Task 1 written tasks



Download 17,54 Kb.
Sana31.12.2021
Hajmi17,54 Kb.
#269730
Bog'liq
611 19 gh Qosimova Task1


Task 1 written tasks:

1.IT jobs and duties: Listen to Record 2. Ex 3. Page-5



  1. Supervise a team of technical support people;

  2. Have great job;

  3. Be responsible for IT projects;

  4. Look after computers;

  5. Install software;

  6. Diagnose problem;

  7. Design database;

  8. Maintain them;

  9. Write specifications for software;

3.System specifications: Ex-2. Page -12

Internal components: 8- memory; 1-power supply unit;

Peripherals: 3-headphones; 5-keyboard; 2-mouse; 9-monitor; 11-printer; 12-screen;

Strorage: 1-external drive; 3-hard disk drive; 4-optical drive; 6- solid state drive;

4. GUI operations: Ex-3. Page-14.

1-b;


2-f;

3-a;


4-e;

5-d;


6-c;

7-g;


5.Multimedia hardware: Ex-5. Page -17.

3-insert =>put(into);

4-power socket=>electricity socket;

5-turn on => switch on;

8-switch off => turn off;

6-press => push;

7.Internet browsing: Ex-3. Page- 20.

1-c;


2-d;

3-e;


4-h

5-g;


6-a;

7-f;


8-b;

8.Networks: Ex-13 Page -23.

You probably have a Wi-Fi router at home, don't you? Devices connected to it can exchange information even without the Internet. This means that you have your own network in your home, but you need to be within reach of the router to connect to it. A VPN (Virtual Private Network) is a virtual private network. It works on the internet so you can connect to it from anywhere.

For example, the company you work for can use a virtual private network for employees who work remotely. Using a VPN, they connect to the working network. In this case, their computer, smartphone or tablet is virtually transferred to the office and connected to the network from within. To connect to a virtual private network, you need to know the address, login and password of the VPN server.

VPNs are very easy to use. Typically, a company creates a VPN server on a local computer, server, or data center somewhere; connections to it are made through the VPN-client application on the user's device.

Currently, all popular operating systems - Android, iOS, Windows, macOS, Linux and others already have VPN-client software.

The VPN connection between the client and the server is usually encrypted.

9.Mobile computing: Ex.10. Page 25;

1.mobile workers;

2.central database;

3.trafiic wardens;

4.OCR technology;

5.contral centre;

6.paperwork;

7. record keeping costs are lower.

10.E-mail: Ex.2. Page 26.

1-I;

2-C;


3-F

4-B;


5-A;

6-G;


7-E

8-J;


9-D

10-H;


Task 1 oral answer topics:

2.IT workplace rules: What IT workplace rules do you know?

Example of IT workplace rules are:

1.When using a computer, the distance between the user and the monitor should be 25-30 sm.

2.Technical safety regulations must be observed when using electricity.

3.It is immosible to talk on the phone for a long time and use it.

4.It is impossible to drink or consume various drinks in front of a computer or similar technology.

5.Keep your passwords secret when using the public communication systeam and to not give them anyone.



6.Operating systems: What is an Operating system? Why is it so necessary for a computer?

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language

You can, but your computer would stop working because Windows is the operating system, the software that makes it tick and provides a platform for programs, like your web browser, to run on. Without an operating system your laptop is just a box of bits that do not know how to communicate with one another, or you.

An Operating System (OS) is a collection of software that manages computer hardware and provides services for programs. Specifically, it hides hardware complexity, manages computational resources, and provides isolation and protection. Most importantly, it directly has privilege access to the underlying hardware.
Download 17,54 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish