You are on page 1of 4

Short Answer:

1. A warm boot, accomplished by pressing the CTRL+ALT+DEL key combination, restarts the
computer through the INT19h ROM BIOS routine. This warm-boot procedure usually does not go
through the complete boot process; generally, it skips the power-on self test (POST) to save time.
In addition, a warm boot frequently fails to reset all adapters in the computer's adapter slots. (so
in other words restarting without powering off)

memory-resident applications are stored in the random access memory (RAM) or page-file if
there isn't enough room instead of on the HDD. non-resident is stored on the HDD.

2. A user interface is the way the person interacts with the computer. using a mouse to track
movement or using the keyboard to give values to the system... In the old days you had to use a
long paper with hole-punches to run programs, just to show how much things have changed.

command-line interface uses the keyboard only. There are a preset number of commands that will
tell the computer to display information or run a program. for instance, "rmdir C:\eraseme\" will
erase that folder on the HDD. The values (grammar and spelling) must be PERFECT in order for
the commands to complete successfully.

menu-based interfacing came later with Microsoft’s DOS platform where instead of typing
commands you could click on commands within menus (thereby eliminating the spelling and
grammar issue as well as being extremely convenient).

graphical interface uses mouse and/or state-of-the-art touch screen technology to pinpoint co-
ordinates on the screen in order for the system to interpret the click of a button. mice and
controllers work much the same way. mouse click at (124,534,0) <left-click at location.
(124,534,1) right-click at location (all programs will use similar values as seen but are different
from program to program).

3. memory management is used to organize and optimize programs and system files kept within
the memory. memory management generally takes system files less-used by the OS and stores
them in the page-file. Depending on how you use your system, it will manage memory to your
needs. Network servers will usually keep more system-relevant files in the memory for faster
performance rather than programs.

virtual memory is basically the system page-file. It stores information with less importance
because the RAM is for fast-access for programs running at the time. If a system DLL file is not
being used by the system at that time it will be stored in the virtual memory. Virtual memory can
also be used when there is not enough room in the RAM to store data. (virtual memory is stored
on the HDD and SHOULD be the same size or larger than your RAM size)

4. device-dependant software is compatible with a limited number of hardware platforms whereas

device-independent software can run on virtually any platform.

5. spy ware gathers information about your actions on a computer and sends it to websites or
hackers (like bank information, passwords, etc.) and can hijack your browser (redirects, etc.)

ad ware will store info about your browsing habits so that it can be used to target particular ads at

Filters for the internet are called: anti-spam filter, web filters, and pop-up blockers.

Scavenger Hunt:
1- The Unix billennium is the point in time represented by a Unix time value of 109:
01:46:40 UTC on September 9, 2001 (

2- SPOOL - Simultaneous Peripheral Operations On-Line made by IBM


3- created CP/M as the first operating system for the new microprocessor. By 1977, CP/M
had become the most popular operating system (OS) in the fledgling microcomputer (PC)
industry. The largest Digital Research licensee of CP/M was a small company which had
started life as Traf-0-Data, and is now known as Microsoft. In 1981, Microsoft paid
Seattle Software Works for an unauthorized clone of CP/M, and Microsoft licensed this
clone to IBM which marketed it as PC-DOS on the first IBM PC in 1981, and Microsoft
marketed it to all other PC OEMs as MS-DOS.(

4- Microsoft completely knocked DR-DOS (caldera) out of compatibility with windows with
the release of windows 95. Caldera filed a lawsuit against Microsoft and Caldera backed
off when Microsoft paid them a large undisclosed sum of money for settlement of the
lawsuit. (

5- Larry the Cow is the unofficial mascot of Gentoo, a semi-popular Linux distribution.

Expanding your understanding:

Instant messaging has proven to be similar to personal computers, e-mail, and the internet, in
that its adoption for use as a business communications medium was driven primarily by
individual employees using software at work, rather than by formal mandate or provisioning
by corporate information technology departments. Tens of millions of the consumer IM
accounts in use are being used for business purposes by employees of companies and other

Popular IM filters like “IM Lock Software” and “IM Filter” are good for filtering your instant

Seeing as Instant Messaging is used almost always now by everyone and their neighbour, it
is a great way to communicate quickly and efficiently in the workplace (as long as it is not a


Avast! Antivirus software:

Avast! Antivirus software costs $40 per year (one computer) (a great price for TOTAL

System requirements: If you can run windows, you can run AVAST!

CONS: Avast! Is slightly weaker than some other antivirus’ and many known viruses can get
through avast! Protection. Not as useful if you are protecting expensive information. Not
designed for server/client computers.

Avast! Includes:
Features overview
Anti-spyware built-in Automatic updates
Anti-rootkit built-in PUSH updates
Strong self-protection Virus Chest
Antivirus kernel System integration
Simple User Interface Command-line scanner
Enhanced User InterfaceIntegrated Virus Cleaner
Resident protection Support for 64-bit Windows
Script blocker Internationalization
P2P and IM Shields Network Shield
Web Shield

Kaspersky Internet Security: Even more advanced than AVAST! As well as the great big
popular Norton Internet Security.

For one year it costs 79.99 but you can use it on up to 3 computers.

The system requirements are a bit higher because the program is very real-time protection
intensive (always running scans so having one gig of ram and a dual-core CPU is

It updates automatically and is known for it’s ability to catch and detect viruses before they
even RUN on your computer.

CONS: Uses a lot of memory and CPU cycles. Is not optimized for use with large networks
but can be configured to do so by an IT professional.

ESET smart security (NOD32): The ideal security solution for businesses with anywhere from 5 to
100,000+ workstations. In addition to the full-feature set of the Home Edition, ESET Smart
Security: Business Edition includes a Remote Administrator and a LAN update "mirror" to easily
monitor and update workstations.

System requirements: works on virtually any computer with any OS

ESET Smart Security: Business Edition may be installed on servers as well as workstations.

ESET smart security costs 254.95 a year or 384.95 every 2 years (for 5 licenses) and Buying in
bulk is extremely cheap… you can get 15 licenses for 970.35.

ESET Smart Security is designed with business in mind so it is hassle-free, can run in complete
silence (user doesn’t need to do anything) and can function on servers and/or small networks.

Smart Security has everything: Antivirus, firewall, anti-spyware/adware/IM filtering/etc. It includes

its own advanced protection to keep itself running and the system from being infected with any
kind of malicious/dangerous software.

PROS: DESIGNED for large networks and businesses with servers

CONS: users that want to change settings should have an extended knowledge of
computers/networks/firewalls/communication/system programming/etc. It Costs a lot more than
the other security programs mentioned here. ESET’s antivirus program does not work as well on
standalone computers than it does on servers and networks.

My opinion:

Every antivirus above has its ups and downs, If you want simple worry free protection use avast!
(especially if you have a tight budget). If you want moderate protection with a simple but
customizable interface with advanced options made easy then Kaspersky is the way to go. But if
you are a big business with a large network, or a business that stores very valuable information,
you should get ESET smart security.

I have used all three programs and I have to say I like Kaspersky the most because it is easy to
use with my computer knowledge and once set up it is an unstoppable barrier for some of the
most dangerous viruses I have encountered. It also costs less than a hundred dollars so it isn’t
too bad on your pocket.