CSC 170 Spring 2019 - HW9
Assigned M 4/29, Due W 5/8/2019
Part One: Ungraded Portion
Read Module 6 parts A and B & Module 7 parts A and B of the Computer Concepts text.
Check your understanding by completing the Quick Quizzes at the end of each of these sections.
Part Two: Graded Portion
In a Microsoft Word (DOC or DOCX) file uploaded to Moodle with a filename of hw9-LastName, where LastName is replaced by your last name:
1. [20 pts. total] Type each sentence & fill in the blank (bold & underlined) based on the reading assignment (Module 6 parts A and B) in Part One above:
A) A new version or edition of a software product is referred to as a software ___.
B) ___ ___ software may be freely copied, distributed, and even resold.
C) Illegal copies of software are referred to as ___ software.
D) Windows evolved from a Microsoft operating system called ___.
E) Software pricing models include one-time purchase, ___, trial, and freemium.
F) ___ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.
G) ___ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.
H) The operating system ___ remains in RAM while a device is in operation and manages the device's resources.
I) ___ capabilities allow an operating system to run multiple simultaneous operations for a single program.
J) A ___ ___ allows one computer to simulate the hardware and software of another.
2. [20 pts. total] Type each sentence & fill in the blank (bold & underlined) based on the reading assignment (Module 7 parts A and B) in Part One above:
A) ___ transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
B) A cryptographic ___ is a word, number, or phrase that must be known to encrypt or decrypt data.
C) User ___ techniques, such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.
D) Conventional wisdom tells us that strong passwords are at least ___ characters in length and include one or more uppercase letters, numbers, and symbols.
E) If you feel more secure with a totally random and unique password for each of your logins, then a ___ ___ is an excellent option.
F) A computer ___ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
G) A computer ___ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
H) A trojan's main purpose is to disguise ___ as legitimate software.
I) Through a process called side-___, an app from a source other than an official app store is installed on a device.
J) ___ ___ is the process of modifying an executable file or data stream by adding additional commands.
3. [10 pts. total] Answer the question in one or more full sentences (make sure to run Spell and Grammar Check & make the appropriate corrections!):
What is antivirus software? What three things can antivirus software attempt to do when it detects malware?
In a separate Microsoft Word file uploaded to Mindtap:
4. [50 pts.] In the Word Folder on Mindtap, complete the Word Module 3 Textbook Project (as you fully read Word Module 3, parts 3-2 to 3-22).
Last Modified: 4/29/19