1. Which of the following software would allow a company to save information about their customers and products?
- A. Utility software
- B. System software
- C. Database software
- D. Middleware software

2. A UWC student requires software that will assist him/her to design a poster for an upcoming campus event. Which one of the following types of software should the student use to create the poster?
- A. Operating System
- B. Application software
- C. Embedded software
- D. System software

3. Which of the following could be a risk associated with using an Application Service Provider?
- A. Efficiency for the business
- B. Data duplication
- C. Less utilisation of space
- D. Compromise of sensitive information

4. John is considering buying software from a particular vendor, which will assist him in calculating and reconciling his inventory every week. Which one of the following is a key question that John will have to ask himself before purchasing this software?
- A. All of the options
- B. Will the software be able to run on the available operating system?
- C. Is the software vendor financially solvent and reliable?
- D. Does the software meet the business requirements that have been pre-defined?

5. Nowadays many organizations, instead of having software run on their local machines, opt to use software/systems that are provided over the network by certain vendors/enterprises and then pay monthly fees as they use the system. These can be accessed via an internet connection. The vendors who provide these systems are referred to as (i)__________ and the model that is used by these vendors to deliver these systems is known as (ii)_________.
- A. (i) Application Service Providers (ii) Online Software Service
- B. (i) Internet Service Providers (ii) Software as a Service
- C. (i) Internet Service Providers, (ii) Online Software Service
- D. (i) Application Service Providers (ii) Software as a Service

6. Software ______ is an important source of increased revenue for software manufacturers and can provide useful new functionality and improved quality for software users.
- A. third-party distributors
- B. upgrades
- C. open-source licenses
- D. bugs

7. Company ABC has adopted the software application that uses the operating system by requesting service through a(n) ______.
- A. software development kit
- B. integrated development environment
- C. application program interface
- D. utility program

8. You are just being hired by an IT company, this company has an existing system in place; however, this system fails to perform other tasks. After some consultations, you and your team developed a system that is better than the existing one. However, your IT manager suggested that you combine these two systems into one powerhouse system. Which one of the following software can you use to ensure that those two systems can be able to exchange data?
- A. Patch software
- B. Integration application software
- C. Utility software
- D. Middleware

9. Important security functions in an OS are (i) controlled resource sharing, (ii) confinement mechanism, (iii) security policy (strategy), (iv) authentication mechanism, (v) authorization mechanism, (vi) encryption
- A. ii, iii, iv and v
- B. ii, iii, and vi
- C. iii, iv, and vi
- D. all

10. Believe it or not, it is not only the computer that depends on operating systems in performing basic tasks; even non-computer items such as cars, house appliances, and so on have operating systems that control their basic tasks. The type of software that is installed in a non-computer item is referred to as _______.
- A. Embedded software
- B. Personal system software
- C. Embedded Windows
- D. Proprietary application software

11. UWC uses a software suite known as Office 365 to allow staff and students to create and share documents, spreadsheets, and presentations. UWC must pay for licenses to use this software and cannot make any changes to the code of the software. This is an example of ________ software.
- A. Off-the-shelf
- B. Proprietary software
- C. System
- D. Freeware

Answer :

Here are the solutions for the software-related questions:

1. C: Database software.

2. B: Application software.

3. D: Compromise of sensitive information.

4. D: Does the software meet the business requirements?

5. D: (i) Application Service Providers, (ii) Software as a Service.

6. B: Upgrades.

7. D: Middleware.

8. A: ii, iii, iv, and v.

9. A: Embedded software.

10. B: Proprietary software.

1. C: Database software - A database software allows a company to save and manage information about their customers and products efficiently. It provides a structured way to store, retrieve, and manipulate data.

2. B: Application software - Application software is designed to perform specific tasks or functions for end-users. In this case, the UWC student needs software specifically for designing a poster, which falls under the category of application software.

3. D: Compromise of sensitive information - One of the risks associated with using an Application Service Provider (ASP) is the potential compromise of sensitive information. When a company relies on an external provider for software services, there is a risk of unauthorized access to sensitive data.

4. D: Does the software meet the business requirements? - Before purchasing software for calculating and reconciling inventory, John should consider whether the software meets the pre-defined business requirements. It is important to ensure that the software aligns with the specific needs and functionalities required by John's business.

5. D: (i) Application Service Providers, (ii) Software as a Service - Vendors who provide software over the network and charge monthly fees for usage are known as Application Service Providers (ASPs), and the model used to deliver these systems is referred to as Software as a Service (SaaS).

6. B: Upgrades - Upgrades refer to new versions or releases of software that provide additional features, improved functionality, and enhanced quality. Upgrades are a source of increased revenue for software manufacturers and offer benefits to users.

7. D: Middleware - Middleware is software that enables communication and data exchange between different systems or applications. In this case, combining two existing systems into one powerhouse system would require the use of middleware to facilitate seamless data exchange.

8. A: ii, iii, iv, and v - Important security functions in an operating system include controlled resource sharing, confinement mechanism, security policy, authentication mechanism, authorization mechanism, and encryption. In this case, options ii, iii, iv, and v are all correct.

9. A: Embedded software - Software installed in non-computer items, such as cars and household appliances, is referred to as embedded software. It controls the basic tasks and functionalities of these non-computer devices.

10. B: Proprietary software - The use of Office 365 by UWC, where licenses are purchased and no changes can be made to the software code, exemplifies proprietary software. It is commercially developed and owned by a specific company, limiting modifications by end-users.

Learn more about software: https://brainly.com/question/28224061

#SPJ11