Name___________________ Date__________
Multiple choice / True or False
____1. Software publishers offer a huge variety of products for personal computer owners. From which of the following categories does the typical computer owner purchase add-on software?
A. System software and operating systems
B. Application software and utilities
C. Device drivers and application software
D. System software and antivirus software
____2. System software is designed to accomplish ____ tasks.
a.
real-world
c.
only gaming
b.
computer-centric
d.
only operating system ____3. The two main categories of software are application software and system software.
TRUE FALSE …show more content…
____4.
Location-based software can pinpoint its location by using the device’s built-in GPS or by triangulating the distance from nearby cell towers.
TRUE FALSE
____5. Screen readers are an example of adaptive utility software.
TRUE FALSE
____6. The software you install to help a printer communicate with a computer is called a device driver.
TRUE FALSE ____7. A EULA is a license agreement that specifies how to legally use a software product
.
TRUE FALSE ____8. .3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.
a.
stereoscopes
c.
wireframes
b.
prototypes
d.
photos ____9. Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.
a.
word processing
c.
Web authoring
b.
desktop publishing
d.
spreadsheet ____10. The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
a.
settings set
c.
utility
b.
execution
d.
config ____11. The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
a.
settings set
c.
utility
b.
execution
d.
config ____12. Just about everyone has used iTunes software to download music. iTunes software also allows you to list the songs you’ve downloaded, delete songs, find songs, and organize your music into play lists. These features of iTunes are similar to what type of software?
a. Word processing software
b. Spreadsheet software
c. Database software
d. Groupware
____13. Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document.
a.
placement
c.
format
b.
wrap
d.
authoring ____14. To find a particular record or group of records in a database, you use a(n) ____.
a.
find
c.
inquiry
b.
query
d.
search ____15. Web applications are ____.
a.
installed locally and run on the Web
c.
installed on the Web and run locally
b.
accessed and run on the Web
d.
all of the above ____16. iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.
a.
protocol breach
c.
android
b.
factory reset
d.
jailbreak ____17. Portable software is ____.
a.
lighter than local software
c.
designed to run from removable storage
b.
licensed only for portable devices
d.
designed to run on portable devices ____18. A service pack ____.
a.
unlocks computer services
b.
requires a service call to a technician
c.
provides updates to the operating system
d.
repairs and fixes the hardware
____19. Indicators of pirated software include all of the following EXCEPT software that ____.
a.
is marked as an “academic” product, but not purchased through an authorized dealer
b.
is downloaded
c.
has photocopied software manuals
d.
has CD-ROMs with handwritten labels ____20. . ____ is typically available as a trial version.
a.
Freeware
c.
Demoware
b.
Open source software
d.
Shareware ____21. During product activation, you must ____.
a.
run the program
c.
enter a product key
b.
create a password
d.
none of the above ____ 22. Product activation can create a ____ based on your validation code and your computer’s internal serial number.
a.
Trojan horse
c.
hash value
b.
blueprint
d.
hash brown ____23. A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.
a.
virus
c.
Trojan horse
b.
worm
d.
bot ____24. The term rootkit refers to ____.
a.
a program that repairs the computer’s hardware core
b.
a program that repairs the kernel
c.
software tools used to conceal malware and backdoors
d.
software tools used to conceal security tools _____25. A virus signature is a ____.
a.
type of utility that looks for and eradicates viruses
b.
unique series of instructions to defend against malicious code
c.
section of program code used to identify a known malicious program
d.
the personal identifier of the author of the virus