Computer Science Semester 6: Software Types
40 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary advantage of using a Local Area Network (LAN)?

  • Securing data effectively (correct)
  • High distance coverage
  • High costs of setup
  • Limited resource sharing
  • Which characteristic defines a Metropolitan Area Network (MAN)?

  • Features low-speed data transfer
  • Typically covers a diameter of 5 to 50 km (correct)
  • Spans a continental area
  • Limited to a single organization
  • What is one of the main disadvantages of a Local Area Network (LAN)?

  • High potential for server crashes affecting all computers (correct)
  • Enhances resource sharing
  • Allows for software program sharing
  • Facilitates easy communication
  • What is one advantage of a Metropolitan Area Network (MAN) compared to a Wide Area Network (WAN)?

    <p>Less expensive setup</p> Signup and view all the answers

    Which of the following is NOT a feature of a Metropolitan Area Network (MAN)?

    <p>Typically requires minimal technical expertise to set up</p> Signup and view all the answers

    In the context of LANs and MANs, what common issue relates to data security?

    <p>Vulnerability to hacker attacks</p> Signup and view all the answers

    Which of these statements about the conversion from LAN to MAN is true?

    <p>The conversion can be done easily.</p> Signup and view all the answers

    What is a significant drawback of a Metropolitan Area Network (MAN)?

    <p>It may experience internet speed differences based on materials.</p> Signup and view all the answers

    Which of the following phases involves a feasibility analysis before project investment?

    <p>Business Analysis</p> Signup and view all the answers

    What is the primary purpose of software in relation to hardware?

    <p>To execute specific tasks</p> Signup and view all the answers

    In which phase of software development do programmers create a coding tasks list?

    <p>Programming</p> Signup and view all the answers

    What does the term 'software' refer to in a computer system?

    <p>Programs that run on a device</p> Signup and view all the answers

    What is typically the first step in the software development process?

    <p>Brainstorming</p> Signup and view all the answers

    Which phase focuses on merging all individual components before final testing?

    <p>Integration</p> Signup and view all the answers

    In software development, what does the term 'release' imply?

    <p>Launching the software to users</p> Signup and view all the answers

    What stage is critical for establishing whether the software project is viable?

    <p>Business Analysis</p> Signup and view all the answers

    What is a primary advantage of Zigbee networking?

    <p>Offers 128-bit AES encryption for secure connections</p> Signup and view all the answers

    Which aspect limits the Zigbee star network's effectiveness?

    <p>The coordinator's support for up to 65,000 devices</p> Signup and view all the answers

    Which of the following describes a disadvantage of Zigbee networking?

    <p>Its data rates are not sufficient for demanding applications</p> Signup and view all the answers

    What is the range covered by Zigbee communication?

    <p>10 to 100 meters</p> Signup and view all the answers

    Which of the following is NOT a benefit of Wi-Fi networking?

    <p>Support for instantaneous high data transmission</p> Signup and view all the answers

    What is a key characteristic of Wi-Fi technology?

    <p>Enables local area networks to function wirelessly</p> Signup and view all the answers

    What does Wi-Fi stand for?

    <p>Wireless fidelity</p> Signup and view all the answers

    What is a significant disadvantage mentioned about Zigbee?

    <p>High licensing fees for implementation</p> Signup and view all the answers

    What is a primary characteristic that distinguishes computer worms from traditional viruses?

    <p>Worms can spread automatically without user intervention.</p> Signup and view all the answers

    Which type of malware is specifically designed to give hackers remote access to a target system?

    <p>Trojan horses</p> Signup and view all the answers

    Which of the following best describes the main function of spyware?

    <p>To collect personal data without consent.</p> Signup and view all the answers

    What is a defining feature of adware compared to other types of malware?

    <p>It delivers advertisements automatically.</p> Signup and view all the answers

    What type of virus targets the File Allocation Table of a hard drive?

    <p>FAT virus</p> Signup and view all the answers

    Which type of malware poses the highest risk to essential hardware components?

    <p>CMOS viruses</p> Signup and view all the answers

    Which of the following is NOT a behavior typically associated with spyware?

    <p>Advertising pop-up messages</p> Signup and view all the answers

    What is the primary purpose of an anti-virus program?

    <p>To protect against malicious software.</p> Signup and view all the answers

    Which of the following types of malware does not replicate itself once installed?

    <p>Trojan horse</p> Signup and view all the answers

    How does a firewall protect a computer?

    <p>By blocking unauthorized access and network attacks.</p> Signup and view all the answers

    Which statement accurately describes spam?

    <p>Spam can sometimes be a useful newsletter or ad.</p> Signup and view all the answers

    What is a common feature of anti-malware programs?

    <p>They aim to prevent and remove various forms of malware.</p> Signup and view all the answers

    Which of the following is NOT typically associated with anti-spyware programs?

    <p>Defending against all forms of malware.</p> Signup and view all the answers

    What happens when an anti-virus program is not updated regularly?

    <p>It may not recognize new variations of viruses.</p> Signup and view all the answers

    Which of the following is an example of an anti-spyware program?

    <p>AVG Anti-spyware</p> Signup and view all the answers

    What is a significant risk associated with spam emails?

    <p>They are often used to spread viruses and trojans.</p> Signup and view all the answers

    Study Notes

    Software

    • Software consists of instructions, data, or programs that operate a computer and perform specific tasks.
    • It differentiates from hardware, the physical components of a computer.
    • Software includes applications, scripts, and programs used on devices.

    Software Development Process

    • Brainstorming: Involves generating ideas for software applications.
    • Business Analysis: Evaluates market demand and project feasibility.
    • Design: Planning the software architecture and user interface.
    • Programming: Coding by developers based on specifications.
    • Integration: Merging different components into a unified system.
    • Quality Assurance: Testing the software for defects and ensuring it meets standards.
    • Release: Launching the software for end-users.

    Local Area Network (LAN)

    • Pros:

      • Facilitates resource sharing and internet access.
      • Enhances communication efficiency.
      • Improves data security.
    • Cons:

      • Vulnerable to data security issues.
      • Distance limitations affect performance.
      • Server failures impact the entire network.

    Metropolitan Area Network (MAN)

    • Covers larger geographic areas than LAN, typically a city or campus.

    • Pros:

      • Cost-effective for local communications.
      • Higher speed than WAN.
      • Supports easy transition from LAN to MAN.
    • Cons:

      • Management complexity is high.
      • Subject to hacker attacks.
      • High wiring requirements and lower data rates.

    Zigbee Networking

    • Functions well for short-range communication (10-100 meters).

    • Pros:

      • Supports multiple network topologies.
      • Efficient power usage with low duty cycle.
      • Strong encryption and collision avoidance.
    • Cons:

      • Licensing costs around $3,500.
      • Limited star network support.
      • Not suitable for high data rate applications.

    Wi-Fi Wireless Networking

    • Wi-Fi allows devices to communicate over a local area without cables.
    • Involves a wireless adaptor converting data into radio signals.
    • Pros:
      • High efficiency and flexibility in networking.
      • Cost-effective and installation-friendly.

    Malware Types

    • Worms: Software that replicates itself on other computers without user intervention; examples include Sasser, Blaster, and Conficker worms.
    • Trojan Horses: Malicious software disguised as useful programs, facilitating unauthorized access to computer systems.
    • Spyware: Gathers covert information on users by transmitting data from their devices without consent.
    • Adware: Delivers advertisements automatically, often bundled with free software.
    • Spam: Uninvited emails that can spread viruses and trojans.

    Anti-Malware Programs

    • Anti-virus Programs: Software designed to detect and neutralize malware threats, requiring constant updating to combat new threats.

    • Examples: Norton, AVG, Kaspersky, McAfee, and Avast.

    • Anti-spyware Programs: Target the detection and removal of unwanted spyware; examples include Spyware Doctor and AVG Anti-spyware.

    • Firewalls: Protect networks by blocking unauthorized access and incoming attacks over the internet or shared networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ICT Finalz PDF

    Description

    This quiz covers the various types of software relevant to Computer Science and Information Technology. It is designed for students in the 6th semester and focuses on the foundational knowledge of software classifications and their applications. Test your understanding and knowledge of different software types.

    More Like This

    Types of Software Overview
    8 questions

    Types of Software Overview

    FuturisticFigTree5271 avatar
    FuturisticFigTree5271
    Software Basics and Types
    13 questions
    Use Quizgecko on...
    Browser
    Browser