Q1: What are the different types of Personal Computer? Explain each in detail.
ANS1: There are so many types of Personal Computer few are them given below.
TYPES OF PERSONAL COMPUTER:
1. TABLET:
A tablet is a portable computer that consists of a touch screen mounted on tablet-size
plastic frame with a small computer inside. There is no keyboard or pointing device; a
software-based keyboard pops on screen serve as pointing device. Tablets are
extremely portable and convenient, but usually do not run desktop computer
applications and have limited memory and storage capabilities.
2. SMARTPHONE:
A smart phone is a mobile phone that can run applications and has internet capability.
Smart phone usually have touch-sensitive screens. Many have a variety of location-
aware applications, such as global positioning system (GPS) and mapping program and
local business guides. Smart Phones have a lot in common with computers, but they
lack the power and flexibility of larger computer devices.
3. DESKTOP COMPUTER:
A desktop computer is designed to be used at a desk and seldom moved. It consists of
a large box called the system unit that contains most of the essential components. The
monitor, keyboard and mouse all plug into using cables (or in some cases using a
wireless technology).
Desktops offer a lot of computing power and performance for the price, and they’re
flexible because you can connect whatever monitor, keyboard and mouse you want to
it, as well as install additional storage drives, memory, and expansion cards that add
new capabilities.
4. NOTEBOOK/LAPTOP:
It covers opens up to reveal a built-in screen, Keyboard, and pointing device, which
substitutes for a mouse. A notebook can run most of the same software as a desktop,
and is similar to it in performance. Some people call it laptop.
Notebooks allow you to take your computer with you almost anywhere. They’re more
expensive than desktop of the same level of performance, however, and not very
customizable or upgrade.
5. POCKET PC:
A pocket PC is a hardware specification for a handled-sized computer (personal digital
assistant , PDA) that runs Microsoft Windows Mobile Operating System. It may have the
capability to run an alternative operating system like NetBSD or linux. Pocket PCs have
many of the capability of the desktop PCs. Numerous applications are available for
handhelds adhering to the Microsoft Pocket PC specification, many of which are
freeware. Microsoft-compliant pocket PCs can also be used with many other add-ons
like GPS receivers, barcode readers, RFID readers and cameras.
Q2: Explain Malware and its types in detail?
ANS2: Malware is a combination of the word malicious and software and is used to
describe, in general term, any types of bad code we may find on computer. Any
software that gets installed on your machine that performs some unwanted or harmful
task, normally for the benefits of some third party, qualifies as malware. Malware
includes computer viruses, worms, Trojans horses, spyware, backdoors, and other
malicious programs.
TYPES OF MALWARE:
1. VIRUSES:
A computer virus is a software usually hidden within other seemingly innocuous
program that can produce copies of itself and insert them into other programs or files,
and that usually performs a harmful action (such as destroying data). An example of this
is a PE infection, a technique, usually used to spread malware, that inserts extra data
and executable code into PE files.
2. TROJANS HORSES:
A Trojans horses is a harmful program that misrepresents itself to masquerade as a
regular, benign program or utility in order to persuade a victim to install it. A Trojans
horse usually carries a hidden function that is activated when the application is started.
Trojans horses are generally spread by some form of social engineering, for example,
where a user is duped into executing an e-mail attachment disguised to be
unsuspicious, e.g, a routine from to be filled in). or by drive-by download. Although their
payload can be anything, many modern forms act as a backdoor, contacting a controller
which can then have unauthorized access to the affected computer. While Trojans
horses are not easily detectable by themselves, computer may appear to run slower
due to heavy processor or network usage.
3. WORM:
A computer worm is very similar to virus. The design is the same but, unlike a virus, a
worm is a capable of moving from system to system without any human action. Worms
replicate themselves on your system, attaching themselves to different files and looking
for pathways between computers, such as a computer network that shares common file
storage areas. Like viruses, worms are often associated with causing damage to
computer systems.
4. SPYWARE:
Spyware has a special classification because its purpose to steal private information to
you computer for a third party, like a spy. Spyware works in a number of different ways.
5. LOGIC BOMBS:
A logic bomb is a malicious program that uses a trigger to activate the malicious code.
The logic bomb remains non-functioning until the trigger event happens. Once triggered
a logic bomb implements a malicious code that causes harm to a computer.
Cybersecuirty specialists recently discovered logic bombs that attack and destroy the
hardware components in workstation or server including the cooling fans, hard drives,
and power supplies. The logic bomb overdrives these devices until they overheat or fall.
6. BACKDOORS:
A backdoors bypasses the usual authentication used to access a system. The purpose
of a backdoor is the grant the cyber criminal future access to the system even if the
organization fixes the original vulnerability used to attack the system.
Q3: How does IT improve our lives? Mention 5 examples and explain each in detail.
ANS3: IT improves our lives in so many ways. There are five examples how does IT
improve our lives.
EXAMPLES OF HOW DOES IT IMPROVE OUR LIVES:
1. EDUCATION:
Most equip labs and classrooms with laptops or desktops.
Registeration, Attendance and Marks posting online.
Digital library
Learning management system, which is software that contains tools for class
preparation, distribution, and management.
For example, through the course management system, students access course
materials, grades, assessments, and a variety of collaboration tools.
Distance learning.
2. TRAVEL:
You may interact with a navigation system or GPS, which uses satellite signals.
GPS technology also assists people with creating maps, determining the best
route between two points, locating a lost person or stolen object, monitoring a
person’s or object’s movement, calculating speed, and finding points of interest.
In preparing for a trip, you may need to reserve a car, hotel, or flight.
Uber, Careem and Bykea.
3. ENTERTAINMENT:
You can use computers and mobile devices to listen to audio clips or live audio
watch video clips, television shows, or live performances and events; read a
book, magazine, or newspaper; and play games individually or with others.
Media can be downloaded and some websites also supports live streaming.
4. SCIENCE:
All branches of science, from biology to astronomy to meteorology, use
computers to assist them with collecting, analyzing, and modeling data.
Tiny computers now imitate functions of the central nervous system, retina of
the eye, and cochlea of the ear.
A cochlear implant allows a deaf person to distinguish sounds.
Electrodes implanted in the brain stop tremors associated with Parkinson’s
disease.
A neural network is a system that attempts to imitate the behavior of the
human brain.
Scientists create neural networks by connecting thousands of processors
together much like the neurons in the brain are connected.
The capability of a personal computer to recognize spoken words is a direct
result of scientific experimentation with neural networks.
5. HEALTHCARE:
Hospitals use computers to maintain and access patient records.
Online reports of tests conducted.
Computers and mobile devices monitor patients’ vital signs in hospital rooms.
Computers and computerized devices assist doctors, nurses, and technicians
with medical tests.
Doctors use the web and medical software to assist with researching and
diagnosing health conditions.
Surgeons implant computerized devices, such as Pacemakers.
Surgeons use computer-controlled devices to provide them with greater
precision during operations, such as for laser eye surgery and robot-assisted
heart surgery.
Medical staff create labels for medicine, hospital ID bracelets, and more,
enabling staff to verify dosage and access patient records by scanning the
label.
Q4: Differentiate between Data and information?
ANS4:
DATA:
1. Data is input for computer.
2. Data is independent.
3. When data is lost, it can’t be reproduced.
4. Data is meaningless and valueless.
5. Data is single unit and is raw. It alone doesn’t have ant meaning.
6. Data alone has no significance.
INFORMATION:
1. Information is an output from computer.
2. Information is dependent on data
3. When information is lost, it can be reproduced from data.
4. Information is meaningful and valuable.
5. Information is the product and group of data which jointly carry a logical meaning
6. Information is significant by itself.
Q5: Explain Application. Also explain the different categories of applications.
ANS6: APPLICATION:
An application, or application program, is a software program that runs on your
computer. Web browsers, e-mail programs, word processor, games, and utilities are all
applications. The word “application” is used because each program has a specific
application for the user. For example, a word processor can help a student create a
research paper, while a video game can prevent the student from getting the paper
done.
CATEGORIES OF APPLICATIONS:
The categories of applications are as follows:
1. BUSINESS APPS
These apps are called productivity apps and are second most demanded apps among
users. From buying, selling, billing, tracking work progress to sending emails, there
are varieties of business apps available. Such apps are designed for B2B or B2C
purposes. The main aim of these apps is to increase the productivity and reduce
expenses for a business. At the same time, it intends to offer maximum convenience
and widen audience pool in the market.
2. GAMING APPS:
By far the most popular category among the types of apps, as more than 24% of all
mobile applications, available in the App store, fall into this section. Nothing surprising
surely, and the average personal time spent on games would only increase, according
to the same research.
Mobile gaming has always been thriving, promoting app developers to invest more time
and resources into creating new games and mobile version of well-known stationary
games. From user perspective gaming apps offer the sense of achievement and high
engagement in the process-an average gaming session is about 8 minutes long.
3. LIFESTYLE APPS:
Probably, the widest category in ‘types of apps’ topic, as it covers plenty of common
human activities and interests. From shopping, fitness and workout trackers to fashion,
virtual fitting room and even weight loss. Such applications for personal lifestyle often
are the one that push technical innovations are the most and developers constantly get
requests to create a solution for personal or working tasks, or leisure and fun.
4. ENTERTAINMENT APPS:
Watching videos online, searching nearest event, chatting, posting photos on social
sites, and more, all those apps that are built to agitate the user’s mind and categorized
as entertainment apps. Such apps are highly engaging and with fun and interactive
elements featured in these apps, the overall experience is too refreshing for the users.
5. TRAVEL APPS:
Travel apps purpose is 100% crisp and clear, as the little suggest – to make your
traveling easier, more comfortable, fun and informative. Some of them turn your
smartphone into universal and travel diary, some can literally guide you through the
unknown sites aboard using maps, some provide translation assistance. That’s why
most of today tourists seem to be digital- savvy all-knowing travelers.
6. UTILITY APPS:
Utility software is used on a daily basis by literally everyone of us, we don’t even realize
it. Through unlike others types of apps, utility apps display the shortest user session
times. People use these to just get things done and move on. Falling into top categories
of mobile apps can be explained by sheet amount of practical individuals leveraging
their gadgets to full potential. For example taxi apps.
Q6: Define Network and its types in detail?
ANS6: NETWORK:
The Network allows computer to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of network designed to
operate over the area they cover. There are some similarities and dissimilarities
between them. One of the major differences is the geographical area they cover, i.e,
LAN covers the smallest area; MAN covers an area larger than LAN and WAN
comprises the largest of all.
TYPES OF NETWORK:
LAN, MAN, and WAN are the types of network.
LOCAL AREA NETWORK (LAN):
A Local Area Network (LAN) is a privately own computer network covering a small
Networks geographical area, like a home, office, or groups of building e.g. a school
Network. A LAN is used to connect the computers and other network devices can
communicate with each other to share the resources. The resources to be shared can
be a hardware device like printer, software like an application program or data. The size
of LAN is usually small. The various devices in LAN are connected to central devices
called Hub or switch using a cable.
Now-a-days LANs are being installed using wireless technologies. Such a system
makes use of access point or APs to transmit or receive data. One of the computers in a
network can become a server serving all the remaining computers called Clients.
LAN offers high speed communication of data rates 4 to 16 megabits per second
(Mbps). IEEE has projects investigating the standardization of 100 Gbits/s, and possibly
40 Gbits/s. LAN network may have the connections with other LANs Network via leased
lines, leased services.
METROPLITAN AREA NETWORK MAN):
Metropolitan Area Network is one of number of types of network. A MAN is a relatively
new class of Network. MAN is larger than LAN and as its name implies, cover the area
of single city. MANs rarely expand beyond 100 KM and frequently comprise a
combination of different hardware and transmission data. It can be single network such
as a cable TV network, or it is a means of connection a number of LANs into larger
network so that resource can be shared LAN to LAN as well as devices to devices.
A MAN can be created as single network such as Cable network, covering the entire
city or a group of several Local Area Networks (LANs). In this way resource can shared
from LAN to LAN and from computer to computer also. MANs are usually owned by
large organizations to interconnect its various branches across a city.
MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual Bus).
DBDQ uses two unidirectional cables (buses) and all the computers are connected to
these bus. Each has bus has a special device that initiates the transmission activity.
This device is called head end. Data that is to be sent to the computer on the right hand
side of the sender is transmitted on upper bus. Data that is to be sent to the computer
on the left hand side of the sender is transmitted on lower bus.
A MAN is usually interconnects a number of Local Area Network using a high-capacity
backbone technology, such as fiber-optics links, and provided up-links services to wide
area networks and the internet.
WIDE AREA NETWORK (WAN):
A Wide Area Network (WAN) is a telecommunication network . A wide area network is
simply a LAN or LANs or network of networks. WANs connect LANs that may be on
opposite sides of a building, across the country or around the World. WANs are
characterized by the slowest data communication rates and the largest distances.
Computer connect to Wide Area Network are often connected through public networks,
such as the telephone system. They can also be connected through leased lines or
satellites. The largest WAN in existence is the internet. Some segments of the internet,
like VPN based extranets, are also in WANs in themselves. Finally, many WANs are
corporate or research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large
corporate networks, military networks, banking networks, stock brokerage networks,
and airlines reservations network.
Organizations supporting WANs using the internet protocol are known as Network
Service Provider (NSPs). These form the core of the internet.
Wide Area Networks (WANs) generally utilize different and much more expensive
networking equipment than do Local Area Network (LANs). Key technology is found in
Wide Area Networks (WANs) include SONET, Frame Relay, And ATM.