Which kind of program attempts to locate a file on your computer or mobile device based on criteria you specify?
B. search tool
Which of the following is a collection of individual programs sold as a unit?
C. search suite
When using spreadsheet software like the kind in the accompanying figure, what are the rows and columns collectively called?
D. worksheet
Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?
C. word processing
Which of the following kinds of software provides the capabilities of paint software and also includes the ability to enhance and modify existing images and pictures?
C. image editing
Which of the following kinds of file utilities shrink the size of a file(s)?
C. file compression
Which of the following tools searches for and removes unnecessary files?
C. disk cleanup
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service?
D. adware
Which of the following kinds of players is a program that allows you to view images and animation, listen to audio, and watch video files on your computer?
B. media
Which kind of software can be distributed by anyone to others at no cost?
A. public-domain
Which of the following is a collection of electronic drawings, photos, and other images that can be inserted into documents?
A. clip art
In the accompanying figure, 12 point and 28 point are measurements of which of the following?
B. font size
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?
B. value
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
B. DTP
Which the following is a filtering program that stops pop-up ads from displaying on web pages?
B. pop-up blocker
Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper?
D. paint
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
B. CAD
Which of the following kinds of software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user?
C. document managament
Which of the following is an example of a photo sharing app?
B. Instagram
Which of the following kinds of software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook?
D. note taking
Which of the following kinds of software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group?
C. presentation
In the event a backup file is used, which kind of program reverses the process and returns backed up files to their original form?
D. restore
Which of the following warns that the computer is infected and needs immediate attention?
B. virus hoax
Which of the following increases or decreases how crisp the objects in a photo appear?
D. sharpness
Which of the following adjusts the difference in appearance between light and dark areas of a photo?
D. contrast
What kind of application teaches a particular skill?
D. educational
Which of the following kinds of software allows users to modify a segment of a video, called a clip?
B. video editing
A single point as shown in the accompanying figure is about what fraction of an inch in height?
a.1/9
b.1/18
c.1/36
d.1/72d. 1/72
Which of the following (with examples such as the bold, italic, and underline shown in the accompanying figure) adds emphasis to a font?
B. font style
Which of the following is a request for specific data from a database?
C. query
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
A. phishing
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox?
A. anti-spam
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
C. website authoring
Which of the following is a utility that detects and protects a computer from unauthorized intrusions?
A. personal firewall
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
a.CBT
b.CAD
c.WBT
d.DTPd. DTP
Which of the following kinds of software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs?
a.DTP
b.CBT
c.CAD
d.WBTc. CAD
Which of the following kinds of malware is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services?
a.worm
b.trojan horse
c.rootkit
d.toll fraudd. toll fraud
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
a.QR code
b.bar code
c.ISBN code
d.USPS codea. QR code
Which kind of program attempts to locate a file on your computer or mobile device based on criteria you specify?
a.file finder
b.file manager
c.image viewer
d.search toold. search tool
Which of the following is a utility that allows users to display, copy, and print the contents of a graphics file?
a.JPEG utility
b.PNG player
c.graphics manager
d.image viewerd. image viewer
Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
a.convenience
b.lifestyle
c.geography-based
d.educationb. lifestyle
What kind of software assists in the preparation of a will, for example?
a.tax
b.financial
c.legal
d.document managementc. legal
Which of the following performs calculations on the data in a worksheet like the one in the accompanying figure and displays the resulting value in a cell?
a.index
b.formula
c.function
d.ratiob. formula
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
a.operating
b.utility
c.application
d.systemc. application
What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like?
a.multimedia authoring
b.image editing
c.professional desktop publishing
d.color libraryb. image editing
Which of the following is a utility that removes a program, as well as any associated entries in the system files?
a.application purger
b.application remover
c.uninstaller
d.antiapp utilityc. uninstaller
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
a.multimedia publishing
b.multimedia editing
c.multimedia management
d.multimedia authoringd. multimedia authoring
As shown in the accompanying figure, which of the following kinds of program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files?
B. antivirus
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission?
a.hotspot
b.file conversion utility
c.file compression utility
d.virusd. virus
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?
D. cookie
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
D. 25
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
C. network
Which of the following terms means in a location separate from the computer site?
A. off-site
What is the term for a website that uses encryption techniques to protect its data?
C. secure site
Which of the following is a federally funded Internet security research and development center?
.Internet2A. CERT/CC
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
C. distributed
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
B. Caesar cipher
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
A. Electronic Communication Privacy Act
What type of program allows a user to copy or backup selected files?
Glossary | |
backup utility | Utility program that allows users to copy, or back up, selected files or an entire hard disk to another storage medium, such as another hard disk, optical disc, USB flash drive, or tape. |
booting | Process of starting or restarting a computer. |