Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CTS 110 Ch 4 Program

CTS 110 Chapter 4 Programs and Apps

A program has been placed on your ________ without your knowledge and it is collecting personal information about you is referred to as spyware. computer device
_______ software is for those who need to manage new product development. Project management
_________ programs look for a specific pattern of virus code referred to as a viris signature. Antivirus
The ________ is used to organize the files and folders on your computer's drive. file manager
You may chose to ______ the size of a photo to be able to work with other applications. edit some photos from your summer vacation, compress
In a __________ program, data is organized as rows and columns collectively called a worksheet spreadsheet
________ _______ store and index information about a file, including its name, date created, and author name search utility
_______________ is a technique to ensure software is not installed on more computers than legally licensed product activation
a value is a number that can be used in a ______. calculation
________ application are used to teach a particular skill. educational
Adobe Reader allows you to view a __________ file pdf
______________ software allows users to combine text, graphics, audio, video, and animation into an interactive application. website authoring
Using ________ software can your parents use to create a will without visiting an attorney? legal
The purchase of a ________ often includes photo editing software . digital camera
You'd use a search tool to find a file on your computer or mobile device based on ____________ you specify. criteria
Paint allows users to draw pictures, shapes, and other graphical ______ with various on-screen tools such as a pen, brush, and eyedropper? images
___________ software can be distributed by anyone to others at no cost. public-domain
You'd use ___________ to make users more productive. application software
______ is a collection of data organized in a manner that allows access, retrieval, and use of that data. database
__________ is a collection of electronic drawings, photos, and other images that can be inserted into documents clip-art
A software ____________ is a collection of individual programs sold as a unit and designed to work together. suite
_____________ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information. phishing
Image viewer is a _______ program that allows users to display, copy, and print the contents of a graphics file. utility
A person ___________ is a utility that detects and protects a computer from unauthorized intrusions. firewall
Media _____ is a program that allows you to view images and animation, listen to audio, and watch video files on your computer? player
__________ is an online advertisement in a banner or pop-up window on webpages, email, or other Internet service adware
___________ allows users to create and manipulate documents containing mostly text and sometimes graphics. word processing
__________ enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook. note taking
Professional designers typically use ________ software to create sophisticated documents that contain text, graphics, and many color Desktop Publishing (DTP)
________ are used to perform calculations on the data in a worksheet. formulas
_____ programs allow designers to rotate designs of 3-D objects to view them from any angle. Computer Aided Design (CAD)
A _____ is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network. worm
A _________ program that hides in a computer and allows someone from a remote location to take full control of the computer? rootkit
Disk ________ is a tool that searches for and removes unnecessary files. cleanup
Users of ____ skill levels can use web page authoring software. all
File manager is a _____ to organize a variety of files and folders. tool
De-fragmenting a computer's hard-drive can ______ performance by storing all related files for a particular program together increase
Disk ______ software can be used to back up the contents of your hard disk on a series of rewritable DVDs. burning
_________ software include the visual aids to communicate ideas messages to a group. Presentation
When you ______ you make sure that both the mobile aps (such as calendar) reflect the most current information from other devices. sync
Created by: galvanl