1.
A set of rules and guidelines that are set up to regulate internet use would be:
Correct Answer
B. ACCEPTABLE USE POLICY (AUP)
Explanation
An Acceptable Use Policy (AUP) is a set of rules and guidelines that are established to regulate internet use. It outlines the acceptable behaviors and actions that users must adhere to when using the internet. This policy helps ensure that the internet is used responsibly and ethically, promoting a safe and secure online environment. It may include guidelines on appropriate content, prohibited activities, privacy and security measures, and consequences for violations. By implementing an AUP, organizations and individuals can establish a framework for responsible internet use and protect against potential misuse or harm.
2.
Law granting a legal right to a copyright holder or author which
requires their permission to make non-archival copies of the work in question.
Correct Answer
B. COPYRIGHT
Explanation
The correct answer is COPYRIGHT. A copyright grants the legal right to the holder or author of a work, such as a book, music, or software, to control the reproduction and distribution of that work. This means that anyone who wants to make non-archival copies of the work, such as photocopying a book or duplicating software, needs to obtain permission from the copyright holder. Copyright laws are in place to protect the rights of creators and ensure that they have the ability to control and profit from their work.
3.
Application
software designed to be sold for a PROFIT.
Correct Answer
D. COMMERCIAL SOFTWARE
Explanation
Commercial software refers to application software that is designed to be sold for a profit. Unlike open source software, which is freely available and can be modified by users, commercial software is typically owned and controlled by a company or individual. This type of software is developed with the intention of generating revenue through sales, licensing, or subscriptions. Examples of commercial software include Microsoft Office, Adobe Photoshop, and QuickBooks.
4.
An application designed to search for viruses and repair
files on a computer.
Correct Answer
A. ANTIVIRUS SOFTWARE
Explanation
Antivirus software is an application specifically designed to search for viruses and repair files on a computer. It helps to protect the computer from malicious software by scanning files and identifying any potential threats. This software plays a crucial role in maintaining the security of a computer system by preventing viruses from infecting files and compromising the system's integrity. It is an essential tool for ensuring the safety and smooth functioning of a computer.
5.
Malicious software code that is designed to copy itself and intentionally
move from computer system to computer system, via networks, internet
etc.
Correct Answer
B. WORM
Explanation
A worm is a type of malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet, etc. Unlike viruses, worms do not require a host program to attach themselves to and can spread independently. They often exploit vulnerabilities in computer systems to gain unauthorized access and can cause significant damage by consuming network bandwidth, slowing down systems, and deleting or modifying files. Therefore, the correct answer for this question is WORM.
6.
The main chip that allows computers to do millions of calculations
per second, for this it is sometimes called the brain of the computer.
Correct Answer
B. CPU
Explanation
The correct answer is CPU. The CPU, or Central Processing Unit, is the main chip in a computer that is responsible for executing instructions and performing calculations. It is often referred to as the brain of the computer because it controls and coordinates all the other components and processes in the system. The CPU's high processing speed allows computers to perform millions of calculations per second, making it a crucial component for computer performance.
7.
Software program that is designed to damage
files on a computer that receives it.
Correct Answer
C. VIRUS
Explanation
A virus is a type of software program that is specifically designed to damage files on a computer that receives it. It can replicate itself and spread to other computers, causing harm to the system by corrupting or deleting files. Unlike other types of malware such as spyware or trojan horses, viruses are specifically focused on causing damage to the computer and its files.
8.
Application
software for which the underlying programming language is protected
by the software developer/owner so that others cannot modify
it for other purposes.
Correct Answer
A. PROPRIETARY SOFTWARE
Explanation
Proprietary software refers to application software that is developed and owned by a software developer or company. The underlying programming language of this software is protected, preventing others from modifying or altering it for any other purposes. This means that the source code is not freely available to the public, and users are typically required to purchase a license to use the software. Proprietary software is often developed with the intention of generating profit and may have restrictions on redistribution and modification.
9.
Application software
for which the underlying programming language is open for others
to access. This
allows the program to be changed by other programmers to meet other
needs of the users.
Correct Answer
B. OPEN SOURCE SOFTWARE
Explanation
Open source software refers to application software that allows other programmers to access and modify its underlying programming language. This means that the software can be changed and customized to meet the specific needs of the users by other programmers. Unlike proprietary software, open source software is not restricted to a single company or developer, and it encourages collaboration and community involvement in its development and improvement.
10.
A system of connected computers that allows the sharing of files
and equipment.
Correct Answer
B. NETWORK
Explanation
A network is a system of connected computers that allows the sharing of files and equipment. This means that multiple computers can be connected together, enabling them to communicate and share resources such as files, printers, and scanners. A network provides a way for users to access and transfer data between computers, making it more efficient and convenient for users to collaborate and share resources. Therefore, the correct answer is NETWORK.
11.
Protection of computer, computer files or a computer network from
use without permission of the owner or owners.
Correct Answer
B. SECURITY
Explanation
The term "security" refers to measures taken to protect computer systems, files, and networks from unauthorized use. It involves implementing various security measures such as firewalls, encryption, access controls, and antivirus software to safeguard against potential threats and breaches. This ensures that only authorized individuals have access to the computer or network, preventing unauthorized use or data theft. Therefore, "security" is the correct answer as it encompasses the protection of computer systems, files, and networks from unauthorized use.
12.
Malicious software that is disguised as
a useful application.
Correct Answer
D. TROJAN HORSE
Explanation
A Trojan horse is a type of malicious software that is disguised as a useful application. It tricks users into downloading and installing it, often by pretending to be a legitimate program or by hiding within another program. Once inside a device, a Trojan horse can perform various harmful actions, such as stealing personal information, damaging files, or allowing unauthorized access to the device. Unlike viruses, which can replicate and spread themselves, Trojan horses rely on user interaction to be installed. Therefore, they can be particularly dangerous as users may unknowingly invite them into their devices.
13.
Also known as End User License Agreement
(EULA). The software license is a legally binding agreement that
states how one who has purchased the rights to use software, can
legally use the software.
Correct Answer
C. SOFTWARE LICENSE
Explanation
The given correct answer is "SOFTWARE LICENSE". A software license is a legally binding agreement that outlines the terms and conditions under which a user can legally use the software they have purchased. It grants the user the rights to use the software while also specifying any restrictions or limitations on its use. This agreement ensures that the software is used in compliance with copyright laws and protects the rights of the software developer or owner.
14.
Technology that prevents users from visiting inappropriate web
sites, and protects the network from unauthorized users.
Correct Answer
B. FIREWALL
Explanation
A firewall is a technology that prevents users from visiting inappropriate web sites and also protects the network from unauthorized users. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking certain types of traffic, a firewall helps to prevent unauthorized access to a network and ensures that users are unable to access inappropriate or potentially harmful websites.
15.
Which if the following would be an example of an emerging technology 5-10 years ago?
Correct Answer
D. GPS ON CELL pHONES
Explanation
GPS on cell phones would be an example of an emerging technology 5-10 years ago because during that time period, the integration of GPS technology into cell phones was still a relatively new and developing concept. As smartphones became more prevalent, GPS capabilities became a standard feature, allowing users to access navigation and location-based services directly from their mobile devices. This advancement in technology opened up new possibilities for navigation, transportation, and location-based applications, making GPS on cell phones an emerging technology during that time.