問題一覧
1
consists of a series related instruction
program or software
2
sometimes called application software
application or app
3
consists of programs designed to make users more productive
application or app
4
set of programs that coordinate all the activities
operating system
5
software is available in variety of forms
retail custom web app mobile app mobile web app shareware freeware open source public domain
6
can assist you in becoming more effective and efficient
productivity applications
7
productivity applications
word processing presentation spreadsheet database note taking calendar and contact management project management accounting personal finance legal tax preparation document management enterprise computing
8
with productivity applications users often
create a project edit a project format a project save a project distribute a project
9
allows users to create and manipulate documents
word processing software
10
it enables users to change written words easily
word processing software
11
allows yser to create visual aids for presentation
presentation software
12
allows user to organize data in colums and rows
spreadsheet software
13
is an application that allows a user to plan
project management sofware
14
collection of data organized in a manner that allows access
database
15
the ultimate safeguard
backing up
16
is an applications that helps businesses of all sizes record and report
accounting software
17
to make a copy of it
back up
18
encrypted code that a person
digital signature
19
a simplified accounting application
personal finance software
20
is an application that assists in the preparation of legal documents
legal software
21
refers to the right of individuals and companies to deny
information privacy
22
are stored in a location separate
off-site backups
23
is an application that provides a means for sharing
document management software
24
users choose which folders and files to include
selective backup
25
requires special computing solutions
enterprise
26
categories of backups or backup methods
full differential incremental selective continuous data protection cloud
27
enterprise
human resources software accounting software engineering or product development software manufacturing software marketing software sales software distribution software customer service software software for information technology staff
28
ensure that an impostor is not participating
digital certificate
29
graphics and media software
computer-aided design (CAD) software desktop publishing software paint/image software photo editing and photo management software video and audio editing software
30
allows users to combine text
multimedia authoring software
31
a small text file
cookie
32
website that uses encryption techniques
secure site
33
helps users of all skill levels create websites
website authoring software
34
is a program that allows you to view images and animations
media player
35
website uses cookie
allow for personalization store user names and or passwords assist with online shopping track how often users visit a site target advertisement
36
is a tool that remove program
uninstaller
37
copies all of the files
full backup
38
copies that have changed since the last full back up
differential backup
39
tool searches for and removes unnecessary file
disk cleanup files
40
is the wct of stealing digital equipment
hardware theft
41
is a tool that reorganizes the file and unused space on a computer's hard disk
disk defragmenter
42
which perpetrator sends an official looking email
phishing
43
is a tool that causes a display device's screen to show moving image
screen saver
44
shrinks the size of a file
file compression tool
45
is time consuming
recovery
46
is a program that identifies and fixes operating system problems
PC maintenance tool
47
an object that can be tapped
clickjacking
48
allows users to copy or back up
backup tool
49
act of defacing or destroying digital equipment
hardware vandalism
50
reverse the process and returns backed up files
restore tool
51
as gaining unauthorized access to obtaining confidential information
social engineering
52
is a collection of individual related applications
software suite
53
hardware theft and vandalism safeguards
physical access controls alarm system physical security devices device tracking app
54
is an application that helps you organize your calendar
calendar and contact management software
55
copies only the last full or incremental backup
incremental backup
56
all data is backed up whenever a change is made
continuous data protection(CDP)
57
is an application that enables user to enter typed text
note taking software
58
allows user to create, access, and manage a database
database software
59
involves the use of computers review an employees use of technology
employee monitoring
60
hardware failure safeguards
surge protector uninterruptable power supply or UPS duplicate components or duplicate computers fault-tolerant computer
61
write text, graphics, audio, and video files
disc burning software
62
personal interest applications
lifestyle applications medical applications entertainment applications convenience applications education applications
63
is a duplicate of a file
backup
64
process of restricting access to certain material
content filtering
65
communications applications
blog browsing chat online discussion email file transfer internet phone instant messaging mobile messaging videoconference web feeds
66
is a security tool that detects and protects a personal computer
personal firewall
67
restrict access to specified websites
web filtering software
68
files are backed up to the cloud as they change
cloud backup
69
protect a compute agaisnt viruses
antivirus program
70
type of program placed on a computer or mobile device without the user's knowledge
spyware
71
poses additional secuirty risk
wireless access
72
are moral guidelines
technology ethics
73
is a type of program that displays an online advertisement in a banner
adware
74
detects and deletes spyware
spyware remover
75
refers to unique and original works
intellectual property
76
detects and deletes adware
adware remover
77
are the rights to which creators are entitled
intellectual property rights
78
protect any tangible form of expression
copyright
79
is a tool that performs functions related to file management
file manager
80
is a strategy designed to prevent illegal distribution
digital rights management or DRM
81
that attemps to locate a file
search tool
82
allows user to display, copy,the contents of graphic file such as photo
image viewer
83
is written guideline
code of conduct
84
involves reducing the electricity
green computing
85
uses two separate methods
two-step verification
86
protects a networks resources from intrusion
firewall
87
areas use digital forensics
law enforcement criminal prosecutors military intelligence insurance agencies information security departments
88
the use of a computer or network without permission
unauthorized access
89
is the discovery, collection and analysis of evidence
digital forensics
90
software theft
steals software media intentionally erases program illegally registers and/or activates a program illegally copies a program
91
use of a computer or its data for unapproved
unauthorized use
92
define who can access a computer
access controls
93
users provide the software products identification
product activation
94
private combination of words
passphrase
95
many manufacturers incorporate an activation
software theft
96
is the right to use sftware
license agreement
97
is a numeric password
passcode or PIN (personal identification number)
98
is any item that you must possess
possessed object
99
occurs when someone steals personal
information theft
100
process of converting data that is readable by humans
encryption