Which of the following is NOT one of the four major functions of a computer?
A) searching the internet
B) processing data into information
C) analyzing the data or information
D) storing the data or information
________________ makes computers faster and information easier to access.
A) Hard drive
_____________ is the set of computer programs that enables the hardware to perform different tasks.
B) Binary data
_____________ software is the set of programs that enables the computer's hardware devices and application software to work together.
Any computer parts that you can actually touch are considered to be:
The cabinet that contains the central electronic components of the computer is the:
B) system unit.
C) peripheral unit.
D) input unit.
Devices such as monitors and printers that are connected through ports to the computer are called:
A) processing devices.
B) system devices.
C) peripheral devices.
D) input devices.
All the following are examples of input devices EXCEPT a:
Which type of monitor is energy efficient and more compact?
B) cathode-ray tube (CRT)
C) liquid crystal display (LCD)
D) picture monitor
____________ ports are now the most popular ports and are used to connect a wide array of input and output devices to the computer.
When the power is turned on, software and data loads from the ____________________ into the RAM.
D) hard drive
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called:
Software that runs the computer and coordinates instructions is called:
A) application software.
B) system software.
C) device software.
D) utility software.
Software that lets you create letters, budgets, and graphs is called:
A) system software.
B) application software.
C) utility software.
D) operating system software.
When installing software, you must accept the ____________ agreement before you can continue with the installation.
C) software license
One way to effectively remove an unwanted software application from your computer is to:
A) change the name of the program.
B) highlight and delete the program's desktop icon.
C) use the install/uninstall utility
D) locate the program's .exe file and delete it.
The operating system is ____________ software.
Microsoft Windows and Mac OS use a ____________ interface.
C) graphical user
All of the following are functions of the operating system EXCEPT:
A) It provides the user interface.
B) It manages the processor.
C) It provides a way for software applications to work with the CPU.
D) It manages the removal of spyware.
The unique location of a file or folder, such as C: My Documents\Spring 2010\PowerPoint\presentation.pptx, is an example of a:
A) file extension.
B) file trail.
C) file list.
D) file path.
The most essential software on your computer system is the:
A) security software.
B) antivirus software.
C) operating system software.
D) productivity software.
Which of the following helps maintain system resources such as the hard drive?
A) Utility programs
B) Application software
C) Productivity software
D) Application programming interfaces
The main circuit board in the computer, which houses the processor and expansion cards is called __________________.
Which is an example of a device used for processing?
A) hard drive
When we refer to a computer's primary memory, which is a temporary or volatile, we are talking about ______________.
A hard drive or a zip disk is an example of what type of storage technology?
A CD or DVD is an example of this type of storage technology?
Which type of printer is non-impact and less expensive?
C) ink jet
A video card is an example of a(n) ____________________, which provides connections for peripheral devices.
B) expansion card
___________________ is a utility which cleans unnecessary files from your hard drive such as files in the Recycle Bin and temporary files.
A) display panel
B) file compression
C) disk defragmenter
D) disk cleanup
Which type of software assists with the assignment of diagnostic and procedural codes?
A) voice recognition
B) DRG grouper
Which type of software is used to assigned DRG's based on the documentation in the patient chart.
A) voice recognition
B) DRG grouper
An _______________ is a private network usually within an organization.
A) star network
This occurs when unauthorized copying of software occurs outside of the agreement.
B) Software piracy
C) Peer-to-peer file sharing