200
DESCRIPTION
Computer Basics. Systems. Viruses. Alternative Input. Speech Recognition. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 400. 400. 400. 400. 400. 500. 500. 500. 500. 500. The components that make up a computer system are:. Hardware. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/1.jpg)
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
Computer Basics
Systems VirusesAlternativeInput
SpeechRecognition
![Page 2: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/2.jpg)
The components that make up a computer system are:
![Page 3: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/3.jpg)
Hardware
![Page 4: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/4.jpg)
Data that appears on the monitor is called:
![Page 5: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/5.jpg)
Softcopy
![Page 6: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/6.jpg)
Information that leaves the computer is called:
![Page 7: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/7.jpg)
Output
![Page 8: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/8.jpg)
Software packages used to create financial statements using
mathematical calculations are:
![Page 9: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/9.jpg)
Electronic spreadsheet
![Page 10: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/10.jpg)
What equipment is used like a copy machine to allow
information to be input into the computer?
![Page 11: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/11.jpg)
Scanner
![Page 12: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/12.jpg)
The operating system functions do NOT include:
![Page 13: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/13.jpg)
Managing input and output
![Page 14: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/14.jpg)
What system software controls the computer operations?
![Page 15: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/15.jpg)
System
![Page 16: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/16.jpg)
Which utility is used to locate and disinfect a virus?
![Page 17: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/17.jpg)
Antiviral
![Page 18: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/18.jpg)
The acronym MS-DOS stands for:
![Page 19: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/19.jpg)
Microsoft Disk Operating System
![Page 20: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/20.jpg)
The operating system capability that permits more than one
program to run simultaneously is called:
![Page 21: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/21.jpg)
Multitasking
![Page 22: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/22.jpg)
To protect the computer from detecting a virus the user should
install a/an:
![Page 23: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/23.jpg)
Anti-virus program
![Page 24: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/24.jpg)
Which is a destructive computer code or virus that is designed to
activate at a specific time?
![Page 25: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/25.jpg)
Bomb
![Page 26: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/26.jpg)
Which is NOT a virus known to destroy or cause damage to
computer files?
![Page 27: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/27.jpg)
Hacker
![Page 28: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/28.jpg)
Which is NOT considered a security measure?
![Page 29: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/29.jpg)
Giving your password to your friends
![Page 30: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/30.jpg)
Which software allows the user to pay a small fee after the trial
period?
![Page 31: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/31.jpg)
Shareware
![Page 32: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/32.jpg)
The software that transforms spoken words into typed text is
called:
![Page 33: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/33.jpg)
Speech recognition
![Page 34: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/34.jpg)
What equipment allows the user to capture pictures and move
them to the computer?
![Page 35: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/35.jpg)
Digital camera
![Page 36: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/36.jpg)
The input device that transfers images or text into a word
processing document or e-mail is a:
![Page 37: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/37.jpg)
Flatbed scanner
![Page 38: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/38.jpg)
What device or system measures a human characteristic for the
purpose of identification?
![Page 39: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/39.jpg)
Biometric
![Page 40: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/40.jpg)
The use of a biometric device does NOT eliminate:
![Page 41: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/41.jpg)
The possibility of stolen passwords increasing
![Page 42: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/42.jpg)
A way of speaking that is characteristic of a geographic
region is called a(n):
![Page 43: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/43.jpg)
Accent
![Page 44: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/44.jpg)
Which is necessary for speech recognition on a computer
system?
![Page 45: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/45.jpg)
Sound card or sound chip
![Page 46: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/46.jpg)
What is the fastest number of words per minute that modern
speech recognition systems can recognize speech?
![Page 47: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/47.jpg)
200
![Page 48: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/48.jpg)
A special file that collects data about a user’s speech patterns is
called a:
![Page 49: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/49.jpg)
Profile
![Page 50: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/50.jpg)
The process in which a user reads a sample script aloud, enabling
the speech recognition system to record an individual’s unique
speech patterns is:
![Page 51: 200](https://reader035.vdocument.in/reader035/viewer/2022062718/56812c6e550346895d910609/html5/thumbnails/51.jpg)
Training