SlideShare a Scribd company logo
I.T Vocabulary
Vocabulary- the body of
words used in a particular
language or topic.
• Adware- A software application which
displays unwanted pop-up
advertisements on your computer while
in use. Adware is often installed at the
same time as free software or shareware.
• Application- Any program designed to
perform a specific function directly for
the user. Microsoft Word, Outlook or
Adobe Photoshop are examples of
application programs.
• Browser- A program or tool such as
Internet Explorer, Mozilla Firefox or
Google that enables you to browse or surf
the World Wide Web and view internet
sites.
• Bug- A defect or fault in a program that
prevents it from working correctly. Bugs
are caused by mistakes or errors made by
those who write the program.
• Cache- A sort of fast memory used for
temporary storage of recently accessed
web pages, which enables the browser to
display them more quickly on the next
visit.
• Bloat ware/Fat ware- Pre-installed
software that occupies a lot of space,
leaving little memory for storing personal
data.
• Cookies- Small piece of information on
the times and dates you have visited web
sites. A web server can temporarily store
this information within your browser.
• Crash- What happens when a program or
the entire operating system, unexpectedly
stops working.
• Cursor- A blinking symbol on the screen
that shows where any new text will next
be entered.
• Driver- A special program which
enables a computer to work with a
particular piece of hardware such as a
printer.
• E-mail- Electronic mail : messages
sent from one computer to another
over the internet.
• FAQ- Frequently Asked Questions.
• Firewall- Specialized hardware or
software designed to prevent
unauthorized access into or out of a
computer or network.
• Font- A particular kind of lettering (e.g.
Arial, Verdana, etc.
• Hardware- The physical equipment or
touchable parts of a computer system (the
CPU (central processing unit), monitor,
keyboard, mouse, external speakers,
scanner the printer, etc.)
• Software- is a general term for the
various kinds of program used to
operate computers and related devices.
• Home page- The main page or opening
page of a website. It usually contains
links to other pages.
• Log-in- Process by which a user enters a
name and password to access a computer.
Hardware Vocabulary
• Troubleshooting- Is the process or
identifying and fixing problems of
the Computer it may involve hardware or
software and can sometimes involve both
at the same time.
• Tools- a device or implement, especially
one held in the hand, used to carry out a
particular function.
• BIOS- (basic input/output system) is the
program a personal computer's
microprocessor uses to get the computer
system information it started after you
turn it on. It also manages computer's
operating system and attached devices
such as the drives storage capacity,
memory installed.
BIOS interface
• CMOS- A complementary metal oxide
semiconductor (CMOS) is an integrated circuit
design on a printed circuit board (PCB) that
uses semiconductor technology.
• POST- (Power-On Self-Test) is the diagnostic
testing sequence that a computer's basic
input/output system (or "starting program")
runs to determine if the computer keyboard,
random access memory, disk drives, and other
hardware are working correctly.
• BOOT- is to load an operating system
into the computer's main memory or
random access memory (RAM).
• Re-format- a computer
means completely erasing (formatting)
the hard drive and reinstalling the
operating system and all other
applications and files. ALL of your data
on the hard disk will be lost, so you will
need to back it up to a CD, DVD, flash
drive or another computer.
• Input devices- hardware that is used
to put information into the computer.
• Output devices- hardware that is
used to put out information so you
can see it or hear it.
• Storage devices- hardware that is
used to save or store information.
• Computer Technician- technician is a
person who repairs and
maintains computers and servers. The
technician's responsibilities may extend
to include building or configuring new
hardware, installing and updating
software packages, and creating and
maintaining computer networks.

More Related Content

Similar to 01 IT Vocabulary.pptx

Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
tamilvani4
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerweUnit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
saiyangodyajat
 
information technology about hardware and software
information technology about hardware and softwareinformation technology about hardware and software
information technology about hardware and software
solavwryait
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
Sweta Kumari Barnwal
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptx
KhushiSinghal52
 
IS100 Week 2
IS100 Week 2IS100 Week 2
IS100 Week 2
METU-Informatics
 
Unit-1 Part1.ppt
Unit-1 Part1.pptUnit-1 Part1.ppt
Unit-1 Part1.ppt
Sandeep kumar
 
Parts of a Computer ppt
Parts of a Computer pptParts of a Computer ppt
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
Software and Hardwew
Software and HardwewSoftware and Hardwew
Software and Hardwewsbpatel199688
 
Computer System.pptx
Computer System.pptxComputer System.pptx
Computer System.pptx
AyodeleAdetayo
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptx
RbiGradeB
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Anshumali Singh
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
Saraswati yadav
 
Components of computer
Components of computerComponents of computer
Components of computer
Ajax Carolus
 
COMPUTER FUNDAMENTALS
COMPUTER FUNDAMENTALSCOMPUTER FUNDAMENTALS
COMPUTER FUNDAMENTALS
SilenceQlny
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
Baryalay Amarzay
 

Similar to 01 IT Vocabulary.pptx (20)

Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerweUnit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
Unit-1 Part1.pptrqwrqwrq3rq33rq3rqwerwerwe
 
information technology about hardware and software
information technology about hardware and softwareinformation technology about hardware and software
information technology about hardware and software
 
Week 01.pdf
Week 01.pdfWeek 01.pdf
Week 01.pdf
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Lec#1 (1)
Lec#1 (1)Lec#1 (1)
Lec#1 (1)
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptx
 
IS100 Week 2
IS100 Week 2IS100 Week 2
IS100 Week 2
 
Unit-1 Part1.ppt
Unit-1 Part1.pptUnit-1 Part1.ppt
Unit-1 Part1.ppt
 
Parts of a Computer ppt
Parts of a Computer pptParts of a Computer ppt
Parts of a Computer ppt
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Software and Hardwew
Software and HardwewSoftware and Hardwew
Software and Hardwew
 
Computer System.pptx
Computer System.pptxComputer System.pptx
Computer System.pptx
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptx
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Components of computer
Components of computerComponents of computer
Components of computer
 
COMPUTER FUNDAMENTALS
COMPUTER FUNDAMENTALSCOMPUTER FUNDAMENTALS
COMPUTER FUNDAMENTALS
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 

More from AngelaClarito1

History of Operating System (1).pptx
History of Operating System (1).pptxHistory of Operating System (1).pptx
History of Operating System (1).pptx
AngelaClarito1
 
Permutation and combination.pptx
Permutation and combination.pptxPermutation and combination.pptx
Permutation and combination.pptx
AngelaClarito1
 
Function and Relation.pdf
Function and Relation.pdfFunction and Relation.pdf
Function and Relation.pdf
AngelaClarito1
 
Lecture-4.1-Operating-System.pptx
Lecture-4.1-Operating-System.pptxLecture-4.1-Operating-System.pptx
Lecture-4.1-Operating-System.pptx
AngelaClarito1
 
Introduction to Java.pptx
Introduction to Java.pptxIntroduction to Java.pptx
Introduction to Java.pptx
AngelaClarito1
 
Lecture_1___Introduction_to_OOP.pdf.pdf
Lecture_1___Introduction_to_OOP.pdf.pdfLecture_1___Introduction_to_OOP.pdf.pdf
Lecture_1___Introduction_to_OOP.pdf.pdf
AngelaClarito1
 
JAVA.1st lesson.pptx
JAVA.1st lesson.pptxJAVA.1st lesson.pptx
JAVA.1st lesson.pptx
AngelaClarito1
 

More from AngelaClarito1 (7)

History of Operating System (1).pptx
History of Operating System (1).pptxHistory of Operating System (1).pptx
History of Operating System (1).pptx
 
Permutation and combination.pptx
Permutation and combination.pptxPermutation and combination.pptx
Permutation and combination.pptx
 
Function and Relation.pdf
Function and Relation.pdfFunction and Relation.pdf
Function and Relation.pdf
 
Lecture-4.1-Operating-System.pptx
Lecture-4.1-Operating-System.pptxLecture-4.1-Operating-System.pptx
Lecture-4.1-Operating-System.pptx
 
Introduction to Java.pptx
Introduction to Java.pptxIntroduction to Java.pptx
Introduction to Java.pptx
 
Lecture_1___Introduction_to_OOP.pdf.pdf
Lecture_1___Introduction_to_OOP.pdf.pdfLecture_1___Introduction_to_OOP.pdf.pdf
Lecture_1___Introduction_to_OOP.pdf.pdf
 
JAVA.1st lesson.pptx
JAVA.1st lesson.pptxJAVA.1st lesson.pptx
JAVA.1st lesson.pptx
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

01 IT Vocabulary.pptx

  • 1. I.T Vocabulary Vocabulary- the body of words used in a particular language or topic.
  • 2. • Adware- A software application which displays unwanted pop-up advertisements on your computer while in use. Adware is often installed at the same time as free software or shareware. • Application- Any program designed to perform a specific function directly for the user. Microsoft Word, Outlook or Adobe Photoshop are examples of application programs.
  • 3. • Browser- A program or tool such as Internet Explorer, Mozilla Firefox or Google that enables you to browse or surf the World Wide Web and view internet sites. • Bug- A defect or fault in a program that prevents it from working correctly. Bugs are caused by mistakes or errors made by those who write the program.
  • 4. • Cache- A sort of fast memory used for temporary storage of recently accessed web pages, which enables the browser to display them more quickly on the next visit. • Bloat ware/Fat ware- Pre-installed software that occupies a lot of space, leaving little memory for storing personal data.
  • 5. • Cookies- Small piece of information on the times and dates you have visited web sites. A web server can temporarily store this information within your browser. • Crash- What happens when a program or the entire operating system, unexpectedly stops working. • Cursor- A blinking symbol on the screen that shows where any new text will next be entered.
  • 6. • Driver- A special program which enables a computer to work with a particular piece of hardware such as a printer. • E-mail- Electronic mail : messages sent from one computer to another over the internet. • FAQ- Frequently Asked Questions.
  • 7. • Firewall- Specialized hardware or software designed to prevent unauthorized access into or out of a computer or network. • Font- A particular kind of lettering (e.g. Arial, Verdana, etc. • Hardware- The physical equipment or touchable parts of a computer system (the CPU (central processing unit), monitor, keyboard, mouse, external speakers, scanner the printer, etc.)
  • 8. • Software- is a general term for the various kinds of program used to operate computers and related devices. • Home page- The main page or opening page of a website. It usually contains links to other pages. • Log-in- Process by which a user enters a name and password to access a computer.
  • 9. Hardware Vocabulary • Troubleshooting- Is the process or identifying and fixing problems of the Computer it may involve hardware or software and can sometimes involve both at the same time. • Tools- a device or implement, especially one held in the hand, used to carry out a particular function.
  • 10. • BIOS- (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system information it started after you turn it on. It also manages computer's operating system and attached devices such as the drives storage capacity, memory installed.
  • 12. • CMOS- A complementary metal oxide semiconductor (CMOS) is an integrated circuit design on a printed circuit board (PCB) that uses semiconductor technology. • POST- (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.
  • 13. • BOOT- is to load an operating system into the computer's main memory or random access memory (RAM). • Re-format- a computer means completely erasing (formatting) the hard drive and reinstalling the operating system and all other applications and files. ALL of your data on the hard disk will be lost, so you will need to back it up to a CD, DVD, flash drive or another computer.
  • 14. • Input devices- hardware that is used to put information into the computer. • Output devices- hardware that is used to put out information so you can see it or hear it. • Storage devices- hardware that is used to save or store information.
  • 15. • Computer Technician- technician is a person who repairs and maintains computers and servers. The technician's responsibilities may extend to include building or configuring new hardware, installing and updating software packages, and creating and maintaining computer networks.