Answer:
D:Process managers
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. (535971)
Answer:
C:digital rights management
_____ is the process of creating programs and apps from the idea stage to distribution to users. (535562)
Answer:
A:Software development
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. (536026)
Answer:
C:Installation
_____ are new releases of an app and may require an additional fee before you can install them. (536060)
Answer:
C:Upgrades
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. (535856)
Answer:
B:Intellectual property
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? (536290)
Answer:
A:Require users to identify themselves using biometrics or passwords.
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? (536357)
Answer:
B:Agile development
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? (536141)
Answer:
B:incomplete documentation
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? (535586)
Answer:
D:Restorers
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? (535733)
Answer:
C:Site license
At what point are you responsible for following the terms in a software license agreement? (535493)
Answer:
C:when you click or take another action to accept the terms
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? (536027)
Answer:
C:Project manager
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. (536117)
Answer:
C:wireframes
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? (536347)
Answer:
B:Support and security phase
During which phase of the SDLC is software tested to make sure each function works as intended? (536475)
Answer:
A:all phases
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? (536474)
Answer:
B:App Store for iOS
File transfer programs belong in what software category? (536098)
Answer:
B:Communications
In which category of software do Microsoft Office Word and Excel belong? (536215)
Answer:
A:Productivity
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? (536341)
Answer:
B:Analysis phase
Is it advisable to enable automatic updates on security software? (535837)
Answer:
A:Yes; this helps to catch and quarantine new malware before it harms the computer.
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? (536002)
Answer:
A:a crash
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? (536330)
Answer:
C:Digital Rights Management
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? (535495)
Answer:
A:integrated development environment (IDE)
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? (535575)
Answer:
B:open source
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? (535824)
Answer:
C:Tester
The set of activities performed to build a program is called the _____. (535636)
Answer:
B:software development life cycle (SDLC)
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? (536205)
Answer:
A:Service pack
What area of software development focuses on the user's reaction to and interaction with the software product? (535955)
Answer:
B:User experience
What can you do to make sure you are not contributing to software piracy? (535775)
Answer:
D:Buy software only from legitimate resellers or directly from the manufacturer.
What defines the behavior of an object in object-oriented programming ? (536327)
Answer:
C:Method
What do you call the rules each programming language has for writing instructions? (536070)
Answer:
C:syntax
What is the goal of a DevOps methodology? (535804)
Answer:
C:to produce programs quickly and then offer continuous updates
What kind of software products can you download from the Internet without being subjected to copyright restrictions? (535890)
Answer:
A:Public domain software
What type of program would have a class named Student with objects called fullTime and partTime? (535793)
Answer:
B:object-oriented program
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? (536308)
Answer:
B:Antispyware
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? (536272)
Answer:
C:firewall
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? (536044)
Answer:
D:Patch finders
Which commonly used programming language isused to manage, access, and search for database content? (536283)
Answer:
C:SQL
Which of the following does a software license usually specify? (535580)
Answer:
A:number of people authorized to use the software
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? (535476)
Answer:
A:Piracy
Which of the following is an example of an object-oriented programming language? (535981)
Answer:
B:Java
Which of the following is not a general guideline for developers? (535820)
Answer:
D:Start programming before creating a proposal.
Which of the following programming languages adds interactivity to websites? (536083)
Answer:
B:JavaScript
Which of the following tools translates the source code of a procedural program into binary code? (536183)
Answer:
B:compiler
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? (535797)
Answer:
C:Interpreters
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? (535521)
Answer:
D:waterfall method
Which software development method uses highly skilled programmers to shorten the development process while producing quality software? (535588)
Answer:
A:Rapid Application development model
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? (536312)
Answer:
D:Fourth generation language
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? (536006)
Answer:
A:Shareware
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? (536243)
Answer:
B:freeware
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? (535731)
Answer:
A:Visit the manufacturer's website and install the latest updates for the app.
Why should we use an uninstaller that comes with an operating system rather than the system’s file management program to delete the folder containing the program’s files to remove a software or app from a device? (536325)
Answer:
B:An uninstaller removes the program files and any associated entries in the system files.
A class is a type of object that defines the format of the object and the actions it can perform. (536186)
Answer:
True
A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions. (536153)
Answer:
True
Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load. (536340)
Answer:
True
Cloud backup software periodically saves your files and settings to an external hard drive. (535533)
Answer:
False
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. (535508)
Answer:
True
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. (536075)
Answer:
True
Answer:
False
When you create an app, you are protected under copyright laws, even before you apply for a copyright. (535924)
Answer:
True
One of the key aspects of this module is understanding the difference between programs and apps. Programs are typically larger software systems designed for comprehensive tasks, such as word processing, data analysis, or operating systems. In contrast, apps are generally lightweight and task-specific, often designed for mobile platforms or focused web use. This distinction helps learners appreciate the variety of tools available and their purposes, whether for personal, professional, or academic use.
The module also emphasizes best practices for using programs and apps efficiently and securely. Topics include navigating user interfaces, customizing settings for better usability, and updating software to improve performance and security. Learners gain insights into troubleshooting common issues and maximizing productivity by leveraging advanced features. Additionally, the module highlights the importance of ethical software use, such as respecting licensing agreements and avoiding piracy.
Another critical component of this module is the introduction to app development. Learners are exposed to the stages of the software development lifecycle, from planning and design to coding, testing, and deployment. It outlines how developers use programming languages, frameworks, and development environments to create functional and user-friendly applications. The module also touches on user experience (UX) design principles and the significance of incorporating feedback to refine and enhance app performance.
The role of apps in modern life cannot be overstated, as they facilitate a wide range of activities, from social networking and online shopping to learning and remote work. This module demonstrates how understanding the development and use of apps can empower individuals to make informed choices about the tools they use while inspiring potential careers in app development. It also underscores the importance of innovation and problem-solving in addressing real-world challenges through technology.
By the end of this module, learners acquire a comprehensive understanding of the multifaceted world of programs and apps. Whether focusing on effective use or delving into the fundamentals of development, the knowledge gained provides a strong foundation for navigating the digital age. This module encourages learners to explore the limitless possibilities offered by software and applications while fostering responsible and creative engagement with technology.
If you have any doubts, Please let me know