chapter four cosc – Flashcards
28 test answers
Unlock all answers in this set
Unlock answers 28question
while a computer or mobile device is running, the operating system remains in memory. t/f
answer
true
Unlock the answer
question
with database software, users run functions to retrieve data. t/f
answer
false; run queries
Unlock the answer
question
software suites off three major advantages: lower cost, ease of use, and integration. t/f
answer
true
Unlock the answer
question
a PDF file can be viewed and printed without the software that created the original document. t/f
answer
true
Unlock the answer
question
the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments. t/f
answer
true
Unlock the answer
question
an antivirus program automatically deletes quarantined files. t/f
answer
false; until the infection can be removed.
Unlock the answer
question
cookies typically are considered a type of spyware.
answer
false; are not
Unlock the answer
question
programs called __ enable you to perform maintenance-type usually related to managing devices, media, and programs used by computer and mobile devices.
answer
tools or utilities
Unlock the answer
question
__ software performs functions specific to a business or industry.
answer
custom
Unlock the answer
question
A __ is the right to use a program or app
answer
license agreement
Unlock the answer
question
__ software is an application that allows users to organize data in rows and columns and perform calculations on the data
answer
spreadsheet
Unlock the answer
question
__ is a type of application that assists professionals and designers in creating engineering, architectural and scientific designs and models.
answer
CAD software
Unlock the answer
question
the term __ refers to decreasing a photo's file size
answer
compress
Unlock the answer
question
a __ is a destructive program disguised as a real program.
answer
trojan horse
Unlock the answer
question
a __ is a known, specific pattern of virus code.
answer
virus signature
Unlock the answer
question
destructive event or prank a virus was created to deliver.
answer
payload
Unlock the answer
question
malware that resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.
answer
worm
Unlock the answer
question
program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobiles devices.
answer
tools
Unlock the answer
question
software provided for use, modification and redistribution that has no restirictions from the copyright holder regarding modification of the software.
answer
open source software
Unlock the answer
question
process of reorganizing a hard disk's files so that the files are stored in contiguous sectors.
answer
defragmenting
Unlock the answer
question
malware that can hide and allow someone to take full control of a computer from a remote location.
answer
rootkit
Unlock the answer
question
scam in which a perpetrator sends an official looking email message that attempts to obtain personal and/or financial information
answer
phishing
Unlock the answer
question
square-shaped coded graphic that corresponds to a web address or other information.
answer
QR code
Unlock the answer
question
separate area of a hard disk that holds an infected file until the infection can be removed.
answer
quarantine
Unlock the answer