Free Essay

Pc Structure and Logic

In:

Submitted By nskadburg
Words 584
Pages 3
What are 4 security measures that can be implemented to restrict access to a computer? 1. Something the user knows 2. Something the user has 3. Something the user is 4. Something the user does
What advantage does a wired network have over a wireless network in terms of security?
The advantage that a wired network has over a wireless is that they do not have to worry about the network working properly and taking the time to troubleshoot.
What is WPA and how can it help your wireless network’s security?
WPA (Wi-Fi Protected Access) is a secure network versus the WEP (Wireless Equivalent Privacy). It supports a key length from 8 up to 63 alphanumeric characters or 64 hex characters, and supports the use of a RADIUS authentication server in corporate environments.
What is the difference between a MAC address and an SSID? It is the serial number of the device and an SSID is the ID for your WIFI connection.
Write a complex password and explain why it is a good password. d@wu4bw is a good password because it is 7 characteristics, there isn’t a word in this password, and it has a special character in the password and has a number.
What is the purpose of a firewall? It is to protect in bound threats or against unauthorized inbound and outbound traffic.
Describe each of the following malware.
Spyware- Software that spies on system activities and transmits details of Web searches or other activities to remote computers.
Adware-Software that displays pop-up ads and banners related to your Web searches and activities.
Rootkits- A concealment method used by many types of malware to prevent detection by normal antivirus and anti-malware programs.
Trojan horse – Programs that purport to be useful utilities or file converters, but actually install various types of harmful programs on your computer, including spyware, remote access, and rootkits.
Find information on a malware. Site your resource.
What does the malware do? (http://www.techterms.com/definition/malware) Its software programs designed to damage or do other unwanted actions on a computer system.
How does the malware get on your PC? (http://www.howtogeek.com/howto/2998/how-does-spyware-malware-or-crapware-get-on-my-computer) When you go to untrusted websites the malware downloads on your computer.
What operating systems or computer systems does the malware affect? (http://www.mywot.com/en/online-threats/malware) Malware can disrupt your work or the normal operations of the system by causing a denial of service, corrupting data, taking up system resources and consuming network bandwidth. In addition, your computer may not shut down or restart.
How do you detect and clean the malware off your computer? (http://www.mywot.com/en/online-threats/malware) Get an anti-virus program and make sure it is up-to-date. Then, scan your computer and delete anything the program identifies as a problem.
Name two “levels” of backup and when you should do each kind of backup.
One level of backup could be on an external hard drive. In my opinion I believe you should do it every 6 months or so. The second level of backup could be on a cloud of some sort, so you know ultimately it is going to be there regardless if in fact the hardware is completely gone. You should do that I believe every 3 to 6 months.
What is encryption? Encoding: the activity of converting data or information to code.

Similar Documents

Premium Essay

Lab 1

...operating system. They are: * Booting the computer * Performing basic computer tasks like the mouse and keyboard * Provides a user interface such as a command line or a graphical user interface * Handles system resources such as a computer’s memory * Provides file management which is the way the operating system manipulates, stores, finds and saves data (N.A., N.D.) The difference between Windows, Linux and Mac OS is that windows is designed to run on PC’s. All three are operating systems, but the internal architectures are different in each. And PC’s are very inexpensive for a basic model. (Sinoun, 2011) The Windows operating system is pretty versatile, and can be installed on PCs having variable amounts of resources. There are versions of Windows that can be installed on PCs having as little resource as 233 MHz processor and 64 MB RAM. Windows users get good choices for their operating systems, based on the system resources they have. An even greater benefit of Windows users is the user-friendliness of the operating system. The graphical user interface is surprisingly easy to work with, and many complicated tasks on Windows can be performed with a few clicks of a mouse only. (N.A, N.D) Windows was originally a GUI that was loaded on top of MS-DOS. This was the case with the first three versions until Windows 95. That is when windows became an all-in-one operating system. Because Windows has the highest saturation in the...

Words: 789 - Pages: 4

Premium Essay

Short Answer 2.1

...The Critical I/O Devices necessary to use a personal computer are the Mouse, the keyboard, The Monitor, The USB ports and the Internet ports. A2: Serial (COM) ports are not necessary for normal day to day use. The optional features include: External modems ,Serial mouse or pointing devices such as trackballs or touchpads, Plotters, Label printers, Serial printers, PDA docking stations, Digital cameras and PC-to-PC connections used by file transfer programs such as Direct Cable Connection, LapLink, and Interlink Team, Pearson C. Computer Structure and Logic. Pearson Custom Publishing, 2011. VitalBook file. Why a modem is considered an I/O device? A: A Modem is considered an I/O Device because more specifically a Null-Modem cable enables two computers to communicate directly with each other by crossing the receive and transmit wires (meaning that two computers can send and receive data, much like a computer network, though much slower) The Modem is Input and output, allowing two devices to receive and send data to one another. Team, Pearson C. Computer Structure and Logic. Pearson Custom Publishing, 2011. VitalBook file. Why do I think a Printer is classified as an input device? A: The Reason I feel a printer is also in Input device is because printers now a days are Multifunctional. Printers have the capabilities to send fax machines for one. In order to send a fax you have to type in the fax number. By having to input the number by pressing those numbers it’s Input. ...

Words: 382 - Pages: 2

Free Essay

Fdfglkd

...Process Principles I N-11 Calculus I 2 Chemical Process Principles I 2 English Comprehension and Composition 2 Islamic Studies 2 Lab-Engineering Drawing 2 Lab-Physics for Chemical Engineers 2 Physics for Chemical Engineers 2 Tuesday Monday English Comprehension and Composition Calculus I N-7 N-12 Chem-Amjad Riaz N-11 Wednesday Phy-Dr. Saif Ur Rehman Physics for Chemical Chemical Process Engineers Principles I N-18 HUM-Dr. Musferah Mehfooz N-19 Math-Imran Zulfiqar Cheema Dr. Saif Ur Rehman / Dr. Ishrat Sultana Thursday Islamic Studies Calculus I Lab-Physics for Chemical Engineers N-15 N-3 Applied Physics Lab Chem-Muhammad Imran Rafiq Friday Lab-Engineering Drawing PC Lab-C Lessons/week 14 Timetable generated:11/13/2014 aSc Timetables Final Time Table - Fall 2014 ( v 20141113-1130 ) CIIT_Lahore FA14-BEC-B (Semester 1) (DDP) 2 10:00 - 11:30 Math-Syed Tahir Raza Rizvi 1 8:30 - 10:00 HUM-Huma Ijaz 3 11:30 - 1:00 4 1:30 - 3:00 5 3:00 - 4:30 6 4:30 - 6:00 7 6:00 - 7:30 Subjects Count English Comprehension and Composition Calculus I N-10 Phy-Dr. Ayesha Anjum N-4 HUM-Huma Ijaz Calculus I 2 Chemical Process Principles I 2 English Comprehension and Composition 2 Islamic Studies 2 Lab-Engineering Drawing 2 Lab-Physics for Chemical Engineers 2 Physics for...

Words: 31997 - Pages: 128

Premium Essay

None

...Chapter 8 Answer the following review questions. 1. Host A is a PC, connected to switch SW1, and assigned to VLAN 1. Which of the following are typically assigned an IP address in the same subnet as host A? (Select two.) a. The local router’s WAN interface b. The local router’s LAN interface c. All other hosts attached to the same switch d. Other hosts attached to the same switch and also in VLAN 1 2. Why does the formula for the number of hosts per subnet (2h-2) requires the subtraction of two hosts? e. To reserve two addresses for redundant default gateways (routers) f. To reserve the two addresses required for DHCP operation g. To reserve addresses for the subnet ID and default gateway (router) h. To reserve addresses for the subnet broadcast address and subnet ID 3. A Class B network needs to be subnetted so that it supports 100 subnets and 100 hosts/subnet. Which of the following answers lists a workable combination for the number of networks, subnets, and host bits? (Select two.) i. Network = 16, subnet = 7, host = 7 j. Network = 16, subnet = 8, host = 8 k. Network = 16, subnet = 9, host = 7 l. Network = 8, subnet = 7, host = 17 4. Which of the following are private IP networks? (Select two.) m. 172.31.0.0 n. 172.32.0.0 o. 192.168.255.0 p. 192.1.168.0 q. 11.0.0.0 5. Which of the following are public IP networks? (Select three...

Words: 955 - Pages: 4

Free Essay

Education

...Digital logic circuits The digital computer is a digital system that performs various computational tasks. Digital computers use the binary number system, which has two digits: 0 and 1. A binary digit is called a bit. A computer system is sometimes subdivided into two functional entities: hardware and software. The hardware of the computer consists of all the electronic components and electromechanical devices that comprise the physical entity of the device. Computer software consists of the instructions and data that the computer manipulates to perform various data-processing tasks. Program A sequence of instructions for the computer is called a program. The data that are manipulated by the program constitute the data base. Computer organization is concerned with the way the hardware components operate and the way they are connected together to form the computer system. The various components are assumed to be in place and the task is to investigate the organizational structure to verify that the computer parts operate as intended. Computer design is concerned with the hardware design of the computer. Once the computer specifications are formulated, it is the task of the designer to develop hardware for the system. Computer design is concerned with the determination of what hardware should be used and how the parts should be connected. This aspect of computer hardware is sometimes referred to as computer implementation. Computer architecture is concerned with the structure and behavior...

Words: 9034 - Pages: 37

Premium Essay

Hmi Controlled Classroom

...Chapter 1 INTRODUCTION Background of the study Living in this modern society, technology is very much involved. Every person is recognized with the device or gadget, he carries; that is the result of a technologically inclined society. Eventually, living without technology is like a soldier without gun; that is how people are so much dependent with technology today. Nowadays, some customers such as hospitals, manufacturing, industries, commercial establishments, schools, buildings and homes are dependent on electrical devices and equipment. These devices are controlled by modern technology for their operations, controls and processes. This includes remote sensing, SCADA, HMI, micro controller sensors and PLC. They are used for automatic control of lights and switches, and for remotely controlled operation of equipment or machine. These modern technologies save time, costs, and labor. The researcher conceptualized this study about the modern technology using HMI in the school specifically the laboratory room. Laboratory should be conducive to learning so that students are encouraged to study. It is a room where the students have the basic knowledge in theoretical aspects before they ought to gain knowledge outside. So, the study is focus on the development of a modernized laboratory equipped with automatic controls. Before laboratory is just a room with equipment, many lights, and switches. They are using manual switching of the facilities inside a laboratory room which is done...

Words: 15414 - Pages: 62

Free Essay

Ports

...functions. The back panel of a personal computer: PS/2 Mouse Port (also known as Min-Den): is used to plug in mice, and pointing devices PS/2 Keyboard Port: is used to plug in the keyboard Ethernet Ports: This port is used to connect computers to a LAN (Local Area Network) line. SPDIF coaxial digital ports: uses a shielded cable with an RCA connector that’s used to receive signals from broadcast and cable TV and radio. It allows you to listen to FM radio and watch TV broadcasts from the PC. Parallel port (LPT): It was originally designed for use of parallel printers. However this port the most versatile of the I/O ports in the system. You are able to connect CD-ROM, scanners, and zip drives. USB (Universal Serial Bus) Ports: you can connect up to 127 simultaneous devices, it’s hot swappable. USB ports come in different speeds, such as USB 1.1, 2.0 also known as Hi-speed USB, and 3.0 SuperSpeed. Serial port: Are used to connect external modems, serial printers, and PC to PC connections. They have from 9 or 25 pins generally used for streaming multi-media. 1/8-inch mini-jack audio ports: is used by sound cards and motherboard integrated sound for speakers, microphone, and line-in jacks. Most systems and sound cars use the PC99 color coding on the back of the panel * Pink: Microphone in *Light Blue: Line in *Lime Green: Stereo/Headphones out *Brown: Left to right speaker *Orange: Subwoofer IEEE 1394 port (Firewire): Compatible devices include internal and...

Words: 715 - Pages: 3

Free Essay

Unit 8

...Running head: SHORT TITLE OF PAPER (<= 50 CHARACTERS) Unit 8 Analysis 1 System Performance Computer Structure and logic Mr.Zakkary 11/11/14 Brandon Walker In computing, file system fragmentation, sometimes called file system aging, is the inability of a file system to lay out related data sequentially (contiguously), an inherent phenomenon in storage-backed file systems that allow in-place modification of their contents. It is a special case of data fragmentation. File system fragmentation increases disk head movement or seeks, which are known to hinder throughput. The correction to existing fragmentation is to reorganize files and free space back into contiguous areas, a process called defragmentation. File system fragmentation is projected to become more problematic with newer hardware due to the increasing disparity between sequential access speed and rotational latency (and to a lesser extent seek time), of consumer-grade hard disks,[3] on which file systems are usually placed. Thus, fragmentation is an important problem in recent file system research and design. The containment of fragmentation not only depends on the on-disk format of the file system, but also heavily on its implementation.[4] In simple file system benchmarks, the fragmentation factor is often omitted, as realistic aging and fragmentation is difficult to model. Rather, for simplicity of comparison, file system benchmarks are often run on empty file systems, and unsurprisingly, the results may...

Words: 473 - Pages: 2

Free Essay

Computer Generation

...Computer Organization 1. Introduction STUDY MATERIALS ON COMPUTER ORGANIZATION (As per the curriculum of Third semester B.Sc. Electronics of Mahatma Gandh Uniiversity) Compiled by Sam Kollannore U.. Lecturer in Electronics M.E.S. College, Marampally 1. INTRODUCTION 1.1 GENERATION OF COMPUTERS The first electronic computer was designed and built at the University of Pennsylvania based on vacuum tube technology. Vacuum tubes were used to perform logic operations and to store data. Generations of computers has been divided into five according to the development of technologies used to fabricate the processors, memories and I/O units. I Generation II Generation III Generation IV Generation V Generation : 1945 – 55 : 1955 – 65 : 1965 – 75 : 1975 – 89 : 1989 to present First Generation (ENIAC - Electronic Numerical Integrator And Calculator EDSAC – Electronic Delay Storage Automatic Calculator EDVAC – Electronic Discrete Variable Automatic Computer UNIVAC – Universal Automatic Computer IBM 701) Vacuum tubes were used – basic arithmetic operations took few milliseconds Bulky Consume more power with limited performance High cost Uses assembly language – to prepare programs. These were translated into machine level language for execution. Mercury delay line memories and Electrostatic memories were used Fixed point arithmetic was used 100 to 1000 fold increase in speed relative to the earlier mechanical and relay based electromechanical technology Punched cards and paper tape were...

Words: 3359 - Pages: 14

Premium Essay

Operating Systems

...input/output, and communication resources. Its abbreviation is OS. Mac OS used by Apple on Macintosh computers is used by 10% of Americans. It uses a GUI (graphical user interface) that is run by a keyboard and mouse. But is not a PC and is not compatible with PC hardware. Previously, it ran on a Motorola processor but its successors run on an Intel platform. Mac OS is a favorite of graphic artist, musicians, and multi-media designers. It uses a point release system. It uses Safari and Mozilla Firefox for internet connection. Mac OS has a specialized version of the program developed for the iphone and ipod. Linux operating system is similar to Unix in design but is meant to be run on PC’s, gaming consoles, DVR’s, and mobile phones. 1 to 2 % of the U.S. population use Linux on personal computers. It was written by Linus Torvalds and can be freely downloaded by anyone. Several companies distribute their own versions of Linux called Ubuntu, SuSE, Red Hat, and Knoppix. Linux’s GUI runs on top of the system, free of open software. It emphasis in on simplicity and accessibility (Computer Structure and Logic, 1st Ed., pg.283, par.1,2,3). Linux can use Konqueror as a web browser. OpenOffice is used for the word processor and is comparable to Microsoft Word. The command line functionality is in most Linux’s distributions. Windows is the...

Words: 730 - Pages: 3

Free Essay

Nt1110Lab5Motherboard

...ITT TECHNICAL INSTITUTE COMPUTER STRUCTURE AND LOGIC NT1110 LAB 5: Identify Motherboard Components and Form Factors Gus Perez 19593003 Salem, Oregon. Task 1: Results and Deliverables. The LGA 1156 connector LGA 1156, also known as Socket H or H1, is an Intel desktop CPU socket. LGA stands for land grid array. Its incompatible successor is LGA 1155. The 1156 is the number of pins in the socket, its designed to take the 1156 pin processor. What processors is it used with? Intel Celeron, Pentium, Core i3, i5, i7, and Xeon What is its purpose on the motherboard? LGA 1156 socket allows the following connections to be made from the processor to the rest of the system. * PCI-Express 2.0 ×16 for communication with a graphics card * DMI for communication with the Platform Controller Hub (PCH). This consists of a PCI-Express 2.0 ×4 connection * FDI for communication with the PCH, this consists of two display connections * Two memory channels for communication with DDR3 SDRAM Basically the LGA 1156 socket connects the processor with the motherboard. Intel H55 chipset The Chipset shows what the motherboard can possible do or not. Every computer have a Northbridge chipset. It’s main purpose is to make the link between the processor and the rest of the computer (graphic card, USB ports, hard drive, etc.) but the utility of a Northbridge vary from chipset to chipset, some will act also as a graphic card and on others chipsets, they may also manage the...

Words: 1476 - Pages: 6

Free Essay

Computer Organization - System Bus Lecture Note

...W., Computer Organization and Architecture: Designing for Performance, (5-th Edition) Prentice Hall, 2000. ▪ Mano M. M., Computer System Architec-ture (3-rd Edition), Prentice Hall, 1993. ▪ Stallings W., Computer Organization and Architecture: Principles of Structure and Function, 3-rd Edition) Macmillan Publishing Company, 1993. ▪ Wear L.L., Computer: An Introduction to Hardware and Software Design, McGraw Hill International Edition, 1991. Subject Contents in Outline: ▪ Data Representation and Manipulation ▪ Digital Component ▪ Register Transfer and Microoperations ▪ Basic Computer Organization ▪ Overview of programming ▪ Central Processing Unit ▪ Input/Output Organization ▪ Memory Organization ▪ New development Suggested Reading Assignments: Stallings William, Computer Organization and Architecture: Designing for Performance, (9th Edition) Prentice Hall, 2012. Part II The Computer Systems Chapter 3 A Top-Level View of Computer Function and Interconnection (Pages 87- 115) (main) (Pages 116 – 129) (optional) Part IV The Central Processing Unit Chapter 14 Processor Structure and Function (Pages 505 – 548) (optional) Part...

Words: 3298 - Pages: 14

Free Essay

Nt1210

...the largest market share. However, this doesn’t make it the best when it comes to quality and consistency as it is constantly marred with problems of viruses and malware (HubPages, 2013).” It usually had an affordable price tag at first, but the consumer is charges extra items like soft wear and anti-virus expenses that add up (HubPages, 2013). Linux is usually thought as a less effective than Mac and Windows, however it does offer many software programs that are similar to the Windows and Mac programs for free (HubPages, 2013). All three computer operating systems have Intel processors that make them unique. According to Pearson Certification Team, “Macintosh computers have Intel processors, they are not PCs. Likewise, the Mac OS is not compatible with PC hardware, and PC- based operating systems, such as Windows and Linux, do not normally run on Macintosh computers (Pearson Certification Team, 2011,p 282).” From my personal experience, I prefer Apple products. I like the designs, the speed and the operating system. I cannot afford their products though, so I am using Windows as well. I feel like Apple is a much smoother operating system. References Answers Corporation...

Words: 399 - Pages: 2

Premium Essay

Identifying the Real Problem

...The Purpose and Functions of an Operating System There are three operating systems, MAC OS, Linux, and Windows. The most common one is windows but what is the difference between the three of them. Linux was written by Linus Torvalds and that is how it got its name. It is an ever expanding operating group and it’s estimated that 1-2% of the US population even use Linux for computers. It was originally designed to be used for PCs, game consoles, DVRs, and other devices. Linux has a bigger market for servers and other computer devices that their percentage is growing. Linux can also be downloaded for free by anybody and there have been companies that have emerged by developing this free download into their own version, which are referred to as distributions. Some examples of these distributions include Ubuntu, and Knoppix. Even though Linux is free to download, it is licensed under a General Public License or GPL. It states that derived works can only be distributed under the same license terms as the software itself. Users have the option of using one of a few GUIs that are similar to the Mac OS GUI. The two most popular GUI environments are GNOME and KDE. GNOME stands for GNU Network Object Model Environment. A graphical user interface that runs on top of the Linux operating system, it consists solely of free and open source software. Mac OS is the proprietary operating system used by Apple for their Macintosh computers. This has been a favorite of multimedia designers, and...

Words: 574 - Pages: 3

Premium Essay

Apple Case 10

............................... 3 Theory and Analysis................................................................................................................................. 4 Research question 1: The structure of the PC industry....................................................................... 4 Research Question 2: The difficulty of Apple in the PC industry over time ........................................ 7 Research Question 3: Sustainability of competitive advantage for Apple in the PC business .......... 10 Strategic advice ..................................................................................................................................... 12 Conclusion and Reflection ..................................................................................................................... 12 References ............................................................................................................................................. 13 2 Introduction In 1976 Steve Jobs and Steve Wozniak founded Apple Computer Inc. together with a group of 20 other people and started out in Steve Jobs garage. Apple started making computer circuit boards and followed that with an easy to use computer in 1978, through the years it focused on the PC business and developed applications for their own Macintosh computers. They created laptops called the Macbook in 1994 and even entered the MP3 player industry with the iPod brand in 2001 and more recently the...

Words: 4449 - Pages: 18