Assignment For Computer Science.
Assignment For Computer Science.
Assignment For Computer Science.
Computer hardware is a collective term used to describe any of the physical components of
an analog or digital computer. The term hardware distinguishes the tangible aspects of a
computing device from software, which consists of written, machine-readable instructions
or programs that tell physical components what to do and when to execute the instructions.
• System unit.
A system unit is the part of a computer that houses the primary devices that perform
operations and produce results for complex calculations. It includes the motherboard,
CPU, RAM and other components, as well as the case in which these devices are
housed.
1. Mother board.
A motherboard is the main printed circuit board in general-purpose computers and other
expandable systems. It holds and allows communication between many of the crucial
electronic components of a system, such as the central processing unit and memory,
and provides connectors for other peripherals.
3. Machine cycle.
4. RAM.
RAM (random access memory) is a computer's short-term memory, where the data that
the processor is currently using is stored.
5. ROM.
6. Cache.
7. System bus.
A system bus is a single computer bus that connects the major components of a
computer system, combining the functions of a data bus to carry information, an
address bus to determine where it should be sent or read from, and a control bus to
determine its operation.
RAM is a type of very fast memory that is used to temporarily hold data about
currently running programs.
ROM Read only memory is mainly used in a PC to store the tiny mini operating
system called the BIOS. The BIOS data is flashed to the ROM chip when the
motherboard is made and does not change for it’s entire lifetime (hence the term
Read Only). If you want to update the BIOS, you need to flash the ROM chip.
Cache memory is small amount of RAM located on the CPU itself. It stores commonly
used data that is being constantly used by the operating system, allowing for even
faster access than the RAM.
9. Ports.
A computer port is also called as a Communication Port as it is responsible for
communication between the computer and its peripheral device. Generally, the
female end of the connector is referred to as a port and it usually sits on the
motherboard.
• Storage units.
A hard disk drive or solid state drive holds all of the data; files, photos, programs, music, and
movies, that the user wants to keep. Removable, external media storage devices such as flash
drives and read/writeable CDs and DVDs are also secondary storage.
1. Hard disk.
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data
storage device that stores and retrieves digital data using.
2. DVD.
In computing, an optical disc drive is a disc drive that uses laser light or electromagnetic
waves within or near the visible light spectrum as part of the process of reading or
writing data to or from optical discs.
3. Flash disk.
A USB flash drive -- also known as a USB stick, USB thumb drive or pen drive -- is a plug-
and-play portable storage device that uses flash memory and is lightweight enough to
attach to a keychain. A USB flash drive can be used in place of a compact disc.
4. Cloud Storage.
Cloud storage is a model of computer data storage in which the digital data is stored in
logical pools, said to be on "the cloud". The physical storage spans multiple servers, and
the physical environment is typically owned and managed by a hosting company.
5. Unit of Data Storage.
Decimal units such as kilobyte (KB), megabyte (MB), and gigabyte (GB) are
commonly used to express the size of data. Binary units of measurement include
kibibyte (KiB), mebibyte (MiB), and gibibyte (GiB).
Byte B 8 bits
Kilobyte KB 1024 bytes
Introduction to Malware.
Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.” Examples of common malware
includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Example of Malwares.
• Virus.
• Worm.
• Spy ware.
• Adware.
• Virus.
Viruses are a subgroup of malware. A virus is malicious software attached to a document or
file that supports macros to execute its code and spread from host to host. Once
downloaded, the virus will lay dormant until the file is opened and in use. Viruses are
designed to disrupt a system’s ability to operate. As a result, viruses can cause significant
operational issues and data loss.
• Worm.
Worms are a malicious software that rapidly replicates and spreads to any device within the
network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a
device via a downloaded file or a network connection before it multiplies and disperses at an
exponential rate. Like viruses, worms can severely disrupt the operations of a device and
cause data loss.
• Spy ware.
Spyware is malicious software that runs secretly on a computer and reports back to a
remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive
information and can grant remote access to predators. Spyware is often used to steal
financial or personal information. A specific type of spyware is a keylogger, which records
your keystrokes to reveal passwords and personal information.
• Adware.
Adware is malicious software used to collect data on your computer usage and provide
appropriate advertisements to you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can redirect your browser to unsafe sites,
and it can even contain Trojan horses and spyware. Additionally, significant levels of adware
can slow down your system noticeably. Because not all adware is malicious, it is important
to have protection that constantly and intelligently scans these programs.
Be wary of emails that ask you to provide passwords. Or emails that seem to be from
friends, but have only a message such as "check out this cool website!" followed by a
link.
Personal vigilance is the first layer of protection against malware, but simply being
careful is not enough. Because business security is not perfect, even downloads from
legitimate sites can sometimes have malware attached. Which means that even the
most prudent user is at risk, unless you take additional measures.
Malware security protection provides that second vital layer of protection for your
computer or network. A robust antivirus software package is the primary component of
technological defenses that every personal and business computer system should have.
Well-designed antivirus protection has several characteristics. It checks any newly
downloaded program to ensure that it is malware-free. It periodically scans the
computer to detect and defeat any malware that might have slipped through. It is
regularly updated to recognize the latest threats.
Good antivirus protection can also recognize — and warn against — even previously
unknown malware threats, based on technical features (such as attempting to "hide" on
a computer) that are characteristic of malware. In addition, robust antivirus software
detects and warns against suspicious websites, especially those that may be designed
for "phishing" (a technique that tricks users into entering passwords or account
numbers).
Robust malware protection specifically guards your finances. These tools safeguard
your account information, and can also provide password-management tools so that
frustration over forgotten passwords does not lead you to skip over this essential
component of protection.