Skip to main content

Describe the malicious computer controllers

Malicious computer drivers


Describe the malicious computer controllers: Various effects and causes work for computer damage. Some of these effects are natural, some are artificial and some are due to user inefficiency and carelessness. Besides, some negative actions intended by other users can damage the computer. Computer malware controllers can be broadly divided into four categories:


(a) Physical damage controls

(b) Malfunctioning controllers due to electrical problems

(c) Software Malicious Controls

(d) Improper Handling of Users.


(a) Physical Harmful Controllers: Those harmful controllers that occur due to external conditions and environmental factors causing damage to the computer are called Physical Harmful Controllers. called physical damage control. The names of such controllers are:


(i) Dust

(ii) Smoke

(iii) High Temperature

(iv) Very Low Temperature

(v) Magnetic Fields

(vi) Liquid & Humidity

(vii) Corrosion to Parts

(viii) Noise or Interference.


(b) Faulty currents due to electrical faults: Faulty currents which occur due to unexpected transient conditions of power are called faulty currents due to electrical faults. Such harmful regulators are:


(i) Excessively low or high supply voltage

(ii) Sudden interruption of power supply

(iii) Switching off and on of power supply at minimum time intervals

(iv) Power Fluctuations

(v) Earthing.


(c) Software Malicious Controllers: Damages observed in the computer due to the software used are called software malware controllers. Some of the software-related malware controllers are:

(i) Operating system corruption

(ii) Virus attack

(iii) unauthorized user penetration or hacking of software or databases and data theft;

(iv) Improper Handling of Computers: The damage caused due to computer installation, operation, maintenance or replacement of parts without following proper rules is called Improper Handling of Computers. The harmful controls due to improper operation are:


(i) Improper installation of hardware and software

(ii) Improper replacement of parts

(iii) not properly executed and

(iv) Lack of proper maintenance.

Comments

Popular posts from this blog

What should the processor look at?

The things that we all should keep an eye on are the processor or not; 1. Clock speed 2. Number of course 3. cache memory 4. FBS 1. Clock Speed: It is also called GH2. All processors are written on. Clock speed means how fast your computer can work. That's what this signal means. The speed of the processor is known through this clock speed, how fast the calculation can be done. 2. Number of Cores: The more cores the processor has, the faster the processor can work. If I give an example to explain the matter, I hope you can understand it very easily. Suppose if a person had many hands, then he could do many things at the same time. That is, if we go to the market and buy a smartphone, then we will see what the configurations of the phone are. If we look closely at the configuration of the smartphone, we will see that Dual Core Processor, Quad Core Processor, Octa core processor, Hexa core processor, Deca core processor. This means that the dual core processor has two arms or cores, ...

How to create a google account from a Android mobile?

 I don't believe a long introduction. I don’t want to bore you.  Today I will teach how to create a google account very flexibly from an android device.  Firstly open a browser like Opera, Firefox, Google Chrome or any other it doesn't matter in that and then type create a Gmail account or  click here After clicking here then click on  create an account  option. Write here your first name and last name exactly. Then write an email address uniquely which did not use in the network or google database. After completing the write a unique email address subsequently you will write a password like  @hga34#@ !. This password format is very effective and efficient against brute force or any other intelligence attack. Now click on the next button  Select your country from here      Enter your mobile number in the orange colour selected blank field. Now enter a recovery email address in the selected field. Anytime if your email address passwo...

What is transmission media? Introduction to different types of data transmission cables

Transmission media: When a PC communicates or wants to communicate with another PC, it has to take the help of some transmission media. The most commonly used media in the network are twisted pair cable, coaxial cable, fiber optic cable. Nowadays, the use of optical fiber is increasing greatly. Radio wave, microwave and infrared technologies are prominent among wireless media. Among these mediums, optical fiber has the highest data transfer speed. The type of medium used in a network depends on the type and location of that network. The connection system for exchanging information between the sender and the remote receiving end is called a channel. The means or methods used to implement the channel are called media. such as-- (i) Cable or wire. (ii) Common telephone lines. (ii) Radio waves. (iv) Microwave. (v) Geo-satellite systems etc. Cable or Wire: Cable is an important medium in data communication. Cables are generally used for data transfer over short range networking such as LAN...