Question
click below
click below
Question
Normal Size Small Size show me how
Block 2 Unit 3
Question | Answer |
---|---|
___ a generic term for organized collections of computer data and instructions that cause the computer hardware to perform specific operations | Software |
Software can be divided into two separate categories ___ and application. | Operating System |
Users generally (do/do not) interact directly with an OS. | Do not |
___ is designed to operate and control computer’s hardware and to provide a platform for running application software. | Operating System Software |
What does operating system software control, direct and keep track of? | OS software controls the operation of a computer, directs the input and output of data, keeps track of files, and controls the processing of computer programs |
Operating Systems provide ___ by preventing unauthorized access. | Security |
Which operating system coordinates the activities of multiple computers to keep the network running smoothly? | NOS |
A piece of software is considered ___ software if it initiates TCP connections. | Client |
A piece of software is considered ___ software if it listens to a TCP port for connections and accepts and services those connections. | Server |
A ___ is a combination of hardware and software that manages network resources. | Server |
A ___ server must divide its workload between its application work and its server work. | non-dedicated |
___ are programs or groups of programs designed for end users and help perform user tasks and allow users to interface with the computer. | Applications |
Microsoft Word is an example of a ____ application software. | Word processor |
___ simulate a paper worksheet in which, columns of numbers are summed for budgets and plans. | Spreadsheets |
What is a specific type of application software that is used to describe electronic media devices used to store and experience multimedia content? | Multimedia |
A characteristic of a ___ is that it facilitates simultaneous updates and queries for multiple users. | Database |
A fast, flexible, and reliable means to transmit messages over communications networks. | |
Software that gives the user an enormous amount of easy control over the information displayed. | Presentation Graphic Software |
Define Malware | Software designed to infiltrate or damage a computer system without the owner's informed consent. |
Viruses and worms are the best-known types of ___. | Malware |
Malware is not the same as... | Defective Software |
The primary purpose of a virus is to ___ itself as often as possible and thereby disrupts the operation of the infected computer or the program. | Reproduce |
A ___ virus is extremely dangerous. | Boot Sector |
File infectors operate in memory and usually infect ___, files. | executable, .com and .exe |
A common method of spreading a virus is through ___ services. | |
What is the most common symptom of virus infection in a network? | One or more workstations with erratic errors. |
___ is the process of preventing, detecting and response to unauthorized use of, or access to your computer. | Computer Security |
What does Prevention Measures do? | Help you stop unauthorized users from accessing any part of your computer screen. |
___ helps you to determine whether or not someone attempted to break into your system | Detection |
What is your system’s protection against viruses? | Anti-virus |
Anti-virus programs look at the contents of each file, searching for specific patterns called ___ | A Virus Signature |
What prevents spyware from collecting information about the user? | Anti-spyware |
What is the basic task of a firewall? | Inspect network traffic, denying or permitting passage based on a set of well-defined rules. |
Firewalls can be implemented in hardware only. True/False | False |