Download file with the answers
1 file(s) 337.81 KB
Module 06 Software
1 file(s) 337.81 KB
If you are not a member register here to download this file
1. In a general sense, ____________ refers to all the non-hardware components of a digital device.
2. What are the main software categories?
a. System, open source, and development
b. Application, shareware, and system
c. System, development, and application
d. Demoware, system, development
3. Which category of software would programming languages fall into?
a. System software
b. Development software
c. Application software
d. All of the above
4. There is a universal standard for categorizing software, and various categorization schemes have few similarities.
5. Mobile devices tend to be populated by entertainment apps, games, and social media services.
6. Desktop and laptop computers require an operating system with a file __________ system that allows users to view and manipulate data files.
7. Which of the following would be considered essential software for both laptop computers and tablet computers?
a. Word processor
b. VoIP (Voice over Internet Protocol) client
c. Office suite
8. Although there are online sources for software, most consumers obtain software offline.
9. System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.
10. A new version or edition of a software product is referred to as a software ___________.
c. service pack
d. software patch
11. A software ___________ is a small section of program code that replaces part of the software currently installed.
ANSWER: update, patch
12. The term service pack usually applies to operating system updates.
13. Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.
14. A software ________ is a legal contract that defines the ways in which a computer program may be used.
ANSWER: license, EULA
15. Like books and movies, software is a type of intellectual property.
16. A(n) _____________ grants the author of a software product an exclusive right to copy, distribute, sell, and modify that work.
17. __________ software may be freely copied, distributed, and even resold.
b. Public domain
18. Most commercial software is distributed under a single-user license that limits use to one person at a time.
19. A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.
a. site license
b. single-user license
c. multiple-user license
20. ______________ is copyrighted software marketed under a try-before-you-buy policy.
21. ____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.
22. A(n) ______ value is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.
23. Which type of software must include the source code, which allows programmers to modify and improve the software?
c. Open source
d. Public domain
24. Two of the most common open source and free software licenses are ___________.
a. BSD (Berkeley Software Distribution) and GPL (General Public License)
b. EULA (end-user license agreement) and VoIP
c. EULA and GPL
d. None of the above
25. Illegal copies of software are referred to as _______ software.
26. Which one of the following types of operating systems would most likely be found on a laptop computer?
a. Desktop operating system
b. Mobile operating system
c. Server operating system
d. Multitasking operating system
27. The kernel stays in random access memory (RAM) the entire time your computer is on.
28. Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.
29. In the context of digital devices, the term __________ refers to any component that is required to perform work.
30. Which of the following would not be considered an operating system resource?
b. CPU (central processing unit)
d. URL (Uniform Resource Locator)
31. Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.
32. A(n) ___________ operating system provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
33. Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.
34. An operating system’s ____________ capability supports a division of labor among all the processing units.
d. all of the above
35. Sometimes an application requests memory but never releases it, a condition called a memory ______.
36. Every peripheral device connected to a computer is regarded as an input or output resource.
37. An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.
38. Which OS is installed on more than 80% of the world’s personal computers?
a. Microsoft Windows
39. Windows evolved from a Microsoft operating system called _____.
40. Microsoft Windows is used exclusively on desktop systems.
41. Which of the following operating systems is found on Macintosh desktop and laptop computers?
42. The main weakness of macOS is lack of security.
43. Which of the following features is unique to macOS?
a. User interface
c. Resource forks
d. GUI (graphical user interface)
44. The iOS operating system is found on which device?
a. Android tablet
c. Mac laptop
d. None of the above
45. You won’t find a desktop with application windows on an iOS device.
46. As with other popular mobile operating systems, Android is designed for _______ processors.
47. All smartphones use the Android operating system.
48. On an Android device, a third-party file manager utility is required to manipulate files.
49. In 2009, Google launched an operating system called ______ OS.
50. Chrome OS is an example of a(n) _________ because it depends substantially on processing and storage provided by cloud-based servers.
a. thin client
b. forked license
51. A(n) _______________ allows one computer to simulate the hardware and software of another.
ANSWER: virtual machine or VM
52. If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.
53. Instead of running program files that are stored locally, the code for _______ applications is downloaded along with HTML pages and is executed client-side by the browser.
54. Web apps are examples of cloud computing.
55. Most Web apps require installation on your local computer or handheld device.
56. Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.
57. A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.
58. Most handheld devices can use either Web apps or mobile apps but not both.
59. The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.
a. arrives only when you use the app, downloaded and installed
b. is downloaded and installed, retrieved from the cloud
c. is downloaded and installed, retrieved only when you use the app
d. none of the above
60. On an iOS device, making unauthorized changes to the device’s software is called a(n) ____________.
61. If you want to run third-party apps on your Android device, you need to jailbreak it.
62. Unauthorized modification of any mobile device to overcome limitations imposed by mobile service providers is called _______.
63. A local application is installed on a computer’s hard disk.
64. Software for Macs is usually stored in a single executable file with a(n) __________ extension.
ANSWER: .app or app
65. On Windows systems, the main executable file has a(n) ________ extension.
ANSWER: .exe or exe
66. Software for PCs contains a(n) _________ program that guides you through the installation process.
67. Which of the following is part of the process for installing software on a PC?
a. Scan the hard drive for registry errors
b. Defragment the hard drive
c. Add the device to the network
d. None of the above
68. Downloads of Mac software are ordinarily supplied as a(n) _______ package.
69. To install software on a Mac, download the application, open the DMG file from the Downloads folder and then drag the .APP file to your ____________ folder.
70. The Windows operating system includes a(n) _________ utility, which deletes software files from various folders on your computer’s hard disk.
71. Which of the following would be classified as productivity software?
a. Microsoft Office
b. Google Docs
d. All of the above
72. A(n) _____________ suite is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.
ANSWER: office, productivity
73. In the context of office suites, the term ___________ refers to a component, such as a word processing program.
74. A typical _________ window displays a work area, called a workspace, which represents a blank piece of paper.
ANSWER: word processor, word processing
75. A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.
a. Search and Replace
b. word wrap
c. readability formula
d. document formatting
76. Word processing software is likely to include which of the following features?
a. Search and Replace and readability formula
b. What-if analysis and worksheet
c. Cell references and functions
d. All of the above
77. Paragraph style includes the alignment of text within the margins and the space between each line of text.
78. A(n) ______ is a set of letters that share a unified design.
79. Because it is so easy to experiment with different numbers, word processing software is particularly useful for what-if analysis.
80. Spreadsheet software can be used to create an on-screen __________ that is based on a grid of columns and rows.
81. In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.
82. The labels and values on a spreadsheet worksheet cannot be formatted in similar way as you would format text in a word processing document.
83. In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.
84. A formula, such as =B6+(C6*.1), does not contain cell references.
85. In spreadsheet software, a(n) ___________ is a built-in preset formula.
86. In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.
a. what-if analysis
b. automatic recalculation
c. relative reference
d. absolute reference
87. Microsoft Access, FileMaker Pro, and LibreOffice Base are three examples of popular ___________ software.
88. Database software stores data as a series of ____________, which are composed of fields that hold data.
89. Database software stores data as a series of records, which are composed of _________ that hold data.
90. In a database, a(n) _________ holds data for a single entity.
91. Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
92. _________ software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector.
93. Popular ___________ software products include Microsoft PowerPoint, iWork Keynote, LibreOffice Impress, and Google Docs Slides.
94. When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
a. disk partition
b. file path
c. file-naming conventions
d. root directory
95. Which of the following is not a file-naming convention?
a. Avoid using symbols.
b. Maximum length is 256 characters.
c. Do not use reserved words.
d. Spaces are not allowed.
96. When working with Windows, storage devices can also be identified by a device __________.
97. Macs do not use drive letters, and the main hard disk is called Macintosh HD.
98. A disk __________ is a section of a hard disk drive that is treated as a separate storage unit.
99. Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
100. Every storage device has a directory containing a list of its files.
101. The main directory on a storage device is referred to as the ________ directory.
102. A computer file’s location is defined by a file ______, such as C:\Documents\To-Do-List.docx.
103. Operating systems provide file organization tools called ___________.
a. Disk Management
b. file management utilities
c. Disk Utility
d. file-naming conventions
104. Which of the following is a file management utility?
b. File Explorer
c. Neither of the above
d. Both A and B
105. The software application associated with a specific file type is called a(n) __________ application.
106. The software application associated with a specific file type is called a(n) __________ application.
107. Applications include menu options for opening and saving files, calling on the operating system’s file management routines to get the job done.
108. The structure of files and folders displayed by File Explorer is called a(n) ________ storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.
109. A(n) ____________ storage model describes what actually happens on the disks and in the circuits.
110. Magnetic and optical media are divided into circular ______ and then further divided into pie-shaped ________.
a. cells, records
b. sectors, tracks
c. tracks, sectors
d. clusters, cells
111. An operating system uses a(n) ___________ to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.
ANSWER: file system
112. To delete data from a disk in such a way that no one can ever read it, you can use special file ________ software that overwrites supposedly empty sectors with random 1s and 0s.
113. When you empty the trash on your computer what happens?
a. Data in the sectors where deleted files were stored is removed.
b. The sectors that held the deleted files are overwritten with zeros.
c. The index marks the sectors as available for storing new data.
d. The data is shredded so it can never be recovered.
114. Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?
115. Which operating system is open source and available as distros, such as Ubuntu and Mint?
b. Windows Mobile
c. Microsoft Windows
Who was the engineer at Bell Labs who in 1948 described the model still used for describing how electronic devices communicate at the basic level? ›
Models of communication are conceptual models used to explain the human communication process. The first major model for communication was developed in 1948 by Claude Shannon and published with an introduction by Warren Weaver for Bell Laboratories.Which is a first step to deter thieves? ›
1. Lock your doors. Keeping your doors locked is the first step in deterring a thief.How is streaming of video or audio different from downloading it? ›
Difference between downloading and streaming
The video is not copied and saved; instead, once streamed, the data is deleted. Downloaded content cannot be played while it is being downloaded. Instead of loading and buffering small amounts of the video at one time, downloaded video files are loaded all at once.
Pretexting is a method of inventing a scenario to convince victims to divulge information they should not divulge.Which HTTP method does a browser use when you upload files to a specific web address? ›
In computing, POST is a request method supported by HTTP used by the World Wide Web. By design, the POST request method requests that a web server accept the data enclosed in the body of the request message, most likely for storing it. It is often used when uploading a file or when submitting a completed web form.When network protocols clean a corrupted signal the process is called _? ›
When network protocols clean a corrupted signal, the process is called. Error Correction.How do you mark a laptop? ›
Mark your laptop.
You can use an engraving tool to literally carve your name and contact information on your laptop, or even write your name inside the laptop, for example, on the back of some removable door, or inside the battery compartment. Use a Sharpie or other indelible marker.
- Lock your computer with a strong and unique password. ...
- Safeguard all passwords. ...
- Consistently lock your screen when you step away. ...
- Encrypt your hard drive. ...
- Regularly back up your encrypted hard drive to another location.
Why? Because they are small, valuable, can be removed quickly, are easily hidden, and there is a market for them. A thief can sell a stolen laptop, MP3 player, or other device to an unsuspecting used computer store or pawnshop, and easily receive up to half its value in cash.How do you stream on a smart TV? ›
How to Watch a Live Stream on your Smart TV - YouTube
The quality of a digital image is affected by matrix size, unsharpness in the underlying image, bit depth, and noise in the underlying image.How do you live stream on a smart TV? ›
- Connect your smart TV or streaming device. First thing's first: set up your smart TV or streaming device. ...
- Connect to the internet. While you're setting up your device or smart TV, you might have already been asked to connect to your internet. ...
- Download, sign up, and sign in to streaming apps.
The quality and resolution of digitized audio is determined by two factors: the number of times per second the amplitude of the wave is measured (the sample rate) and the bit-depth used to record each measurement. Amplitude is measured or described in kilohertz (kHz).What is the role of the email server in the email communication process? ›
The receiving server accepts the message so that it can be delivered to the recipient. The recipient's email client retrieves the message using standards like the Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) to download the message so it can be read.What does a DSL modem send and receive digital data? ›
DSL is short for "digital subscriber line." This type of data connection uses phone lines to send and receive information.How do you upload a file to a website using HTML? ›
HTML allows you to add the file upload functionality to your website by adding a file upload button to your webpage with the help of the <input> tag. The <input type=”file”> defines a file-select field and a “Browse“ button for file uploads.How do I upload an index HTML file to my website? ›
Navigate to Remote Site panel and click on the public_html folder. Head to the Local Site panel and locate the extracted files. Select the files, right-click to upload them to the public_html directory.What is HTTP How do browser and server communicate using HTTP request and response? ›
- A client (a browser) sends an HTTP request to the web.
- A web server receives the request.
- The server runs an application to process the request.
- The server returns an HTTP response (output) to the browser.
- The client (the browser) receives the response.
A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.What are two types of topologies? ›
There are two types of network topology: physical and logical. Physical topology describes how network devices (called computers, stations, or nodes) are physically connected in a computer network.
Yes, GPS tracking works for missing laptops too. As long as you use the computer to surf the internet, you can track a stolen computer's location using its built-in tracking device, just as you would for a mobile device.Do laptops get stolen in college? ›
Are laptop thefts common in college? Yes! Laptops, tablets, jewelry, phones and entire backpacks are all popular to steal because they are quick to take even from one foot away as a person turns their head to chat to a person or takes a call and stops watching their property.Why should we recycle old computers? ›
Preserve natural resources: Recycling computers allows reuse of metals, plastic and glass among other items. The availability of this recycled material reduces demand for newly mined virgin material. This conserves these natural resources and reduces the need for mining and manufacturing brand new material.What are the 5 safety rules of the computer? ›
- Don't save your login information. ...
- Don't leave the computer unattended with sensitive information on the screen. ...
- Erase your tracks. ...
- Disable the feature that stores passwords. ...
- Delete your temporary Internet files and your history. ...
- Watch out for over-the-shoulder snoops.
The cabinets in your bathroom and linen closet are probably another place burglars will skip over. Try stashing your laptop under the bathroom sink (in an airtight bag, you know, just in case). We also love this idea from Frambwaze: “I used to hide my laptop wrapped in a bath towel in the middle of the pile…How can I block my stolen laptop? ›
- Open a browser, like Chrome. . ...
- Open your Google Account.
- In the "Security" section, find "Your devices." Select Manage devices.
- Select the lost phone, tablet, or Chromebook. ...
- Next to "Account Access," select Sign out.
Available laptop tracking software solutions require the laptop to be connected to internet which is usually in the form of Wi-Fi connection. Thus, it proves useless if there is no internet connection. The main objective of the offline laptop tracking system is to track a stolen laptop without making use of internet.Can a laptop be tracked after factory reset? ›
Unfortunately, no. If the thief erases your hard drive, or restores your computer to factory settings (using the manufacturer's factory restore procedure,) your computer can no longer be located. At present, the 'find my device' feature of Windows 10 is very limited.How do I lock my stolen HP laptop? ›
If your desktop, laptop, tablet, or Surface is lost or stolen, use Find my device to locate and lock it remotely. To find the lost device, it must be running Windows 10 and be signed in to your Microsoft account. You can also use Find my phone to find, locate, lock, and even erase your Windows Phone.How do you use screen mirroring? ›
How to Connect Your Mobile Device to Your TV Using Screen Mirroring
- Connect your device to the same Wi-Fi network as your Apple TV or AirPlay 2-compatible smart TV.
- Find the video that you want to stream.
- Tap AirPlay . ...
- Choose your Apple TV or AirPlay 2-compatible smart TV.
Open Control Center on your iPhone by swiping from the top-right corner of your screen. Tap the Screen Mirroring button which looks like two interlinked rectangles and choose your Apple TV or an AirPlay 2-enabled smart TV from the list. If an AirPlay passcode appears on the TV screen, enter the passcode on your iPhone.How we can convert an analog image into digital image? ›
We can convert analog image to digital image using sampling and quantization. The process of manipulating digital images with a computer is called as digital image processing. Pixel: In a digital image, all the coordinates on 2-d function and the corresponding values are finite.How spatial resolution of a digitized image is different from brightness resolution explain? ›
If we increase the brightness of an image, then the brightness of each pixel increase by the same amount. Similarly, when brightness is decreased, the brightness of each pixel is decreased by the same amount. Brightness is different from contrast. The brightness of the image does not define the quality of the image.What is a digital image pixel? ›
A: In digital imaging, a pixel(or picture element) is the smallest item of information in an image. Pixels are arranged in a 2-dimensional grid, represented using squares. Each pixel is a sample of an original image, where more samples typically provide more-accurate representations of the original.Does a smart TV need an antenna for local channels? ›
Do I need a TV antenna with a smart TV? Smart TVs are connected to the internet and provide a number of free streaming options. But if you want free over-the-air local channels then you need a TV antenna to watch them.How can I stream TV without internet? ›
Use an Android to HDMI connector (Android)
All you'll need to do is to plug the USB cable into your phone and plug the HDMI end into the HDMI plug on your smart TV. That way, you can cast your phone to a TV without a WiFi connection. Also, you can use your mobile data to view other streaming apps.
Staying informed on the news in your area is viewed as a public right, and that's why all of your local TV news channels are available to watch totally free with an antenna. With an antenna, you'll be able to watch dozens of channels that you might not have even realized you have free access to.Who owned Bell Labs? ›
Bell Laboratories, formerly AT&T Bell Laboratories, Inc., byname Bell Labs, in full Nokia Bell Labs, the longtime research-and-development arm of the American Telephone and Telegraph Company (AT&T). It is now part of the Finnish telecommunications company Nokia.What was developed at Bell Labs? ›
The achievements of the Bell Labs researchers have been recognized by nine Nobel prizes and four Turing awards, the best-known inventions being the transistor, laser, charged-coupled device and photovoltaic cell. Bell Labs was the birthplace of information theory, the UNIX operating system and C programming language.
A Plan 9 server is an agent that provides one or more hierarchical file systems -- file trees -- that may be accessed by Plan 9 processes. A server responds to requests by clients to navigate the hierarchy, and to create, remove, read, and write files.Who made UNIX? ›
Dennis Ritchie and Ken Thompson's creation of the UNIX operating system and the C programming language were pivotal developments in the progress of computer science. Today, 50 years after its beginnings, UNIX and UNIX-like systems continue to run machinery from supercomputers to smartphones.What is the history of transistor? ›
The first transistor was successfully demonstrated on December 23, 1947, at Bell Laboratories in Murray Hill, New Jersey. Bell Labs is the research arm of American Telephone and Telegraph (AT&T). The three individuals credited with the invention of the transistor were William Shockley, John Bardeen and Walter Brattain.What went wrong with Bell Labs? ›
Bell Labs Notable Controversies
While the company was seen to be innovative and mostly benevolent toward society, the monopoly it held in the telephone industry created an unfair market for anyone not in the company. The company was forced to split into seven different regional companies.
AT&T Laboratories, Inc.
It was founded in 1925 as Bell Telephone Laboratories, Inc., following the merger of the research & development divisions of American Telephone & Telegraph and Western Electric. AT&T Laboratories, Inc. AT&T Labs logo, 1999-2005. Formerly. Bell Telephone Laboratories, Inc.
Bell Labs is a modern incarnation of AT&T Bell Laboratories that provides research and development in the telecom industry and beyond.How many people work at Bell Labs? ›
Bell Laboratories is a medium manufacturing company with 375 employees and an annual revenue of $100.0M that is headquartered in Madison, WI. To excellence in customer service and to conduct our business with the highest integrity.Does Bellcore still exist? ›
Known as Bellcore after its establishment in the United States in 1983 as part of the break-up of the Bell System, the company's name changed to Telcordia Technologies after a change of ownership in 1996. The business was acquired by Ericsson in 2012, then restructured and rebranded as iconectiv in 2013.When did Nokia buy Bell Labs? ›
On April 15, 2015, Nokia agreed to acquire Alcatel-Lucent, Bell Labs' parent company, in a share exchange worth $16.6 billion. Their first day of combined operations was January 14, 2016.Why was Bell Labs so successful? ›
In its heyday from the 1940s to the 1970s, a Bell Labs job was said to be just like working at a research university, except the pay was better, the equipment was more up-to-date, the machine shop was available for all your needs and you didn't have to spend time teaching or applying for research grants.
Stroustrup's C++ built upon the C programming language, developed by Dennis Ritchie at Bell Labs. Bjarne Stroustrup joined the 1127 Computing Science Research Center of AT&T Bell Laboratories in 1979.How big was the Bell System? ›
At the time of the breakup of the Bell System in the early 1980s, it had assets of $150 billion (equivalent to $390 billion in 2021) and employed over one million people.