logo image

CIM 1 Chapter 4

Application software serves as the interface between the user , the apps, and the computer’s or mobile device’s hardware. T/F
False.
The operating system serves as the interface between the user, the apps, and the computer or mobile device’s hardware.
Each time you start a computer or mobile device, the system software is loaded from storage into memory. T/F
True?

Each time you start a computer or mobile device, the operating system is loaded (copied) from the computer’s hard disk or mobile device’s storage media into memory

Open source software is mass-produced , copyrighted software that meets the needs of a wide variety of users. T/F
False

RETAIL SOFTWARE is mass-produced , copyrighted software that meets the needs of a wide variety of users.

Open source software is provided for use, modification, and redistribution. This software has no restrictions from the copyright holder regarding modification of softwared internal instructions and its redistribution.
Two main advantages:
-users who modify the software share their improvements with others, and customers can personalize the software to meet their needs.

When downloading shareware, freeware, or public domain software, it is good practice to seek websites with ratings for and reviews of products.
True.
While a computer or mobile device is running, the operating system remains in memory. T/F
True
With database software, users run functions to retrieve data. T/F
False.
Users run QUERIES to retrieve data.
Software suites offer three major advantages: lower cost, ease of use, and integration. T/F
True
A PDF file can be viewed and printed without the software that created the original document. T/F
True.
The military and airlines might use CBT simulations to train pilots to fly in various conditions and environments.
True.
An antivirus program automatically deletes quarantined files. T/F
False.
Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures that other files will not be infected. Quarantined files remain on your computer or mobile device until you delete them or restore them.
One of the fastest growing threats in mobile apps is toll fraud malware. T/F
True.

It is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services.

Cookies are typically considered a type of spyware. T/F
False.
Cookies are not considered spyware because website programmers do not attempt to conceal the cookies.
Programs called _____enable you to perform maintenance- type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
tools or utilities
_____ software performs functions specific to a business or industry.
custom software
A(n)____ is the right to use a program of app.
license agreement
_____ software is an application that allows users to organize data in rows and columns and perform calculations on the data.
spreadsheet.
____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
Computer aided design (CAD) software.
The term ____ refers to decreasing a photo’s file size.
compress
A ____ is a destructive program disguised as a real program
trojan horse
ex. screen saver
A(n) ____ is a known, specific pattern of virus code.
virus signature aka virus definition
a destructive event or prank a virus was created to deliver.
payload
copyrighted software that is distributed at no cost for a trial period
shareware
malware that resides in active memory and replicated itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system
worm
program that enables you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
tools
software provided for use, modification , and redistribution that has no restrictions from the copyright holder regarding modification of the software
open source software
process of reorganizing hard disk’s files so that the files are stored in contiguous sectors
defragmenting
malware that can hide and allow someone to take full control of a computer from a remote location
rootkit
scam in which a perpetrator sends an official looking email message that attempts to obtain personal and or financial information
phishing
square shaped coded graphic that corresponds to a web address or other information
QR code
separate area of a hard disk that holds an infected file until the infection can be removed
quarantine

Need essay sample on "CIM 1 Chapter 4"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy