SOFTWARE
GUI
Software development
Cybersecurity
Computer crimes
100

What kind of skills do you need to be a software developer?

Software developers need to know programming languages, data structures and algorithms, the software development process, and information security measures

100

What is the full form of GIU?

Graphical User Interface  

100

What is software development?

Software development is the process of designing, creating, testing, and maintaining software applications.

100

Which one of the following is NOT a security threat?
Virus
Firewall
Trojan
Irresponsible User Practices

Firewall

100

You can protect yourself against spam or fraudulent emails by:
- using a spam filter
- never clicking on links that you are suspicious of
- being aware of different types of fraudulent email
- all of these

all of these

200

What is the software?

The programs and other operating information used by a computer.

200

What are the components of a GUI?

Visual elements like windows, icons, menus, buttons, and pointers (WIMP) with input controls (text fields, sliders) and navigational tools (scroll bars, toolbars).

200

Who develops software?

Programmers (coders), software engineers, software developers

200

What's the name given to the use of electronic messaging systems to send an unsolicited message, usually repeatedly?

Spam

200

Which of the following is true?
- Viruses cannot be spread via email.
- Viruses can completely destroy all the data on your computer.
- Anti-virus software will always prevent a virus from attacking your computer.

Viruses can completely destroy all the data on your computer.

300

One kind of software is called ....  software, which is normally free to use.

open source

300

The background of the screen is called the .... , which contains labelled pictures called icons.

Tell the word.

Desktop

300

Put these stages of the software development process in the best order:

a. The customer checks and approves the final version.
b. Speak with the people who will use the new software and analyse how they will use it.
c. Plan the project, write the specifications and prepare instructions for the programmers.
d. Test and debug the code.
e. Write the code.

b c e d a

300

What's the name given to harassment using electronic forms of contact?

CyberBullying

300

What's the name given to tricking a user into revealing confidential information such as an access code or a credit- card number?

Phishing

400

Sometimes when software stops responding you are forced to manually abort the program yourself by pressing some strange combination of keys such as...

Control-Alt-Delete.

400

Translate into English: Удобный интерфейс

User-friendly interface

400

What are the some tools for software development?

Code Editor – The Writing Tool
Compiler – The Translator
Debugger – The Problem Finder
Testing Tools – Make Sure It Works

400

Which one of the following is NOT a characteristic of a secure password?

- Contains Uppercase letters
- Contains Numbers
- Is random
- Contains Names and Dates

Contains Names and Dates

400

What's the name given to redirecting anyone trying to visit a certain site elsewher?

Hijacking

500

Examples of open software include most popular programming languages, operating systemsand thousands of applications.
Cive some examples.

Linux, Mozilla Firefox, Open Office and others

500

In the context of common computer graphical elements, what does the acronym WIMP represent? 

- Window, icon, menu, and pointer.
- Work station, interface, megabyte, and program.
- Wide array, interface, multi array, and path.

Window, icon, menu, and pointer.

500

Which of the following is an example of programming software?
- Operating Systems
- Integrated Development Environments
- Media Players
- Disk cleanup tools

Integrated Development Environments.
Programming software provides tools for developers to write, test, and debug code.

500

What is a harmful program disguised as a gift usually in free music or games. The hacker will gain access to the computer when installed.

Trojan

500

What's the name given to using another person's identification code or using that person's files before he or she has logged off (disconnected from a network account)?

Piggybacking

M
e
n
u