Skip to main content

Posts

Showing posts from May, 2022

Software piracy and its prevention

  Software piracy and its prevention Software Piracy: Software piracy refers to the activity of copying software, distributing it, partially modifying it and continuing it under one's own name. Software piracy is also a crime like stealing other people's stuff. Due to software piracy, software manufacturers suffer financially. Some steps to prevent piracy: (i) The first step to prevent piracy is to comply with the prevailing laws of the country. (ii) When any software needs to be installed, patiently read the “Terms and Conditions” carefully. Not only read, but act upon it. If it infringes copyright, refrain from using it. (iii) The mentality of saving money by buying pirated software is not stopping. This mentality must end. If there is no money to buy the software, the software can be used with the permission of the specific organization or software manufacturer. In that case its use will not be illegal. (iv) Risk and Responsibility Offices should be encouraged to purchase an

Malicious regulation of power supply and its prevention

Control of power supply damage and its prevention Computers can have various problems related to power supply. Irregular supply of electricity is one of the problems related to computer power supply. Besides, not having proper voltage, frequent power supply, power return in shortest time interval, lack of earthing, fault in power supply unit, heating of internal parts of power supply unit, not getting proper voltage and signal at output power supply unit switch Not working mode etc. are some of the harmful regulators of power supply. All these problems and solutions are described below -- (a) Voltage problem : Damage to computers and other electrical appliances due to high voltage is a regular occurrence in our country. A voltage stabilizer can be used to avoid this condition. Many times when the voltage is much lower than required, any electrical appliance used in the home cannot be operated. In this case, the computer should be turned off. (b) Sudden power outage : Load shedding is a

How to maintain and use disks ?

How to maintain and use disks There are basically three types of disks used in computers, namely: (i) Floppy Disk, (ii) Hard Disk, (iii) Compact disk or CD. Of these, the first two discs work on the principle of magnetic and the third optical technology. At present there is not much use of floppy disk. However, magnetic hard disk and optical CD or DVD are two essential means of data storage in computer systems. Disk drives are used to store and read data on these disks. Disk Drive Maintenance: Dust or dirt can damage this drive and data can be lost if the disk enters a dusty drive. In addition, due to the formation of dust layer or oxide layer, the rotation of the drive head is hindered. For these reasons, disk drives must be cleaned regularly. Disadvantages for disks and disk drives are: (i) High temperature (ii) Cold flow (iii) Electro-magnetic field (iv) Dust (v) Ash or fibrous matter.  (vi) Stress The following steps can be taken to protect disks and disk drives from various malic

What are desktop items in Windows operating system?

What are desktop items in Windows operating system\ Items on the Windows operating system desktop screen with names and pictures are each called icons. The main items on the desktop of the Windows screen are: (i) My Computer  (ii) My Network Place (ii) My Document (iv) Connect to the Internet (v) Online Service (vi) Recycle Bin (vii) Internet Explorer (viii) Taskbar (ix) Outlook Express Windows Media Player et cetera. The main items on the desktop of Windows operating system are described below-- Taskbar: The bar containing the text Start at the bottom of the desktop is called the taskbar. To the left of the taskbar is the Start button. From this button, various program files can be opened and the computer can be shut down. Besides, time and running programs are shown on the right side. My Document : Document and other files are saved in this folder as per default setting. Under My Document there is a sub-folder called My Picture. Any image input from a digital camera or scanner is sav

Describe the steps to be taken to prevent cyber crime

Things to do to prevent cyber crime It is always better to take determinative measures to prevent a crime than to take action against it after it has occurred. This also applies to online users. To avoid becoming a victim of cybercrime, one can easily stay free from cybercrime if some awareness and some preventive measures are always followed. Some of such preventive measures are described below: (i) One should refrain from presenting one's confidential information to others. (ii) Never send any photograph of yourself or someone you know online to a stranger or a chat friend. Because that kind of photography can be used for any evil purpose. (iii) Always use new and upgraded anti-virus to prevent virus attacks. (iv) Important data should always be backed up so that the data is not lost forever due to virus attack. (v) Never provide credit card number to any insecure website to stay financially risk free. (vi) Children should always monitor their browsing so that they do not access

Describe the types of viruses.

Computer Virus Types of viruses The names of two species of virus in general are particularly noteworthy. Two types are Trojan horse and worm virus- • Trojan horse virus: This type of virus encourages the computer user to follow the message with some interesting message. By responding to the Trojan virus's call, the computer user is in immediate danger. • Worm virus: This type of virus gets into the computer like a malicious insect along with any file. Then it attacks the special files of the computer by making automatic copies and enters and disrupts the normal functioning of the computer. Computer viruses can be mainly divided into two categories on the basis of their destructive effect, like: (i) Program Viruses (ii) Boot sector virus. Program virus: This type of virus adds virus code to the first or last part of the executable file. In this case the number of bytes of the executable file shows more or less than the actual number. In this case, some common words can be noted

Describe the symptoms of a computer infected with a virus

 Symptoms of a virus infected computer  A virus infected computer shows the following symptoms: (i) the computer takes longer than normal to start up; (ii) programs used on a daily basis run slower than normal; (iii) the program takes longer to load; (iv) accidentally deletes or hides any files; (v) takes longer than usual to store information; (vi) New software or hardware is not compatible and various messages are displayed (vii) abnormally reduced hard disk space; (viii) parts of the file are altered and marked abnormally; (ix) reduced printer speed in printing; (x) decrease or increase the size of command.com files; (xi) changes the size or name of files with an .EXE or COM extension; (xii) Overall system performance is impaired.

What are software maintenance tools? What is program and data back-up?

Software maintenance tools Software maintenance tools and system tools used in Windows operating system for software maintenance are backup, character map, disk clean-up, disk defragmentation, file and setting transfer wizard, schedule task, security center, system information and system restore. Below are descriptions of three commonly used tools (Disk Clean-up, Scan Disk or Check Disk, and Disk Defragmentation): (a) Disk clean-up: Many unnecessary files accumulate in the computer system at various times, such as temporary files, files downloaded from the Internet, files stored in Recycle Bin. All these files occupy the memory or space of the computer system. All these unnecessary file systems can be deleted using disk clean-up tool. The following unnecessary files can be deleted using disk clean-up tool. * Temporary Internet files * Downloaded program files * Deposit file in recycle bin * Temporary files (b) Scan Disk: If there is any error in the saved file, it can be corrected us

Describe computer maintenance methods from controlling physical damage to computers

Computer maintenance methods from controlling physical damage to computers Maintenance from dust and smoke: Computers can be damaged by dust as follows-- (i) Due to non-conductive coating of dust on various circuits, the heat generated in the circuit cannot be dissipated, resulting in damage to the circuit. (ii) Due to the formation of dust coating, the rotating components of the computer cannot rotate properly, resulting in various operational problems. (iii) Dust accumulation can damage the heads of disk drives. (iv) Cigarette ash dust can damage the data stored on the disk. The following steps can be taken to protect computer systems from dust:- (i) Computers should be properly cleaned at various time intervals. (ii) No smoking in the computer room. (iii) No powdered food should be consumed while sitting near the computer. (iv) Computers should not be placed where chalk is written on the blackboard. (v) The computer should be covered with a plastic cover. Maintenance due to temperat

Describe the malicious computer controllers

Malicious computer drivers Describe the malicious computer controllers: Various effects and causes work for computer damage. Some of these effects are natural, some are artificial and some are due to user inefficiency and carelessness. Besides, some negative actions intended by other users can damage the computer. Computer malware controllers can be broadly divided into four categories: (a) Physical damage controls (b) Malfunctioning controllers due to electrical problems (c) Software Malicious Controls (d) Improper Handling of Users. (a) Physical Harmful Controllers: Those harmful controllers that occur due to external conditions and environmental factors causing damage to the computer are called Physical Harmful Controllers. called physical damage control. The names of such controllers are: (i) Dust (ii) Smoke (iii) High Temperature (iv) Very Low Temperature (v) Magnetic Fields (vi) Liquid & Humidity (vii) Corrosion to Parts (viii) Noise or Interference. (b) Faulty currents due t

Describe the general features of printers.

General features of printers General Features of Printer : Information stored in the computer's memory comes to the printer 8 through the input/output interface. The printer records incoming data permanently on paper. Hard copies of letters, numbers, symbols, images etc. are made with the help of printer. Printers with different features are manufactured by different companies. Following are some common features of the printer: (i) Print speed: Print speed (Print speed) means the speed of printing. That is, how fast, how much information can be printed out, this amount is used to measure. Print speed is expressed as DPI (Do Per Inch), PPM (Page Per Minute) etc. (ii) Print Quality: The print quality of the printer is called print quality. These print standards are based on four types of print. These are Draft Print, Letter Quality Print, Normal Print and Best Print. Generally, normal and best quality prints are available in laser printers. (iii) Buffer size: The amount of data that

Describe the functions of the various keys on the keyboard.

Functions of different keys on the keyboard: Keyboard is a device with many buttons consisting of letters, numbers, symbols etc. to provide various information or instructions to the computer. Keyboard is used as the most widely used input device. It has some additional buttons besides the required buttons. These additional buttons can be used to perform various commands on the computer. Normally keyboard has 104 number of buttons. These keys are divided into the following six categories, viz (i) Alphabetic Key (ii) Numeric Key (iii) Function Key (iv) Cursor Key (v) Special Key (vi) Command Key (i) Alphabetic Key: The keys A to Z in the middle of the keyboard are called alphabetic keys. These keys are used to type various characters. (ii) Numeric Key: The ten keys from 0 to 9 located below the function keys of the keyboard are called numeric keys. Numbers are typed using these keys. (iii) Function : The keys from F1 to F12 located on the top row of the keyboard are called function keys

What is the characteristics of analog signals and digital signals?

Fundamentals of Digital Electronics Characteristics of Analog Signals and Digital Signals: Analog Signal: Continuous electrical signal is called an analogue signal. The change in analogue signal value over time is infinite. A simple signal-generating device converts physical quantities such as pressure, dip, light intensity, noise, etc. into equivalent analogue electrical signals through transducers. The value of this signal is always changing. That is, an electrical signal whose value continuously increases or decreases with time is called an analogue signal. The figure below shows the shape of an analogue signal: Digital Signal: The voltage level of the digital signal is isolated. The voltage level of a digital signal is expressed by two or more states. All these levels are expressed as low (Low) and high (High) or digital 0 volts. A discrete electrical signal is called a digital signal. The change in value of a digital signal with time is finite and the change in value is expressed

What is the difference between electronics and digital electronics? What are the benefits of working in digital mode?

Analog Electronics (i) The branch of electronics technology that analyzes and discusses the design, construction, operational use, advantages, disadvantages, etc. of analogue signals and various circuits and devices operated by analogue signals is called analogue electronics. The branch of electronics technology that deals with digital signals, numbers and the design, construction, operation, use, advantages and disadvantages of various circuits and devices operated by digital signals. Various topics are analyzed and discussed, called digital electronics. (ii) Analog electronics systems use ever-changing electrical signals. Digital electronics systems have two defined levels of signals. (iii) Analog electronics are difficult to diagnose due to variations in signal. Since there are only two layers in the digital electronics system, fault diagnosis is easy. (vi) Signal processing circuit components are quite expensive in analogue electronics systems. Circuits used for signals in digital

What are the characteristics of image based and color based operating system?

Based on the interface, operating systems are divided into two categories, namely: (i) Text or character-based operating system (ii) Image-based operating system. Text or letter-based operating systems: In text-based operating systems, commands are executed by typing them in the command prompt according to their structure. Commands are written using letters, words, numbers, symbols, etc. To work in this system, the user needs to know the commands and syntax in advance and work by writing commands according to the syntax. Being color based this operating system is difficult and boring to work with. Commands have to be typed by keyboard only. A. Network, Internet system is not working. This system requires relatively little memory to operate, cannot run multiple programs simultaneously, supports only one user, and requires the use of a keyboard to move the cursor. No pictures, images or icons can be used in this command. Examples: MS-DOS, TOS, BOS, UNIX et cetera. Characteristics of tex

What is the purpose of operating system? Basic concepts of operating system?

Basic concepts of operating system The main purpose of the operating system is to-- • Creation of working environment: The operating system that creates a better working environment, the better and improved the operating system. • Coordinator: It coordinates between hardware and software. It acts as a coordinator between user tasks and all devices. • Automatic management: When a problem arises, it automatically understands what to do. If the appropriate solution is not provided, the operating system may automatically shut down the computer by itself. • Control of computer operations: The objective of the operating system is to control the speed of input/output operations by programs. • Memory management: helps the computer to work faster in stages by storing different files so that they can be found easily. this • Working based on priority: All the tasks that are directed to the computer are carried out based on priority. • Input/Output Management (I/O Management): It is the task o

How many types of computer memory?

Describe the different types of computer memory Memory is the place to hold memories or information. Information can be stored here. Memory is mainly of two types, (a) Main memory/Primary memory (b) Auxiliary memory/Secondary memory Main memory is again of two types, namely-- (i) RAM or Random Access Memory (ii) ROM or Read-only memory (ROM or Read-only memory). 1. Main memory/ Primary memory: The memory with which ALU has a direct connection is called the main memory. The main memory also needs to be very fast as it is directly connected to the ALU and capable of very fast calculations. All the information and instructions that are always needed are kept in the main memory. In addition, the necessary data and instructions for the calculations performed by the ALU are fetched from the auxiliary memory and temporarily stored in the main memory. After the calculation is finished they are moved back to the auxiliary memory. Main memory is of three types namely--  (a) Internal, (b) Extern