Exam 3: Computer Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ applications are software that is designed to reside on a computer's hard disk.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

The term rootkit refers to ____.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

To steal passwords a Trojan horse uses a ____________________.

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

keylogger

  In the figure above, the box with a B represents the ____. In the figure above, the box with a B represents the ____.

(Multiple Choice)
4.9/5
(43)

An example of number-crunching software includes ____.

(Multiple Choice)
4.8/5
(36)

A virus signature is ____.

(Multiple Choice)
4.7/5
(39)

A s oftware license defines the ways you may use a computer program.

(True/False)
4.8/5
(34)

Case-Based Critical Thinking Questions Case 3-2 Tom owns a small company and is purchasing a software license for his company. He originally had to purchase a copy of each piece of software for each of his employees. However, one of his friends told him there were other types of license agreements. Tom has come to you and asked for help in deciding what kind of license is right for his company. Tom's company runs a morning and a night shift. He has 6 employees using a statistic software, 3 work on the morning shift and 3 on the evening shift. He wants to know if there is a software license that will allow him to only purchase 3 copies. You advise him to buy a ____ license.

(Multiple Choice)
4.9/5
(40)

Case-Based Critical Thinking Questions Case 3-3 At the ACME Widget Company the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed their computer was beginning to run very slow and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. ACME Widget Company is concerned it may have a ____ which is a self-replicating program designed to carry out some unauthorized activity on a victim's computer.

(Multiple Choice)
4.8/5
(32)

When you update your computer, it overrides the existing program files.

(True/False)
4.8/5
(40)

A virus signature is a digitally signed certificate that certifies the file is virus free.

(True/False)
4.8/5
(34)

In order to find a particular record or group of records in a database you use a ____.

(Multiple Choice)
4.9/5
(42)

  In the figure above, the box with a B indicates ____. In the figure above, the box with a B indicates ____.

(Multiple Choice)
4.9/5
(34)

It is illegal to do all the following expect ____.

(Multiple Choice)
4.8/5
(29)

CD ripper software is designed to pull a track off an audio CD and store it in an encoded format.

(True/False)
4.9/5
(37)

Desktop widgets include all of the following except ____.

(Multiple Choice)
4.8/5
(38)

If you are installing a local application from a distribution CD and it does not automatically run, you should ____.

(Multiple Choice)
4.7/5
(42)

A collection of software applications sold as a single package is called a software ____________________.

(Short Answer)
4.8/5
(37)

You may purchase third party utility programs but they are really a waste of money. All the needed utility programs come preloaded.

(True/False)
4.7/5
(39)

A group of utility programs that can help you recover files include ____.

(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 139
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)