You are on page 1of 15

BUSHRA SAIFULLAH.

16088 – BBA-1.
HYDERI.
INTRODUCTION TO COMPUTING.
SIR MIRZA ANAS MASOOD BAIG.

Q:01: What are the different of personal computer? Explain each in detail.
A:01 TYPES OF PERSONAL COMPUTER:

DESKTOP: Before the widespread use of PCs, a computer that could fit on
a desk was remarkably small, leading to the "desktop" nomenclature. More
recently, the phrase usually indicates a particular style of computer case.
Desktop computers come in a variety of styles ranging from large
vertical tower cases to small models which can be tucked behind or rest
directly beneath (and support) LCD monitor.
While the term "desktop" often refers to a computer with a vertically aligned
computer tower case, these varieties usually rest on the ground or
underneath desks. Despite this seeming contradiction, the term "desktop"
does typically refer to these vertical tower cases as well as the horizontally
aligned models which are designed to literally rest on top of desks and are
therefore more appropriate to the "desktop" term, although both types
qualify for this "desktop" label in most practical situations aside from certain
physical arrangement differences. Both styles of these computer cases
hold the systems hardware components such as the motherboard,
processor chip, other internal operating parts. Desktop computers have an
external monitor with a display screen and an external keyboard, which are
plugged into USB ports on the back of the computer case. Desktop
computers are popular for home and business computing applications as
they leave space on the desk for multiple monitors.

PORTABLE: The potential utility of portable computers was apparent early


on. Alan Kay described the Dynabook in 1972, but no hardware was
developed. The Xerox NoteTaker was produced in a very small
experimental batch around 1978. In 1975, the IBM 5100 could be fit into a
transport case, making it a portable computer, but it weighed about 50
pounds.
Before the introduction of the IBM PC, portable computers consisting of a
processor, display, disk drives and keyboard, in a suit-case style portable
housing, allowed users to bring a computer home from the office or to take
notes at a classroom. Examples include the Osborne 1 and Kaypro; and
the Commodore SX-64. These machines were AC powered and included a
small CRT display screen. The form factor was intended to allow these
systems to be taken on board an airplane as carry-on baggage, though
their high power demand meant that they could not be used in flight. The
integrated CRT display made for a relatively heavy package, but these
machines were more portable than their contemporary desktop equals.
Some models had standard or optional connections to drive an external
video monitor, allowing a larger screen or use with video projectors.

LAPTOP: A laptop computer is designed for portability with "clamshell”


design, where the keyboard and computer components are on one panel,
with a hinged second panel containing a flat display screen. Closing the
laptop protects the screen and keyboard during transportation. Laptops
generally have a rechargeable battery, enhancing their portability. To save
power, weight and space, laptop graphics cards are in many cases
integrated into the CPU or chipset and use system RAM, resulting in
reduced graphics performance when compared to a desktop machine. For
this reason, desktop computers are usually preferred over laptops
for gaming purposes.
Unlike desktop computers, only minor internal upgrades (such as memory
and hard disk drive) are feasible owing to the limited space and power
available. Laptops have the same input and output ports as desktops, for
connecting to external displays, mice, cameras, storage devices and
keyboards. Laptops are also a little more expensive compared to desktops,
as the miniaturized components for laptops themselves are expensive.

ULTRA MOBILE PC: The ultra-mobile PC (UMP) is a small tablet


computer. It was developed by Microsoft, Intel and Samsung, among
others. Current UMPCs typically feature the Windows XP, Windows Vista,
Windows 7, or Linux operating system, and low-voltage Intel Atom or VIA
C7-M processors.

SMARTPHONE: Smartphones are often similar to tablet computers, the


difference being that smartphones always have cellular integration. They
are generally smaller than tablets, and may not have a slate form factor.

Q:2 Explain Malware and its types in detail?


A:2 MALWARE: Malware is a combination of the word malicious and
software and is used to describe, in general term, any types of bad code
we may find on computer. Malware is a program designed to gain access to
computer systems, for the benefits of some third party. Malware includes
worms, virus, ransomware, spyware and other.
TYPES OF MALWARE:

VIRUS: Viruses are designed to damage its target by corrupting data,


reformatting your hard disk, or completely shutting down your system. The
can also be used to steal information, harm computers and network, create
botnets, steal money, render advertisements, and more. A virus can copy
itself and spread to other computers by attaching themselves to programs
and executing code when user runs the infected program. A computer virus
requires human action to spread to other computers and are often spread
through email attachments and internet downloads.
WORM: One of the most common types of malware, worms spread over
computer networks by exploiting operating system vulnerabilities. It’s a
standalone programs that replicate itself to infect other computers, without
requiring action from anyone.
Since they can spread fast, worms are often used to execute a playload- a
piece of code that can cause damage to a system. Playloads can delete
files on a host system, encrypt data for ransomeware attack, steal
information, and delete files.
TROJANS HORSE: Trojans Horse enters your system disguised as a
normal, harmless file or program to trick users into downloading and
installing malware. As soon as install a Trojan, you are giving cyber
criminals access to your system. This allows the cyber criminal to steal
data, install more malware, modify files, monitor user activity, destroy of
data, steal financial information, conduct denial of service (DoS) attacks on
target web addresses, and more. Trojans malware cannot replicate by
itself, however, if combined with a worm, the damage Trojans can have on
users and systems is endless.
SPYWARE: Installed on your computer without your knowledge, spyware
is designed to track your browsing habits and internet activity. Spying
capabilities can include activity monitoring, collecting keystrokes, data
harvesting of account information, logins, and more. Spyware can spread
by exploiting software vulnerabilities, building with legitimate software, or in
Trojans.
KEYLOGGERS: Keyloggers records everything the users types on his/her
computer system to obtain passwords and other sensitive information and
send them to the source of the keylogging program.
RANSOMWARE: Ransomware is a type of malware that hold your data
captive and demands payment to release the data back to you. It restricts
users access to the computer by either encrypting files on the hard drive or
locking down the system and displaying messages that are intended to
force the user to pay the attacker to release the restrictions and regain
access to the computer. Once the attacker paid, your system and data will
back to the original state.

Q:3 How does IT improve our lives? Mention five examples and explain
each in detail.
A:3 IT IMPROVE OUR LIVES EXAMPLES:
1. EDUCATION:
 Most equip labs and classrooms with laptops or desktops.
 Registeration, Attendance and Marks posting online.
 Digital library
 Learning management system, which is software that contains tools
for class preparation, distribution, and management.
 For example, through the course management system, students
access course materials, grades, assessments, and a variety of
collaboration tools.
 Distance learning.
2. RETAIL:
 The retail stores can check the customer sales and track inventory.
 Additionally, you can purchase just about any product or service on
the web.
3. PUBLISHING:
 Many publishers of books, magazines, newspapers, music, film, and
video make their works available online.
 Organizations and individuals publish their thoughts and ideas using
a blog, podcast, or wiki.
 A blog is an informal website consisting of time-stamped article
(posts) in a diary or journal format, usually listed in reverse
chronological order. Posts can contain text, photos, links, and more.
 Podcasts are a popular way to distribute audio or video on the web.
 A podcast is recorded media that users can download or stream to a
computer or portable media player.
 Examples of podcasts include lectures, political messages.
 A wiki is a collaborative website that allows users to create, add to,
modify, or delete the content via their browser. Many wikis are open
to modification by the general public.
4. MANUFACTURING:
 Computer-aided manufacturing (CAM) refers to the use of computers
to assist with manufacturing processes, such as fabrication and
assembly.
 CAM is used by a variety of industries, including oil drilling, power
generation, food production, and automobile manufacturing.
 Automobile plants, for example, have an entire line of industrial
robots that assemble a car.
 Special computers on the shop floor record actual labor, material,
machine, and computer time used to manufacture a particular
product.
 The computers process this data and automatically update inventory,
production, payroll, and accounting records on the company’s
network.
5. HEALTHCARE:
 Hospitals use computers to maintain and access patient records.
 Online reports of tests conducted.
 Computers and mobile devices monitor patients’ vital signs in hospital
rooms.
 Computers and computerized devices assist doctors, nurses, and
technicians with medical tests.
 Doctors use the web and medical software to assist with researching
and diagnosing health conditions.
 Surgeons implant computerized devices, such as Pacemakers.
 Surgeons use computer-controlled devices to provide them with
greater precision during operations, such as for laser eye surgery and
robot-assisted heart surgery.

Q:4 Differentiate between Data and Information?


A:4 DATA:
1. Data comes from a Latin word, datum, which means "To give
something." Over a time "data" has become the plural of datum.
2. Data does not have any specific purpose.
3. It never depends on Information.
4. Data depends upon the sources for collecting data.
5. Data is based on records and observations and, which are stored in
computers or remembered by a person.
INFORMATION:
1. Information word has old French and middle English origins. It has
referred to the "act of informing.". It is mostly used for education or
other known communication.
2. It carries meaning that has been assigned by interpreting data.
3. It depended on Data.
4. Information depends upon data.
5. Information is considered more reliable than data. It helps the
researcher to conduct a proper analysis.

Q:5 Explain Application. Also explain different categories of Applications.


A6: APPLICATIONS: An application, or application program, is a software
program that runs on your computer. Web browsers, e-mail programs, word
processor, games, and utilities are all applications. The word “application”
is used because each program has a specific application for the user. For
example, a word processor can help a student create a research paper,
while a video game can prevent the student from getting the paper done.
Examples of applications include word processor, database programs,
development tools, web browsers, and communication platform.
Applications use the computer’s operating system (OS) and other
supporting programs, typically system programs, to function.

CATEGORIES OF APPLICATIOS:
1. BUSINESS APPS:
Also referred to as productivity apps, they holds the second place with the
considerable 10% share. Modern-day smartphones are capable of
performing many complex tasks on the run.
Billing, buying, booking, sending emails, tracking working progress – you
name it. Business apps vary from B2B applications to office and personal
apps to boost productivity and minimize expense: imagine that you can find
Android app developers for hire, recruit a new sales-manager or buy new
cartridges for your office printers just with one tap.
2. EDUCATIONAL APPS:
This category is somewhat blurry in its content, as it may encompass a vast
field of mobile apps. In other words, an app can be educational to some extent
and still do not fit in this category. Or otherwise. However, it’s good to know
that we as society care about self-education, which brings this category to
the top 2 of our list.
Kids can learn while playing educational game apps. Students may learn
out of the class and adjust individual learning pace. Moreover, according to
recent reviews many educational apps are useful for teachers as well –
organizing a teaching process better, educating themselves, etc.

3. ENTERTAINMENT APPS:
We are talking about streaming, chatting, searching events, watching
videos online, posting photos to Instagram and so on. Applications for
entertainment are often closely related to gaming due to same goal – to
agitate your mind.
These are the apps that have a tendency to invoke a kind of dependency,
they keep us engaged, logged in, always checking for updates. On the
bright side, imagination and talent of app creators bring lots of fresh and
fun things to our lives, so we will never be bored again, that’s for sure.
4. UTILITY APPS:
Utility software is used on a daily basis by literally everyone of us, we don’t
even realize it. Though unlike others types of apps, utility apps display the
shortest user session times. People use these to just get things done and
move on. Falling into top categories of mobile apps can be explained by
sheer amount of practical individuals leveraging their gadgets to full
potential. For example taxi apps. However, most popular types of
applications here are scanners, trackers, healthcare, first aid manuals, etc.
5. TRAVEL APPS:
Travel apps’ purpose is 100% crisp and clear, as the title suggests – to
makes your traveling easier, more comfortable. Some of them turn your
smar tphone into universal travel diary, some can literally guide you
through the unknown sites abroad using maps, some provide translation
assistance. That’s why most of today’s tourists seem to be digitally-savvy
all-knowing travelers.
Q:6: Define network and its types in detail.
A6: NETWORK:
A network consists of multiple devices that communicate with one another.
It can be as small as two computers or as larger as billions of device. While
a traditional network is comprised of desktop computers, modern network
may include latptops, tablets, smartphons, television, gaming consoles and
other electronics. There are three types of networks.
1. LAN
2. MAN
3. WAN
TYPES OF NETWORK:
LAN (LOCAL AREA NETWORK):
A Local Area Network (LAN) consists of computer network at a single site,

typically on office building. A LAN is very useful for sharing resources, such
as data storage and printers. LANs can be built with relatively inexpensive
hardware such as, hubs, network adapters and Ethernet cables.
A small LAN may only use two computers, while larger LAN can
accommodate thousand of computers. A LAN typically relies on wired
connections for increased speed and security, but wireless connection can
also be the part of a LAN. High speed and relatively low cost are the
defining characteristics of LANs.
LANs are typically used for the single sites where people need to share
resources among themselves but not with the rest of the outside world.
Think of an office building where everybody should be able to access files
on a central server or able to print a document to one or more central
printers. Those tasks should be easy for everybody for working in the same
office, but you would not want somebody just walking outside to be able to
send a document to the printer from their cell phone! If a local area
network, or LAN, is entirely wireless, it is referred to as a wireless local
area network, or WLAN.

MAN( METROPOLITAN AREA NETWORK):


A Metropolitan Area Network consists of a computer network across an
entire city, college campus or small region. A MAN is larger than a LAN,
which typically limited to a single building or site. Depending on the
configuration, this types of network can cover an area from several miles to
tens of miles. A MAN is often to used to connect several LANs together to
form a bigger network. When this types network is specifically designed for
a college campus, it is sometimes referred to as a campus area network, or
CAN.
WAN (WIDE AREA NETWORK):
A Wide Area Network, or WAN, occupies a very large area, such as an
entire country or the entire world. A WAN can contain multiple smaller
networks, such as LANs or MANs. The internet is the best example of
public WAN.
Numerous WANs have been constructed, including public packet networks,
large corporate networks, military networks, banking networks, stock
brokerage networks, and airline reservation networks.
Organizations supporting WANs using the Internet Protocol are known as
Network Service Providers (NSPs). These form the core of the Internet .
By connecting the NSP WANs together using links at Internet Packet
Interchanges (sometimes called "peering points") a global communication
infrastructure is formed.

You might also like