preview

Yeah

Decent Essays

Computer and its components

Computer : Computer itself a combination of different type of separate electronic device. i.e. Computer only will be computer if it has INPUT DEVICE, PROCESS UNIT, and OUTPUT DEVICE.

Central Processing Unit (CPU) : It is heart and mind of the computer without this unit computer unable to process.

Keyboard : This is an input device which is used to input the data into the computer.

Mouse : This is also an input device which is used to input the data into the computer.

Monitor : This is an output device which is used to show the result of the instructions. There are variety of monitor available in the market such as, CRT Monitor, LCD Monitor, Touch Screen Monitor, TFT Monitor etc.

Switched Mode …show more content…

Compiler : This is also a convertor which converts whole high level language programme to low level language programme at a time.

Number System

Binary Number System : It has only base 2 i.e 0 and 1

Octal Number System : Base of octal is 8 i.e. 0, 1, 2, 3, 4, 5, 6, 7

Decimal Number System : Base of Decimal is 10 i.e. 0 1 2 3 4 5 6 7 8 9

Hexadecimal Number System : Base of this number system is 16 i.e. 0 1 2 3 4 5 6 7 8 9 A B C D E F

Operating System

Windows : This is an Proprietary Operating system and vendor is Microsoft. i.e. Windows 2007, Windows vista, Windows 2008 etc.

Linux : This is an open source Operating System such as ubuntu, fedora, debian, mandriva, centOS etc. Linux (Ubuntu ) Desktop Elements. File Management in Linux (Ubuntu)

Computer Security

Virus and worms : These are the computer programme which malfunction the computer system. Virus requires a carrier while worms does this by itself. Worm does not requires any carrier.

Spoofing : Through this, deceiving the computer users and making the fool.

Intrusion or Hacking : If a computer is used and controlled by unauthorised users then it is called hacking and who does this is called hacker. Main purpose of hacking to steal the private data or alter the actual data.

Denial of Services: The main aim of this attack is to bring down the targeted network and make it to deny the service for

Get Access