Com 111
Com 111
October 2023
What is a computer?
A computer is an electronic device that manipulates information, or data. It has the ability
to store, retrieve, and process data. You can use a computer to type documents, send email, play games,
and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos.
Parts of Computer.
1. Motherboard
2. Keyboard
3. Mouse
4. CPU
5. Computer Memory
6. Speakers
7. Mic
8. UPS
10. Printers
11. Scanners
The motherboard is basically a circuit board of a decent size, depending on the size of the computer
we’re dealing with. It acts as a nexus of sorts because it facilitates the communication of the other
components in the computer. There are ports on the motherboard that face the outside of the
computer, allowing you to plug in different components into your computer and also to charge it.
Most motherboards also allow you to scale up by including slots that allow for expansion. You could add
in components like CPUs and RAMs, Video cards, and so on. You can also expand the motherboard by
adding more ports that allow you to connect even more auxiliary devices to your computer. In other
words, you have control over just what your computer’s capabilities are.
Apart from this, the motherboard plays other roles like storing some simple information when the
computer is off, such as the system time. That’s why your computer always tells you the correct time,
even when you turn it on after a long time.
The power supply, as you might have already guessed is the powerhouse of the computer. It ensures
that every other component gets the juice that it needs to function properly. The power supply looks
like a black box of sorts, with a fan built into it. It is plugged into the motherboard, where it supplies
power to the other components of the computer.
On the one hand, the power supply is plugged into the motherboard. On the other, it is connected to
some kind of power source. If you’re using a laptop, then that power source is a removable or
permanent battery. If you’re using a desktop, then that power source is a power outlet.
The fan on the power source plays a very important role. It cools it down as it does its duty to prevent
the computer’s internals from overheating. It’s important to keep that fan clean so that the computer’s
power supply functions like it’s meant to.
The Central Processing Unit
You may have heard of the cliché that the central processing unit is the brain of the computer. Well, the
only reason it’s a cliché is that it’s true. The c_entral processing unit_, or CPU, is where all the magic
happens. It is to the computer what an engine is to a car.
The CPU mainly does arithmetic and logical tasks. It will make a bunch of calculations to ensure
the functions of the computer are carried out efficiently. The CPU doesn’t always function at a single
speed. The speed can vary depending on the priority and intensity of the task at hand. The CPU will
generate a lot of heat as it does its work and so that fan that comes built into the power supply comes in
real handy at this point.
The more powerful a CPU is, the more capable it is of carrying out more and more intense work. For the
basic things that an everyday computer does, like word processing, preparing spreadsheets, and
browsing the internet, an average CPU will do. However, when you need to edit high definition video,
program complicated software, or play CPU-intensive games, you will need a powerful CPU.
The Random Access Memory, or RAM, is a temporary form of memory. When you open an application in
our computer, the computer will place that application and all its data in the RAM. When you close the
application, then space in the RAM is freed. That is why your computer gets so slow when you have too
many applications open; your RAM is probably being used at capacity.
Since RAM is only temporary, it has a volatile nature. The minute you turn your computer off, all of the
memory that is stored in RAM is lost. That’s why you’re advised to keep saving the work you do in
applications as you go along to avoid losing all of it in case your computer suddenly goes off.
The more RAM you have, the greater the number of programs that you can run simultaneously.
The Hard Drive or Solid State Drive
Remember that we said RAM is volatile due to its temporary nature, which means the computer still
needs a more permanent form of data storage. That’s why the hard drive or solid state drive exists.
Traditionally, the hard drive is a drum with several platters piled on it and spinning, and physical arm
then writes data onto these platters. These disks are very slow because of the mechanics through which
data is stored, although latest hard drives, solid state drives, are much faster.
Solid state drives have the same kind of memory as the one on your phone or flash drive, also known as
flash memory. They cost more but are also faster and more efficient than traditional hard drives.
The data stored in the hard drive does not disappear when you switch your computer off. It will be there
when you switch the computer back on. You are, however, advised to keep it far away from magnets as
they could damage it and cause you to lose your information.
The video card is a dedicated component that hands the images output by your monitor display. They
come with their own RAM, dedicated to this singular purpose. If your work involves highly visual work at
very high definitions, then you should get yourself a video card to take the load off your RAM.
Sometimes, the computer may have integrated graphics, where some of the RAM is borrowed for
graphics processing. This happens frequently on laptops, because there is a need to save space. Using
integrated graphics is much less expensive using a graphics card, but is not sufficient for intense graphics
functions.
These have become a lot less common today, with many machines doing away with them altogether. An
optical drive is used to read CDs and DVDs, which can be used to listen to music or watch movies. They
can also be used to install software, play games, or write new information into a disk.
Input/Output Devices
Depending on the type of computer you have, there are lots of devices you can connect to your
computer to input information and also output it. Some examples of input devices are the mouse, the
keyboard, and the webcam. Examples of output devices include monitors, speakers, and monitors.
There are also removable devices, such as SD cards and flash drives, which can be used to transfer data
to and from your computer.
Display monitor
The display monitor of a computer is the screen where you can view different programs and operate the
system. The resolution and pixel density of a monitor determines its sharpness and quality. The
performance of a monitor is usually a top priority for all computer and laptop users. Laptop and
computer screens emit artificial light that can be detrimental to your eyes if exposed for long durations
without any break. You can affix an anti-glare film on your monitor or wear glasses while using the
computer to minimise the effect of this light.
Types of Computer.
1. Super Computers
2. Mainframe
3. Personal Computers
4. Mini Computers.
1. Supercomputers
A supercomputer is the fastest, largest, and most expensive type of computer that exists today. It
comprises either 10, 100, 1,000, or more computers working simultaneously. They are only designed for
special purposes that often require complex calculations, such as scientific research, weather
forecasting, nuclear energy research, and geological data analysis.
In 2023, the U.S. Department of Energy is set to roll out one of the largest supercomputers, Aurora,
which is worth about $500 million. The Aurora will process about a quintillion (260 or 1018) calculations
in seconds.
The largest known supercomputers include (but are not limited to) Fugaku, which is used in Japan for
scientific research, and Sierra, which is by the National Nuclear Security Administration (NNSA), a U.S.
federal agency, for nuclear weapons safety.
2. Mainframe Computers
Mainframe computers are enormous (2,000 to 10,000 sq. ft.) and powerful computers mainly used in
the data centers of large enterprises and organizations. They are typically found in a dedicated server
room and can be accessed remotely by different users simultaneously.
Mainframes were invented in the 1950s and are capable of processing huge amounts of data (up to 30
billion transactions per day) quickly and accurately. Mainframes have upgraded security, scalability, and
dependability levels, making them ideal for vital processes such as banking, government, or insurance.
Mainframe computers also control other systems, such as air traffic control, satellite tracking, and
military defense systems. Mainframes typically feature several CPUs, interconnected to many other
computers and gadgets to pool an even larger computing system.
3. Personal Computers
A personal computer is a computer small and low cost, which is intended for personal use (or for use by
a small group of individuals). The term “personal computer” is used to describe desktop computers
(desktops). It is often shortened to the acronym PC or microcomputer, whose meaning in English is
“personal computer”. It is a very common type of machines.
Personal Computer (acronym PC) consists of a central processing unit (CPU) contains the arithmetic,
logic, and control circuitry on an single (IC) integrated circuit; two types of memory, main memory, such
as RAM, and ROM, magnetic hard disks (HDD) and compact discs and various input/output devices,
including a display screen, keyboard and mouse, modem, and printer.
4. Minicomputers
Minicomputers are mid-sized computers, larger than microcomputers but smaller than mainframes.
These multi-processing systems are ideal for 5 to 300 people and are primarily used in small businesses,
colleges, research labs, and hospitals.
Minicomputers are cost-effective and deliver the functionalities of a mainframe computer at a more
affordable price. Minicomputers can process data from various sources while handling large chunks of
information. They are run by microprocessors and use operating systems such as Unix, Linux, or
Windows.
Minicomputers applications include networking, communication, data processing and analysis, image
processing, software development, and multimedia. Minicomputers can also store huge volumes of data
and are ideal for banking, inventory tracking, accounting, and office automation.
Theere are three different kinds of computers based on their capacity to manage data: A computer can
be Digital, Hybrid, or Analog.
Analog Computer:
An analog computer system is a type of computer system that operates on the mathematical variables
that consist of changeable physical quantities like mechanical, electrical etc.
These computers make use of continuous values in place of discrete values that generate an analog
signal. Analog computers were in use during the 1950s-1960s which were in itself a successor to code-
breaking machines used during World War II. Analog computers have a limited capacity in accepting and
computing problems and may not always be accurate in their result.
2. Digital Computer:
Digital computers are machines that employ a binary number system which has two digits only: 0 and 1.
Using this binary system, many complicated tasks are undertaken. It processes the data represented in
discrete and the main three components of digital computers are as follows:
Input
Processing
Output
The first digital computer was designed for numerical computations during the 1940s and has made
several advancements over the years. Digital computers have more accuracy than their analog
counterparts as they are not dependent on physical quantities for task processing.
Hybrid Computer
A hybrid computer is a combination of digital and analog computers and it combines the best features of
both types of computers.
For example a petrol pump contains a processor that converts fuel flow measurement into quantity and
price.
Hybrid computer is used in hospitals to measure the heartbeat of the patient. Hybrid computers are also
used in scientific applications or in controlling industrial processes.
The first desktop hybrid computing system was the Hycomp 250, released by Packard Bell in 1961.
Bit
In a computer, data is stored in the form of 0s and 1s. We can store each and every data in a computer
with the help of 0s and 1s. Each digit, either 0 or 1, is called a Bit. The Bit is the smallest unit of memory.
Bit simply refers to the binary digit.
Nibble
Nibble is just a greater version of Bit. It is a combination of 4 bits of binary digits or half of an Octet. A
nibble can be represented by a single hexadecimal digit.
Byte
In computer systems, a unit of data that is eight binary digits long is known as a byte. A byte is a unit
that computers use to represent a character such as a letter, number, or a typographic symbol (for
example, “h”, “7”, or “$”). A byte can also grasp a string of bits that need to be used in some larger units
of application processes (e.g., the stream of bits that composes a visual image for a program that
represents images or the string of bits that composes the machine code of a computer program).
KiloByte
The kilobyte is the smallest unit of memory measurement but greater than a byte. A kilobyte is 103 or
1,000 bytes abbreviated as ‘K’ or ‘KB’. It antecedes the MegaByte, which contains 1,000,000 bytes. One
kilobyte is technically 1,000 bytes, therefore, kilobytes are often used synonymously with kibibytes,
which contain exactly 1,024 bytes (210).
Kilobytes are mostly used to measure the size of small files. For example, a simple text document may
contain 10 KB of data and therefore it would have a file size of 10 kilobytes. Graphics of small websites
are often between 5 KB and 100 KB in size. Individual files typically take up a minimum of four kilobytes
of disk space.
One megabyte is equal to 1,000 KBs and antecedes the gigabyte (GB) unit of memory measurement. A
megabyte is 106 or 1,000,000 bytes and is abbreviated as “MB”. 1 MB is technically 1,000, 000 bytes,
therefore, megabytes are often used synonymously with mebibytes, which contain exactly 1, 048, 576
bytes (220).
Megabytes are mostly used to measure the size of large files. For example, a high-resolution JPEG image
might range in size from 1-5 megabytes. A 3-minute song saved in a compressed version may be roughly
3MB in size, and the uncompressed version may take up to 30 MB of disk space. Compact Disk’s capacity
is measured in megabytes (approx 700 to 800 MB), whereas the capacity of most other forms of media
drives, such as hard drives and flash drives, is generally measured in gigabytes or terabytes.
GigaByte
One gigabyte is equal to 1,000 MBs and precedes the terabyte(TB) unit of memory measurement. A
gigabyte is 109 or 1,000,000,000 bytes and is abbreviated as “GB”. 1 GB is technically 1,000,000,000
bytes, therefore, gigabytes are used synonymously with gibibytes, which contain exactly 1,073,741,824
bytes (230).
Gigabytes, are sometimes also abbreviated as “gigs, ” and are often used to measure a storage device’s
capacity. e.g., a standard DVD drive can hold 4.7 GB of data. Storage devices that hold 1, 000 GB of data
or more are measured in terabytes.
An operating system (OS) is the program that, after being initially loaded into the computer by a boot
program, manages all of the other application programs in a computer. The application programs make
use of the operating system by making requests for services through a defined application program
interface (API). In addition, users can interact directly with the operating system through a user
interface, such as a command-line interface (CLI) or a graphical UI (GUI).
An operating system brings powerful benefits to computer software and software development.
Without an operating system, every application would need to include its own UI, as well as the
comprehensive code needed to handle all low-level functionality of the underlying computer, such as
disk storage, network interfaces and so on.
1. Microsoft Windows
2. Linux
3. IOS
4. IBM
5. Android
The Windows operating system from Microsoft is a graphical operating system. Users can use it to read
and store files, run apps, play games, and watch videos, as well as connect to the internet. It was made
available for both personal and professional use.
Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating
system (OS) developed by Microsoft Corporation (PCs). The Windows operating system, which included
the first graphical user interface (GUI) for IBM-compatible PCs, quickly dominated the PC market.
Windows is install on around 90% of personal computers.
The first version of Windows, introduced in 1985, was merely a graphical user interface (GUI) added to
Microsoft’s existing disc operating system, MS-DOS.
Beginning with Windows XP, Microsoft released many editions of Windows. The underlying operating
system is the same in all of these versions, however some incorporate further capabilities for a fee. The
two most popular editions of Windows are:
Windows Home
Windows Home is the most basic version of the OS. It includes all of Windows’ essential features, such
as web surfing, Internet connection, video game play, office software use, and video viewing. It’s also
less priced and comes pre-installed on a lot of new laptops.
Windows Professional
Windows Professional (also known as Window Pro or Win Pro) is a version of Windows that runs on a
PC. It’s a more powerful version of Windows that’s ideal for power users and small to medium-sized
companies. It includes all of the features of Windows Home plus the following:
Remote Desktop
Hyper – V
Bitlocker
Trusted Boot
Linux is the best-known and most-used open source operating system. As an operating system, Linux is
software that sits underneath all of the other software on a computer, receiving requests from those
programs and relaying these requests to the computer’s hardware.
But Linux also is different from other operating systems in many important ways. First, and perhaps
most importantly, Linux is open source software. The code used to create Linux is free and available to
the public to view, edit, and—for users with the appropriate skills—to contribute to.
What Is iOS?
The iOS is a mobile operating system developed by Apple. It is the operating system that powers Apple’s
iPhones today.
The iOS has evolved over the years and today integrates features and functionalities like multitasking,
cloud syncing, augmented reality, and machine learning capabilities. iOS devices deliver a robust,
seamless, and user-friendly social media experience. The system provides access to popular social media
applications through the App Store.
The launch of iOS was historic as it was the first time a complete touchscreen interface was introduced
for a mobile phone.
So, what is iOS? iOS stands for the ‘iPhone Operating System.’ When it was first released in 2007, it was
called ‘iPhone OS,’ but was renamed after the launch of version 4. It was used to run the iPhone, iPad,
and iPod until iOS 13. After that, Apple released different operating systems for devices other than
iPhones.
With an optimized user interface and a wide range of apps, iOS stands out for its focus on user privacy
and security. Banking on iOS features like Face ID, Touch ID, and rigorous app permissions, users can
message, browse emails, and use social media without any concerns over security.
iOS is a convenient operating system for social media marketers, influencers, and other users, with
several exciting features supporting multimedia capabilities and sharing and a comprehensive
notification management system.
AirDrop
AirDrop is a convenient functionality that enables iOS device users to share videos, photos, and other
files with other iOS users nearby. Using AirDrop, you can swiftly transmit multimedia content without
going through the process of emailing or uploading them to social media sites or storage platforms.
Siri Shortcuts
This iOS feature enables users to create custom voice commands for frequently performed tasks. This
feature is helpful for social media platforms as users can create shortcuts for tasks such as posting a
tweet or updating their Facebook status. The significant advantage of this feature is that you need not
navigate manually through the apps.
Share Sheet
Share Sheet can support social media users to easily share interesting content across social media
platforms without switching between apps. It is a convenient feature that saves you time and effort in
sharing content on your social media.
Moreover, users of iOS can access social media easily with various iOS features, such as Siri, Apple
Music, and iMessage, which have been seamlessly integrated with major social media platforms.
Siri Integration
As you’d know, Siri is a voice-controlled personal assistant built into iOS devices for users to carry out
everyday tasks with just their voice. But did you know Siri has been integrated into major social media
platforms like Twitter, WhatsApp, and Facebook?
This integration makes it all easier for social media managers and other users as they can carry out tasks
such as sending messages on these platforms without opening the app. Users can simply command Siri
to do something, and the AI will take care of it.
iMessage Integration
The iOS operating system comes with a built-in messaging application called iMessage. The app allows
users to share content from their social media accounts with anyone on their contacts while staying on
the messaging interface.
Apple Music has been developed to enhance accessibility to music on iOS devices. Instagram and
Facebook are two popular social media platforms that have integrated Apple Music into their interface,
allowing users to share their preferred music without switching between applications.
BSD is configured for internet hosting, web hosting, and hosting many servers on one system. It is the
first OS to have added an internet protocol. BSD OSes have a very strongly enforced time-sharing
system, which makes them most useful where resources are shared between processes.
BSD includes a ‘Jails’ system which is somewhat analogous to Linux Containers —except with additional
security and flexibility in implementation.
The Android operating system is a mobile operating system that was developed by Google (GOOGL) to
be primarily used for touchscreen devices, cell phones, and tablets. Its design lets users manipulate the
mobile devices intuitively, with finger movements that mirror common motions, such as pinching,
swiping, and tapping. Google also employs Android software in televisions, cars, and wristwatches—
each of which is fitted with a unique user interface.
The 1st Generation Computers were introduced using the technology of vacuum tubes which can
control the flow of electronics in a vacuum. These tubes are usually used in switches, amplifiers, radios,
televisions, etc. The First Generation of Computer was very heavy and large and were not ideal for
programming. They used basic programming and didn’t have an operating system, which made it tough
for users to do programming on them. The 1st Generation Computers required a big room dedicated to
them and also consumed a lot of Electricity.
1. ENIAC: Electronic Numerical Integrator and Computer, built by J. Presper Eckert and John V. Mauchly
which contained 18,000 vacuum tubes.
The period of first generation was from 1946-1959. The computers of first generation used vacuum
tubes as the basic components for memory and circuitry for CPU (Central Processing Unit). These tubes,
like electric bulbs, produced a lot of heat and the installations used to fuse frequently. Therefore, they
were very expensive and only large organizations were able to afford it.
However, the transistor generated a lot of heat, which harmed the computer. Punched cards and
printouts were also employed for input and output in second-generation computers. For the first time,
transistors were used in a computer with the TX-0. In 1956, it was released. Transistors were also
employed in the RCA 501.
Computers of the second generation, which made use of transistors, were more dependable than their
predecessors and smaller, quicker, more energy-efficient, and less expensive.
Magnetic storage disks and magnetic core memory are also included in these devices.
They used high-level programming languages like Fortran and Cobol and provided a telephone line for
communication.
When comparing the second-generation computers to the first-generation computers, the speed and
reliability of the second-generation computers were significantly improved; the data processing time
was lowered from milliseconds to microseconds.
The period of third generation was from 1965-1971. The computers of third generation used Integrated
Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with
the associated circuitry.
The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and
efficient. In this generation remote processing, time-sharing, multiprogramming operating system were
used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used
during this generation.
Fourth Generation of computers was between 1971 – 1980. These computers used the VLSI technology
or the Very Large Scale Integrated (VLSI) circuits technology. Therefore they were also known as the
microprocessors. Intel was the first company to develop a microprocessor. The first “personal
computer” or PC developed by IBM, belonged to this generation. VLSI circuits had almost about 5000
transistors on a very small chip and were capable of performing many high-level tasks and
computations. These computers were thus very compact and thereby required a small amount of
electricity to run.
Examples are STAR 1000, CRAY-X-MP(Super Computer), DEC 10, PDP 11, CRAY-1. This generation of
computers had the first “supercomputers” that could perform many calculations accurately. They were
also used in networking and also used higher and more complicated languages as their inputs. The
computer languages like languages like C, C+, C++, DBASE etc. were the input for these computers.
Computer hardware is a collective term used to describe any of the physical components of an analog or
digital computer. The term hardware distinguishes the tangible aspects of a computing device
from software, which consists of written, machine-readable instructions or programs that tell physical
components what to do and when to execute the instructions.
External hardware components, also called peripheral components, are those items that are often
externally connected to the computer to control either input or output functions. These hardware
devices are designed to either provide instructions to the software (input) or render results from its
execution (output).
Mouse. A mouse is a hand-held pointing device that moves a cursor around a computer screen and
enables interaction with objects on the screen. It may be wired or wireless.
Keyboard. A keyboard is an input device featuring a standard QWERTY keyset that enables users to input
text, numbers or special characters.
Microphone. A microphone is a device that translates sound waves into electrical signals and supports
computer-based audio communications.
Camera. A camera captures visual images and streams them to the computer or through a computer to
a network device.
Touchpad. A touchpad is an input device, external or built into a laptop, used to control the pointer on a
display screen. It is typically an alternative to an external mouse.
USB flash drive. A USB flash drive is an external, removable storage device that uses flash memory and
interfaces with a computer through a USB port.
Memory card. A memory card is a type of portable external storage media, such as a CompactFlash card,
used to store media or data files.
Monitor. A monitor is an output device similar to a TV screen that displays information, documents or
images generated by the computing device.
Printer. Printers render electronic data from a computer into printed material.
Speaker. A speaker is an external audio output device that connects to a computer to generate a sound
output.
Computer software is a program that enables a computer to perform a specific task, as opposed to the
physical components of the system (hardware). This includes application software such as a word
processor, which enables a user to perform a task, and system software such as an operating system,
which enables other software to run properly, by interfacing with hardware and with other software.
Computer software is so called in contrast to computer hardware, which encompasses the physical
interconnections and devices required to store and execute (or run) the software. In computers,
software is loaded into random access memory (RAM) and executed in the central processing unit.
Types
Practical computer systems divide software into three major classes: System software, programming
software, and application software, although the distinction is arbitrary and often blurred.
System software helps run the computer hardware and computer system. It includes operating systems,
device drivers, diagnostic tools, servers, windowing systems, utilities, and more. The purpose of systems
software is to insulate the applications programmer as much as possible from the details of the
particular computer complex being used, especially memory and other hardware features, and such
accessory devices as communications, printers, readers, displays, keyboards, etc.
Programming software usually provides tools to assist a programmer in writing computer programs and
software using different programming languages in a more convenient way. The tools include text
editors, compilers, interpreters, linkers, debuggers, and so on. An Integrated development environment
(IDE) merges those tools into a software bundle, and a programmer may not need to type multiple
commands for compiling, interpreter, debugging, tracing, and etc., because the IDE usually has an
advanced graphical user interface (GUI).
Application software allows humans to accomplish one or more specific (non-computer related) tasks.
Typical applications include industrial automation, business software, educational software, medical
software, databases, and computer games. Businesses are probably the biggest users of application
software, but almost every field of human activity now uses some form of application software. It is used
to automate all sorts of functions.
Software is a general term used to describe a collection of computer programs, procedures, and
documentation that perform some task on a computer system. Practical computer systems divide
software systems into three major classes: system software, programming software, and application
software, although the distinction is arbitrary and often blurred. Software is an ordered sequence of
instructions for changing the state of the computer hardware in a particular sequence. Software is
typically programmed with a user-friendly interface that allows humans to interact more more
efficiently with a computer system.
Hardware is best described as a device, such as a hard drive, that is physically connected to the
computer or something that can be physically touched. A CD-ROM, computer display monitor, printer,
and video card are all examples of computer hardware. Without any hardware, a computer would not
function, and software would have nothing to run on. Hardware and software interact with one another:
software tells hardware which tasks it needs to perform.
Computer Security threats and attacks involve accessing information, obliterating or manipulating data,
destabilizing the computer, or degrading its performance [1]. Computer attacks are mainly information
gathering, privilege escalation, buffer overflow exploits, remote accessing by unauthorized users, and
denial of service attacks [2]. Network attacks being a subset of computer attacks were mostly attacks on
computer systems that form the basic infrastructure of a communication network. A network aids in
sending an attack or it could be the means of attack.
Knowing is half the battle, especially in the digital space. These five common computer security threats
could ruin you if left undetected.
Botnets
These guys are the ninjas of digital crime. If your computer’s infected with one, you won’t know it.
Botnets are a collection of software robots that infect other computers, called zombies. The creator of
the botnets can then control the zombies.
Using the zombies, the controller can send infected emails and spread malware. Worse, they can recruit
your computer into an army, carrying out the next threat on our list.
DDOS Attacks
DDOS stands for distributed denial-of-service. It’s one of the nastier online threats.
Hackers use zombie computers to sabotage a server. They contact it again and again, flooding it with
piles of useless data. The traffic increases so much, it can force the server to shut down. The network
then can’t serve legitimate users.
For most online businesses, traffic is revenue. A server slows down, or worse, a shutdown, spells
catastrophe.
Mobile Malware
More and more people browse the Internet with their phones. Businesses have adapted. They make
phone friendly websites and mobile apps to buy.
Using infected apps, hackers steal information with mobile malware. Often they go after businesses
because most don’t have the proper security.
Phishing
Also known as spoofing, phishing is a common cyber scam: easy to do with effortless results.
Hackers bait the hook with fake text messages, websites, and emails appearing legitimate. They ask you
to submit information or update an account.
Don’t let them fool you though. It’s only a trick to steal from you and wreck your system.
Ransomware
One of the worst Internet threats is ransomware. It’s a type of malware designed to restrict access to
your computer. It can come from phishing emails or pop-up ads.
Ransomware has two flavors: lock screen and encryption. Lock screen ransomware prevents you from
accessing your computer. Encryption ransomware locks up your files on your hard drive, shared
network, USB, or the cloud.
With each, you’ll receive a notification demanding payment to restore access. Hackers may even
disguise themselves as law enforcement. They might say the money is to avoid prosecution for illegal
activity.
Whatever the case, never pay the ransom. It’s a trick to steal money, and restored access is never
guaranteed.
A computer virus is an ill-natured software application or authored code that can attach itself to other
programs, self-replicate, and spread itself onto other devices. When executed, a virus modifies other
computer programs by inserting its code into them. If the virus’s replication is successful, the affected
device is considered “infected” with a computer virus.
The malicious activity carried out by the virus’s code can damage the local file system, steal data,
interrupt services, download additional malware, or any other actions the malware author coded into
the program
Spyware Threats.
What is spyware?
Spyware is a type of malware that hides on your device, secretly recording information and tracking
your online activity. Spy software can monitor and copy text you enter, apps you use, websites you visit,
and docs you read. Some strains of spyware can also access your camera and mic to watch and record
you.
Computer spyware, by definition, is designed to be invisible, which is one of its most harmful attributes
— the longer it goes undetected, the more damage it can cause. Sometimes called stalkerware or
spouseware, spyware is like a virtual stalker that follows you through your device usage, collecting your
personal data along the way.
Hackers and Predators.
What is a Hacker?
A hacker is someone who uses computer programming and other technical skills to gain unauthorized
access to a computer system or network. Hackers often use malicious software, such as viruses, worms,
and Trojans, to damage a system or steal data. Hackers typically have a wide range of technical skills,
and some may even specialize in certain areas of hacking, such as web application security or network
security.
What is a Predator?
A predator is someone who uses deception and manipulation to lure victims into dangerous or
damaging situations. Predators often target children and young adults, and they typically use common
online tools such as social media, chat rooms, and online games to connect with potential victims.
Predators use their victims’ trust to gain access to personal information and manipulate them into
engaging in illegal or dangerous activities.
The primary difference between hackers and predators is their intent. Hackers are typically motivated by
a desire to gain access to a system or to steal data, while predators are motivated by a desire to control,
manipulate, and exploit their victims. Hackers typically target computer systems and networks, while
predators target people.
Computer security threats can impact the smooth running of your computer and it has the serious harm
to a computer system. In this article we will discuss on how to prevent computer security threats to safe
running of a computer.
Cyber attackers are looking to steal sensitive information such as business details, credit card
information, personal details, or any other information which they can sell to others for business
purposes.
There are different types of computer security threats such as virus, adware, malware,
rootkit, hackers and much more. We have mentioned best tips on how to prevent computer security
threats, which are as follows:
Create Strong password.
Booting a Computer.
The operating system is loaded via a bootstrapping procedure, often known as booting. An operating
system or other larger program, such as a boot loader, is loaded by this application. The process of
booting involves turning on a computer. The memory of the CPU is empty when it is first turned on.
After loading the operating system into the main memory and turning on the computer, it is prepared to
accept user commands. A computer's operating system is launched during the booting process when it is
turned on. The initial collection of tasks the computer carries out when turned on is known as the boot
sequence.
Every computer has a boot process. The kernel is located, loaded into the main memory, and executed
by the bootstrap loader. In some systems, the kernel is loaded after a straightforward bootstrap loader
retrieves a more intricate boot program from the disk. Restarting a computer is sometimes referred to
as rebooting. Depending on whether the power is interrupted throughout the process, rebooting can be
"soft" or "hard." On some PCs, a soft boot may optionally clear RAM to zero.
Hardware, such as pressing a button or software commands, can start hard and soft booting. When the
functioning runtime system, typically the operating system and a few applications, is reached, booting in
OS is complete
Microsoft Word.
What is MS Word- Microsoft Word or MS Word is a popular word-processing program used mainly for
creating documents, such as brochures, letters, learning activities, quizzes, tests, and students’
homework assignments. It was first released in 1983 and is one of Microsoft Office suite’s applications.
Word is one of the most widely used and familiar pieces of office software in the world. It has grown in
power and complexity over the years, and its integration with Office 365 and Microsoft OneDrive makes
it even more versatile for businesses, both large and small.
You can create any business document, including presentations, proposals, company reports, plans, and
budgets. Word’s design features are simple and easy to use so that you can build a library of key forms
such as memos, agendas, invoices, and statements.
Word helps you create promotional and marketing materials like brochures, flyers, and newsletters you
can send out to prospects and clients. You can also format and produce your own letterheads and
business cards. This may be particularly useful for small businesses that may struggle to pay third-party
design and print costs.
Brand Building
You can standardize a letter or memo format that you design and save as a template that the entire
company can use. This ensures consistency of color, fonts, and effects. You can also download free
Microsoft templates. Microsoft groups some templates into style sets, so you could apply the same
theme to a range of marketing materials, documents, and forms, giving you a consistency of branding.
On Mac, open a document. Click the "Review" tab → "Protect" → "Protect Document". Enter a password
and click "OK".
Since you won't be able to retrieve a lost password, be sure to use a password you can remember or
write it down.
Application software
The most common type of software is application software, or apps, which is performed by the end-user
and lets you complete your tasks. An end-user is the individual using the device. Individuals may also
refer to these applications as non-essential software. You can install these applications on your devices
yourself. Additionally, several types of application software can help you complete many tasks. Here are
some types of application software you can use:
Word processing apps: This type of application allows you to complete writing tasks, such as writing,
editing and formatting. With this tool, you can also create and edit tables and print documents as
needed.
Spreadsheet apps: A spreadsheet application can help you complete tasks to compute and organize
data. With this tool, you can store business data, create budgets and generate reports and charts.
Databases: This type of application allows you to store and sort business information in fields, records
and files. With a database app, you can enter and edit data, maintain business files and create new
records
Internet browsers: These types of applications allow you to access the internet through different host
providers. With this tool, you can access and view websites to help you complete your tasks.
Email apps: You can these types of applications to write, send, receive and read emails from other
individuals. These programs are helpful when you're working or trying to contact other individuals.
Microsoft Excel is a spreadsheet program consisting of cells organized by lettered columns and
numbered rows. This grid pattern allows for easy data manipulation and conversion of data into
mathematical formulas. Excel is typically included as part of the Microsoft Office 365 software suite.
Beyond basic calculations, Excel is great for data visualization, allowing you to create bar charts, scatter
plots, graphs, and histograms from sets of information. Additionally, you can use Excel for data analysis
using pivot tables and macro programming using Visual Basic for Application (VBA) — a programming
language that allows you to automate tasks across Microsoft Office applications.
Practicalise MS Excel.
What is a Chart?
A chart is a graphical representation of data. Visualizing data through charts helps to uncover patterns,
trends, relationships, and structure in data. Use charts together with maps to explore data and help tell
a story.
Charts can be created from both tabular and raster data, and a different set of charts are available for
each data type. Tabular data refers to vector or feature data, as well as stand-alone tables. Raster data
refers to imagery or pixel-based data.
Practicals.
a. Practice How to Shutdown a Computer.
Steps To Switch Off A ComputerSTEP 1 : Press the Start button. STEP 2 : When the start menu opens,
select shut down. (Click OK when the shutdown box displays.) STEP 3 : Wait for the Monitor to turn Off.
Open PowerPoint.
Select More themes to view the gallery and search for more.
d. How to use Auto, content, wizard, design template, blank slide or existing Presentation to create slide.
The internet is a global network of interconnected computers, servers, phones, and smart appliances
that communicate with each other using the transmission control protocol (TCP) standard to enable a
fast exchange of information and files, along with other types of services.
Uses of the Internet.
Education
The internet has made education and upskilling more accessible to anyone looking to enrich themselves.
With a vast array of free online courses through platforms like Google Learning, educational sites
like Coursera, and tutorials featuring a range of topics on YouTube, people can upskill themselves in just
about any field without leaving the comfort of their homes.
Making use of these online tools is a huge time and money saver too!
3. Social Networking
Social Networking has become one of the most popular internet usage drivers. Keeping in touch with
family and friends across the world, sharing special moments, and even running an entire business
online.
4. Online Banking
Banking online has made life easier and safer for individuals. Transferring money, paying bills, and
generally managing funds has a home in the palm of our hand. Most banks offer a host of services online
including benefits and perks for using online, cashless facilities.
5. Online Shopping
A majorly popular use of the internet is online shopping! With more stores offering amazing online
deals, like Takealot, Superbalist, and UberEats to name a few, online shopping is easy, safe, and super
convenient.
Shopping online also allows you as a consumer more opportunity to price match and get a better view of
the best deals! We could argue that online shopping has changed the game for shopaholics and the old-
school “coupon collectors”.
6. Entertainment | Gaming
No matter the weather, everyone needs a day off to just chill and take a load off. With various streaming
sites both local and international and gaming platforms, this has become easier and cheaper. Gaming
has progressed into a full-time career for many, on platforms like Twitch, thanks to the internet.
7. E-News
We no longer have to wait around to read yesterday’s headlines. You can keep up to date with breaking
news, weather updates, and all current affairs. The internet, coupled with social media, has created a
short-form and easily consumable means of sharing topical issues although many question the
newsworthiness and credibility of these sites. One thing is for sure, more people, from a wider
demographic, are consuming world news compared to before the internet.
8. Research
The internet has revolutionised the way we search for things. Resources for DIY projects, school
projects, work insights, and many other interests and topics are all available online. This article right
here is being done via the net!
9. Communication
Gone are the days of sending letters via pigeon post. With today’s technology, we can send emails,
instant messages, photos, videos, and much more at the literal click of a button!
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages
that users can access on their local computers and other devices through the internet. These pages and
documents are interconnected by means of hyperlinks that users click on for information.
A web browser takes you anywhere on the internet, letting you see text, images and video from
anywhere in the world. The web is a vast and powerful tool. Over the course of a few decades, the
internet has changed the way we work, the way we play and the way we interact with one another.
Depending on how it’s used, it bridges nations, drives commerce, nurtures relationships, drives the
innovation engine of the future and is responsible for more memes than we know what to do with.
Importance of E- mail.
In our daily life we need various means of communication. Now we have fax, telex, text message, mobile
phone etc. But E-mail has brought about a revolutionary change in our communication system. In this
system, we just need a personal computer or mobile phone and internet connection. In a second we can
send our messages to the other side of the world. There are separate mailboxes in this system. So acute
privacy can be maintained in this system. It is also very cheap and easy. So the students also can use
Email to communicate with their friends at home and abroad. As it is used all over the world, and it is
most modern communication system.
One of the coolest things about living in the time and technological age that we do is that we can
connect with almost anyone from anywhere in the world at any time. Through all of the different social
media channels — from Instagram, WhatsApp, LinkedIn and Facebookwe have the opportunity to
communicate with and even befriend people we may have never met in real life, which is crazy! It's also
really amazing, and something that I am personally super grateful for. I have made so many sweet
friends through social media over the years, many of which have become the kind of friends that I don't
know where I'd be without today. And it honestly blows my mind that I get to now know and do life
with these women simply because we followed one another on Instagram or read each other's blogs...
or both!