It Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

IT REVIEWER

Computer- an electronic device, operating under the control of instructions stored in its
own memory that can accept data it can be input or output.
Five functions of a Computer- Takes data as input, Stores data in its own memory and
used them required, processing the data or information, Generates the output, Control
all the four steps.
Speed- Electronic device that can solve large and complex problems in few seconds.
Storage Capacity- it can store huge amount of data.
Accuracy- Carries out Calculations Accuracy.
Reliability- Produces Results with no error.
Versatility- the computer can perform different task and can be used on different
purposes.
Diligence- Computer cannot suffer from human traits such as tiredness, fatigue, lack of
concentration.
GIGO- Garbage in Garbage out
Two types of Computer Components – Hardware and Software
Hardware- Collection of physical elements that constitute a computer system
Input device- any peripheral piece of computer hardware equipment to provide data and
control signals to an information processing system such as a computer or other
information appliance.
Central Processing Unit (CPU)- is brain of a computer. It is responsible for all functions
and processes.
Arithmetic Logic Unit (ALU)- Executes all arithmetic and logical operations. Arithmetic
calculations like as addition, subtraction, multiplication and division.
Control Unit (CU)- controls and co-ordinates computer components.
Primary Memory- RAM: Random Access Memory (RAM), ROM (Read Only Memory)
Secondary Memory- Hard drive (HD), Optical Disk, Flash Disk
RAM: Random Access Memory (RAM)- a memory scheme within the computer system
responsible for storing data on a temporary basis, so that it can be promptly accessed
by the processor as and when needed.
ROM (Read Only Memory)- is a permanent form of storage. ROM stays active
regardless of whether power supply to it is turned on or off.
Hard drive (HD): is part of a unit, often called a "disk drive," "hard drive," or "hard disk
drive," that store and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
Optical Disk- an optical disc drive (ODD) is a disk drive that uses laser light as part of
the process of reading or writing data to or from optical discs.
Flash Disk- A storage module made of flash memory chips.
Output Devices- any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into humanreadable
form.
Software- generic term for organized collections of computer data and instructions
Types of Software- System Software, Application Software
System software- is responsible for controlling, integrating, and managing the individual
hardware components of a computer system
Application software is used to accomplish specific tasks other than just running the
computer system.
Storage measurements: The basic unit used in computer data storage is called a bit
(binary digit).
Disadvantages of using a computer
1.Health risks: Prolonged computer use can lead to issues like eye strain,
musculoskeletal disorders, and a sedentary lifestyle.
2.Cybersecurity threats: Computers are vulnerable to viruses, malware, and hacking.
3.Dependency and addiction: Over-reliance on computers can lead to addiction and
reduced productivity.
4.Privacy concerns: Computers can compromise personal privacy.
5.Environmental impact: Computers contribute to pollution and waste.
6.Distraction and procrastination: Excessive computer use can lead to distractions and
reduced focus.
TYPES OF SERVER

Malware- Malware, or “malicious software,” is an umbrella term that describes any


malicious program or code that is harmful to systems.
Types of Malware
Adware- is unwanted software designed to throw advertisements up on your screen,
most often within a web browser. Typically, it uses an underhanded method to either
disguise itself as legitimate, or piggyback on another program to trick you into installing
it on your PC, tablet, or mobile device.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
Virus is malware that attaches to another program and, when executed usually
inadvertently by the user replicates itself by modifying other computer programs and
infecting them with its own bits of code.
Worms are a type of malware similar to viruses. Like viruses, worms are self-
replicating.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to the affected computer.
malware, often ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypts
your files, then forces you to pay a ransom to regain access
Rootkit is a form of malware that provides the attacker with administrator privileges on
the infected system, also known as “root” access.
Keylogger is malware that records all the user’s keystrokes on the keyboard, typically
storing the gathered information and sending it to the attacker, who is seeking sensitive
information like usernames, passwords, or credit card details.
Malicious Crypto mining-, also sometimes called drive-by mining or cryptojacking, is an
increasingly prevalent malware usually installed by a Trojan.
Exploits are a type of malware that takes advantage of bugs and vulnerabilities in a
system in order to give the attacker access to your system.
Industrial espionage describes a series of covert activities in the corporate world such
as the theft of trade secrets by the removal, copying, or recording of confidential or
valuable information in a company. The information obtained is meant for use by a
competitor.
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in
order to gain control over a computer system, or to steal personal and financial
information. It uses psychological manipulation to trick users into making security
mistakes or giving away sensitive information.
BASIC PARTS OF MICROSOFT WORD
Quick AccessToolbar- Displays quick access to commonly used commands.
File Tab- The File tab has replaced the Office button in 2007. This area is called the
Backstage which helps you to manage the Microsoft application and provides access to
its options such as Open, New, Save As, Print, etc.
Ribbon Tab Title or name of the specific Ribbon.
Ribbon Displays groups of related commands within tabs. Each tab provides buttons
for commands.
Group Contain category of command buttons.
Show Dialog Box Show additional options.

BASIC PARTS OF MICROSOFT EXCELL


Term Description
1. Quick Access Toolbar Displays quick access to commonly used commands.
2. Search Bar Advance search will help you find and perform tasks.
3. Title Bar Displays the name of the application file.
4. File Tab The File tab has replaced the Office button. It helps you to manage
the Microsoft application and provide access to its options such as
Open, New, Save, As Print, etc.
5. Name Box Displays the active cell location.
6. Cell The intersection of a row and column; cells are always named with
the column letter followed by the row number (e.g. A1 and
AB209); cells may contain text, numbers and formulas.
7. Range One or more adjacent cells. A range is identified by its first and last
cell address, separated by a colon. Example ranges are B5:B8,
A1:B1 and A1:G240.
8. Status Bar Displays information about the current worksheet.
9. New Sheet Add a new sheet button.
10. Ribbon Displays groups of related commands within tabs. Each tab
provides buttons for commands.
11. Formula Bar Input formulas and perform calculations.
12. Worksheet A grid of cells that are more than 16,000 columns wide (A-Z, AA-AZ,
BA-BZ…IV) and more than 1,000,000 rows long.
13. View Option Display worksheet view mode

You might also like