Get your brand new Wikispaces Classroom now
and do "back to school" in style.
Pages and Files
Chapter 1 Combined
Chapter 10 Combined
Chapter 11 Combined
Chapter 12 Combine
Chapter 2 Combined
Chapter 3 Combined
Chapter 4 Combined
Chapter 5 Combined
Chapter 6 Combined
Chapter 7 Combined
Chapter 8 Combined
Chapter 9 Combined
Add "All Pages"
Chapter 3 Combined
1. List ten examples of application software and make sure that you include at least three examples of productivity software and one example of groupware.
Productiviy Software- Microsoft Office Word,Microsoft Excel, Quicken Books
Groupware - Google Docs,WikiPages
2. List at least three examples of system software and five examples of utility software.
Some examples of system software is microsoft windows, DOS, and BIOS software. Five examples of utility software is,Norton systems works,System mechanic,PC Doc,Net Nanny, Adoby reader.and 12Ghosts
3. Compare the strengths of word processing, DTP, and Web authoring software. Explain how a spell checker works and why it is not a substitute for proofreading.
packages, such as Microsoft Word, give you the ability to create, spell-check, edit and format a document on the screen before you commit it to paper.
(DTP) takes word processing software one step further by helping you use graphic design techniques to enhance the format and appearance of a document.
helps you design and develop web pages that you can publish electronically on the internet.
works by comparing each word that is stored in data files called a spelling dictionary. A spell checker is not a substitute for proofreading as some words that are pronounced the same and have different meanings can be spelled differently….i.e.…there, their and they’re
4. Draw a sketch of a simple worksheet and label the following: columns, rows, cell, active cell, values, labels, formulas, and Formula bar. Explain the difference between an absolute reference and a relative reference, giving an example of each.
In a worksheet formula, an Absolute reference is a cell reference (usually preceded by a $ symbol) that cannot change as a result of a move or copy opperation.
In a worksheet formula, an Relative reference is a cell reference that can change if cells change position as a result of a move or copy opperation.
5. List five types of "number crunching" software that you can use in addition to spreadsheet software.
helps you analyze large sets of data to discover relationships and patterns.
Mathematical Modeling Software
provides tools for solving a wide range of math, science, and engineering problems.
Money Management Software
offers a variety of tools for tracking monetary transactions and investments.
Personal Finance Software
– Microsoft Money.
Tax Preparation Software
is designed to help you gather your annual income and expense data.
6. Describe how you would use each of the six types of graphics software described in this chapter.
1.)Paint Software- Web designers and illustrators use tthem to make graphics.
2.)Photo Editing Software- You can fix and edit your photos. You can remove red-eye and crop and modify contrast and brightness. The photo editing software typically offers tools and wizards that simplify photo editing tasks.
3.)Drawing software- It provides tools for creating and manipulating graphics. They can be assembled into diagrams, corporate logos, and schematics.
4.)3D Graphics software- You can cover a wireframe object with surface texture and color to create a graphic of a 3D object.
5.)CAD software- Its a special type of 3D software that can be used to create blue-prints and product specifications.
6.)Presentation Software- It has the tools necessary to combine text photos, clip-art, graphics, animations, and sound into a series of electronic slides.
7. List five guidelines that are important for software shoppers.
1) Make sure that the software you are purchasing is suitable for your computer.
2) Make sure it is genuine software software not pirated.
3) Make sure that when you buy it, it has all the contents in the package, including all the CD's that come with it so you can download and install the software to your computer.
4) Buy software with licensing that fits your needs.
5) Use demoware (i.e. A 14 day trial) before making your purchase so you can see if you would be satisfied with the product or not.
8. Read the license agreement in Figure 3-32 and answer each of the questions in the corresponding figure caption.
1.Am i buying the software or licensing it? answer: licensing it.
2.when does the license go into effect? answer: by installing it, copying, or otherwise using the software.
3.under what circumstances can i make copies? answer: copy for use on own personal computer
4. can i rent software? answer: no
5.can i sell the software? answer: yes
6.what if the software includes a distribution cd and a set of distribution flopppy disk? answer: you may only use one medium that is appropriate for your single computer
7.Does the software publisher provide a warranty? answer: 90 days
8. Can i loan the software to a friend? answer: no. you may not rent, lease, or lend software
9. Explain the procedures for installing local software, portable software, and Web apps.
1. Insert the first distribution CD or DVD. The program should start automatically, if it does not, looke for the Setup.exe
2. Read the license agreement if one is presented and accept the terms
3. Select the installation option that best fits your needs
4. Follow the prompts provided to select a folder to store the file
5. If the software contains multiple CDs, insert when prompted to do so
6. When the setup is complete, start the program to make sure it works
Portable software is very simple and is sometimes referred to as install-free software. If you want to run a program, for example, OpenOffice.org Portable from a USB flash drive you simply download the zip Portable file and then simply unzip it so that the files end up in the desired location
An example of a Web App would be Gmail. It requires no installation at all on your computer. It makes use of browser software as the e-mail client software, making it possible to access your e-mail from any computer that has a browser and an internet connection.
10. Write a set of step-by-step instructions for installing software from a distribution CD and another set of instructions for installing downloaded software. Explain the differences between self-installing executable files, self-executing zip files, and non-executing zip files.
Installing software from a distribution cd
Insert the disc.
Read the license agreement and select agree.
Select either full or custom installation.
Select where to save it to.
If there is more than one cd, insert each one as it prompts you to.
After setup is complete, run the program.
On the website, locate any info pertaining to installing the software. Read it and/ or print it.
Click the download link.
Click the run button in the dialog box.
Wait for download to finish and the setup program should start automatically.
Select where to install the program.
Wait for setup to complete to uncompress the file. Install it. Agree to license agreement. Test the software to make sure it works.
Self- Installing Executable Files-
Software downloaded is packaged as one large file with an.exe extension. The file automatically unzips itself and starts the setup program.
Self-Executing Zip Files-
Downloaded files with .exe extensions do not always install themselves. Some are self exciting files but not always automatically start the setup program.
Non-Executing Zip Files-
Downloaded software that arrives in one huge file with a .zip extension, you must first download your hard disk and then use WinZip to unzip it. After unzipping the file you must run setup program
11. Explain the difference between proprietary software, commercial software, shareware, open source software, freeware, and public domain software.
It is distributed commercially where as some of it is free. Based on licensing rights proprietary software is distributed commercial software, demoware, shareware, freeware, opensource software.
Usually bought in computer stores or websites you purchase the right to use it under the terms of the software license. It might give you the permission to install the software at a computer at work or home but can only use one of them at a time.
The license permits you to the software for a trail period. Try it before you buy the policy.
Open Source Software-
Maybe sold or distributed free of charge and compiled form but it must almost always include the source code. It can be copied and unlimited number of times distributed for free, sold, and modified.
Freeware is protected by copyright. The license for freeware permits you to use the software, copy it and give it away but you cannot alter it or sell it.
Public Domain Software-
It is not protected by copy right it has expired or the author placed the program in public domain. It may be freely copied, distributed, or resold.
12. Explain the purpose of a software patch and describe how it differs from a service patch.
A software patch is a small section of program code that replaces part of the software you currently have installed. A service pack is a set of patches that corrects problems and addresses security vulnerabilities and usually applies to operating system updates. These are both usually provided by the publisher of the software for free.
13. Create a table that summarizes the difference between various types of malware based on their method of distribution and exploits.
Malicious software (malware) is software specifically programmed to harm a computer's software. There are several types of malware: viruses, worms, mass-mailing worms, Trojan Horses, keyloggers, and Remote Access Trojans, bots and Zombies, bot nets, and Spyware. Below is a table defining these various threats.
Viruses: program instructions that attach themselves to a file, replicates, than attaches to other files.
Worm: self-replicating programs made to carry out an unauthorized computer on other computers.
Mass Mailing worms: spread by sending itself to every computer in the address book of the infected computer.
Trojan Horse: Masquerade as useful apps that pretend to do one function while actually doing some other, harmful thing to the system.
Keylogger: This malware tracks keystrokes in order to learn passwords, usernames, and other personal information.
Remote Access Trojan: has capabilities that allow remote hackers to transmit files to victim's computers from a distance, as well as use a host computer as a relay station for hacking into other computers.
Bad Bots: a corruption of good software, these bots take over victim computers, turning them into Zombies, capable of carrying out instructions from a bad leader.
Botnet: a network of bot infected computers which utilize the mass computing power to do things like break encrytions and retrieve secured data.
Spyware: a program that gathers personal information for sale to ad agencys or more nefarious groups
Rootkit: software designed to disguise the malware installed in victim computers.
14. Draw a story board to illustrate how antivirus software works.
help on how to format text
Turn off "Getting Started"