Description of this paper





Question;Which type of software alters a devices user interface to;aid individuals with physical challenges, by creating as accessible environment;by providing closed captions, text-to-speech, speech-to-text, or large screen;text?;Adaptive Utilities;Compilers;Desktop Publishing;Groupware;Spreadsheet;Question 2. Question;Which are the two main classes;of software?;Compilers and Utilities;Productivity and Games;System and Application;System and Network;Utilities and Application;Question 3. Question;Which type of application;software are Microsoft Excel, Lotus 123, and OpenOffice Calc?;Database;Presentation Software;Spreadsheet;Word Processor;Web Browser;Question 4. Question;In database terminology, which;term refers to all of the data for a specific, single entity - a person, place;thing or event?;Database;Field;Form;Query;Record;Question 5. Question;Which term refers to placing a;program into a computer so it can be run on?;Downloading;Installation;Jail Breaking;Rooting;Uploading;Question 6. Question;Which type of file is designed;to be started by the user or automatically launched by an operating system?;Assembler File;Configuration File;Data File;Executable File (Exe);Object File;Question 7. Question;Which is the official term for;software which has been illegally copied, distributed, or modified?;Cracked Software;Freeware;Highjacked Software;Gasparillaware;Pirated Software;Question 8. Question;Which type of software license;allows the software to be used on all computers at a specified location?;Multiple-User License;Shrink Wrap License;Single User License;Site License;Unlimited Local License;Question 9. Question;Which software tool is used to;conceal malware and backdoors that have been installed on a computer?;Bot;Rootkit;Virus;Worm;Zombie;Question 10. Question;Which term refers to a file;that contains suspicious code, typically resembling a virus signature, which;has been encrypted and moved so that it cannot be inadvertently opened or;accessed by a hacker?;Bot File;Isolated File;Quarantined File;Root Kit;Secured Threat File;Question 11. Question;According to the textbook;what is the cash value of pirated software to date?;$53 Million;$530 Million;$5.3 Billion;$53 Billion;$530 Billion;Question 12. Question;Which reporter converted an;M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom;but died during the conflict?;Arthur Miller;David Bloom;Ethel Gahwhiler;Jeff Raucher;Irving L. Levine


Paper#36630 | Written in 18-Jul-2015

Price : $19