You are on page 1of 31

COMPUTER OPERATIONAL SYSTEM

Class – B.Sc. Hons Bioinformatics


Roll No. – 2182217
Submitted By – Ms. Anushka Srivastava
Submitted To – Ms. Meenakshi Ma’am
INDEX

S.N Topics
O.
1. What is System Maintenance?
2. What are the Diagnosis of a computer?
3. What is Computer Virus and it’s types?
4. How Virus infects system?
5. What are the symptoms of Computer Virus?
6. What are the precautions of Virus?
7. Explain the Physical components of
computer?
QUES 1. What is System Maintenance?
ANS.
System Maintenance planning begins early in the acquisition process with
development of a maintenance concept. Maintenance planning is conducted to
evolve and establish requirements and tasks to be accomplished for achieving,
restoring, and maintaining operational capability for the life of the system. For
a system to be sustained throughout its system life cycle, the maintenance process
has to be executed concurrently with the operations process.
The initial requirements for maintenance include:

 Maximizing system availability to meet the operational requirements. This has


to take into account the designed-in reliability and maintainability of the system
and resources available.
 Preserving system operating potential through proper planning of system
scheduled maintenance. This requires a reliability-centered maintenance
strategy that incorporates preventive maintenance in order to preempt failures,
thereby extending the mean time between corrective maintenance, as well as
enhancing the availability of the system.
 Segmenting maintenance activities for potential outsourcing of non-critical
activities to approved maintenance subcontractors as to optimize scarce
technical manpower resources and maintenance/repair turn-around times.
 Harnessing IT technology for maintenance management. This involves rigorous
and systematic capturing and tracking of operating and maintenance activities
to facilitate analysis and planning.
Maintenance management is concerned with the development and review of
maintenance plans, as well as securing and coordinating resources, such as budget,
service parts provisioning, and management of supporting tasks (e.g., contract
administration, engineering support, and quality assurance). Maintenance planning
relies on level of repair analysis (LORA) as a function of the system acquisition
process. Initial planning addresses actions and support necessary to ensure a
minimum life cycle cost (LCC).
Process Approaches :
The purpose of the maintenance process is to sustain the capability of a system to
provide a service. This process monitors the system’s capability to deliver services,
records problems for analysis, takes corrective, adaptive, perfective, and preventive
actions, and confirms restored capability. As a result of the successful
implementation of the maintenance process:

 a maintenance strategy is developed


 maintenance constraints are provided as inputs to requirements
 replacement system elements are made available
 services meeting stakeholder requirements are sustained
 the need for corrective design changes is reported
 failure and lifetime data are recorded
The project should implement the following activities and tasks in accordance with
applicable organization policies and procedures with respect to the maintenance
process:

 scheduled servicing, such as daily inspection/checks, servicing, and cleaning


 unscheduled servicing (carrying out fault detection and isolation to the faulty
replaceable unit and replacement of the failed unit)
 re-configuration of the system for different roles or functions
 scheduled servicing (higher level scheduled servicing but below depot level)
 unscheduled servicing (carrying out more complicated fault isolation to the
faulty replaceable unit and replacement of the failed unit)
 minor modifications
 minor damage repairs
 major scheduled servicing (e.g., overhaul and corrosion treatment)
 major repairs (beyond normal removal and replacement tasks)
The maintenance plan specifies the scheduled servicing tasks and intervals
(preventive maintenance) and the unscheduled servicing tasks (adaptive or
corrective maintenance). Tasks in the maintenance plan are allocated to the various
maintenance agencies. A maintenance allocation chart is developed to tag the
maintenance tasks to the appropriate maintenance agencies. These include: in-
service or in-house work centers, approved contractors, affiliated maintenance or
repair facilities, original equipment manufacturer (OEMs), etc. The maintenance
plan also establishes the requirements for the support resources.
Related activities such as resource planning, budgeting, performance monitoring,
upgrades, longer term supportability, and sustenance also need to be managed.
These activities are planned, managed, and executed over a longer time horizon
and they concern the well-being of the system over the entire life cycle.
Proper maintenance of the system (including maintenance-free system designs)
relies very much on the availability of support resources, such as support and test
equipment (STE), technical data and documentation, personnel, spares, and
facilities. These have to be factored in during the acquisition agreement process.

QUES 2. What are the Diagnosis of


Computer?
ANS.
Computer diagnostics are software programs designed to scan the hard disk and
other computer hardware components of a computer system, and identify any
issues that may be hampering the overall performance of that system.
 Many diagnostic utilities of this type also have the capability of correcting
those issues, and thus restoring full function to the system immediately after
the diagnostics session is completed.
 Most operating systems have basic computer diagnostics programming
included in the basic installation. In addition, it is possible to purchase
additional computer software and routinely run diagnostics sessions to
identify and correct a wide range of operational issues.
 The main function of computer diagnostics is to ensure the ongoing
operation efficiency of the computer and its related components. For this
reason, all diagnostic programs scan the hard drive of the system.
 Most types of diagnostic programs have the capability to scan all other
drives that are currently enabled on the system. Many programs of this type
will also allow the user to set up a recurring schedule of automatic scans,
thus ensuring that any developing issues are identified and resolved before
there is a chance for severe damage to any of the drives.
 In addition to computer diagnostics associated with a computer workstation,
there are also diagnostic programs that address the efficiency of a network
configuration.
 This type of tool is helpful when a specific workstation experiences
difficulty when attempting to connect to a network via a server or some type
of remote connection.
 Like the basic diagnostics used to scan local drives, many operating systems
also are equipped with a network tool that is capable of troubleshooting the
more common issues that may develop.
Methods of Operation:
The diagnostics program for a device or system may be independently located or
integrated within. These Methods of Operation are arranged, more-or-less, in order
of increasing complexity and their increasing value of diagnostics information.

1. Background monitoring of system indicators, for statistical analysis of


trends, and for recording abnormal events.
2. Solution-based diagnostics, that test for known failure modes by identifying
if their known symptoms are detected.
3. Black box, which is testing of a mechanism without knowing how it works,
and merely focusing on the accuracy of output data based on a known input.
4. White box, which uses knowledge of a mechanism's inner functions for
direct testing.
5. Operation-oriented, a combination of both black and white box, with one or
more black-box operations interleaved with one or more white-box
operations. This mode of testing is not preferred, however, some complex
systems do not have the necessary interfaces to perform one or the other
type independently.
6. Integrated background diagnostics, that perform testing of system
components during idle-time of a system.
7. Operation-interleaved diagnostics, that incorporate diagnostics into the
normal operation of a system component, thus any marginal operating mode
is immediately diagnosed. Examples of hardware components with features
that assist a diagnostic program are:
1. Modern hard drives have Self-Monitoring, Analysis and Reporting
Technology (SMART) commands that provide information about
internal error conditions, e.g., spin retry counts, bad sector counts,
etc.
2. Some systems may use Error Correcting Code (ECC) memory that
logs memory failure events that were automatically corrected.

QUES 3. What is Computer Virus and it’s


Types?
ANS.
 A computer virus is a kind of malicious computer program, which when
executed, replicates itself and inserts its own code. When the replication is
done, this code infects the other files and program present on your system.
 A computer virus is a program which can harm our device and files and
infect them for no further use. When a virus program is executed, it
replicates itself by modifying other computer programs and instead enters its
own coding. This code infects a file or program and if it spreads massively,
it may ultimately result in crashing of the device. 
 Across the world, Computer viruses are a great issue of concern as they can
cause billions of dollars’ worth harm to the economy each year. 
 These computer viruses are present in various types and each of them can
infect a device in a different manner. 

What is the virus’s goal?

 The goal of a virus depends entirely on the person that made it and their
intentions at the time. For example, A virus might be made to take
advantage of a very specific exploit that is only available on very few
computers after certain conditions have been meet, but the systems that have
this exploit/hole might be systems that keep very valuable and sensitive
information or run a widely used service for lots of other people. In this case
the person making the virus would design to take advantage of the exploit to
gain access to the data or to control the service that is being provided. This
virus would be useless on another computer that is used for a different
reason.

 These days for people making the virus, they usually want it to be as
widespread as possible. To do that they first target the Operating System that
is the most used in the world which is Microsoft Windows. This is why there
are so many virus’s for Windows Based computers and why it’s so
important to take precautions to protect your computer from these viruses.

The most common goals that common viruses have today are…
 Collect data about your computer and the user’s habits and sell that data.
 Hijack your computer to push more Ads to your screen and gain money from
advertising
 Hijack your computer and holds your computer for ransom until you pay it
or tricks the user into buying fake software.
 To mess up your computer as much as they can, because they can.

Types of Computer Virus:


Discussed below are the different types of computer viruses:

 Boot Sector Virus – It is a type of virus that infects the boot sector of
floppy disks or the Master Boot Record (MBR) of hard disks. The Boot
sector comprises all the files which are required to start the Operating
system of the computer. The virus either overwrites the existing program or
copies itself to another part of the disk.
 Direct Action Virus – When a virus attaches itself directly to a .exe or .com
file and enters the device while its execution is called a Direct Action Virus.
If it gets installed in the memory, it keeps itself hidden. It is also known as
Non-Resident Virus.
 Resident Virus – A virus which saves itself in the memory of the computer
and then infects other files and programs when its originating program is no
longer working. This virus can easily infect other files because it is hidden in
the memory and is hard to be removed from the system.
 Multipartite Virus – A virus which can attack both, the boot sector and the
executable files of an already infected computer is called a multipartite
virus. If a multipartite virus attacks your system, you are at risk of cyber
threat.
 Overwrite Virus – One of the most harmful viruses, the overwrite virus can
completely remove the existing program and replace it with the malicious
code by overwriting it. Gradually it can completely replace the host’s
programming code with the harmful code.
 Polymorphic Virus – Spread through spam and infected websites, the
polymorphic virus are file infectors which are complex and are tough to
detect. They create a modified or morphed version of the existing program
and infect the system and retain the original code.
 File Infector Virus – As the name suggests, it first infects a single file and
then later spreads itself to other executable files and programs. The main
source of this virus are games and word processors.
 Space filler Virus – It is a rare type of virus which fills in the empty spaces
of a file with viruses. It is known as cavity virus. It will neither affect the
size of the file nor can be detected easily.
 Macro Virus – A virus written in the same macro language as used in the
software program and infects the computer if a word processor file is
opened. Mainly the source of such viruses is via emails.

QUES 4. How Virus Infects System?


ANS.
The way a virus spreads to other computers varies with the type of virus.

 A macro virus becomes active when a document infected with the virus is


opened using the program it is designed to attack. (So far--as of October
1997--only Microsoft Word, Microsoft Excel, and Lotus Ami Pro are
vulnerable to macro viruses.) The program must have its ability to run
macros enabled (turned on). Generally, when a virus in a document becomes
active, it will spread to global settings for the application, so that other
documents will become infected when they are opened. When an infected
document is opened on another computer, the global settings used by that
copy of the application will be infected as well.

 A boot sector virus infects hard disks and diskettes. If a computer is re-


booted or its power is turned on while an infected diskette is in drive A, the
virus will spread to the hard disk, even if the diskette is not capable of
starting up the computer. Once the hard disk is infected, all diskettes used in
the computer will be infected and can spread the infection to other
computers. On Macintoshes, a boot sector virus can become active when an
infected diskette is inserted in a diskette drive because the Macintosh reads
the diskette immediately.

 A program virus becomes active when a program infected with a virus is


run. Once a program virus is active, it will usually infect other programs on
the computer. If a copy of an infected program is moved to and run on
another computer, it can then infect programs on that computer.
Can a virus spread through e-mail?
o It is possible to get a virus through e-mail but only in very limited
circumstances. If you are using an e-mail program that can handle
files attached to an e-mail message, you may be vulnerable.

o To get an infection, the attachment must carry an infection and the e-


mail program must be set to do something automatically when it sees
the attachment.
o If the attachment is a program, the e-mail program would have to run
the program without asking you; if the attachment is a document, the
e-mail program would have to run a program to open that document.

o In the latter case (opening a document), the program would have to be


configured to allow running macros. If any of the above
circumstances are not true for you, you're in no danger of being
infected by a virus when you read e-mail.

o If you save the attachment from an e-mail message, and it is a


program or a file that might contain a macro virus, you should scan it
with an anti-virus program before opening it.

QUES What are the symptoms of


5.
Computer Virus?
ANS.
The Symptoms of Computer Virus are :
1.Your Computer Slows Down
One of the most common computer virus symptoms is slow down. You can
know that your computer has been affected by malware if your operating
system, computer applications, and internet speed begin to slow down. If you
note such a tendency and you’re not running heavy applications or programs,
there may be cause for alarm.

2.Crashing

If your system crash suddenly appears or the infamous Blue Screen of Death
(BSOD) appears more often, then it’s obvious that your computer isn’t
operating normally and you should check it.

3.Pop-ups

One of the most annoying computer virus symptoms is characterized by


unwanted pop-ups. If these unexpected pop-ups appear on your system, know
that your computer has probably been affected by spyware/virus/malware.

4.Hard Drive Malfunction

In case you have discovered that your hard disk is exhibiting unusually high
activity even when you aren’t using it, consider checking for malware.
However, hard disk malfunction can also be caused by hardware failure.

5.Running Out of Storage Space

Computer virus symptoms can be triggered by numerous malicious software


through different methods to fill your storage space and may eventually cause
it to crash.

6.Unwanted Programs or Messages That Start Automatically

Some of the warning signs that you should be suspicious about include:
 Windows shutting down suddenly without reason
 Programs opening or closing automatically
 Strange windows as you boot
 Message from windows that you lost access to your drive
7.Disabled Security Solution

In case your antivirus doesn’t seem to work or if your update module all of a
sudden is disabled, make sure that you check what has happened as soon as
possible. There are some types of malware that are built to disable computer
security solutions and leave your machine defenseless.

8.Sending Strange Messages Automatically

The first step is to confirm whether the messages were sent from your account.
However, if you discover that you weren’t the sender, then the messages were
sent by an uncontrollable application.

9.Unusual Network Activity

Sometimes you may not be connected to the internet, and you aren’t running
any applications that can connect themselves to the internet, but you still
observe high network activity. Such computer virus symptoms can be
confirmed by using a good antivirus.

10. Applications

If you have tried to start applications from the start menu or desktop of your
computer and nothing happens, then your computer may be infected.

11.Error Messages

Your computer will know when something is wrong even before you do. One of
the noticeable computer virus symptoms includes messages that warn you of
missing files.

12.Advertisements

Ads are common when browsing. However, when you see them when not
browsing, this could be a sign of a virus.
13.Hardware and Accessory Problems

In case you have problems with your computer display, for instance color
problems or mixing pixels, this can be an indication of malware in your
computer. Sometimes network printers also malfunction if they become
infected.

14.Sent Emails

Viruses can be  spread via emails. Therefore, if you note that there are emails
in your outbox that you never sent or you receive suspicious emails from a
friend, they may be infected.

15.Computer Malfunction

Computer viruses can cause your computer to do all kind of strange things.
When your computer starts to open files on its own, or acts like keys have been
clicked, then you may be experiencing computer virus symptoms.

16.Affected Applications

Some viruses are created to affect some applications, and as a result your
computer may fail to run such applications until they are reinstalled.
17.Blocked From Antivirus Sites

If your computer has been infected by malicious viruses, your computer may
be prevented from accessing antivirus sites. Viruses attack browsers and may
inhibit them from using the internet normally.

18.Gibberish Dialog Boxes

If your computer opens up many dialog boxes on your screen all at once, this
can be a sign of malware. Most of the dialog boxes show gibberish messages
that aren’t easily decoded.
19.Slow Startup
If your computer suddenly experiences a slow startup most likely it has
become infected. There is the typical time your computer takes before it starts
and you can note when your computer starts slower than usual.

20.Printer Issues

If your printer seems to have a mind of its own and randomly prints
documents, you could possibly be dealing with a virus.

QUES 6. What are the Precautions of Virus?


ANS.
 Install an anti-virus program
Whether you are connecting to the internet or not, having reliable
protection is the route to go. Anti-virus programs are a minimal
investment and are worth the dollars so as soon as you power up that
computer, make sure you are protected!
 Install anti-spyware and anti-malware programs
Many of these programs are free and prevent viruses from doing any
damage on your computer. They require continuous running and
updating but when used correctly, they serve their purpose.
 Avoid suspicious websites
A lot of times websites will notify you if you are about to enter a
website that attempts to install or run a program on your computer but
not always. Avoid websites such as those.
 Never open email attachments without screening them
The most common way viruses are spread remains to be through
email. Make sure you use an email provider that requires all
attachments to be scanned prior to opening, to ensure your computer
doesn’t get a virus.
 Set up automatic scans
Setting up scans to run on your computer daily or weekly is a good
idea to get rid of any viruses. This keeps your computer updated and
clear of issues.
 Watch your downloads
We understand that downloading files from the internet such as music
and movies is what so many of us do, but it also gets so many of us in
trouble. Big files like those are easy to sneak some trouble into so be
aware of what you are downloading.
 Update, Update, Update!
Microsoft Windows ‘Critical Update’ is one example of staying ahead
of all the hackers out there. Critical Update is an entire branch of
Microsoft that is dedicated to keeping computers free is viruses.
Always keep your system updated
 Always be in the know
Whether you are a computer fanatic or you just use yours casually,
always know what the latest viruses are and how they will affect your
computer. This will prepare you if something happens so you can fix
the problem sooner.
 Avoid cracked software
Everyone knows that you can download illegal or ‘cracked’ software
online that seems to be easier on the wallet but in reality downloading
those programs hurt you. They subject your computer to hard-to-
detect bugs and will end up causing you more problems.
 Install a firewall
A firewall is a program that screens incoming internet and network
traffic. Along with your virus program, it can help prevent
unauthorized access to your computer.
 Be prepared
If you get wind of a virus that is going around like wildfire than be
sure to be on high alert. Don’t accept any downloads and be extra
cautious when opening emails and files.

 Keep your computer up to date


All operating systems on computers get frequent updates that enhance
features but also include security patches that will fill security holes before
cyber criminals do. While we know that updates are a bit of a pain, they are
far less inconvenient that getting a virus on your computer. We encourage
our clients to enable automatic updates on their computers in addition to
running updates for programs such as Adobe and Java. Before you allow any
updates, ensure that you are on a secured connection and not at a coffee shop
for instance.
 Don’t use Internet Explorer
Old habits can die hard but we now live in an exciting time. We have so
many browsers to choose from. Whether you prefer Chrome, Firefox or
Opera, any of those choices are safer than Internet Explorer. While the
newer versions of Internet Explorer are an improvement over the past
versions, they are still a far cry from the quality of Chrome or Firefox. We
saw significant improvement in online security with our clients with just
switching to a different browser. And when you choose a better browser —
keep it updated!
 Backup your computer
As in our cautionary tale above, some computer viruses just keep coming
back and are just impossible to delete off of a computer. When this happens,
there can be some of your own data removal involved. In other times, a virus
removal will cause damage to the operating system. At these times, we
might suggest a reinstall of the operating system. This shouldn’t really be a
problem — if you have a backup strategy that is. Without a backup, there
would be no way to recover the lost data. With your data backed up, the
process of virus removal is quicker and more affordable. We recommend
backing up all of your data, with sensitive information having priority. Apps
such as Google Drive available in Google Workspace offer cloud storage
with a large amount of space.
 Always scan email attachments
One of the oldest ways of infection, and one that made computer viruses so
notorious in the early days of the internet is through email. Some people
send viruses to their friends and not even know that they did it. At Altitude
Integrations, we have encountered many situations where our clients have
had their email accounts hacked. Once hacked, the attackers would use that
account to send malicious content to the entire address book list. The most
reliable way to make sure you are safe is to open an email attachment or
click on a link is to scan it with anti-virus software. Your mail provider or
email service you are using should also have some sort of email protection
against viruses. In Gmail, for example, attachments are automatically
scanned for viruses. If a virus is present, the email will be rejected and you
will be notified. 
 Use a malware scanner
Anti-virus is important and you should invest in a robust solution, there is
still a possibility for the virus to slip through the cracks and get downloaded
to your computer. It can often lurk in your network, you being unaware of its
presence. In order to make sure viruses don’t get the opportunity to spread
further through your network and to minimize the damage, a weekly
malware scan should be scheduled. Many of these programs are easy,
affordable and sometimes even free and they can be used in combination
with a backup, so to ensure no malicious files are backed up with your other
files. 

QUES 7. Explain the Physical Components


of computer?
ANS.
COMPUTER SYSTEM

Definition: Is a collection of entities(hardware, software and liveware) that are


designed to receive, process, manage and present information in a meaningful
format.

COMPONENTS OF COMPUTER SYSTEM

Computer hardware - Are physical parts/ intangible parts of a computer. e.g. Input
devices, output devices, central processing unit and storage devices

Computer software - also known as programs or applications. They are classified


into two classes namely - system software and application software

Liveware - is the computer user. Also kwon as orgwareor the humanware. The user
commands the computer system to execute on instructions.

COMPUTER HARDWARE
Hardware refers to the physical, tangible computer equipment and devices, which
provide support for major functions such as input, processing (internal storage,
computation and control), output, secondary storage (for data and programs), and
communication

What is an Input Device?


The data received by any computer goes through the input unit. The input unit
comprises devices like a mouse, keyboard, barcode scanner, etc. Each of the input
devices of computer acts as a mediator between the users and the computer.

The data that is to be processed is put through the input unit, the computer accepts
the raw data in the binary form, processes the data, and produces the desired
output.
Functions of an Input Device
The 3 major functions of the input unit are-

 Take the data to be processed from the user


 Convert the given data into machine-readable form.
 Transmit the converted data into the main memory of the computer.
Its sole purpose is to connect the user and the computer and create easy
communication between them.
Examples of Input Devices
Let us discuss about the different computer input its devices in detail.

Keyboard
The keyboard is an input device that is used to type and feed the data into the
computer. The data can be in words, numbers, and symbols. It consists of
mechanical buttons called the ‘keys’.

There are 5 different keys on the keyboard-

 1. Alphabetical keys from A-Z


 2. Numerical keys from 0-9
 3. There are 12 function keys on the top of the keyboard F1-F12. Each of which
performs a special function.
4. There are control keys, which help in gaining control of the screen and the
keyboard. These include 4 direction keys, home, end, delete, page-up, page-down,
control(ctrl), alternate(alt), escape(ESC).
5. Then there are special keys which by the name you can figure, are used for
special tasks. These include a print screen(PrtScr), Spacebar, Tab, Num Lock,
shift, enter, and caps lock.

Working – The major part of the working of the keyboard is done by the ‘key
matrix’. This is a grid that is beneath the keys of the keyboard. Each time a key is
pressed, the broken circuit beneath each key gets completed. A tiny amount of
current then flows through the matrix and information is received by the computer,
which key has been pressed. This is a signal, what is to be displayed on the screen. 
The keyboard is attached to the computer by a cable. However, there are now
wireless keyboards as well in the market which work on Bluetooth technology.

Mouse

The mouse is the input device that is used to coordinate the pointer on the screen.
The mouse is used to select, point, and display additional menus on the screen. It
has typically two buttons. The left button is used to select or move items on the
screen. The right button is used to display additional dropdowns.

The mouse is mainly classified as mechanical and optical. The mechanical mouse
consists of a trackball beneath it, and are no longer in use. The optical mouse uses
laser light for pointing and has more accuracy and speed than the mechanical one. 

Working – The traditional trackball mouse has been replaced by the optical mouse.
This mouse has a LED installed underneath it along with a CMOS sensor. The
LED emits light and then the light gets reflected by the surface of your desk. This
reflected light is sensed by the CMOS sensor, which in turn sends the signal to a
DSP. This DSP determines the pattern made and then sends the coordinates to the
computer. Based on it the cursor on the display moves respectively.
There is now even a mouse specifically designed for gaming purposes. Such a
mouse can contain numerous buttons designed to give control in the game. usually,
the mouse is connected through a cable but, there are now Bluetooth-operated
wireless mouses as well. However, the working remains the same.

Microphone
The microphone is an input device used to feed audio in the computer. The
microphone can be used for several purposes like-
1. Chatting online
2. Used to feed audios for presentations
3. Used for VoIP(Voice Over Internet Protocol)
4. For voice recognition system
5. Record audio for different purposes
Microphones are a kind of transducers, as they convert mechanical energy to
electrical energy(AC voltages). Let us understand its working

Working – The sound waves created are carried towards the microphone. Inside the
microphones there exists a small plastic diaphragm, which starts moving when the
sound hits it. This makes the coil attached to it move too. The permanent magnet
wounded by the coil produces a magnetic field. After that, the movement of the
coil in this magnetic field causes the flow of current through the coil. This
electricity is then amplified and sent to the computer. And thus the sound can be
stored or used by the computer.

Scanner
A scanner is an input device and works similarly to a photocopy machine. It is
used to scan documents and then display them on the screen. It is used to store a
hardcopy in digital format on the computer.
Working – The scanning device is swept across the document placed on the glass
panel. The device emits light which is then reflected from the surface of the
document. This reflected light is passed through a series of lenses and glasses and
then reaches a photosensitive device. The most commonly used one is
CCD(charged coupled device). This device senses the light, converts it into an
electrical signal, and then sends it to the computer. In this way, the digital image of
the scanned document is procured.

Barcode Reader
The barcode reader is a type of optical scanner that is used to read barcodes and
decode the data stored in them and send it to the computer. Just like a scanner this
also consists of a light emitter, a series of lenses, and a photosensitive device
installed inside it. In addition to this is a decoding circuitry attached to decode the
barcodes. The working is the same as that of the flatbed scanner.
Webcam
A webcam is a type of camera that streams still pictures or videos in real-time to
the computer. Unlike our common digital cameras, these do not hold any special
function key nor storage. They are connected to the computer and use the
computer’s storage instead. Today webcams come embedded in laptops but they
used to be connected through cables earlier. 
The webcams have an image sensor, a lens, and circuitry installed inside them.
This is to capture the images and motion pictures.

Working – The camera obtains the picture through the lenses and is received by the
photosensitive circuitry, mostly CCD. This then converts the image captured into
the digital format and feeds it to the computer. The webcams are now also
sometimes come with pre-installed microphones inside them, to capture both
image and the audio.
The webcams can be used for video calling purposes, to capture images, record
videos, and sometimes even stream online on the internet.
 
Stylus

The stylus is also one of the common types of input devices nowadays. With the
introduction of touch-screen desktops and laptops, the stylus has become common
among users. The stylus is shaped like a pen and is used to write, draw, point on
the screen. It has replaced the use of the keyboard and mouse.

In addition, it gives more precision in terms of pointing or drawing on the screen.

Earlier it was developed only for graphic designing purposes but now it is used
even in mobile phones.

Microprocessor

A microprocessor is a computer processor where the data processing logic and


control is included on a single integrated circuit, or a small number of integrated
circuits. The microprocessor contains the arithmetic, logic, and control circuitry
required to perform the functions of a computer's central processing unit.
RAM
RAM, in full random-access memory, computer main memory in which specific
contents can be accessed (read or written) directly by the central processing unit in
a very short time regardless of the sequence (and hence location) in which they
were recorded. Two types of memory are possible with random-access circuits:
static RAM (SRAM) and dynamic RAM (DRAM).

Motherboard
Alternatively referred to as the mb, mainboard, mboard, mobo, mobd, backplane
board, base board, main circuit board, planar board, system board, or a logic board
on Apple computers. The motherboard is a printed circuit board and foundation of
a computer that is the biggest board in a computer chassis. It allocates power and
allows communication to and between the CPU, RAM, and all other computer
hardware components.
Storage
Storage is a process through which digital data is saved within a data
storage device by means of computing technology. Storage is a mechanism
that enables a computer to retain data, either temporarily or permanently.

Storage devices such as flash drives and hard disks are a fundamental
component of most digital devices since they allow users to preserve all
kinds of information such as videos, documents, pictures and raw data.

Storage may also be referred to as computer data storage or electronic data


storage.
 

You might also like