What type of software monitors all incoming and outgoing traffic for your computer and block suspicious activity?

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (61)

_____ are tools that track the memory usage, status, and errors of currently running software. (530506)

D:Process managers

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. (530494)

C:digital rights management

_____ is the process of creating programs and apps from the idea stage to distribution to users. (530520)

A:Software development

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. (530493)

C:Installation

_____ are new releases of an app and may require an additional fee before you can install them. (530497)

C:Upgrades

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. (516383)

B:Intellectual property

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? (530489)

A:Require users to identify themselves using biometrics or passwords.

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? (530530)

B:Agile development

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? (530518)

B:incomplete documentation

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? (516380)

D:Restorers

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? (530508)

C:Site License

At what point are you responsible for following the terms in a software license agreement? (530501)

C:when you click or take another action to accept the terms

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? (530512)

C:Project manager

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. (516413)

C:wireframes

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? (530519)

B:Support and security phase

During which phase of the SDLC is software tested to make sure each function works as intended? (530517)

Incorrect - C:analysis
Incorrect - D:Implementation

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? (530491)

B:App Store for iOS

File transfer programs belong in what software category? (530525)

Incorrect - D:File, disk, and system management
Incorrect - A:Productivity (business and personal)

In which category of software do Microsoft Office Word and Excel belong? (516403)

A:Productivity

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? (530528)

B:Analysis phase

Is it advisable to enable automatic updates on security software? (530527)

A:Yes; this helps to catch and quarantine new malware before it harms the computer.

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? (530500)

A:a crash

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? (516385)

C:Digital Rights Management

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? (530511)

A. integrated development environment (IDE)

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? (530492)

B:open source

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? (530532)

C:Tester

The set of activities performed to build a program is called the _____. (530514)

B:software development life cycle (SDLC)

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? (530509)

A:Service pack

What area of software development focuses on the user's reaction to and interaction with the software product? (530529)

B:User experience

What can you do to make sure you are not contributing to software piracy? (530504)

D:Buy software only from legitimate resellers or directly from the manufacturer.

What defines the behavior of an object in object-oriented programming ? (516392)

C:Method

What do you call the rules each programming language has for writing instructions? (530536)

C:syntax

What is the goal of a DevOps methodology? (530515)

C:to produce programs quickly and then offer continuous updates.

What kind of software products can you download from the Internet without being subjected to copyright restrictions? (530488)

A:Public domain software

What type of program would have a class named Student with objects called fullTime and partTime? (530526)

B:object-oriented program

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? (530524)

B:Antispyware

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? (530523)

C:firewall

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? (516391)

D:Patch finders

Which commonly used programming language isused to manage, access, and search for database content? (516408)

C:SQL

Which of the following does a software license usually specify? (530498)

A:number of people authorized to use the software

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? (530490)

A:Piracy

Which of the following is an example of an object-oriented programming language? (530522)

B:Java

Which of the following is not a general guideline for developers? (530513)

D:Start programming before creating a proposal.

Which of the following programming languages adds interactivity to websites? (530535)

B:JavaScript

Which of the following tools translates the source code of a procedural program into binary code? (530533)

B:compiler

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? (516409)

C:Interpreters

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? (530510)

D:waterfall method

Which software development method uses highly skilled programmers to shorten the development process while producing quality software? (530516)

A:Rapid Application development model

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? (530534)

D:Fourth generation language

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? (530503)

A:Shareware

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? (530502)

B:freeware

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? (530505)

A:Visit the manufacturer's website and install the latest updates for the app.

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? (530496)

B:An uninstaller removes the program files and any associated entries in the system files.

A class is a type of object that defines the format of the object and the actions it can perform. (530531)

True

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions. (516363)

True

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load. (530495)

True

Cloud backup software periodically saves your files and settings to an external hard drive. (530521)

False

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. (516371)

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. (530499)

True

Programmers use compilers to test code to find errors and provide suggestions to fix them. (530537)

False

When you create an app, you are protected under copyright laws, even before you apply for a copyright. (530507)

True

Recommended textbook solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

C++ Programming: From Problem Analysis to Program Design

5th EditionD. S. Malik

708 solutions

Java How to Program, Early Objects

9th EditionHarvey M. Deitel, Paul J. Deitel

323 solutions

Sets with similar terms

Class Exercise 13

20 terms

darr_kristy

Exam 13

30 terms

Testeric

Management Information Systems: Software Terms

33 terms

Viggianoi

Ch. 13 Intro to Data Processing (Programming & Lan…

58 terms

jmlandolt

Sets found in the same folder

Module 10 Computer Concepts Exam

51 terms

pariwils1

Module 4 Computer Concepts Exam

70 terms

pariwils1

Module 6 Computer Concepts Exam

39 terms

pariwils1

Computer Concept Module 9

44 terms

MackMarr

Other sets by this creator

10908 ECN201 Microeconomic Principles

208 terms

Pepepepepepepepepepo

Computer Concepts Module 14

22 terms

Pepepepepepepepepepo

Computer Concepts Module 12

23 terms

Pepepepepepepepepepo

Computer Concepts Module 9

44 terms

Pepepepepepepepepepo

Verified questions

COMPUTER SCIENCE

Use the binary search algorithm to decide whether 35 is in the following list: 3, 6, 7, 9, 12, 14, 18, 21, 22, 31, 43.

Verified answer

COMPUTER SCIENCE

Which of the following is not a Python data type? a) int b) float c) rational d) string

Verified answer

COMPUTER SCIENCE

The largest element in a heap resides in which node? a. the root, b. the leftmost leaf in the tree, c. the rightmost leaf on the bottom level, d. any leaf, e. any node in the tree.

Verified answer

COMPUTER SCIENCE

You have devised a new page-replacement algorithm that you think may be optimal. In some contorted test cases, Belady’s anomaly occurs. Is the new algorithm optimal? Explain your answer.

Verified answer

Other Quizlet sets

Ch. 12 Transport Across Cell Membranes pt. 1

41 terms

willwmac

Nematodes - Strongyloidea

23 terms

KirstenWeir

Macro ch.14 hw

75 terms

india_clark3

Related questions

QUESTION

This control entails verifying that the proper number of bits are set to the value 1 in each character received.

11 answers

QUESTION

Which management notice will be produced because of issue processing and reflects issue, kill, or backorder quantity notice?

2 answers

QUESTION

* (True or False) A domain is a set of values for which a program performs non-identical computations

2 answers

QUESTION

Outline reasons that many software developers do not pay enough attention to requirements engineering.

15 answers

What type of software monitors all incoming and outgoing traffic?

A firewall is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to identify and block threats.

What type of security software prevents detects and removes malware?

Antivirus software is a class of program designed to prevent, detect and remove malware infections on individual computing devices, networks and IT systems.

Which type of software is copyrighted and distributed for free for a trial period and then requires you to send payment to continue using the program?

Shareware is commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software. You might see shareware in formats that paywall advanced features or offer the full package for a limited time.

What can you do to make sure you're not contributing to software piracy?

How To Prevent External Software Piracy.
Use license keys. ... .
Have a demo or (unlimited) free trial. ... .
Submit a DMCA request to search engines. ... .
Use DRM (Digital Rights Management) ... .
Update/Patch your product regularly. ... .
Require online verification for software usage. ... .
Use tamper proofing. ... .
Maintain open communication with your users..

Toplist

Neuester Beitrag

Stichworte