暗記メーカー
ログイン
IT2
  • Lady Rose Joy Domalanta

  • 問題数 120 • 9/14/2023

    記憶度

    完璧

    18

    覚えた

    42

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    consists of a series related instruction

    program or software

  • 2

    sometimes called application software

    application or app

  • 3

    consists of programs designed to make users more productive

    application or app

  • 4

    set of programs that coordinate all the activities

    operating system

  • 5

    software is available in variety of forms

    retail custom web app mobile app mobile web app shareware freeware open source public domain

  • 6

    can assist you in becoming more effective and efficient

    productivity applications

  • 7

    productivity applications

    word processing presentation spreadsheet database note taking calendar and contact management project management accounting personal finance legal tax preparation document management enterprise computing

  • 8

    with productivity applications users often

    create a project edit a project format a project save a project distribute a project

  • 9

    allows users to create and manipulate documents

    word processing software

  • 10

    it enables users to change written words easily

    word processing software

  • 11

    allows yser to create visual aids for presentation

    presentation software

  • 12

    allows user to organize data in colums and rows

    spreadsheet software

  • 13

    is an application that allows a user to plan

    project management sofware

  • 14

    collection of data organized in a manner that allows access

    database

  • 15

    the ultimate safeguard

    backing up

  • 16

    is an applications that helps businesses of all sizes record and report

    accounting software

  • 17

    to make a copy of it

    back up

  • 18

    encrypted code that a person

    digital signature

  • 19

    a simplified accounting application

    personal finance software

  • 20

    is an application that assists in the preparation of legal documents

    legal software

  • 21

    refers to the right of individuals and companies to deny

    information privacy

  • 22

    are stored in a location separate

    off-site backups

  • 23

    is an application that provides a means for sharing

    document management software

  • 24

    users choose which folders and files to include

    selective backup

  • 25

    requires special computing solutions

    enterprise

  • 26

    categories of backups or backup methods

    full differential incremental selective continuous data protection cloud

  • 27

    enterprise

    human resources software accounting software engineering or product development software manufacturing software marketing software sales software distribution software customer service software software for information technology staff

  • 28

    ensure that an impostor is not participating

    digital certificate

  • 29

    graphics and media software

    computer-aided design (CAD) software desktop publishing software paint/image software photo editing and photo management software video and audio editing software

  • 30

    allows users to combine text

    multimedia authoring software

  • 31

    a small text file

    cookie

  • 32

    website that uses encryption techniques

    secure site

  • 33

    helps users of all skill levels create websites

    website authoring software

  • 34

    is a program that allows you to view images and animations

    media player

  • 35

    website uses cookie

    allow for personalization store user names and or passwords assist with online shopping track how often users visit a site target advertisement

  • 36

    is a tool that remove program

    uninstaller

  • 37

    copies all of the files

    full backup

  • 38

    copies that have changed since the last full back up

    differential backup

  • 39

    tool searches for and removes unnecessary file

    disk cleanup files

  • 40

    is the wct of stealing digital equipment

    hardware theft

  • 41

    is a tool that reorganizes the file and unused space on a computer's hard disk

    disk defragmenter

  • 42

    which perpetrator sends an official looking email

    phishing

  • 43

    is a tool that causes a display device's screen to show moving image

    screen saver

  • 44

    shrinks the size of a file

    file compression tool

  • 45

    is time consuming

    recovery

  • 46

    is a program that identifies and fixes operating system problems

    PC maintenance tool

  • 47

    an object that can be tapped

    clickjacking

  • 48

    allows users to copy or back up

    backup tool

  • 49

    act of defacing or destroying digital equipment

    hardware vandalism

  • 50

    reverse the process and returns backed up files

    restore tool

  • 51

    as gaining unauthorized access to obtaining confidential information

    social engineering

  • 52

    is a collection of individual related applications

    software suite

  • 53

    hardware theft and vandalism safeguards

    physical access controls alarm system physical security devices device tracking app

  • 54

    is an application that helps you organize your calendar

    calendar and contact management software

  • 55

    copies only the last full or incremental backup

    incremental backup

  • 56

    all data is backed up whenever a change is made

    continuous data protection(CDP)

  • 57

    is an application that enables user to enter typed text

    note taking software

  • 58

    allows user to create, access, and manage a database

    database software

  • 59

    involves the use of computers review an employees use of technology

    employee monitoring

  • 60

    hardware failure safeguards

    surge protector uninterruptable power supply or UPS duplicate components or duplicate computers fault-tolerant computer

  • 61

    write text, graphics, audio, and video files

    disc burning software

  • 62

    personal interest applications

    lifestyle applications medical applications entertainment applications convenience applications education applications

  • 63

    is a duplicate of a file

    backup

  • 64

    process of restricting access to certain material

    content filtering

  • 65

    communications applications

    blog browsing chat online discussion email file transfer internet phone instant messaging mobile messaging videoconference web feeds

  • 66

    is a security tool that detects and protects a personal computer

    personal firewall

  • 67

    restrict access to specified websites

    web filtering software

  • 68

    files are backed up to the cloud as they change

    cloud backup

  • 69

    protect a compute agaisnt viruses

    antivirus program

  • 70

    type of program placed on a computer or mobile device without the user's knowledge

    spyware

  • 71

    poses additional secuirty risk

    wireless access

  • 72

    are moral guidelines

    technology ethics

  • 73

    is a type of program that displays an online advertisement in a banner

    adware

  • 74

    detects and deletes spyware

    spyware remover

  • 75

    refers to unique and original works

    intellectual property

  • 76

    detects and deletes adware

    adware remover

  • 77

    are the rights to which creators are entitled

    intellectual property rights

  • 78

    protect any tangible form of expression

    copyright

  • 79

    is a tool that performs functions related to file management

    file manager

  • 80

    is a strategy designed to prevent illegal distribution

    digital rights management or DRM

  • 81

    that attemps to locate a file

    search tool

  • 82

    allows user to display, copy,the contents of graphic file such as photo

    image viewer

  • 83

    is written guideline

    code of conduct

  • 84

    involves reducing the electricity

    green computing

  • 85

    uses two separate methods

    two-step verification

  • 86

    protects a networks resources from intrusion

    firewall

  • 87

    areas use digital forensics

    law enforcement criminal prosecutors military intelligence insurance agencies information security departments

  • 88

    the use of a computer or network without permission

    unauthorized access

  • 89

    is the discovery, collection and analysis of evidence

    digital forensics

  • 90

    software theft

    steals software media intentionally erases program illegally registers and/or activates a program illegally copies a program

  • 91

    use of a computer or its data for unapproved

    unauthorized use

  • 92

    define who can access a computer

    access controls

  • 93

    users provide the software products identification

    product activation

  • 94

    private combination of words

    passphrase

  • 95

    many manufacturers incorporate an activation

    software theft

  • 96

    is the right to use sftware

    license agreement

  • 97

    is a numeric password

    passcode or PIN (personal identification number)

  • 98

    is any item that you must possess

    possessed object

  • 99

    occurs when someone steals personal

    information theft

  • 100

    process of converting data that is readable by humans

    encryption