S: D.C.S. Class
FC: What I learned in D.C.S.
1: We learned the input and output process. we learned that there is input and output and the processor. there is storage also, the storage has R.O.M.(read only memory). the processor has R.A.M.(random access memory.
2: Table of contents Chapter 1. Objective 1 Chapter 2. alternative input devices Chapter 3. speech recognition Chapter 4. Accountability
3: Chapter 5. Word possessing Chapter 6. Spreadsheet Chapter 7. DataBase Chapter 8.
4: We learned about the three components of a computer system, and that there are three main ones Hardware, system software and Application Software
5: there are four typer of software. the first is Commercial software which costs to use it and is copyrighted and has to be registered | The second type is Shareware. Shareware is copyrighted and used on a trial basis
6: The third is Freeware. it is free but it is still copyrighted and the owner still | The fourth and final is Public Domain. this software is not copyrighted and you can alter it.
7: The types of viruses are, Bomb Trojan Horse Worm Phage Hoax
8: Bomb is made to go off at a certain time. A Trojan Horse is one that looks like it is good but is not
9: A Worm is a virus that slowly eats your memory .
10: Chapter 2 Alternative input devices
11: one of the alternative input devices is the touch screen. | the touch screen work ia how you can touch it to use it.
12: one the other ones is the joystick. it can be used in games. | it is used in games for flying and other things.
13: another one is the microphone. it can be put on a headset and is used in speech recognition. it picks up noise and turn it into text.
14: Digital cameras, they are cameras that record and store photographic images in digital form.they are useful in many ways on is that you can travel with them easily. can capture moments in an instance.
15: A Stylus is a tool created for touch screen to make them work better. the stylus prevents oils on the hand from getting on the touch screen. it is an input device.
16: A Puc is a pointing device used on a graphic tablet. it is similar to the mouse in shape and size.
17: Tablets are great hand writing recognition technology. it uses a graph to know where you are touching it.
18: what is a notebook computer. it is a computer that is small enough to fit in your lap. they are mainly used for people on the go but can be used for a home computer.
19: Chapter 3 Speech Recognition
20: First we had to train the system to get used to our voice patterns. We did that by reading some stories that the computer had on file. this helped it get used to our voice and accent. when you trained the system you have to make sure that the microphone is positioned correctly and working
21: To make sure your microphone was at the best place necessary we had to learn about different kinds of headsets and their advantages and disadvantages. we trained and retrained if necessary. We checked for accuracy to see if the software had gotten our voice pattern yet
22: We also had to check for speed, this showed us that the software had gotten our voice pattern and can keep up with us while we are talking at a normal rate.
23: We learned speech recognition vocabulary like Acoustic model-a set of mathematical formulas that analyze the human voice patterns and evaluates the probability of word matching the vocabulary of speech recognition
24: Continued speech- a speech recognition system that allows the user to speak normally, pausing only to give commands and to insert punctuation.
25: Discrete speech- Speech recognition system that requires the user to pause momentarily between each word.
26: When dictating numbers
28: Chapter 4 Accountability
30: Part of being accountable is helping people who think they are victims, and just doing the right thing.
31: Victims use phrases such as: it's not my job, it wasn't my fault, thats to much work, thats unfair, But...
32: Victim Phrases it's not my job lets just wait and see what happens someone ought to tell him/her that's to much work that's unfair no one else ever does that that's to hard i would have but...
33: Ways to control victimization 1:(See it)-see the truth of the situation from all sides 2:(Own it)-become accountable for your part in the situation 3:(Solve it)-become accountable for finding a solution 4:(Do it)- embrace your full responsibility for results and remain answerable for your progress in attaining those results
34: Word Processing Letters
35: There are two types of letters.The first is the Personal Letter; it is a letter to someone like your grandma. The other is a Business Letter; that means it represents a company or person.
36: Business Letters Guidelines: They are typed in block type- which means nothing is indented. you have to have a date spelled out, a return address, a letter address(who it is going to), salutation, the body of the letter, complementary close, and the name of the writer
37: Margins: 2" top margin 1" side margin 1" bottom margin Special Parts: reference initials, attachments, and enclosed notation.
38: We learned about Letter heads. Letter Heads tell your name, your address ,and your company logo.
39: Word Processing Fonts and Editing
40: We did a matching activity that showed us the definitions and we had words to match it to but we though we new most of the terminology but we didn't. We also did another activity that we brought a word document and there were directions on how to change the word,that was fun.
41: Word Processing Memos and E-Mail
42: We learned how to format an E-Mail, and what the proper grammar. We did the