1.
An __________________ is a program responsible for running a computer.
Explanation
An operating system is a program responsible for running a computer. It manages computer hardware and software resources, provides a user interface, and allows users to run applications. It controls the execution of programs, manages memory, handles input and output devices, and ensures the overall functionality and security of the computer system. Without an operating system, the computer would not be able to perform any tasks or run any programs.
2.
__________________ tell the computer what to do and allow the user to control the computer.
Explanation
Commands are instructions given to a computer that tell it what to do. They allow the user to control the computer and perform specific tasks or actions. The use of both "commands" and "command" in the answer suggests that either term can be used to refer to these instructions.
3.
An application uses values organized into rows and columns is called an __________________.
Explanation
An application that uses values organized into rows and columns is called a spreadsheet or spreadsheets. This type of software allows users to input and manipulate data in a tabular format, perform calculations, and create charts or graphs based on the data. Spreadsheets are commonly used for financial analysis, budgeting, data tracking, and other tasks that require organizing and analyzing data in a structured manner.
4.
A __________________ is an organized way to store information so that it is easy for the computer to search for information.
Explanation
A database is an organized way to store information so that it is easy for the computer to search for information. It is a structured collection of data that can be accessed, managed, and updated. Databases use tables, rows, and columns to organize and store data, making it efficient for the computer to retrieve specific information or perform queries. By using indexes and search algorithms, databases can quickly search for and retrieve the requested data, providing a convenient and efficient way to manage and access information.
5.
A __________________ is more efficient than a typewriter because you can correct mistakes on the screen before you print a document.
Explanation
A word processor is more efficient than a typewriter because it allows users to correct mistakes on the screen before printing a document. Unlike a typewriter, which requires manual correction or retyping, a word processor provides the ability to edit and revise text easily, saving time and effort. This feature enhances productivity and accuracy in document creation.
6.
__________________ is the process of identifying and correcting problems.
Explanation
Troubleshooting is the process of identifying and correcting problems. It involves systematically analyzing a problem, determining its cause, and then implementing solutions to resolve the issue. This can be done in various fields such as technology, mechanics, or customer service. Troubleshooting is essential in maintaining the functionality and efficiency of systems, equipment, or processes, as it helps to identify and fix any issues that may arise. "Trouble shooting" is a misspelling of the correct term "troubleshooting."
7.
__________________ forces unwanted advertising onto your computer screen.
Explanation
Adware is a type of malicious software that forces unwanted advertising onto a computer screen. It is designed to display advertisements, typically in the form of pop-ups or banners, without the user's consent. Adware can be installed unknowingly by downloading free software or clicking on malicious links. Once installed, it tracks the user's browsing habits and displays targeted advertisements. Adware can be disruptive and intrusive, causing annoyance and potentially compromising the user's privacy and security.
8.
A __________________ is an unwanted program that can copy itself.
Explanation
A virus is a type of unwanted program that has the ability to replicate itself. It can spread from one computer to another, often without the user's knowledge or consent. Viruses can cause various harmful effects, such as corrupting or deleting files, slowing down computer performance, or even stealing personal information. They are typically designed to cause damage or disrupt the normal functioning of a computer system.
9.
A program that perfroms a specific task within an operating system is called a(n) __________________.
Explanation
A program that performs a specific task within an operating system is called a utility program. Utility programs are designed to assist in managing and optimizing computer resources, performing maintenance tasks, and providing additional functionality to the operating system. These programs typically focus on specific tasks such as file management, disk cleanup, system diagnostics, and security. They are often included as part of the operating system or can be installed separately to enhance the functionality of the system. Utility programs help users streamline their computing experience and improve the overall efficiency of the operating system.
10.
A __________________ protects a computer against unwanted connections.
Explanation
A firewall is a security measure that protects a computer from unwanted connections. It acts as a barrier between a computer or network and potential threats from the internet, filtering and monitoring incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malware infections, and other cyber threats by analyzing the data packets and determining whether to allow or block them. Therefore, a firewall is an essential component in safeguarding a computer system and maintaining its security.