Describe the following types of application software. 

1 Answer

Answer :

 Productivity Software:

 They include word processing, spreadsheet and database management.

 They are used to speed up daily routine tasks.

 They help to work in organized and efficient manner.

 Business Software:

 They help to run any kind of business in efficient way.

 Some examples are accounting, sales, marketing and inventory softwares etc.

 Entertainment Software:

 They are used for entertainment purpose.

 Games are most popular entertainment softwares.

 They also help to improve skills like typing tutors etc.

 Education Software:

 They are used for education purpose.

 They include typing tutors, spelling tutor, language learning, medical, driving test,

 flight simulation etc. 

Related questions

Description : Differentiate between systems software and application software. 

Last Answer :  System Software:  It is a collection of programs which makes the use of computer easy and efficient.  Highly experienced computer programmers develop system software ... software includes productivity software, business software, entertainment software and education software. 

Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost

Last Answer : (D) Hardware maintenance cost

Description : The ................ model is preferred for software development when the requirements are not clear. (A) Rapid Application Development (B) Rational Unified Process (C) Evolutionary Model (D) WaterfallModel

Last Answer : (C) Evolutionary Model

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : What is a stack? State it’s application.

Last Answer : A: It is a linear data structure which follows the LIFO (Last In First out) pattern. Stack memory is used in recursion. Application: It can be used for reversing strings, for evaluating postfix expressions.

Description : The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC drivers D) Application, drivers

Last Answer : C) ODBC drivers, JDBC drivers

Description : …………… are very effective because a mode switch is not required to switch from one thread to another. A) Kernel-level threads B) User-level threads C) Alterable threads D) Application level threads

Last Answer : B) User-level threads

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True

Description : Which is/are the application(s) of stack A) Function calls B) Large number Arithmetic C) Evaluation of arithmetic expressions D) All of the above

Last Answer : D) All of the above

Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above

Last Answer : C) Implementation level

Description : Which if the following is/are the levels of implementation of data structure A) Abstract level B) Application level C) Implementation level D) All of the above

Last Answer : D) All of the above

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application

Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping 

Last Answer : (B) Web browser

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol

Last Answer : (D) Session Initiation Protocol

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary

Last Answer : (A) Indexes

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : Which of the following is not an inherent application of stack? (A) Implementation of Stack (B) Evaluation of a postfix expression (C) Job Scheduling (D) Reverse a string

Last Answer : (C) Job Scheduling

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : The maximum size of the data that the application layer can pass on to the TCP layer below is ......... (1) 216 bytes (2) 216 bytes + TCP header length (3) 216 bytes - TCP header length (4) 215 bytes

Last Answer : Answer: Marks to all

Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP

Last Answer : Answer: 1

Description : State true or false for the following statements in Java. i) Java beans slow down software development process. ii) Java Servlets do not have built in multithreading feature. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : A) i-false, ii-false

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : ………… is a good example of deterministic system. A) Life cycle B) Computer Program C) Software Program D) None of the above

Last Answer : B) Computer Program

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.

Last Answer : (D) independent of both hardware and software.

Description : Interrupt which arises from illegal or erroneous use of an instruction or data is (A) Software interrupt (B) Internal interrupt (C) External interrupt (D) All of the above

Last Answer : (B) Internal interrupt

Description : Software safety is a ................... activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire ... monitoring and management (B) Software quality assurance (C) Software cost estimation (D) Defect removal efficiency

Last Answer : (B) Software quality assurance

Description : ............... is a process model that removes defects before they can precipitate serious hazards. (A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model

Last Answer : (C) Cleanroom software engineering

Description : The Software Maturity Index (SMI) is defined as SMI = [Mf - (Fa + Fc + Fd)] / Mf Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have ... (A) SMI approaches 1 (B) SMI approaches 0 (C) SMI approaches -1 (D) None of the above

Last Answer : (A) SMI approaches 1 

Description : A good software design must have (A) High module coupling, High module cohesion (B) High module coupling, Low module cohesion (C) Low module coupling, High module cohesion (D) Low module coupling, Low module cohesion

Last Answer : (C) Low module coupling, High module cohesion

Description : While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following? (A) Length of code (B) Size of software (C) Functionality of software (D) None of the above

Last Answer : (B) Size of software

Description : Which one of the following is not a software myth? (A) Once we write the program and get it to work, our job is done. (B) Project requirements continually change, but ... not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Last Answer : (D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Description : Testing of software with actual data and in actual environment is called (A) Alpha testing (B) Beta testing (C) Regression testing (D) None of the above

Last Answer : (B) Beta testing

Description : Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) the changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes (D) all of the above

Last Answer : (D) all of the above

Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.

Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.

Description : Which one of the following is not a key process area in CMM level 5 ? (A) Defect prevention (B) Process change management (C) Software product engineering (D) Technology change management

Last Answer : (C) Software product engineering

Description : Which one of the following is not a definition of error ? (A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value. (B) It ... to fail. (D) It refers to human action that results in software containing a defect or fault. 

Last Answer : The input, or clock pulse.