Assignment For Computer Science.

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Computer Hardware.

Computer hardware is a collective term used to describe any of the physical components of
an analog or digital computer. The term hardware distinguishes the tangible aspects of a
computing device from software, which consists of written, machine-readable instructions
or programs that tell physical components what to do and when to execute the instructions.

• Brief introduction / Purpose of Computer System Components.


Computer systems consist of three components as shown in below image: Central
Processing Unit, Input devices and Output devices. Input devices provide data input to
processor, which processes data and generates useful information that’s displayed to
the user through output devices. This is stored in computer’s memory.

• System unit.
A system unit is the part of a computer that houses the primary devices that perform
operations and produce results for complex calculations. It includes the motherboard,
CPU, RAM and other components, as well as the case in which these devices are
housed.
1. Mother board.

A motherboard is the main printed circuit board in general-purpose computers and other
expandable systems. It holds and allows communication between many of the crucial
electronic components of a system, such as the central processing unit and memory,
and provides connectors for other peripherals.

2. Central Processing Unit.


The computer's central processing unit (CPU) is the portion of a computer that retrieves
and executes instructions. The CPU is essentially the brain of a CAD system. It consists
of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is
often simply referred to as the processor.

3. Machine cycle.

A machine cycle consists of the steps that a computer's processor executes


whenever it receives a machine language instruction. It is the most basic CPU
operation, and modern CPUs are able to perform millions of machine cycles per
second. The cycle consists of three standard steps: fetch, decode and execute.

4. RAM.
RAM (random access memory) is a computer's short-term memory, where the data that
the processor is currently using is stored.

5. ROM.

Read-only memory is a type of non-volatile memory used in computers and other


electronic devices. Data stored in ROM cannot be electronically modified after the
manufacture of the memory device.

6. Cache.

In computing, a cache is a hardware or software component that stores data so that


future requests for that data can be served faster; the data stored in a cache might be
the result of an earlier computation or a copy of data stored elsewhere.

7. System bus.

A system bus is a single computer bus that connects the major components of a
computer system, combining the functions of a data bus to carry information, an
address bus to determine where it should be sent or read from, and a control bus to
determine its operation.

8. Difference between RAM ,ROM AND CACHE.

RAM is a type of very fast memory that is used to temporarily hold data about
currently running programs.

ROM Read only memory is mainly used in a PC to store the tiny mini operating
system called the BIOS. The BIOS data is flashed to the ROM chip when the
motherboard is made and does not change for it’s entire lifetime (hence the term
Read Only). If you want to update the BIOS, you need to flash the ROM chip.

Cache memory is small amount of RAM located on the CPU itself. It stores commonly
used data that is being constantly used by the operating system, allowing for even
faster access than the RAM.

9. Ports.
A computer port is also called as a Communication Port as it is responsible for
communication between the computer and its peripheral device. Generally, the
female end of the connector is referred to as a port and it usually sits on the
motherboard.

• Storage units.
A hard disk drive or solid state drive holds all of the data; files, photos, programs, music, and
movies, that the user wants to keep. Removable, external media storage devices such as flash
drives and read/writeable CDs and DVDs are also secondary storage.

1. Hard disk.
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data
storage device that stores and retrieves digital data using.
2. DVD.
In computing, an optical disc drive is a disc drive that uses laser light or electromagnetic
waves within or near the visible light spectrum as part of the process of reading or
writing data to or from optical discs.
3. Flash disk.
A USB flash drive -- also known as a USB stick, USB thumb drive or pen drive -- is a plug-
and-play portable storage device that uses flash memory and is lightweight enough to
attach to a keychain. A USB flash drive can be used in place of a compact disc.
4. Cloud Storage.
Cloud storage is a model of computer data storage in which the digital data is stored in
logical pools, said to be on "the cloud". The physical storage spans multiple servers, and
the physical environment is typically owned and managed by a hosting company.
5. Unit of Data Storage.
Decimal units such as kilobyte (KB), megabyte (MB), and gigabyte (GB) are
commonly used to express the size of data. Binary units of measurement include
kibibyte (KiB), mebibyte (MiB), and gibibyte (GiB).

Unit Shortened Capacity

Bit b 1 or 0 (on or off)

Byte B 8 bits
Kilobyte KB 1024 bytes

Megabyte MB 1024 kilobytes

Gigabyte GB 1024 megabytes

Terabyte TB 1024 gigabytes

Petabyte PB 1024 terabytes

Exabyte EB 1024 petabytes

Zettabyte ZB 1024 exabytes

Yottabyte YB 1024 zettabytes

Introduction to Malware.
Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.” Examples of common malware
includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.

Example of Malwares.
• Virus.
• Worm.
• Spy ware.
• Adware.
• Virus.
Viruses are a subgroup of malware. A virus is malicious software attached to a document or
file that supports macros to execute its code and spread from host to host. Once
downloaded, the virus will lay dormant until the file is opened and in use. Viruses are
designed to disrupt a system’s ability to operate. As a result, viruses can cause significant
operational issues and data loss.

• Worm.
Worms are a malicious software that rapidly replicates and spreads to any device within the
network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a
device via a downloaded file or a network connection before it multiplies and disperses at an
exponential rate. Like viruses, worms can severely disrupt the operations of a device and
cause data loss.

• Spy ware.
Spyware is malicious software that runs secretly on a computer and reports back to a
remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive
information and can grant remote access to predators. Spyware is often used to steal
financial or personal information. A specific type of spyware is a keylogger, which records
your keystrokes to reveal passwords and personal information.

• Adware.
Adware is malicious software used to collect data on your computer usage and provide
appropriate advertisements to you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can redirect your browser to unsafe sites,
and it can even contain Trojan horses and spyware. Additionally, significant levels of adware
can slow down your system noticeably. Because not all adware is malicious, it is important
to have protection that constantly and intelligently scans these programs.

Identify ways to protect system against Malware.


One of the most popular ways to spread malware is by email, which may be disguised
to look as if it is from a familiar company such as a bank, or a personal email from a
friend.

Be wary of emails that ask you to provide passwords. Or emails that seem to be from
friends, but have only a message such as "check out this cool website!" followed by a
link.
Personal vigilance is the first layer of protection against malware, but simply being
careful is not enough. Because business security is not perfect, even downloads from
legitimate sites can sometimes have malware attached. Which means that even the
most prudent user is at risk, unless you take additional measures.

Malware security protection provides that second vital layer of protection for your
computer or network. A robust antivirus software package is the primary component of
technological defenses that every personal and business computer system should have.
Well-designed antivirus protection has several characteristics. It checks any newly
downloaded program to ensure that it is malware-free. It periodically scans the
computer to detect and defeat any malware that might have slipped through. It is
regularly updated to recognize the latest threats.

Good antivirus protection can also recognize — and warn against — even previously
unknown malware threats, based on technical features (such as attempting to "hide" on
a computer) that are characteristic of malware. In addition, robust antivirus software
detects and warns against suspicious websites, especially those that may be designed
for "phishing" (a technique that tricks users into entering passwords or account
numbers).

Finally, malware protection needs to be usable. Effective antivirus software must be


simple to download and install, so you don't need to be a Ph.D. in computer science in
order to use it. Look for antivirus software solutions that have the characteristics
outlined above — and follow through by installing it.

Robust malware protection specifically guards your finances. These tools safeguard
your account information, and can also provide password-management tools so that
frustration over forgotten passwords does not lead you to skip over this essential
component of protection.

No protection is absolute. But a combination of personal awareness and well-designed


protective tools will make your computer as safe as it can be.

Written by Dua Alvi.

You might also like