MIS Ch. 4 Practice

Which of the following kinds of software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group?
Which of the following kinds of software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs?
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
Which of the following is a collection of electronic drawings, photos, and other images that can be inserted into documents?
Clip art
Which of the following increases or decreases how crisp the objects in a photo appear?
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission?
Which of the following kinds of software provides the capabilities of paint software and also includes the ability to enhance and modify existing images and pictures?
Image editing
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
_____ technologies help to fight software piracy and prevent unauthorized copying of digital content.
An end-user license agreement, or _____, grants one user the right to use the software.
The illegal copying and distribution of copyrighted software is known as ______.
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
For downloaded software, the details of the software license usually appear during ______.
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
Which of the following kinds of software allows users to modify a segment of a video, called a clip?
Video editing
Which the following is a filtering program that stops pop-up ads from displaying on web pages?
Pop-up blocker
The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it on.
A set of instructions that tells a computer what to do, how to do it, and where to send the results or output is called ________.
Software is written by software developers using computer-readable code called a(n) _______.
Programming language
When you choose a(n) ___________ installation, you only install selected features, rather than all of the features associated with a software program.
A software __________ replaces small sections of existing software code with new, improved code to add enhancements or fix problems.
What you need to change to make words appear bigger on the page
Font size
This defines what text characters look like
Font type
The document formatting feature you use to make paragraphs line up with the left side of the page
You adjust this to control the amount of white space in between rows of text
Line spacing
Shadowing and reflection are examples of this
Text effect
Which of the following is a request for specific data from a database?
Which kind of program attempts to locate a file on your computer or mobile device based on criteria you specify?
What kind of software assists in the preparation of a will, for example?
Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper?
Which of the following is a utility that allows users to display, copy, and print the contents of a graphics file?
Image viewer
Which of the following kinds of malware is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services?
Toll fraud
Which of the following is an example of a photo sharing app?
Which of the following is a utility that detects and protects a computer from unauthorized intrusions?
Personal firewall
Which of the following kinds of software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user?
Document management
Which of the following kinds of players is a program that allows you to view images and animation, listen to audio, and watch video files on your computer?
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like?
Image editing
Which of the following is a collection of individual programs sold as a unit?
Software suite
Which of the following adjusts the difference in appearance between light and dark areas of a photo?
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
Website authoring
Architects, scientists, interior designers, and engineers use _____ design software to create highly detailed and technically accurate drawings.
TIFF, PNG, and GIF files can be compressed using _____ compression, so the files contain all of their original data when uncompressed.
The clarity or sharpness of an image is called _____.
_____ and Fotolia are examples of Web sites where you can download graphics and photos for a fee.
Flatbed, sheet-fed, pen, and handheld are types of _____.
Which kind of software can be distributed by anyone to others at no cost?
Which of the following is a utility that removes a program, as well as any associated entries in the system files?
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service?
Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they’re needed.
Device drivers
Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance.
Operating system software, also called a(n) _____, manages computer hardware and software.
Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities.
Trojan horses
Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a calendar.
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
Multimedia authoring
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
QR code
Which of the following kinds of file utilities shrink the size of a file(s)?
File compression
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox?
Which of the following warns that the computer is infected and needs immediate attention?
Virus hoax
Which of the following kinds of software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook?
Note taking
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
Software designed to meet the unique needs of an organization or business
Software whose ownership rights are public property, and which is available to anyone at no cost
Copyrighted software, such as Linux, that is typically distributed free of charge and can be customized
Open source
Type of software where some applications are free, some require a one-time registration fee, and some require a periodic subscription charge
Web apps
Software whose ownership rights are public property, and which is available to anyone at no cost
Public domain
Which of the following tools searches for and removes unnecessary files?
Disk cleanup
A _____ is technology used to compress/decompress video files.
To watch video on a computer, you need special hardware plus software known as a _____.
Media player
Streaming media known as _____ is stored on the provider’s server, which allows you to play the media multiple times.
Graphics that help a viewer know when one scene ends and another begins are called _____ .
The Moving Pictures Experts Group (MPEG) is a popular _____ standard.
Video compression
Displays unsolicited advertisements in banners or pop-up windows
Removes unused files like temporary Internet files from your hard drive
Disk cleanup utility
Reorganizes the data on a magnetic hard drive so that you can access files more quickly
Disk defragmenter
Not emptying this lets files remain on your computer and take up space
Recycle bin
Software that scans incoming messages and programs to protect your computer
Virus protection
Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?
Word processing
In the event a backup file is used, which kind of program reverses the process and returns backed up files to their original form?