Up to 50% Off! Up to 50% Off Sitewide! Code: SPRING19 Ends: 3/25 Details

  1. Help
Up to 50% Off! Up to 50% Off Sitewide! Code: SPRING19 Ends: 3/25 Details

DCS 101

Hello, you either have JavaScript turned off or an old version of Adobe's Flash Player. Get the latest Flash player.

DCS 101 - Page Text Content

S: DCS 101

FC: DCS 101 By: Mike Tsambouniery

1: TABLE OF CONTENTS Chp.1 - Computer Fundamentals Chp.2 - Speech Recognition Chp.3 - Alternative Input Devices Chp.4 - Accountability

2: INTRODUCTION My name is Mike Tsambouniery and I'm writing this book to tell about what I've learned in DCS class. I'll tell about the hardware and software all the way to using software such as databases, word, Microtype etc. I'm taking DCS in my first semester as a freshman. I'll tell a little about myself before I get into all the technical stuff. My name is Mike like I said and I go to Highland Tech in Gastonia. I like to chill with friends, play football, play video games, skate, and weightlift. I like computers a lot and want to be an engineer or inventor.

3: GOALS There are 9 goals that we work on in Mrs. Mac's DCS class and they are: Goal 1: Computer Functions Goal 2: Keyboarding Goal 3: AIDs Goal 4: Speech Recognition Goal 5: Word Processing Goal 6: Spreadsheets Goal 7: Database Goal 8: S&A Goal 9: Leadership I will talk about what I've learned from each goal in the order they are listed.

5: This is a Graphic Organizer showing the 4 types of hardware and 2 types of memory. The 4 types of Hardware are: Input, Output, CPU, and Storage. Input: Mice, Keyboard, Flash Drive, Mic Output: Monitor, Speakers, Printer CPU: The actual processor in your PC Storage: Stores all the work you save on your PC, IE: Hard Drive, Flash Drive etc. The 2 types of Memory are: RAM: Ram stands for Random Access Memory IE: Resides in the CPU. (Volatile Memory) ROM: Rom stands for Read Only Memory. IE: Cd Rom. (Resides in the Storage Devices)

6: Commercial Software - Pay for it before you can use it. -Copyrighted -Must be purchased -Disabled if not registered (protected from piracy) | SHAREWARE -Copyrighted -Distributed for free on trial basis -Trials of software etc.

7: FREEWARE -Copyrighted -Freeware is free -Internet-Explorer is freeware | PUBLIC-DOMAIN SOFTWARE -Owned by public -Owner has no greater rights to the product. -Can download,modify, distribute, etc. -Free

10: Types of viruses -A virus is a program that harms the computer and does malicious damage to your computer. (Hinders performance) Bomb: A bomb computer virus is a virus that has a timer that triggers when the virus will go off (trigger) which is activated by the sender. Worm: Goes through the information on your computer and periodically destroys the information until it gets to a critical piece of information and you notice the damage it has done. You might not notice it for a really long time. (Key logger) Phage: Databases, OS’s, PDAs. It can mess up your OS or Database when your computer is connected to your PDA.

11: Trojan horse: A decoy. Something that tricks you into downloading or receiving the program/file. Once you download/receive the program/file it will put a virus on your computer. Internet advertisements (pop ups). Something that looks neat that conceals the virus. Hoax: Made out to be something bad but turns out to be harmless. But it can lead/create bad thing(s). People get you to do something that will make you harm your own computer because of lack of knowledge.

12: Computer Fundamental Vocabulary ANTI-VIRUS SOFTWARE Software that is used to protect against viruses and other malicious programs and it also warns you about infected websites and programs. Encryption -Something that is coded like a password or credit card information. (Coding) Ethics Morals/standards; doing the right thing.

13: Hackers -A program with bad ethics and illegally access another person's computer files for their own purposes. Crackers -Legal hackers. There job is to prevent hacker and data infiltration. Password -A code that will allow you to get your computer or secured device but deters others from getting in. Must know the code. Piracy -Taking someone else’s things/works and distributing it illegally.

14: Speech Recognition - Obj 3 In speech recognition we used headsets and talked into the microphone which would then create our speech into text. It would not always come out to what you say which was the challenging part. We learned about Dragon speech recognition software and random speech recognition facts/information.

15: Lastly, we learned commands such as: New line - goes to the next line Period - Creates a period at the cursor Scratch that - Deleted the last phrase said.

16: My Opinion about Speech Recognition I think that speech recognition is not accurate enough and only has one use. It is good for people who have a speaking dissability. I think typing is a lot better then using the speech recognition software and I would not pay money to use speech recognition. It is also really frustrating and training it really uses up your time. All in all i think it has a good use but has a flaw that defeats it's use.

17: Activities We did a few activities with speech recognition and they are: Adjusting the headset/microphone Creating your profile Training your profile Practicing in word with it Created a vocabulary list in word Read off paragraphs into word with it

18: AIDs (Alternate Input Devices) We learned about input devices such as touch screens, web cell phones, biometric devices, Joysticks/controllers,GPS, and handicap input devices.

19: We all did power points on a certain AID. I did Web Cell Phones. Some of the power points were about things like keyboards and mice that we already know a lot about. But we really got in depth and learned about over 15 AIDs. Some of them we knew but didn't know a lot about them so we learned about computers in this objective. I'm going to tell you about 7 AIDs.

20: Touch Screen - A touch screen is a computer display screen that enables the user to interact with the computer by touching areas on the screen. 3 basic components of a touch screen: Touch sensor, a controller and a software driver Examples: Iphone, PDA, Blackberry Storm,GPS navigators

21: Biometric Devices- Biometrics Devices use attributes of the human body, like fingerprints or Iris scans, instead of passwords. This can make them more secure. Biometrics can also use a signature as a password, it can even use your voice as a password. Types of Biometric Scanners -Fingerprint Scanners -Voice Recognition System Iris Scans -Face Recognition System -Hand and Finger Geometry -Signature Verification Biometric Devices are safer then regular passwords

22: Environmental Control Units -Environmental Control Units (ECUs) enable people to manipulate and interact with their surroundings through a variety of easy to use interfaces such as the touch of a button, flip of a switch, or even the sound of a voice. Is a system that can be used by a remote control or electronic device. A person can independently turn lights, radio, and television on and off, answer or initiate phone calls, and unlock a door.

23: Examples of Environmental Control Units -Light switch -Smart house -Air conditioners -Remote controls -Radio

24: Input Devices for Handicaps The Magic Wand Keyboard The Magic Wand Keyboard is a miniature computer keyboard, with a built-in mouse, that allows anyone with a disability to fully and easily access any computer. It is designed to be used with little or no hand movement and is the only computer keyboard and mouse that requires no strength. Most of the time they hold the wand with their mouth.

25: -Voice Recognition Speech/Voice Recognition converts spoken words to a machine-readable input, such as a computer. People with disabilities can benefit from speech recognition programs greatly. It is especially useful to people who have difficulty using their hands. Users can say things such as open file to open a file and left click this, to left click this Footime Foot Mouse Ergonomically and universally designed, Footime foot mouse and programmable pedal can help physically-challenged people navigate the computer by foot. It serves its purpose as a mouse letting you navigate and click things on the computer easily. “Trust in your feet”

26: Controllers/Joysticks A game controller is an input device used to control a video game. A controller is typically connected to a video game console or a personal computer. A game controller can be a keyboard, mouse, gamepad, joystick, paddle, or any other device designed for gaming that can receive input. Special purpose devices, such as steering wheels for driving games and light guns for shooting games, may also exist for a platform. Some devices, such as keyboards and mice, are actually generic input devices and their use is not strictly limited to that of a game controller.

27: Types of Controllers/Joysticks: Mouse Wheel Joystick Touch Screen Virtual Helmet Hand-Held devices What is a Joystick? A joystick is a lever that moves in all directions and controls the movement of a pointer or another display symbol

28: GPS (Global Positioning System) GPS is a worldwide radio-navigation system. It uses twenty-four satellites that are each 11,000 miles above the Earth. GPS uses these satellites as reference points to make positions accurate to a couple of meters (a couple of centimeters if its an advanced receiver)

29: How it Works: Ideally, a receiver triangulates its position using three satellites. The receiver measures the time it takes for a signal to get to a satellite, and how long it takes to get a signal back. Both the receiver and the satellite need to have very accurate timers which the do with some tricks. T he satellite has an atomic clock, which is the most accurate kind of timer, and those clocks run about $50K to $100K. Having atomic clocks in every receiver, isn’t probable because of the size and the cost, so they use four satellites, instead of three, to find their position.

30: Web Cell Phones The first full Web cell phone was the i-Mode introduced by NTT DoCoMo in Japan in 1999. In 2001 the first commercial launch of 3G (Third Generation) was again in Japan by NTT DoCoMo Third generation (3G) wireless networks offer faster data transfer rates than older networks such as 1G, 2G, 2.5G.

31: The higher the number the faster the Internet speed will be. 3G increases the speed at which we can surf the Internet and transfer data(downloading). Without 3G you wouldn't be able to watch things like YouTube. From the first I-Mode to the Apple I-Phone cell phones have changed dramatically. How quick they react when you perform a certain task to how fast the internet loads when you try to access a webpage have all changed. Today we have web cell phones that are touch screen and have apps that automatically take you to websites. Web Cell Phones have been out since 1999 and 3G has been out since 2001.

32: Touch Screens: Biometric Devices Environmental Control Units: Handicap Computer Input Devices: Controllers/Joysticks: GPS: Web Cellphones: | THANK YOU: David Baucom Ty Cathey Alvaro Correa Des' Tri Martin Jack Bates Amber Williams Mike Tsambouniery (me)

33: Each of these Alternate input devices were presentations by classmates and we used presented them to each other to teach about AIDs. I used six power points from different people in the class and told about their AID and what I learned. I am thanking them in this Mixbook for letting me use their information.

34: Ch. 4 Accountability and Victimization In this chapter you learn about how to be an accountable person and about victimization. Also you will learn about how to identify a victim and an accountable person.

35: Telltale Signs of Victimization: -Failing to confront issues -Blaming or Pointing fingers -Repeatedly becoming defensive -Avoiding situations -Stalling -Viewing the world as a pessimist -Using victim phrases frequently -Ignoring criticism/feedback -Citing confusion as a excuse

36: VICTIM PHRASES -I don't see a problem -It's not my job -Lets just wait and see -There's nothing I can do -Someone ought to tell him/her -It wasn't my fault -I'm doing the best I can -I didn't because -That's too much work -That's unfair -No one else does that -That's too hard -I would have but ..... *That's just some of the phrases commonly used

37: Steps To Accountability 1. See It 2. Own It 3.Solve it 4. Do It Above The Line ________THE LINE_____________ Below The Line Victim Cycle: 1. Ignore/Deny 2. It's not my job 3. Finger pointing 4. Confusion 5. Defend yourself 6. Wait and see

38: How to be accountable: 1. See the truth of the whole situation. Understand both sides. 2. Become accountable for your part in a situation; take responsibility. Decide how to face the situation and deal with it. 3. Be responsible for finding a solution. Focus on YOUR goal and involve others however they are affected. 4. Take full responsibility for the results and stick up for your progress and how you got those results.

39: Why be accountable When your an accountable person people look at you with more respect and will also respect your decisions more. When you own up for your mistakes and your progress people will look at you as a more constructive person. When your acting like a victim people will usually not look at you with the pity you expect them to. They will try to avoid you, not help you and shut you out in almost every situation. People will also not give you as much praise when you do something right if you act like a victim. People don't respect you either.

40: What is an accountable person? An accountable person owns up for their actions and takes full responsibility for their actions. Also people will not make excuses and do whatever they are suppose to at the best of their ability. An accountable person is someone you can rely on to do things without failing at it or making an excuse for being unsuccessful.

42: LETTERS Well we have started learning about letters now. We have learned about how to format a letter, what types of letters there are. Simple, general rules about letters and what is in a letter. We have also got into detail about letters and learned a lot about every detail that has to do with creating a letter. We have made two complete letters, one to an adult role model and one to our favorite teacher. We also have made a letterhead.

43: Letterheads A letterhead contains contact information for the the company that sent the letter. It also can contain a logo or other decorative items. Some examples are, email addresses, phone numbers, street addresses, return address, name of the company, and more.

44: Here Is An Example of a Letterhead: Mike Tsambouniery 2435 East Main Street London, England 03923 Letterhead@gmail.com www.Letterhead.com

45: 2 Types of Letters: Business Letter- A letter represents a company or other organization. Personal Business letter- A letter that represents a single persons business. If you have a personal problem and were going to mail your complaint to a company about your personal problem you would be mailing a personal business letter because that's YOUR business. If you were mailing a letter on behalf of your company/business that would be a business letter.

46: Example of a Formatted Personal Business Letter in Block Style: Highland School of Technology 1600 N. Morris Street Gastonia, NC 28052 October 15, 2009 Meg Tsambouniery 106 Meredith Drive Cherryville, NC 28021 Dear Mom We have been learning about different types of letters and how to format them in DCS class. We had to write a letter to our favorite adult that was not a teacher and I chose you. I chose you because you're always there for me through the good and the bad. Secondly, you're a really good role model and you teach me a lot about life. You don't ask much of us except to not do drugs, alcohol, or smoke and succeed at whatever it is we want to do. Also you ask that we be good students and make good grades which is also a goal of mine because you taught me how important it is. I also appreciate you not smoking or using any drugs because that puts on a good example to Manny and Ana. You taught me so much and helped me with so many things and I really appreciate it. If it wasnt for you Id probably not be as smart as I am and making a lot of bad choices. You do so much for our family and I dont know how you do it but you do because youre the best mom anyone could ask for. Sincerely Mike Tsambouniery

47: The point of showing this letter was just o show how a letter is formatted. How the spacing should look and what a block style letter would look like in its correct form. It is not meant to be read just to see how it's suppose to look when formatted correctly. ADD YOUR SIGNATURE IN BETWEEN THE "SINCERALY" AND YOUR PRINTED NAME.

48: Memos: Memos are a lot like letters. A memo is a message that is meant for a business to see. i.e: The boss of a company will send out a memo that only certain people will see. A memo has to do with things that are related to business. It can be personal things such as asking for a day off. Also it can be a non-personal subject and you can send a memo to as many people as you want and your subject can be about a new project within the company.

49: EXAMPLE OF A FORMATTED MEMO: TO: Mrs. MacMahan FROM: Mike Tsambouniery DATE: October 23, 2009 SUBJECT: Requesting Day Off For Dentist Appointment Tomorrow Morning. Hey Mrs. MacMahan I was wondering if it would be ok if I could have tomorrow morning off for a dentist appointment. Please get back to this by tonight, thank you.

50: TABLES: Tables are a type of graphic organizer. It sorts out information pertaining to a certain topic. Tables are useful for comparing data that concerns one topic to conclude data. Microsoft word is the software that you would use to make a table. Tables can come in all different shapes, sizes, colors, and formats. Tables can also be used to be an organizer for a report. Use the data from the table to make a report. Such as writing about statistics about a sport such as UFC fights.

51: Example of a table:

52: Reports There are two kinds of reports. 1.Business Report 2. Academic Report -Also bound/unbound Business/academic reports

53: Margins for reports are 2,1,1,1. Reports should follow an outline. A table of contents should explain what is where in the report. Only business reports have title pages. Bibliographies are used to show all material used to get the information that was said in the report.

54: Documentation of sources: -Enclose direct quotes of up to 3 lines in length in quotation marks. Quotes of 4 or more lines in length (long quotations) should be single-spaced and indented .5” from the left margin. -An ellipsis () is used to indicate the material that is omitted from a quotation. -There are 3 methods of referencing cited material within the body of a report: -Textual Citations -Foot Notes -End Notes

55: Works Cited – A listing of only those works that were cited in the report; located on a separate page at the end of the report. -Follow the same formatting as that of a bibliography. The difference is that you will only include those sources that were quoted or paraphrased. Do not include other reference materials on a works cited page.

56: Textual Citations: -Typically keyed within parenthesis immediately following the quoted material. -Includes name of the author(s), the year of publication, and the page number. Example: a textual citation. (Smith, 2003, 45)

57: Footnotes: -When using footnotes, complete documentation for a reference is placed at the bottom of the same page. A divider line (preceded and followed by a DS) typically separates footnotes from the report body. -Superscript numbers are used to consecutively identify each footnote. -Indent the first line .5” from the left margin. -Single-space each footnote; double-space between items.

58: Endnotes: -Like footnotes, endnotes contain complete documentation for a reference. However, endnotes appear on a separate page at the end of the report. -Use the same margins as for the 1st page of the report. -Endnotes are formatted like footnotes with a corresponding superscript number and 1st line indent. -Single-space each endnote; double-space between items. -Include a page number at the top right.

60: Types of Special Business Documents: Job Application Resume Purchase Requisition (Request) Purchase Order Flyers Invitation Announcement Agenda Minutes Itinerary Enhancements Orientation

61: Job Application- An employment form used by employers to document information pertaining to job applicants. -Legal document used as proof of EEOC reqs. -Employer Driven

62: Resume- Usually a one-page document, a resume is a summative document which usually outlines six major areas describing an applicant. -Personal Info -Objective -Education -School/community/Employment Awards, honors and achievements. -Work Experience -References

63: Purchase Requisition (Request) - A form to be completed by individuals within a business to request that items or services be purchased. _____________________________ Purchase Order- A form prepared by a business (buyer) and sent to another business (seller/supplier) to order items or service.

64: Flyers- A one-page document created to inform individual of an event or occasion. No response is usually needed. Can be sent to individuals within a targeted interest group, but may also be posted for the general public to view.

65: Invitation- A document sent to specified individuals to inform them and request their presence at an event or occasion. A response is often required to indicate whether or not the individual(s) will attend.

66: Announcement- A document created to inform individuals of an event or occasion. No response is usually required often sent to individuals within a targeted interested group.

67: Agenda- Includes the order of topics to be covered at a meeting and individuals responsible for each topic. ______________________ Minutes- A summary of the events and business conducted during a meeting. The official record of a meeting generally kept by the secretary of the organization

68: Itinerary- A list which includes the dates, times, schedules, lodging, and method of travel to be used on a trip. _____________________________ Enhancements- Visual additions to attract a reader's attention to specific text.

69: Orientation- The determination of how material is arranged on a page. -Portrait – Taller than Wide -Landscape – Wider than Tall.

70: Spreadsheets A program that allows you to use rows + columns of data to manage, predict, and present information. Advantages -Fast/Accurate -What Is -What If

71: Uses - School Grades Payroll Class Sizes Schedules -Sports Stats Budgets

72: -Personal Checkbook Expenses Investments Taxes -Business Payroll Investments

73: -Government Taxes Census Loans Budgets Investments

74: -Terms: Active cell – cell ready for data entry. Alignment – When data is entered into a cell, the default alignment is labels to the left and values to the right. Cell- Intersection of a row and column and is identified by a cell reference. Call Range- A selected group of cells that form rectangle.

75: Cell reference – The column letter and the row number Column – identified by letters that appear at the top of the spreadsheet. Formula – equations with symbols for math operations Function – Special formulas that do not use operators to calculate a result. Label – text, symbols dates or #s not used in calcs Rows- Identified by #s on the left side of the spreadsheet.

79: This is a chart of my typing speed and accuracy from when I first started in Mrs. Mac's class until our last set of skill analysis. My gwam was already really good so it barely improved but my accuracy is much better.

Sizes: mini|medium|large|enormous
Default User
  • By: Mike T.
  • Joined: over 9 years ago
  • Published Mixbooks: 1
No contributors

About This Mixbook

  • Title: DCS 101
  • This is a Mixbook about what I've learned in Mrs.Mac's DCS class.
  • Tags: communications, dcs, digital, mac, mixbook, mrs, portfolio, systems
  • Published: about 9 years ago