1.
16)Font size is measured in .
Explanation
Font size is measured in point size. Point size refers to the measurement of the height of characters in a font. It is typically measured in points, where one point is equal to 1/72 of an inch. The larger the point size, the larger the characters will appear on a page or screen.
2.
3) Many bot-infested computers can be linked together to form what is known as a .
Explanation
A botnet is a network of computers that have been infected with malicious software, or bots, which are controlled by a central command and control server. These infected computers, also known as zombies, can be linked together to form a botnet. The purpose of a botnet is often to carry out coordinated attacks, such as distributed denial of service (DDoS) attacks, spamming, or stealing sensitive information. By leveraging the power of multiple computers, botnets can be highly effective in carrying out malicious activities while remaining difficult to trace back to the perpetrators.
3.
20)The Windows is a database that keeps track of your computer's peripheral devices, software, preferences, and settings. When you install software on the hard disk, information about the software is recorded in the .
Explanation
The Windows registry is a database that keeps track of a computer's peripheral devices, software, preferences, and settings. When software is installed on the hard disk, information about the software is recorded in the registry.
4.
1)Two main categories of software is software and software.
Explanation
The correct answer is "application system". The question is asking for the two main categories of software, and "application system" is one of those categories. The other category is not mentioned in the question, but it can be inferred that it is referring to "system software" as the two main categories of software.
5.
14)Trojan horses are notorious for stealing passwords using a a type of program that records keystrokes.
Explanation
Trojan horses are a type of malicious software that disguise themselves as legitimate programs. They can be used to steal sensitive information, such as passwords. One common method they use for this is by installing a keylogger on the victim's computer. A keylogger is a program that records every keystroke made by the user, allowing the attacker to capture passwords and other important information. Therefore, the correct answer to the question is "keylogger".
6.
A holds data for a single entity- a person, place, thing, or event. is a string of related information.
Explanation
A record holds data for a single entity, such as a person, place, thing, or event. It is a collection of related information stored together. In databases, a record is typically represented as a row in a table, where each column represents a different attribute or field of the entity. The record allows for the organization and retrieval of data in a structured manner.
7.
is a collection of data that is stored on one or more computers.
Explanation
A database is a collection of data that is stored on one or more computers. It is a structured set of data that is organized and can be accessed, managed, and updated easily. Databases are commonly used in various applications and systems to store and retrieve information efficiently. They provide a centralized and secure way to store and manage data, allowing multiple users to access and manipulate the data simultaneously. By using databases, organizations can ensure data integrity, consistency, and reliability, making it an essential component in modern information systems.
8.
software is designed to protect computers from various forms of destructive software and unauthorized intrusions.
Explanation
The given answer "security" is correct because it accurately describes the purpose of the software mentioned in the question. Security software is specifically designed to protect computers from destructive software (such as viruses, malware, and ransomware) and unauthorized intrusions (such as hacking attempts and unauthorized access). It helps to safeguard the computer system and its data from potential threats and vulnerabilities.
9.
A holds one item of data relevant to a record.
Explanation
A field holds one item of data relevant to a record. In a database, a field represents a specific piece of information that is stored for each record. It can hold different types of data such as text, numbers, dates, or even images. Fields are used to organize and categorize data within a database, allowing for efficient storage and retrieval of information.
10.
The intersection of a column and row is called a . Each in the grid can contain a value, label, or formula.
Explanation
The intersection of a column and row is called a "cell". Each "cell" in the grid can contain a value, label, or formula.
11.
A is a set of letters that share an unified design.
Explanation
A font is a set of letters that share a unified design. Fonts are used to display text in a specific style, size, and weight. They consist of a collection of characters, including letters, numbers, symbols, and punctuation marks, that have a consistent visual appearance. Fonts are used in various mediums such as printed materials, websites, and digital documents to convey a specific tone or aesthetic.
12.
A desktop (sometimes called a gadget, dashboard , or a control) is a specialized utility program that appears on a computer's screen-based desktop, looks like a control, and might display a snippet of information.
13.
Open software makes uncompiled program instructions-the code-available to programmers who want to modify and improve the software.
14.
Files are usually to consolidate them into one large file, which is compressed to decrease its size and reduce the download time.
Explanation
Files are usually "zipped" to consolidate them into one large file, which is compressed to decrease its size and reduce the download time.
15.
Security experts use the term threat to describe malware that combines more than one type of malicious program.
Explanation
The term "blended" is used by security experts to describe malware that combines multiple types of malicious programs. This means that the malware incorporates different techniques and functionalities to carry out its malicious activities. By combining different types of malware, attackers can increase the complexity and effectiveness of their attacks, making it more difficult for security measures to detect and mitigate them. Blended malware can include elements such as viruses, worms, Trojans, spyware, and more, making it a potent and versatile threat.
16.
software provides a set of tools for transferring video footage from a camcorder to a computer, clipping out unwanted footage, assembling video segments in any sequence, adding special video effects, and adding a sound track.
Explanation
The given correct answer is "video editing". This is because the question describes a software that provides tools for transferring video footage from a camcorder to a computer, clipping out unwanted footage, assembling video segments in any sequence, adding special video effects, and adding a sound track. All these activities are part of the process of video editing, which involves manipulating and enhancing video footage to create a final edited video.
17.
Program and data are two different kind of extensions when installing software.
18.
software can be defined as any type of application software that has the potential to help people do their work more efficiently.
Explanation
The term "software" refers to any type of application or program that can be used on a computer or electronic device. In this context, the given answer states that software can be defined as any type of application software that has the potential to help people do their work more efficiently. This definition emphasizes the purpose of software, which is to enhance productivity and improve efficiency in various tasks and activities.
19.
A file is a three letter suffix that is appended to the file name to indicate the kind of information the file contains.
Explanation
The given answer "extension" correctly explains that a file extension is a three-letter suffix that is added to the file name to indicate the type or format of information contained in the file. File extensions are used by operating systems to associate files with specific programs or applications that can open and process them. It helps users easily identify the file type and choose the appropriate software to open and work with the file.
20.
A software is a collection of software applications sold as a single package. A collection of related software.
Explanation
A software suite refers to a collection of software applications that are sold together as a single package. It typically includes multiple related software programs that are designed to work together and complement each other. This term is commonly used in the software industry to describe a bundle or package of software applications that are marketed and sold as a unified product.
21.
production software assists you with composing, editing, designing, printing, and electronically publishing documents. Most popular types of production software are word processing, desktop publishing, and web authoring.
Explanation
The given answer "document" is correct because the question is asking for the type of software that assists with composing, editing, designing, printing, and electronically publishing documents. The question also mentions that the most popular types of production software are word processing, desktop publishing, and web authoring, all of which are used for creating and working with documents. Therefore, "document" is the appropriate answer.
22.
From a legal perspective there are two categories of software; public domain and .
Explanation
From a legal perspective, there are two categories of software: public domain and proprietary. Public domain software refers to software that is not protected by copyright and can be freely used, modified, and distributed by anyone. On the other hand, proprietary software is protected by copyright and its use, modification, and distribution are restricted by the software owner. This means that proprietary software is owned by a specific individual or organization, and users must obtain a license or permission to use it.
23.
A is text that you specify to automatically appear in the top margin of every page.
Explanation
A header is text that is specified to automatically appear in the top margin of every page. It is a common feature in word processing software that allows users to add consistent information, such as page numbers, document title, or author name, to all pages of a document.
24.
A is a grid-like structure that can hold text or pictures. For printed documents, are a popular way to produce easy-to-read columns and rows of data and to position graphics.
Explanation
A table is a grid-like structure that can hold text or pictures. For printed documents, tables are a popular way to produce easy-to-read columns and rows of data and to position graphics.
25.
Software (sometimes referred to as setup) is a process that places a program into a computer so that it can be run or executed.
Explanation
The given definition states that software installation is a process of placing a program into a computer so that it can be run or executed. Therefore, the correct answer for this question is "installation".
26.
A device is a software that helps a peripheral device establish communication with a computer. Acts like an interpreter.
Explanation
A driver is a software that helps a peripheral device establish communication with a computer. It acts like an interpreter, translating the commands from the computer into a language that the peripheral device can understand and vice versa. The driver allows the computer to control and utilize the features and functions of the peripheral device effectively. It ensures compatibility and enables smooth communication between the computer and the peripheral device.
27.
A uses rows and columns of numbers to create a model or representation of a real situation.
Explanation
A spreadsheet is a tool that uses rows and columns of numbers to create a model or representation of a real situation. It allows users to organize and manipulate data, perform calculations, and create charts or graphs. Spreadsheets are commonly used in business and finance for tasks such as budgeting, financial analysis, and data management. They provide a structured and efficient way to organize and analyze large amounts of data, making them a valuable tool in various industries.
28.
A software is a small section of program code that replaces a part of the software you currently have installed. Software fix.
Explanation
A patch is a small section of program code that is used to replace or fix a part of the software that is currently installed. It is a common method of addressing bugs, security vulnerabilities, or adding new features to existing software. By applying a patch, users can update their software without having to reinstall the entire program.
29.
is a set of patches that correct problems and address security vulnerabilities(usually applies to operating system updates).
Explanation
A service pack is a collection of patches and updates that are released by software vendors to fix known issues and address security vulnerabilities in their products. This term is commonly used in the context of operating system updates, where a service pack includes a set of cumulative updates, bug fixes, and security enhancements. Service packs are important for maintaining the stability, performance, and security of software systems by ensuring that any known issues are resolved and the software is up to date.
30.
Database software helps you enter, , organize, update, and report information stored in a database.
Explanation
Database software helps you find information stored in a database. It provides tools and functionalities that allow users to search for specific data or records within the database. This can be done by using search queries or filters to locate relevant information based on certain criteria. By using the "find" feature in the database software, users can easily locate and retrieve the desired information from the database.