Answer :
Here are the solutions for the software-related questions:
1. C: Database software.
2. B: Application software.
3. D: Compromise of sensitive information.
4. D: Does the software meet the business requirements?
5. D: (i) Application Service Providers, (ii) Software as a Service.
6. B: Upgrades.
7. D: Middleware.
8. A: ii, iii, iv, and v.
9. A: Embedded software.
10. B: Proprietary software.
1. C: Database software - A database software allows a company to save and manage information about their customers and products efficiently. It provides a structured way to store, retrieve, and manipulate data.
2. B: Application software - Application software is designed to perform specific tasks or functions for end-users. In this case, the UWC student needs software specifically for designing a poster, which falls under the category of application software.
3. D: Compromise of sensitive information - One of the risks associated with using an Application Service Provider (ASP) is the potential compromise of sensitive information. When a company relies on an external provider for software services, there is a risk of unauthorized access to sensitive data.
4. D: Does the software meet the business requirements? - Before purchasing software for calculating and reconciling inventory, John should consider whether the software meets the pre-defined business requirements. It is important to ensure that the software aligns with the specific needs and functionalities required by John's business.
5. D: (i) Application Service Providers, (ii) Software as a Service - Vendors who provide software over the network and charge monthly fees for usage are known as Application Service Providers (ASPs), and the model used to deliver these systems is referred to as Software as a Service (SaaS).
6. B: Upgrades - Upgrades refer to new versions or releases of software that provide additional features, improved functionality, and enhanced quality. Upgrades are a source of increased revenue for software manufacturers and offer benefits to users.
7. D: Middleware - Middleware is software that enables communication and data exchange between different systems or applications. In this case, combining two existing systems into one powerhouse system would require the use of middleware to facilitate seamless data exchange.
8. A: ii, iii, iv, and v - Important security functions in an operating system include controlled resource sharing, confinement mechanism, security policy, authentication mechanism, authorization mechanism, and encryption. In this case, options ii, iii, iv, and v are all correct.
9. A: Embedded software - Software installed in non-computer items, such as cars and household appliances, is referred to as embedded software. It controls the basic tasks and functionalities of these non-computer devices.
10. B: Proprietary software - The use of Office 365 by UWC, where licenses are purchased and no changes can be made to the software code, exemplifies proprietary software. It is commercially developed and owned by a specific company, limiting modifications by end-users.
Learn more about software: https://brainly.com/question/28224061
#SPJ11