SlideShare a Scribd company logo
BCT Section 1.3 & 1.4 Terms
                   Input & Output Devices,
                  Software & Computer Care
1. Word Processing             A program that allows you to create, edit, and print
                               text documents
2. Spreadsheet                 A document of numbered rows and lettered columns
                               that made up of cells.
3. Database                    Electronic filing systems that store data.

4. Utility                     Helps you perform housekeeping chores; complete
                               specialized tasks related to managing the computer’s
                               resources, file management, and so on.
5. Application Software        Programs that work with the OS software to help you
                               use your computer to do specific types of work.
6. System Software             A group of programs that coordinate & control the
                               resources and operations of a computer.
                               Enables components of the computer to communicate.
7. Integrated Software         Combines several software applications into one
                               program.
8. Desktop Publishing          Uses both pictures and words to give you the ability to
                               create documents.
9. Communications              Works with your modems or network hardware and
                               allows your computer to communicate with other
                               computers.
10. Multimedia                 Combines text, graphics, animation, video, and audio.

11. Input Devices              Hardware that allows you to communicate with your
                               computer.
12. Output Devices             Hardware that allows your computer to communicate
                               with the user,
13. Magnetic Storage Devices   A device that uses mylar and contains data in tracks
                               that the computer reads or stores.
14. Hard Disk Drive            A drive used to store data inside of the computer. Size
                               measured in MB and GB.
15. Floppy Disk                A hard plastic case that encloses flat circles of iron
                               oxide-coated plastic.
16. Zip Disk                   A disk that can hold a lot of information (up to 1 GB).
                               Only the size of a 3 inch disk.
17. Magnetic Tape Drives       Drives used to make backup copies for large amounts
                               of data and can replace data in the hard drive.
18. Optical Discs              Use laser technology to read and write data on platters.

19. CD-ROM                     A disk that can store up to 800MB of data.

20. DVD                        A disk the size of a CD and can be played in a CD or
                               DVD movie player.
21. Operating System           A system that provides an interface between the user or
                               application program and the computer hardware.
22. Graphical User Interface   Graphical symbols (icons) that represent files, disks,
                                programs, and other objects
23. Proper Computer Care       Keep food and drinks away from the computer and
                               keyboard.
                               Avoid dusty locations.
                               Use a surge protector.
                               Keep magnets Away.
                               Do not block vents on the CPU.
                               Avoid bright sunny locations.
                               Do not move the computer while it is in use.
                               Always exit programs properly.
                               Use a virus check program on a regular basis.
24. Proper Diskette Care       Do not remove from drives while drive in running or
                               light is on.
                               Avoid contact with magnets and electromagnetic fields.
                               Keep disks stored in a clean, cool and dry place with a
                               protective cover.
                               Keep protective metal slider in place.
                               Use a virus check program on a regular basis.
                               Avoid hot and cold locations.
                               Make a back-up copy of your programs and files.
25. Proper CD ROM Care         Keep CDs stored in a clean, cool and dry place with a
                               protective cover.
                               Avoid touching the back side of the CD; to avoid
                               scratches.
                               Avoid hot and cold locations.
                               Make a back-up copy of your programs and files.
                               Insert it into the CD ROM Drive properly; label facing
                               up.
                               Only write on CD’s with a CD Marking Pen on a label
                               or the correct side of the CD.
26. Proper Printer Care        Avoid cold, hot, and dusty locations.
                               Always use the correct ink or toner replacement.
                               Always have the proper printer cable connected to
your computer.
                         Never pull paper out of a printer in motion.
                         Do not turn off the printer while printing.
                         Read the instruction manual before operating a
                         printer.
                         Always use the proper type of paper in your printer.
27. How to Maintain your Start a Log of information on your System. Backup
Computer System          data and keep the computer system clean and cool.
28. Ergonomics           The science of designing equipment for a comfortable
                         and safe working environment

More Related Content

What's hot

Digital Classification
Digital ClassificationDigital Classification
Digital Classificationethan58
 
Software (system utilities)
Software (system utilities)Software (system utilities)
Software (system utilities)JDoughty11
 
Module 1 computer fundamental
Module 1 computer fundamentalModule 1 computer fundamental
Module 1 computer fundamentalVTC
 
Software (system utilities)
Software (system utilities)Software (system utilities)
Software (system utilities)JDoughty1
 
Introduction to comp+word+access
Introduction to comp+word+accessIntroduction to comp+word+access
Introduction to comp+word+accessGaby Mbugua
 
intro to compooters
intro to compootersintro to compooters
intro to compootersTony Edwards
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
JAI MCA-STUDENT
 
Computer system component breakdown
Computer system component breakdownComputer system component breakdown
Computer system component breakdown
Arjun Verma
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
Amir Villas
 

What's hot (11)

Digital Classification
Digital ClassificationDigital Classification
Digital Classification
 
Software (system utilities)
Software (system utilities)Software (system utilities)
Software (system utilities)
 
Module 1 computer fundamental
Module 1 computer fundamentalModule 1 computer fundamental
Module 1 computer fundamental
 
Software (system utilities)
Software (system utilities)Software (system utilities)
Software (system utilities)
 
Introduction to comp+word+access
Introduction to comp+word+accessIntroduction to comp+word+access
Introduction to comp+word+access
 
intro to compooters
intro to compootersintro to compooters
intro to compooters
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Computer system component breakdown
Computer system component breakdownComputer system component breakdown
Computer system component breakdown
 
Lecture 3
Lecture 3 Lecture 3
Lecture 3
 
Computer maitenance
Computer maitenanceComputer maitenance
Computer maitenance
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 

Viewers also liked

Technology And Student Achievement
Technology And Student AchievementTechnology And Student Achievement
Technology And Student Achievementjblikre
 
Lectores Competentes
Lectores CompetentesLectores Competentes
Lectores Competentesdaherr
 
A Galiza Medieval
A Galiza MedievalA Galiza Medieval
A Galiza Medievalnoagaliza
 
Jacoby Resume Synopsis Powerpoint
Jacoby Resume Synopsis PowerpointJacoby Resume Synopsis Powerpoint
Jacoby Resume Synopsis Powerpoint
ems179
 
FabMarker for IT Park
FabMarker for IT ParkFabMarker for IT Park
FabMarker for IT Park
Paul Serikov
 
Magen 2012
Magen 2012Magen 2012
Magen 2012rvas
 
Brochure Picam7
Brochure Picam7Brochure Picam7
Premium Inspection Report
Premium Inspection ReportPremium Inspection Report
Premium Inspection Report
Tom Rosenberger
 
Face 2
Face 2Face 2
Face 2Tony
 
Inria - Software assets - Aerospace
Inria - Software assets - AerospaceInria - Software assets - Aerospace
Inria - Software assets - Aerospace
Inria
 
Ingles8 Publishing
Ingles8 PublishingIngles8 Publishing
Ingles8 Publishingcarlos214
 
Inria - leaflet of research centre Grenoble - Rhône-Alpes
Inria - leaflet of research centre Grenoble - Rhône-AlpesInria - leaflet of research centre Grenoble - Rhône-Alpes
Inria - leaflet of research centre Grenoble - Rhône-Alpes
Inria
 
Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0
YOGISS Muñoz
 
11 suprunyuk
11 suprunyuk11 suprunyuk
11 suprunyukSalesDog
 
Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0
YOGISS Muñoz
 
Lina Marcela Salgado Ramos
Lina Marcela Salgado RamosLina Marcela Salgado Ramos
Lina Marcela Salgado Ramosguest29caee
 
Inria - Strategic plan 2008-2012
Inria - Strategic plan 2008-2012Inria - Strategic plan 2008-2012
Inria - Strategic plan 2008-2012Inria
 
астахов, SIW 2010
  астахов, SIW 2010  астахов, SIW 2010
астахов, SIW 2010
SalesDog
 

Viewers also liked (20)

Technology And Student Achievement
Technology And Student AchievementTechnology And Student Achievement
Technology And Student Achievement
 
Lectores Competentes
Lectores CompetentesLectores Competentes
Lectores Competentes
 
A Galiza Medieval
A Galiza MedievalA Galiza Medieval
A Galiza Medieval
 
Jacoby Resume Synopsis Powerpoint
Jacoby Resume Synopsis PowerpointJacoby Resume Synopsis Powerpoint
Jacoby Resume Synopsis Powerpoint
 
FabMarker for IT Park
FabMarker for IT ParkFabMarker for IT Park
FabMarker for IT Park
 
Magen 2012
Magen 2012Magen 2012
Magen 2012
 
Brochure Picam7
Brochure Picam7Brochure Picam7
Brochure Picam7
 
Premium Inspection Report
Premium Inspection ReportPremium Inspection Report
Premium Inspection Report
 
Face 2
Face 2Face 2
Face 2
 
Inria - Software assets - Aerospace
Inria - Software assets - AerospaceInria - Software assets - Aerospace
Inria - Software assets - Aerospace
 
Ingles8 Publishing
Ingles8 PublishingIngles8 Publishing
Ingles8 Publishing
 
Inria - leaflet of research centre Grenoble - Rhône-Alpes
Inria - leaflet of research centre Grenoble - Rhône-AlpesInria - leaflet of research centre Grenoble - Rhône-Alpes
Inria - leaflet of research centre Grenoble - Rhône-Alpes
 
Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0
 
Hfc g rf amplifiers
Hfc g rf amplifiersHfc g rf amplifiers
Hfc g rf amplifiers
 
11 suprunyuk
11 suprunyuk11 suprunyuk
11 suprunyuk
 
Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0Geoconda muñoz beneficios web 2.0
Geoconda muñoz beneficios web 2.0
 
Lina Marcela Salgado Ramos
Lina Marcela Salgado RamosLina Marcela Salgado Ramos
Lina Marcela Salgado Ramos
 
Hfc q- more on docsis
Hfc q- more on docsisHfc q- more on docsis
Hfc q- more on docsis
 
Inria - Strategic plan 2008-2012
Inria - Strategic plan 2008-2012Inria - Strategic plan 2008-2012
Inria - Strategic plan 2008-2012
 
астахов, SIW 2010
  астахов, SIW 2010  астахов, SIW 2010
астахов, SIW 2010
 

Similar to Bct Terms 1 3

Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
06maggiequ
 
Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4jjang97
 
Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4jjang97
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3Jean
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3bjohns65
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3dilan123
 
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)Bct Terms 1 3 (2)
Bct Terms 1 3 (2)erikabonati
 
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)Bct Terms 1 3 (2)
Bct Terms 1 3 (2)erikabonati
 
Power point lesson 03
Power point lesson 03Power point lesson 03
Power point lesson 03
heidirobison
 
Components and categories of computer
Components and categories  of computerComponents and categories  of computer
Components and categories of computer
RabiaNaeem14
 
PERFORMING COMPUTER OPERATION.pptx
PERFORMING COMPUTER OPERATION.pptxPERFORMING COMPUTER OPERATION.pptx
PERFORMING COMPUTER OPERATION.pptx
CarlKenBenitez1
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
EnquiryTITBhiwani
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
KarrarIbrahimAbdAlam
 
Introduction to Computers system ppt.ppt
Introduction to Computers system ppt.pptIntroduction to Computers system ppt.ppt
Introduction to Computers system ppt.ppt
AnkitaDhiman36
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
LordelynFrancoYusi
 
Presentation1
Presentation1Presentation1
Presentation1aterodz
 

Similar to Bct Terms 1 3 (20)

Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4
 
Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4Bct Terms 1 3 And 1 4
Bct Terms 1 3 And 1 4
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Bct Terms 1 3
Bct Terms 1 3Bct Terms 1 3
Bct Terms 1 3
 
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)Bct Terms 1 3 (2)
Bct Terms 1 3 (2)
 
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)Bct Terms 1 3 (2)
Bct Terms 1 3 (2)
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Power point lesson 03
Power point lesson 03Power point lesson 03
Power point lesson 03
 
Components and categories of computer
Components and categories  of computerComponents and categories  of computer
Components and categories of computer
 
PERFORMING COMPUTER OPERATION.pptx
PERFORMING COMPUTER OPERATION.pptxPERFORMING COMPUTER OPERATION.pptx
PERFORMING COMPUTER OPERATION.pptx
 
compooters
compooterscompooters
compooters
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
 
Introduction to Computers system ppt.ppt
Introduction to Computers system ppt.pptIntroduction to Computers system ppt.ppt
Introduction to Computers system ppt.ppt
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 

More from 06yuqingchen

Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms06yuqingchen
 

More from 06yuqingchen (6)

H
HH
H
 
Section 3 Terms
Section 3 TermsSection 3 Terms
Section 3 Terms
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Bct Terms 1 3

  • 1. BCT Section 1.3 & 1.4 Terms Input & Output Devices, Software & Computer Care 1. Word Processing A program that allows you to create, edit, and print text documents 2. Spreadsheet A document of numbered rows and lettered columns that made up of cells. 3. Database Electronic filing systems that store data. 4. Utility Helps you perform housekeeping chores; complete specialized tasks related to managing the computer’s resources, file management, and so on. 5. Application Software Programs that work with the OS software to help you use your computer to do specific types of work. 6. System Software A group of programs that coordinate & control the resources and operations of a computer. Enables components of the computer to communicate. 7. Integrated Software Combines several software applications into one program. 8. Desktop Publishing Uses both pictures and words to give you the ability to create documents. 9. Communications Works with your modems or network hardware and allows your computer to communicate with other computers. 10. Multimedia Combines text, graphics, animation, video, and audio. 11. Input Devices Hardware that allows you to communicate with your computer. 12. Output Devices Hardware that allows your computer to communicate with the user, 13. Magnetic Storage Devices A device that uses mylar and contains data in tracks that the computer reads or stores. 14. Hard Disk Drive A drive used to store data inside of the computer. Size measured in MB and GB. 15. Floppy Disk A hard plastic case that encloses flat circles of iron oxide-coated plastic. 16. Zip Disk A disk that can hold a lot of information (up to 1 GB). Only the size of a 3 inch disk.
  • 2. 17. Magnetic Tape Drives Drives used to make backup copies for large amounts of data and can replace data in the hard drive. 18. Optical Discs Use laser technology to read and write data on platters. 19. CD-ROM A disk that can store up to 800MB of data. 20. DVD A disk the size of a CD and can be played in a CD or DVD movie player. 21. Operating System A system that provides an interface between the user or application program and the computer hardware. 22. Graphical User Interface Graphical symbols (icons) that represent files, disks, programs, and other objects 23. Proper Computer Care Keep food and drinks away from the computer and keyboard. Avoid dusty locations. Use a surge protector. Keep magnets Away. Do not block vents on the CPU. Avoid bright sunny locations. Do not move the computer while it is in use. Always exit programs properly. Use a virus check program on a regular basis. 24. Proper Diskette Care Do not remove from drives while drive in running or light is on. Avoid contact with magnets and electromagnetic fields. Keep disks stored in a clean, cool and dry place with a protective cover. Keep protective metal slider in place. Use a virus check program on a regular basis. Avoid hot and cold locations. Make a back-up copy of your programs and files. 25. Proper CD ROM Care Keep CDs stored in a clean, cool and dry place with a protective cover. Avoid touching the back side of the CD; to avoid scratches. Avoid hot and cold locations. Make a back-up copy of your programs and files. Insert it into the CD ROM Drive properly; label facing up. Only write on CD’s with a CD Marking Pen on a label or the correct side of the CD. 26. Proper Printer Care Avoid cold, hot, and dusty locations. Always use the correct ink or toner replacement. Always have the proper printer cable connected to
  • 3. your computer. Never pull paper out of a printer in motion. Do not turn off the printer while printing. Read the instruction manual before operating a printer. Always use the proper type of paper in your printer. 27. How to Maintain your Start a Log of information on your System. Backup Computer System data and keep the computer system clean and cool. 28. Ergonomics The science of designing equipment for a comfortable and safe working environment