CSC 170 Spring 2019 - HW9
Assigned M 4/29, Due W 5/8/2019


Part One: Ungraded Portion
Read Module 6 parts A and B & Module 7 parts A and B of the Computer Concepts text.
Check your understanding by completing the Quick Quizzes at the end of each of these sections.


Part Two: Graded Portion
In a Microsoft Word (DOC or DOCX) file uploaded to Moodle with a filename of hw9-LastName, where LastName is replaced by your last name:
1. [20 pts. total] Type each sentence & fill in the blank (bold & underlined) based on the reading assignment (Module 6 parts A and B) in Part One above:
  • A) A new version or edition of a software product is referred to as a software ___.
  • B) ___ ___ software may be freely copied, distributed, and even resold.
  • C) Illegal copies of software are referred to as ___ software.
  • D) Windows evolved from a Microsoft operating system called ___.
  • E) Software pricing models include one-time purchase, ___, trial, and freemium.
  • F) ___ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.
  • G) ___ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.
  • H) The operating system ___ remains in RAM while a device is in operation and manages the device's resources.
  • I) ___ capabilities allow an operating system to run multiple simultaneous operations for a single program.
  • J) A ___ ___ allows one computer to simulate the hardware and software of another.
    2. [20 pts. total] Type each sentence & fill in the blank (bold & underlined) based on the reading assignment (Module 7 parts A and B) in Part One above:
  • A) ___ transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
  • B) A cryptographic ___ is a word, number, or phrase that must be known to encrypt or decrypt data.
  • C) User ___ techniques, such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.
  • D) Conventional wisdom tells us that strong passwords are at least ___ characters in length and include one or more uppercase letters, numbers, and symbols.
  • E) If you feel more secure with a totally random and unique password for each of your logins, then a ___ ___ is an excellent option.
  • F) A computer ___ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
  • G) A computer ___ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
  • H) A trojan's main purpose is to disguise ___ as legitimate software.
  • I) Through a process called side-___, an app from a source other than an official app store is installed on a device.
  • J) ___ ___ is the process of modifying an executable file or data stream by adding additional commands.
    3. [10 pts. total] Answer the question in one or more full sentences (make sure to run Spell and Grammar Check & make the appropriate corrections!):
    What is antivirus software? What three things can antivirus software attempt to do when it detects malware?

    In a separate Microsoft Word file uploaded to Mindtap:
    4. [50 pts.] In the Word Folder on Mindtap, complete the Word Module 3 Textbook Project (as you fully read Word Module 3, parts 3-2 to 3-22).


    Last Modified: 4/29/19