Application and softwares set #1 (IT fundamentals)

Application and softwares set #1 (IT fundamentals)

Assessment

Flashcard

Computers

11th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

14 questions

Show all answers

1.

FLASHCARD QUESTION

Front

John, a project manager at Dion Training, wants to terminate a resource-hungry application. Which of the following would BEST help achieve this? Memory management, process management / scheduling, access control/protection, disk management

Back

process management / scheduling

Answer explanation

Process management/scheduling is an operating system feature that handles application execution, allowing John to terminate a resource-intensive application. Memory management controls how system memory is assigned and used, but doesn't specifically allow for application termination. Access control/protection governs user rights and permissions, but it does not give the ability to terminate applications. Disk management handles how storage is allocated and used, not controlling running applications.

2.

FLASHCARD QUESTION

Front

Which software type is tailored to meet a company's unique requirements and help streamline its operations? Options: Instant Message Software, email client, business-specific applications, conferencing software

Back

business-specific applications

Answer explanation

Business-specific applications are typically bespoke, designed specifically for a company's needs, enabling them to streamline their unique operations. Customer relationship management (CRM) software helps businesses manage their customer interactions. It can be used to track customer leads, sales opportunities, and customer support tickets. While useful for business interactions, conferencing software doesn't deliver customization unique to each company's operational needs. Email clients are predominantly for sending, receiving, and organizing emails. They do not typically provide business-specific functionalities designed for any unique operational needs a company may have. Instant messaging software is largely for communication in real-time—rapidly and efficiently—but it doesn't focus on unique operational needs of a company.

3.

FLASHCARD QUESTION

Front

What are folders/directories primarily used for?

Back

organizing files within a system

Answer explanation

The principal function of folders/directories is to create an organized structure within a file system for easy navigation and management, hence the correct answer. While permissions can be assigned to directories, their primary purpose is not to set file permissions, but rather to provide an organizational structure within a file system. Folders don't primarily serve to encrypt files. Even though certain systems allow entire directories to be encrypted, this is not the fundamental role of a directory. Folders/directories do not modify file extensions. File extensions are defined when a file is created and can be changed or managed independently of their location in directories.

4.

FLASHCARD QUESTION

Front

What is the primary benefit of file encryption? Options: increase processing speed, protection from unauthorized access, reduce file sizes, facilitate data recovery

Back

protection from unauthorized access

Answer explanation

Encryption provides a high level of security by scrambling the data in a file to prevent unauthorized access, keeping it safe in the network. Encryption does not reduce file size, it encrypts or scrambles the data to provide security. Compression, not encryption, is used to reduce the file size. Encryption does not typically impact system speed in a positive way. Actually, it could slightly slow down the process since the system has to encrypt and decrypt files. While encryption can protect data from unauthorized access, it doesn't inherently facilitate data recovery. However, combined with a backup strategy, it can contribute to a holistic data protection plan.

5.

FLASHCARD QUESTION

Front

Which licensing model would you likely encounter when subscribing to a Software as a Service (SaaS) product?

Back

subscriptions

Answer explanation

n a subscription model, users pay a recurring fee to access the software, often on a monthly or yearly basis. This payment structure is typically characteristic of SaaS offerings, where the software is hosted remotely. A group use or site license enables use of the software for multiple users within a specified location, but doesn't inherently align with recurring fees, as required in a subscription-based model. Thus, while it could sometimes apply to SaaS products, it doesn't by definition. Under a one-time purchase model, users pay a flat fee for permanent access to the software. While this may be applicable to some software applications, it is less common for SaaS products which require regular updates and ongoing support. Open source licenses allow users to freely use, modify, or distribute the software. This is not typically characteristic of SaaS products, which more commonly operate on a subscription model.

6.

FLASHCARD QUESTION

Front

What could be responsible for Lisa not being able to utilize the productivity extension she uploaded to her browser? Options: the cache has not been cleared, certificate is invalid, incorrect proxy setting, the extension is disabled

Back

the extension is disabled

Answer explanation

If Lisa has installed the extension but can’t use it, it is possible that the extension is disabled. Enabling it in her browser's settings should resolve the issue. Clearing the browser cache would help in loading updated website content but wouldn't affect the functionality of an installed extension. An invalid certificate would cause security warnings when visiting secured web pages but wouldn't limit the use of a browser extension. Setting Incorrect proxy settings would generally interrupt the internet connection entirely and wouldn't specifically degrade the functionality of a browser extension.

7.

FLASHCARD QUESTION

Front

Which aspect of an operating system ensures that resources are used only in ways that satisfy predetermined policies?

Back

access control

Answer explanation

Access control is a part of the operating system design that ensures resources are used only in ways that satisfy predetermined policies. It restricts system access to authorized users, apps, or other systems, providing a key role in maintaining the system's security. Whereas a firewall aids in preventing unauthorized access to or from a private network, it does not inherently deal with the management of resource usage according to predefined policies. While a security patch can remedy a specific vulnerability in an operating system or an application, it doesn't necessarily manage usage in accordance to predetermined policies. While data encryption secures data and information by translating it into a secret code, it doesn't specifically control the ways resources are utilized.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?