200

51
200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 Computer Basics Systems Viruses Alternative Input Speech Recognitio

description

Computer Basics. Systems. Viruses. Alternative Input. Speech Recognition. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 400. 400. 400. 400. 400. 500. 500. 500. 500. 500. The components that make up a computer system are:. Hardware. - PowerPoint PPT Presentation

Transcript of 200

Page 1: 200

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

Computer Basics

Systems VirusesAlternativeInput

SpeechRecognition

Page 2: 200

The components that make up a computer system are:

Page 3: 200

Hardware

Page 4: 200

Data that appears on the monitor is called:

Page 5: 200

Softcopy

Page 6: 200

Information that leaves the computer is called:

Page 7: 200

Output

Page 8: 200

Software packages used to create financial statements using

mathematical calculations are:

Page 9: 200

Electronic spreadsheet

Page 10: 200

What equipment is used like a copy machine to allow

information to be input into the computer?

Page 11: 200

Scanner

Page 12: 200

The operating system functions do NOT include:

Page 13: 200

Managing input and output

Page 14: 200

What system software controls the computer operations?

Page 15: 200

System

Page 16: 200

Which utility is used to locate and disinfect a virus?

Page 17: 200

Antiviral

Page 18: 200

The acronym MS-DOS stands for:

Page 19: 200

Microsoft Disk Operating System

Page 20: 200

The operating system capability that permits more than one

program to run simultaneously is called:

Page 21: 200

Multitasking

Page 22: 200

To protect the computer from detecting a virus the user should

install a/an:

Page 23: 200

Anti-virus program

Page 24: 200

Which is a destructive computer code or virus that is designed to

activate at a specific time?

Page 25: 200

Bomb

Page 26: 200

Which is NOT a virus known to destroy or cause damage to

computer files?

Page 27: 200

Hacker

Page 28: 200

Which is NOT considered a security measure?

Page 29: 200

Giving your password to your friends

Page 30: 200

Which software allows the user to pay a small fee after the trial

period?

Page 31: 200

Shareware

Page 32: 200

The software that transforms spoken words into typed text is

called:

Page 33: 200

Speech recognition

Page 34: 200

What equipment allows the user to capture pictures and move

them to the computer?

Page 35: 200

Digital camera

Page 36: 200

The input device that transfers images or text into a word

processing document or e-mail is a:

Page 37: 200

Flatbed scanner 

Page 38: 200

What device or system measures a human characteristic for the

purpose of identification?

Page 39: 200

Biometric

Page 40: 200

The use of a biometric device does NOT eliminate:

Page 41: 200

The possibility of stolen passwords increasing

 

Page 42: 200

A way of speaking that is characteristic of a geographic

region is called a(n):

Page 43: 200

Accent

Page 44: 200

Which is necessary for speech recognition on a computer

system?

Page 45: 200

Sound card or sound chip

Page 46: 200

What is the fastest number of words per minute that modern

speech recognition systems can recognize speech?

Page 47: 200

200

Page 48: 200

A special file that collects data about a user’s speech patterns is

called a:

Page 49: 200

Profile

Page 50: 200

The process in which a user reads a sample script aloud, enabling

the speech recognition system to record an individual’s unique

speech patterns is:

Page 51: 200

Training