Download presentation
Presentation is loading. Please wait.
Published byLynne York Modified over 9 years ago
1
200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 Computer Basics SystemsViruses Alternative Input Speech Recognition
2
The components that make up a computer system are:
3
Hardware
4
Data that appears on the monitor is called:
5
Softcopy
6
Information that leaves the computer is called:
7
Output
8
Software packages used to create financial statements using mathematical calculations are:
9
Electronic spreadsheet
10
What equipment is used like a copy machine to allow information to be input into the computer?
11
Scanner
12
The operating system functions do NOT include:
13
Managing input and output
14
What system software controls the computer operations?
15
System
16
Which utility is used to locate and disinfect a virus?
17
Antiviral
18
The acronym MS-DOS stands for:
19
Microsoft Disk Operating System
20
The operating system capability that permits more than one program to run simultaneously is called:
21
Multitasking
22
To protect the computer from detecting a virus the user should install a/an:
23
Anti-virus program
24
Which is a destructive computer code or virus that is designed to activate at a specific time?
25
Bomb
26
Which is NOT a virus known to destroy or cause damage to computer files?
27
Hacker
28
Which is NOT considered a security measure?
29
Giving your password to your friends
30
Which software allows the user to pay a small fee after the trial period?
31
Shareware
32
The software that transforms spoken words into typed text is called:
33
Speech recognition
34
What equipment allows the user to capture pictures and move them to the computer?
35
Digital camera
36
The input device that transfers images or text into a word processing document or e-mail is a:
37
Flatbed scanner
38
What device or system measures a human characteristic for the purpose of identification?
39
Biometric
40
The use of a biometric device does NOT eliminate:
41
The possibility of stolen passwords increasing
42
A way of speaking that is characteristic of a geographic region is called a(n):
43
Accent
44
Which is necessary for speech recognition on a computer system?
45
Sound card or sound chip
46
What is the fastest number of words per minute that modern speech recognition systems can recognize speech?
47
200
48
A special file that collects data about a user’s speech patterns is called a:
49
Profile
50
The process in which a user reads a sample script aloud, enabling the speech recognition system to record an individual’s unique speech patterns is:
51
Training
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.