its peripherals, such as its keyboard and mouse.
A) System
B) Application
C) Embedded
D) Productivity
A) System
B) Application
C) Embedded
D) Productivity
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Companies either hire outside programmers to write ____ software or use their own internal developers.
A) packaged
B) embedded
C) adaptive
D) custom
A) packaged
B) embedded
C) adaptive
D) custom
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
If you no longer use certain software, you can remove, or ____, the unwanted programs.
A) unload
B) patch
C) unboot
D) uninstall
A) unload
B) patch
C) unboot
D) uninstall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
Preinstalled software that takes up a lot of memory and disk space is called ____.
A) Software as a Service
B) malware
C) shareware
D) bloatware
A) Software as a Service
B) malware
C) shareware
D) bloatware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
When you run a program or an app, your computer or mobile device ____, or reads and transfers it, into memory so that you can use it.
A) replicates
B) inputs
C) loads
D) compiles
A) replicates
B) inputs
C) loads
D) compiles
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
____ examine software code line by line to identify errors, such as incorrect formulas or logic errors.
A) Compilers
B) Editors
C) Debuggers
D) Assemblers
A) Compilers
B) Editors
C) Debuggers
D) Assemblers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
Program ____ let programmers write code using a word processing-like interface.
A) compilers
B) assemblers
C) debuggers
D) editors
A) compilers
B) assemblers
C) debuggers
D) editors
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
Software programs are based on ____.
A) algorithms
B) comments
C) platforms
D) gadgets
A) algorithms
B) comments
C) platforms
D) gadgets
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
____ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
A) Copyright
B) Intellectual property
C) License
D) Security
A) Copyright
B) Intellectual property
C) License
D) Security
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
____ translate source code from high-level languages into machine code so it can be understood by the processor.
A) Interpreters
B) Editors
C) Assemblers
D) Debuggers
A) Interpreters
B) Editors
C) Assemblers
D) Debuggers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
In the software development process, software engineers and systems analysts provide input for the analysis, design, and ____ phases.
A) documentation
B) implementation
C) validation
D) testing
A) documentation
B) implementation
C) validation
D) testing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Computers come with ____ software, software that is already on the machine.
A) preinstalled
B) loaded
C) w eb-based
D) replicated
A) preinstalled
B) loaded
C) w eb-based
D) replicated
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
____ operating systems use code names such as Sierra, El Capitan, Yosemite, Mavericks, Mountain Lion, Lion, Snow Leopard, Leopard, Tiger, Panther, Jaguar, Puma, Cheetah, and Kodiak.
A) Windows
B) Mac
C) Linux
D) Chrome
A) Windows
B) Mac
C) Linux
D) Chrome
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
When troubleshooting a computer problem, it can be important to note whether you can ____ the problem.
A) assemble
B) update
C) authenticate
D) replicate
A) assemble
B) update
C) authenticate
D) replicate
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
____ is the process of restarting your computer.
A) Rebooting
B) Updating
C) Compiling
D) Loading
A) Rebooting
B) Updating
C) Compiling
D) Loading
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
In extreme cases, you may need to ____ your device to its original factory settings.
A) reset
B) reboot
C) cold boot
D) refresh
A) reset
B) reboot
C) cold boot
D) refresh
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
The ____ methodology focuses on flexibility; program designs and specifications change and evolve as a project moves forward.
A) agile
B) waterfall
C) open source
D) public domain
A) agile
B) waterfall
C) open source
D) public domain
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
Rather than selling a software package at a fixed, one-time price, software publishers are now offering products you can obtain by paying a monthly subscription fee. This arrangement is known as ____.
A) software as a service
B) shareware
C) public domain
D) open source
A) software as a service
B) shareware
C) public domain
D) open source
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
To program an app on an iPhone, a programmer would use a programming language named ____, which is similar to the Objective-C language.
Eclipse
A) Notepad
B) Eclipse
C) Visual Studio
D) Swift
Eclipse
A) Notepad
B) Eclipse
C) Visual Studio
D) Swift
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
____, malicious software written by hackers, poses a significant threat to your computer and its contents.
A) Malware
B) Bloatware
C) Destroyware
D) Platform software
A) Malware
B) Bloatware
C) Destroyware
D) Platform software
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
Packaged software can refer to a group of programs having similar features and sold together, known as a(n) ____.
A) suite
B) OS
C) service pack
D) patch
A) suite
B) OS
C) service pack
D) patch
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
____ software, such as a word processing program, performs specific tasks.
A) System
B) Application
C) Integrated
D) Agile
A) System
B) Application
C) Integrated
D) Agile
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
When your device does not respond to common recovery techniques, you may need to ____ your operating system to a previous version.
A) restore
B) format
C) reboot
D) install
A) restore
B) format
C) reboot
D) install
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
____ means that Apps should run equally well on a variety of platforms and devices, such as laptops, tablets, and smartphones.
A) Scalability
B) Portability
C) Stability
D) Personalization
A) Scalability
B) Portability
C) Stability
D) Personalization
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
____ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking any suspicious activity.
A) Antispyware
B) Antivirus
C) Antispam
D) Firewall
A) Antispyware
B) Antivirus
C) Antispam
D) Firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
Increasingly, software publishers and trade groups use ____ technologies to fight software piracy and prevent unauthorized copying of digital content.
A) digital rights management
B) assembly
C) firewall
D) open source
A) digital rights management
B) assembly
C) firewall
D) open source
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
____ technologies require users to log in with a valid user ID and password to access web-based content.
A) Encryption
B) Copy protection
C) Digital watermark
D) Authentication
A) Encryption
B) Copy protection
C) Digital watermark
D) Authentication
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
A game app might require a(n) ____ to move to a higher level.
A) in-app purchase
B) SaaS
C) site license
D) software development kit
A) in-app purchase
B) SaaS
C) site license
D) software development kit
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
____ is installed on your computer and can be used indefinitely.
A) Perpetual software
B) SaaS
C) DRM
D) EULA
A) Perpetual software
B) SaaS
C) DRM
D) EULA
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
A user ____ gives instructions on using the program's features and troubleshooting common problems.
A) algorithm
B) m anual
C) library
D) platform
A) algorithm
B) m anual
C) library
D) platform
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
A ____ license grants one user the right to use the software.
A) site
B) concurrent-use
C) single-user
D) time-limited
A) site
B) concurrent-use
C) single-user
D) time-limited
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
____ software finds and removes malware from your computer and scans incoming and outgoing email messages to identify threats.
A) Antivirus
B) Program
C) Application
D) Firewall
A) Antivirus
B) Program
C) Application
D) Firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
A software ____ grants a user rights to use of the software in specified ways.
A) license
B) development kit
C) algorithm
D) certificate
A) license
B) development kit
C) algorithm
D) certificate
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
____ is application software that makes people more productive by automating common or repetitive tasks.
A) Productivity software
B) Utility software
C) Operating system software
D) Shareware
A) Productivity software
B) Utility software
C) Operating system software
D) Shareware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
Basic software troubleshooting techniques include the following: stop and think, save and back up, gather information, research possible solutions, and ____.
A) contact technical support
B) upgrade
C) reformat
D) debug
A) contact technical support
B) upgrade
C) reformat
D) debug
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
Match between columns
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
____ replace sections of existing code with the new, improved code.
A) Software updates
B) EULAs
C) Platforms
D) Software development kits
A) Software updates
B) EULAs
C) Platforms
D) Software development kits
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
____ are utility programs that control peripheral devices such as a keyboards, printers, or scanners.
A) Device drivers
B) Service packs
C) Patches
D) Apps
A) Device drivers
B) Service packs
C) Patches
D) Apps
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
____ software blocks electronic junk mail from entering your email inbox.
A) Antispam
B) Antispyware
C) Antivirus
D) Firewall
A) Antispam
B) Antispyware
C) Antivirus
D) Firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
____ technologies require users to sign in with a valid user ID and password to access web-based content such as software programs or e-books.
A) Authentication
B) Agile
C) Monetized
D) Open source
A) Authentication
B) Agile
C) Monetized
D) Open source
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
Software is a set of instructions that tells a computer what to do, how to do it, and where to send the results, or____.
A) output
B) algorithms
C) SDKs
D) input
A) output
B) algorithms
C) SDKs
D) input
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
You can now purchase the use of many apps by paying a monthly subscription fee instead of paying for the entire product all at once. This arrangement is known as ____.
A) software as a service (SaaS)
B) sharing
C) in-app purchasing
D) pirating
A) software as a service (SaaS)
B) sharing
C) in-app purchasing
D) pirating
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
Software interacts with computer hardware and other software in an organized chain of events; each link in the chain relays ____ along the chain until the job at hand is successfully completed.
A) instructions
B) algorithms
C) source code
D) apps
A) instructions
B) algorithms
C) source code
D) apps
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
Software publishers periodically introduce new versions, or____, of their software products with entirely new features.
A) upgrades
B) updates
C) patches
D) software development kits
A) upgrades
B) updates
C) patches
D) software development kits
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck