Książka Solutions - Średnio zaawansowany - Jednostka 5 - 5H
Tutaj znajdziesz słownictwo z rozdziałów 5 - 5H z podręcznika Solutions Intermediate, takie jak „system operacyjny”, „dysk twardy”, „spam” itp.
Przegląd
Fiszki
Pisownia
Test
the most fundamental software that manages a computer, cell phone, etc., hardware and provides a platform for running applications
system operacyjny, OS
a small, handheld device that we move across a flat surface to move the cursor on a computer screen
mysz, mysz komputerowa
a movie or TV screen in which the image has a high width compared to its height
ekran panoramiczny, ekran szerokokątny
the visual output of data or images on a computer, television, or other screen
wyświetlacz, ekran
the duration for which a battery can power a device or system before it needs to be recharged or replaced
żywotność baterii, czas pracy baterii
a device used for storing and retrieving digital information, which uses rapidly rotating disks to read and write data
dysk twardy, jednostka dyskowa
used to describe something that includes or combines various features or functions into a single unit
wszystko w jednym
an area on a computer where the icons of programs are displayed
pulpit, desktop
a small device used for storing data or transferring data between electronic devices
pendrive, napęd USB
to send an unwanted advertisement or message online, usually to a lot of people
spamować, wysyłać spam
(computing) a piece of software that blocks or sorts particular types of information that is sent to a computer
filtr
a computer program that searches the internet and finds information based on a word or group of words given to it
silnik wyszukiwania, wyszukiwarka
a device in a computer or gaming system that improves the display and performance of graphics and images
karta graficzna, karta wideo
a software designed to detect, prevent, and remove harmful software, such as viruses, from a computer or device
program antywirusowy, oprogramowanie antywirusowe
a harmful program that pretends to be legitimate and can give unauthorized access to a device
koń trojański