Application software serves as the interface between the user , the apps, and the computer’s or mobile device’s hardware. T/F
The operating system serves as the interface between the user, the apps, and the computer or mobile device’s hardware.
Each time you start a computer or mobile device, the system software is loaded from storage into memory. T/F
Each time you start a computer or mobile device, the operating system is loaded (copied) from the computer’s hard disk or mobile device’s storage media into memory
Open source software is mass-produced , copyrighted software that meets the needs of a wide variety of users. T/F
RETAIL SOFTWARE is mass-produced , copyrighted software that meets the needs of a wide variety of users.
Open source software is provided for use, modification, and redistribution. This software has no restrictions from the copyright holder regarding modification of softwared internal instructions and its redistribution.
Two main advantages:
-users who modify the software share their improvements with others, and customers can personalize the software to meet their needs.
When downloading shareware, freeware, or public domain software, it is good practice to seek websites with ratings for and reviews of products.
While a computer or mobile device is running, the operating system remains in memory. T/F
With database software, users run functions to retrieve data. T/F
Users run QUERIES to retrieve data.
Software suites offer three major advantages: lower cost, ease of use, and integration. T/F
A PDF file can be viewed and printed without the software that created the original document. T/F
The military and airlines might use CBT simulations to train pilots to fly in various conditions and environments.
An antivirus program automatically deletes quarantined files. T/F
Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures that other files will not be infected. Quarantined files remain on your computer or mobile device until you delete them or restore them.
One of the fastest growing threats in mobile apps is toll fraud malware. T/F
It is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services.
Cookies are typically considered a type of spyware. T/F
Cookies are not considered spyware because website programmers do not attempt to conceal the cookies.
Programs called _____enable you to perform maintenance- type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
tools or utilities
_____ software performs functions specific to a business or industry.
A(n)____ is the right to use a program of app.
_____ software is an application that allows users to organize data in rows and columns and perform calculations on the data.
____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
Computer aided design (CAD) software.
The term ____ refers to decreasing a photo’s file size.
A ____ is a destructive program disguised as a real program
ex. screen saver
A(n) ____ is a known, specific pattern of virus code.
virus signature aka virus definition
a destructive event or prank a virus was created to deliver.
copyrighted software that is distributed at no cost for a trial period
malware that resides in active memory and replicated itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system
program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
software provided for use, modification , and redistribution that has no restrictions from the copyright holder regarding modification of the software
open source software
process of reorganizing hard disk’s files so that the files are stored in contiguous sectors
malware that can hide and allow someone to take full control of a computer from a remote location
scam in which a perpetrator sends an official looking email message that attempts to obtain personal and or financial information
square shaped coded graphic that corresponds to a web address or other information
separate area of a hard disk that holds an infected file until the infection can be removed
Need essay sample on "CIM 1 Chapter 4"? We will write a custom essay sample specifically for you for only $ 13.90/page