1) ________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse. A) Processing technologies B) Storage technologies C) Input technologies D) Computational technologies E) Output technologies 2) Which of the following statements is true about processing technologies? A) They are used to enter information into a computer. B) They deliver information in a usable format. C) They define the procedures that different computers follow when they transmit and receive data. D) They transform inputs into outputs. E) They move data storage away from a centralized location to the”edges” of a network. 3) ________ deliver information to you in a usable format. A) Output technologies B) Computational technologies C) Storage technologies D) Input technologies E) Processing technologies 4) A(n) ________ is also referred to as the computer’s brain. A) random-access memory B) operating system C) read-only memory D) application software E) microprocessor 5) The ________ is responsible for performing all the operations of the computer. A) random-access memory B) central processing unit C) read-only memory D) application software E) operating system 6) Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word “digitized” in the preceding sentence? A) stored in random-access memory B) encrypted in the operating system C) stored in a hard drive D) translated into binary code E) converted into application software 7) The primary storage is also known as ________. A) volatile memory B) permanent memory C) nonvolatile memory D) protocols E) long-term memory 8) Which of the following statements is true about secondary storage? A) The instructions and work stored in secondary storage are lost when the computer is shut off. B) It retains the data when the power to the computer is shut off. C) It is a temporary storage place for data that is currently being processed. D) It is considerably faster than primary storage. E) The work stored in secondary storage is lost when new data is placed. 9) The CPU interacts with ________ for permanently storing data. A) primary storage B) volatile memory C) random-access memory D) output technologies E) secondary storage 10) ________ is the collection of programs that control the basic operations of computer hardware. A) Application software B) Transitory software C) Systems software D) Open source software E) Peripheral software 1