Task 1 written tasks:
1.IT jobs and duties: Listen to Record 2. Ex 3. Page-5
Supervise a team of technical support people;
Have great job;
Be responsible for IT projects;
Look after computers;
Install software;
Diagnose problem;
Design database;
Maintain them;
Write specifications for software;
3.System specifications: Ex-2. Page -12
Internal components: 8- memory; 1-power supply unit;
Peripherals: 3-headphones; 5-keyboard; 2-mouse; 9-monitor; 11-printer; 12-screen;
Strorage: 1-external drive; 3-hard disk drive; 4-optical drive; 6- solid state drive;
4. GUI operations: Ex-3. Page-14.
1-b;
2-f;
3-a;
4-e;
5-d;
6-c;
7-g;
5.Multimedia hardware: Ex-5. Page -17.
3-insert =>put(into);
4-power socket=>electricity socket;
5-turn on => switch on;
8-switch off => turn off;
6-press => push;
7.Internet browsing: Ex-3. Page- 20.
1-c;
2-d;
3-e;
4-h
5-g;
6-a;
7-f;
8-b;
8.Networks: Ex-13 Page -23.
You probably have a Wi-Fi router at home, don't you? Devices connected to it can exchange information even without the Internet. This means that you have your own network in your home, but you need to be within reach of the router to connect to it. A VPN (Virtual Private Network) is a virtual private network. It works on the internet so you can connect to it from anywhere.
For example, the company you work for can use a virtual private network for employees who work remotely. Using a VPN, they connect to the working network. In this case, their computer, smartphone or tablet is virtually transferred to the office and connected to the network from within. To connect to a virtual private network, you need to know the address, login and password of the VPN server.
VPNs are very easy to use. Typically, a company creates a VPN server on a local computer, server, or data center somewhere; connections to it are made through the VPN-client application on the user's device.
Currently, all popular operating systems - Android, iOS, Windows, macOS, Linux and others already have VPN-client software.
The VPN connection between the client and the server is usually encrypted.
9.Mobile computing: Ex.10. Page 25;
1.mobile workers;
2.central database;
3.trafiic wardens;
4.OCR technology;
5.contral centre;
6.paperwork;
7. record keeping costs are lower.
10.E-mail: Ex.2. Page 26.
1-I;
2-C;
3-F
4-B;
5-A;
6-G;
7-E
8-J;
9-D
10-H;
Task 1 oral answer topics:
2.IT workplace rules: What IT workplace rules do you know?
Example of IT workplace rules are:
1.When using a computer, the distance between the user and the monitor should be 25-30 sm.
2.Technical safety regulations must be observed when using electricity.
3.It is immosible to talk on the phone for a long time and use it.
4.It is impossible to drink or consume various drinks in front of a computer or similar technology.
5.Keep your passwords secret when using the public communication systeam and to not give them anyone.
6.Operating systems: What is an Operating system? Why is it so necessary for a computer?
An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language
You can, but your computer would stop working because Windows is the operating system, the software that makes it tick and provides a platform for programs, like your web browser, to run on. Without an operating system your laptop is just a box of bits that do not know how to communicate with one another, or you.
An Operating System (OS) is a collection of software that manages computer hardware and provides services for programs. Specifically, it hides hardware complexity, manages computational resources, and provides isolation and protection. Most importantly, it directly has privilege access to the underlying hardware.
Do'stlaringiz bilan baham: |