Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (61)
_____ are tools that track the memory usage, status, and errors of currently running software. (530506)
D:Process managers
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. (530494)
C:digital rights management
_____ is the process of creating programs and apps from the idea stage to distribution to users. (530520)
A:Software development
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. (530493)
C:Installation
_____ are new releases of an app and may require an additional fee before you can install them. (530497)
C:Upgrades
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. (516383)
B:Intellectual property
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? (530489)
A:Require users to identify themselves using biometrics or passwords.
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? (530530)
B:Agile development
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? (530518)
B:incomplete documentation
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? (516380)
D:Restorers
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? (530508)
C:Site License
At what point are you responsible for following the terms in a software license agreement? (530501)
C:when you click or take another action to accept the terms
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? (530512)
C:Project manager
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. (516413)
C:wireframes
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? (530519)
B:Support and security phase
During which phase of the SDLC is software tested to make sure each function works as intended? (530517)
Incorrect
- C:analysis
Incorrect - D:Implementation
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? (530491)
B:App Store for iOS
File transfer programs belong in what software category? (530525)
Incorrect - D:File, disk, and system management
Incorrect
- A:Productivity (business and personal)
In which category of software do Microsoft Office Word and Excel belong? (516403)
A:Productivity
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? (530528)
B:Analysis phase
Is it advisable to enable automatic updates on security software? (530527)
A:Yes; this helps to catch and quarantine new malware before it harms the computer.
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? (530500)
A:a crash
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? (516385)
C:Digital Rights Management
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? (530511)
A. integrated development environment (IDE)
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? (530492)
B:open source
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? (530532)
C:Tester
The set of activities performed to build a program is called the _____. (530514)
B:software development life cycle (SDLC)
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? (530509)
A:Service pack
What area of software development focuses on the user's reaction to and interaction with the software product? (530529)
B:User experience
What can you do to make sure you are not contributing to software piracy? (530504)
D:Buy software only from legitimate resellers or directly from the manufacturer.
What defines the behavior of an object in object-oriented programming ? (516392)
C:Method
What do you call the rules each programming language has for writing instructions? (530536)
C:syntax
What is the goal of a DevOps methodology? (530515)
C:to produce programs quickly and then offer continuous updates.
What kind of software products can you download from the Internet without being subjected to copyright restrictions? (530488)
A:Public domain software
What type of program would have a class named Student with objects called fullTime and partTime? (530526)
B:object-oriented program
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? (530524)
B:Antispyware
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? (530523)
C:firewall
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? (516391)
D:Patch finders
Which commonly used programming language isused to manage, access, and search for database content? (516408)
C:SQL
Which of the following does a software license usually specify? (530498)
A:number of people authorized to use the software
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? (530490)
A:Piracy
Which of the following is an example of an object-oriented programming language? (530522)
B:Java
Which of the following is not a general guideline for developers? (530513)
D:Start programming before creating a proposal.
Which of the following programming languages adds interactivity to websites? (530535)
B:JavaScript
Which of the following tools translates the source code of a procedural program into binary code? (530533)
B:compiler
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? (516409)
C:Interpreters
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? (530510)
D:waterfall method
Which software development method uses highly skilled programmers to shorten the development process while producing quality software? (530516)
A:Rapid Application development model
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? (530534)
D:Fourth generation language
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? (530503)
A:Shareware
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? (530502)
B:freeware
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? (530505)
A:Visit the manufacturer's website and install the latest updates for the app.
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? (530496)
B:An uninstaller removes the program files and any associated entries in the system files.
A class is a type of object that defines the format of the object and the actions it can perform. (530531)
True
A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions. (516363)
True
Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load. (530495)
True
Cloud backup software periodically saves your files and settings to an external hard drive. (530521)
False
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. (516371)
True
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. (530499)
True
Programmers use compilers to test code to find errors and provide suggestions to fix them. (530537)
False
When you create an app, you are protected under copyright laws, even before you apply for a copyright. (530507)
True
Recommended textbook solutionsComputer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
C++ Programming: From Problem Analysis to Program Design
5th EditionD. S. Malik
708 solutions
Java How to Program, Early Objects
9th EditionHarvey M. Deitel, Paul J. Deitel
323 solutions
Sets with similar termsClass Exercise 13
20 terms
darr_kristy
Exam 13
30 terms
Testeric
Management Information Systems: Software Terms
33 terms
Viggianoi
Ch. 13 Intro to Data Processing (Programming & Lan…
58 terms
jmlandolt
Sets found in the same folderModule 10 Computer Concepts Exam
51 terms
pariwils1
Module 4 Computer Concepts Exam
70 terms
pariwils1
Module 6 Computer Concepts Exam
39 terms
pariwils1
Computer Concept Module 9
44 terms
MackMarr
Other sets by this creator10908 ECN201 Microeconomic Principles
208 terms
Pepepepepepepepepepo
Computer Concepts Module 14
22 terms
Pepepepepepepepepepo
Computer Concepts Module 12
23 terms
Pepepepepepepepepepo
Computer Concepts Module 9
44 terms
Pepepepepepepepepepo
Verified questionsCOMPUTER SCIENCE
Use the binary search algorithm to decide whether 35 is in the following list: 3, 6, 7, 9, 12, 14, 18, 21, 22, 31, 43.
Verified answer
COMPUTER SCIENCE
Which of the following is not a Python data type? a) int b) float c) rational d) string
Verified answer
COMPUTER SCIENCE
The largest element in a heap resides in which node? a. the root, b. the leftmost leaf in the tree, c. the rightmost leaf on the bottom level, d. any leaf, e. any node in the tree.
Verified answer
COMPUTER SCIENCE
You have devised a new page-replacement algorithm that you think may be optimal. In some contorted test cases, Belady’s anomaly occurs. Is the new algorithm optimal? Explain your answer.
Verified answer
Other Quizlet setsCh. 12 Transport Across Cell Membranes pt. 1
41 terms
willwmac
Nematodes - Strongyloidea
23 terms
KirstenWeir
Macro ch.14 hw
75 terms
india_clark3
Related questionsQUESTION
This control entails verifying that the proper number of bits are set to the value 1 in each character received.
11 answers
QUESTION
Which management notice will be produced because of issue processing and reflects issue, kill, or backorder quantity notice?
2 answers
QUESTION
* (True or False) A domain is a set of values for which a program performs non-identical computations
2 answers
QUESTION
Outline reasons that many software developers do not pay enough attention to requirements engineering.
15 answers