Computer Science Semester 6: Software Types

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary advantage of using a Local Area Network (LAN)?

  • Securing data effectively (correct)
  • High distance coverage
  • High costs of setup
  • Limited resource sharing

Which characteristic defines a Metropolitan Area Network (MAN)?

  • Features low-speed data transfer
  • Typically covers a diameter of 5 to 50 km (correct)
  • Spans a continental area
  • Limited to a single organization

What is one of the main disadvantages of a Local Area Network (LAN)?

  • High potential for server crashes affecting all computers (correct)
  • Enhances resource sharing
  • Allows for software program sharing
  • Facilitates easy communication

What is one advantage of a Metropolitan Area Network (MAN) compared to a Wide Area Network (WAN)?

<p>Less expensive setup (D)</p> Signup and view all the answers

Which of the following is NOT a feature of a Metropolitan Area Network (MAN)?

<p>Typically requires minimal technical expertise to set up (B)</p> Signup and view all the answers

In the context of LANs and MANs, what common issue relates to data security?

<p>Vulnerability to hacker attacks (A)</p> Signup and view all the answers

Which of these statements about the conversion from LAN to MAN is true?

<p>The conversion can be done easily. (C)</p> Signup and view all the answers

What is a significant drawback of a Metropolitan Area Network (MAN)?

<p>It may experience internet speed differences based on materials. (C)</p> Signup and view all the answers

Which of the following phases involves a feasibility analysis before project investment?

<p>Business Analysis (B)</p> Signup and view all the answers

What is the primary purpose of software in relation to hardware?

<p>To execute specific tasks (B)</p> Signup and view all the answers

In which phase of software development do programmers create a coding tasks list?

<p>Programming (B)</p> Signup and view all the answers

What does the term 'software' refer to in a computer system?

<p>Programs that run on a device (B)</p> Signup and view all the answers

What is typically the first step in the software development process?

<p>Brainstorming (A)</p> Signup and view all the answers

Which phase focuses on merging all individual components before final testing?

<p>Integration (D)</p> Signup and view all the answers

In software development, what does the term 'release' imply?

<p>Launching the software to users (D)</p> Signup and view all the answers

What stage is critical for establishing whether the software project is viable?

<p>Business Analysis (B)</p> Signup and view all the answers

What is a primary advantage of Zigbee networking?

<p>Offers 128-bit AES encryption for secure connections (C)</p> Signup and view all the answers

Which aspect limits the Zigbee star network's effectiveness?

<p>The coordinator's support for up to 65,000 devices (C)</p> Signup and view all the answers

Which of the following describes a disadvantage of Zigbee networking?

<p>Its data rates are not sufficient for demanding applications (D)</p> Signup and view all the answers

What is the range covered by Zigbee communication?

<p>10 to 100 meters (B)</p> Signup and view all the answers

Which of the following is NOT a benefit of Wi-Fi networking?

<p>Support for instantaneous high data transmission (D)</p> Signup and view all the answers

What is a key characteristic of Wi-Fi technology?

<p>Enables local area networks to function wirelessly (C)</p> Signup and view all the answers

What does Wi-Fi stand for?

<p>Wireless fidelity (C)</p> Signup and view all the answers

What is a significant disadvantage mentioned about Zigbee?

<p>High licensing fees for implementation (D)</p> Signup and view all the answers

What is a primary characteristic that distinguishes computer worms from traditional viruses?

<p>Worms can spread automatically without user intervention. (A)</p> Signup and view all the answers

Which type of malware is specifically designed to give hackers remote access to a target system?

<p>Trojan horses (B)</p> Signup and view all the answers

Which of the following best describes the main function of spyware?

<p>To collect personal data without consent. (A)</p> Signup and view all the answers

What is a defining feature of adware compared to other types of malware?

<p>It delivers advertisements automatically. (D)</p> Signup and view all the answers

What type of virus targets the File Allocation Table of a hard drive?

<p>FAT virus (B)</p> Signup and view all the answers

Which type of malware poses the highest risk to essential hardware components?

<p>CMOS viruses (B)</p> Signup and view all the answers

Which of the following is NOT a behavior typically associated with spyware?

<p>Advertising pop-up messages (B)</p> Signup and view all the answers

What is the primary purpose of an anti-virus program?

<p>To protect against malicious software. (C)</p> Signup and view all the answers

Which of the following types of malware does not replicate itself once installed?

<p>Trojan horse (D)</p> Signup and view all the answers

How does a firewall protect a computer?

<p>By blocking unauthorized access and network attacks. (C)</p> Signup and view all the answers

Which statement accurately describes spam?

<p>Spam can sometimes be a useful newsletter or ad. (C)</p> Signup and view all the answers

What is a common feature of anti-malware programs?

<p>They aim to prevent and remove various forms of malware. (B)</p> Signup and view all the answers

Which of the following is NOT typically associated with anti-spyware programs?

<p>Defending against all forms of malware. (A)</p> Signup and view all the answers

What happens when an anti-virus program is not updated regularly?

<p>It may not recognize new variations of viruses. (C)</p> Signup and view all the answers

Which of the following is an example of an anti-spyware program?

<p>AVG Anti-spyware (C)</p> Signup and view all the answers

What is a significant risk associated with spam emails?

<p>They are often used to spread viruses and trojans. (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Software

  • Software consists of instructions, data, or programs that operate a computer and perform specific tasks.
  • It differentiates from hardware, the physical components of a computer.
  • Software includes applications, scripts, and programs used on devices.

Software Development Process

  • Brainstorming: Involves generating ideas for software applications.
  • Business Analysis: Evaluates market demand and project feasibility.
  • Design: Planning the software architecture and user interface.
  • Programming: Coding by developers based on specifications.
  • Integration: Merging different components into a unified system.
  • Quality Assurance: Testing the software for defects and ensuring it meets standards.
  • Release: Launching the software for end-users.

Local Area Network (LAN)

  • Pros:

    • Facilitates resource sharing and internet access.
    • Enhances communication efficiency.
    • Improves data security.
  • Cons:

    • Vulnerable to data security issues.
    • Distance limitations affect performance.
    • Server failures impact the entire network.

Metropolitan Area Network (MAN)

  • Covers larger geographic areas than LAN, typically a city or campus.

  • Pros:

    • Cost-effective for local communications.
    • Higher speed than WAN.
    • Supports easy transition from LAN to MAN.
  • Cons:

    • Management complexity is high.
    • Subject to hacker attacks.
    • High wiring requirements and lower data rates.

Zigbee Networking

  • Functions well for short-range communication (10-100 meters).

  • Pros:

    • Supports multiple network topologies.
    • Efficient power usage with low duty cycle.
    • Strong encryption and collision avoidance.
  • Cons:

    • Licensing costs around $3,500.
    • Limited star network support.
    • Not suitable for high data rate applications.

Wi-Fi Wireless Networking

  • Wi-Fi allows devices to communicate over a local area without cables.
  • Involves a wireless adaptor converting data into radio signals.
  • Pros:
    • High efficiency and flexibility in networking.
    • Cost-effective and installation-friendly.

Malware Types

  • Worms: Software that replicates itself on other computers without user intervention; examples include Sasser, Blaster, and Conficker worms.
  • Trojan Horses: Malicious software disguised as useful programs, facilitating unauthorized access to computer systems.
  • Spyware: Gathers covert information on users by transmitting data from their devices without consent.
  • Adware: Delivers advertisements automatically, often bundled with free software.
  • Spam: Uninvited emails that can spread viruses and trojans.

Anti-Malware Programs

  • Anti-virus Programs: Software designed to detect and neutralize malware threats, requiring constant updating to combat new threats.

  • Examples: Norton, AVG, Kaspersky, McAfee, and Avast.

  • Anti-spyware Programs: Target the detection and removal of unwanted spyware; examples include Spyware Doctor and AVG Anti-spyware.

  • Firewalls: Protect networks by blocking unauthorized access and incoming attacks over the internet or shared networks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

ICT Finalz PDF

More Like This

Types of Software Overview
8 questions

Types of Software Overview

FuturisticFigTree5271 avatar
FuturisticFigTree5271
Informatica e Tecnologia della Salute
15 questions
Types of Software and Programming Languages
44 questions
Use Quizgecko on...
Browser
Browser