You are on page 1of 24

What is a Computer?

• A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically
via computer programming. Modern computers have the ability to follow generalized sets of operations, called
programs. These programs enable computers to perform an extremely wide range of tasks.
• Computers are used as control systems for a wide variety of industrial and consumer devices. This includes simple
special purpose devices like microwave ovens and remote controls, factory devices such as industrial robots and
computer-aided design, and also general purpose devices like personal computers and mobile devices such as
smartphones.
Classification of Computers
SUPER COMPUTERS
supercomputer, any of a class of extremely powerful computers. The term is commonly applied to the fastest high-
performance systems available at any given time. Such computers have been used primarily for scientific and
engineering work requiring exceedingly high-speed computations. Common applications for supercomputers include
testing mathematical models for complex physical phenomena or designs, such as climate and weather, evolution of the
cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and . As the
cost of supercomputing declined in the 1990s, more businesses cryptology began to use supercomputers for market
research and other business-related models.
MAINFRAME COMPUTERS
Mainframe computers are very large often filling an entire room and can process thousands of millions of instructions
per second. They are used in large Mainframe Computers private and government organizations like insurance
companies and banks where many people need frequent access to information. In a mainframe environment, users
connect to the mainframe through the many terminals wired to the mainframe. Mainframes are capable of supporting
hundreds to thousands of users simultaneously.
MINI COMPUTERS
Minicomputers are Minicomputer such smaller than mainframes and are also less expensive. Sometimes referred to as
Midrange Server or Midrange Computer, they are typically larger, more powerful and more expensive than desktop
computers. Midrange computers are usually used by small and medium-sized businesses as their servers. Users connect
to the server through a network by using desktop computers, notebooks, thin clients or dumb terminals. They are also
used by hospitals as well as in school computer laboratories.
Microcomputers
Microcomputers are the most frequently used type of computer. Also, known as Personal Computer (PC), a
microcomputer is a small computer system designed to be used by one person at a time. The size of microcomputers
range from those that can fit on a desktop, inside a briefcase, or even into a shirt pocket. The various sizes of
microcomputers can be grouped into desktop computers and portable computers.
MICROCOMPUTERS
are microcomputers designed to be carried easily around in the hand, bag, Portable Computers briefcase or pocket
depending on their sizes. They run on rechargeable batteries and also use an adapter which allows them to be plugged
into a power outlet to be recharged. Portable computers are essential for many workers like salespeople, agents and
managers who may be off-sites and in remote locations but need computing and communications resources as they
travel.
ELEMENTS OF COMPUTER
Types of Computers
There are 3 main types of PCs
• Desktop
• Portable (Notebook/Laptop) When portable (notebook/laptop) computers were first created they were HUGE. They
weighed around 100 lbs., and were carried in a large luggage suitcase. The creators of the portable (notebook/laptop)
computer dreamed that one day it would be the size a notebook or pocket dictionary. With today’s technology, we have
been able to accomplish this goal and more.
• Hand-Held
Parts of a Computer
There are two basic parts that make up a computer..HARDWARE & SOFTWARE
Hardware
hardware is basically anything that you can touch with your fingers.
 Computer Case
 CPU (central processing unit...Pentium chip)
 Monitor
 Keyboard & Mouse Disk Drive,
 Zip Drive,
 CD-ROM,
 DVD,
 Hard Drive Memory (RAM)
 Speakers
 Printer
There are three types/categories of hardware
1. Input Devices
2. Output Devices
3. Storage Devices
Input Devices
Input basically means getting data into the computer to be processed.
 Keyboard, Mouse,
 Trackball,
 Touch Pad Light Pen,
 Laser Scanner,
 Pointing Stick Touch Screen,
 Bar Code Reader,
 Scanner Microphone,
 Joystick Output Devices
Output basically means getting data out of the computer.
 Monitor
 Printer
 Speakers
 Headphones
 Modem
 Fax
Storage Devices
• Storage devices are both input and output devices in one. A storage device is a place to keep data that has been
processed so that it can be retrieved at a later time to be used again.
 Hard Disk
 Floppy Disk
 CD’s, DVD’s
 Magnetic Tape Flash Memory,
 Jump Drive Software
SOFTWARE
• Software is the programs and applications that tell the computer what to do and how to look.
• Computer programmers write the codes/instructions that make-up software applications/programs.
• HTML is a type of computer programming language that allows programmers to make web pages.
• The next 2 slides show what HTML codes look like and the web page the codes produce.
Two Types of Software
• Application Software
• Operating System Software
Operating System Software
• Directs all the activities and sets all the rules for how the hardware and software will work together.
Examples would be: DOS, Windows 95, 98, ME, NT, XP, Vista, Windows 7
Unix, Linux,
MAC system OS 6,7,8,9,10
Application Software
• Programs that work with operating system software to help the computer to do specific types of work. Application
Software
• There are six basic types of application software.
1. Business software: word processors, spreadsheets, and database programs.
2. Communication software: allows computers to communicate with other computers: fax software, Novell NetWare,
AOL, Modem Software.
3. Graphics software: software that allows users to create and manipulate graphics...Photoshop, Print Shop, etc.
4. Education and Reference software: Programs that help teach new material and ideas, and programs that can be used
to find information...Encarta, Worldbook Encyclopedia, Jumpstart Kindergarten, MicroType.
5. Entertainment and Leisure software...Warcraft, Age of Empires, Barbie Design Center, Mrs. Pacman, Solitair
6. Integrated software: Combines several types of software into one program or package...Quicken (Spreadsheet/data
base/communications/reference) or Print Shop (Graphics/Word processor)
UNDESTANDING COMPUTER SYSTEM
DIFFERENT COMPONENTS OF A COMPUTER SYSTEM
Hardware
Software
People ware
. Hardware- the physical, touchable, electronic and mechanical parts of a computer system.
MAJOR HARDWARE COMPONENTS OF A COMPUTER SYSTEM
1.System Unit- The main part of a microcomputer, sometimes called the chassis. It includes the following parts:
Motherboard, Microprocessor, Memory Chips, Buses, Ports, Expansion Slots and Cards.
2. MOTHERBOARD / MAINBOARD / SYSTEM BOARD- The main circuit board of a computer. It contains all the circuits and
components that run the computer
3. CPU (CENTRAL PROCESSING UNIT)- The processor is the main “brain” or “heart” of a computer system. It performs all
of the instructions and calculations that are needed and manages the flow of information through a computer.
4. PRIMARY STORAGE- (internal storage, main memory or memory) is the computer's working storage space that holds
data, instructions for processing and processed data (information) waiting to be sent to secondary storage. Physically,
primary storage is a collection of RAM chips.
TWO (2) TYPES OF MEMORY
ROM – (Read Only Memory) ROM is non- volatile, meaning it holds data even when the power is ON or OFF.
RAM – (Random Access Memory) RAM is volatile, meaning it holds data only when the power is on. When the power is
off, RAM's contents are lost.
5. EXPANSION BUS - A bus is a data pathway between several hardware components inside or outside a computer. It
does not only connect the parts of the CPU to each other, but also links the CPU with other important hardware.
6.POWER SUPPLY UNIT (PSU)- Installed in the back corner of the PC case, next to the motherboard. It converts 120vac
(standard house power) into DC voltages that are used by other components in the PC
8.HARD DISK DRIVE (HDD)- Also known as hard drive, is a magnetic storage device that is installed inside the computer.
The hard drive is used as permanent storage for data. In a Windows computer, the hard drive is usually configured as the
C: drive and contains the operating system and applications.
9.OPTICAL DRIVE- An optical drive is a storage device that uses lasers to read data on the optical media. There are three
types of optical drives: Compact Disc (CD), Digital Versatile Disc (DVD) and Blu-ray Disc (BD)
10.DIGITAL VERSATILE DISC (DVD) - Designed to optically access data stored on a DVD. A laser moves back and forth near
the disk surface and accesses data at a very fast rate
INPUT DEVICES - ACCEPTS DATA AND INSTRUCTIONS FROM THE USER OR FROM ANOTHER COMPUTER SYSTEM.
Two (2) Types of Input Devices
1. Keyboard Entry
2. Direct Entry
KEYBOARD ENTRY– DATA IS INPUTTED TO THE COMPUTER THROUGH A KEYBOARD.
Keyboard - The first input device developed for the PC. Data is transferred to the PC over a short cable with a circular 6-
pin Mini din connector that plugs into the back of the motherboard.
DIRECT ENTRY–A form of input that does not require data to be keyed by someone sitting at a keyboard. Direct-entry
devices create machine-readable data on paper, or magnetic media, or feed it directly into the computer’s CPU.
THREE CATEGORIES OF DIRECT ENTRY DEVICES
 Pointing Devices - An input device used to move the pointer (cursor) on screen
MOUSE- The most common 'pointing device' used in PCs. Every mouse has two buttons and most have one or two
scroll wheels
TOUCH SCREEN-A display screen that is sensitive to the touch of a finger or stylus. Used in myriad applications,
including ATM machines, retail point-of-sale terminals, car navigation and industrial controls. The touch screen
became wildly popular for smart phones and tablets
LIGHT PEN-A light- sensitive stylus wired to a video terminal used to draw pictures or select menu options. The user
brings the pen to the desired point on screen and presses the pen button to make contact.
DIGITIZER TABLET- A graphics drawing tablet used for sketching new images or tracing old ones. Also called a
"graphics tablet," the user contacts the surface of the device with a wired or wireless pen or puck. Often mistakenly
called a mouse, the puck is officially the "tablet cursor.
SCANNING DEVICES- A device that can read text or illustrations printed on paper and translates the information
into a form the computer can use.
Voice- Input Devices -Audio input devices also known as speech or voice recognition systems that allow a user to
send audio signals to a computer for processing, recording, or carrying out commands. Audio input devices such as
microphones allow users to speak to the computer in order to record a voice message or navigate software.
OUTPUT DEVICES -Any piece of computer hardware that displays results after the computer has processed the input
data that has been entered.
Computer Display Monitor-It displays information in visual form, using text and graphics. The portion of the monitor
that displays the information is called the screen or video display terminal.
TYPES OF MONITOR

❖CRT Monitors - Cathode Ray Tubes (CRT) were the only type of displays for use with desktop PCs. They are
relatively big (14" to 16" deep) and heavy (over 15 lbs)
LCD Monitors -Liquid Crystal Display (LCD) technology has been used in laptops for some time. It has recently been
made commercially available as monitors for desktop PCs.
LED Monitors-(Light Emitting Diode) - A display and lighting technology used in almost every electrical and electronic
product on the market, from a tiny on/off light to digital readouts, flashlights, traffic lights and perimeter lighting.
PROJECTOR-An electric current passed through the liquid causes the crystals to align so that light cannot pass
through them. Each crystal, therefore, is like a shutter, either allowing light to pass through or blocking the light.
Smart Board - A type of display screen that has a touch sensitive transparent panel covering the screen, which is
similar to a touch screen.
Printer - A device that prints text or illustrations on paper.
Types of printer
Ink-Jet or Bubble-Jet Printer - sprays ink at a sheet of paper. Ink- jet printers produce high-quality text and graphics
Laser Printer - Uses the same technology as copy machines. Laser printers produce very high quality text and
graphics
Line Printer - Contains a chain of characters or pins that print an entire line at one time. Line printers are very fast,
but produce low- quality print
Thermal Printer- An inexpensive printer that works by pushing heated pins against heat- sensitive paper. Thermal
printers are widely used in calculators and fax machines
SPEAKERS - Used to play sound. They may be built into the system unit or connected with cables. Speakers allow you
to listen to music and hear sound effects from your computer
PORTS
External connecting sockets on the outside of the computer. This is a pathway into and out of the computer. A port
lets users plug in outside peripherals, such as monitors, scanners and printers.
THE PORTS AND THEIR FUNCTION
Serial Port - Intended for serial type mouse and older camera.
Parallel Port - Also called as printer port. This is only for old model printer. It has 25 pins. It is a female port.
 VGA (Video Graphic Array) Port - Used to connect monitors. It has 15 pins and it is a female port.
USB (Universal Serial Bus) Port - High speed serial interface that is used with almost all devices. It is used to
connect latest model printers, pen drives, cell phones etc. it has 4 pins
PS/2 Port - Simple, 6-pin, low- speed serial connections commonly dedicated to a keyboard and mouse.
Power Port- Intended for power cord.
S-Video Port - S-Video connections are available on certain source components and video display devices, and offer
a higher level of video performance over composite video signals.
Audio Port - Intended for plugging in the speaker or headset
LAN (Local Area Networking) Port - A physical interface often used for terminating twisted pair type cables used to
connect computers onto a local-area networks (LAN), especially Ethernet RJ-45 connectors
CABLES AND WIRES
A cable is most often two or more wires running side by side and bonded, twisted or braided together to form a
single assembly, but can also refer to a heavy strong rope
THE CABLES AND CONNECTORS
specifically for PS/2 type of keyboard and mouse.
This type of jack is intended for the audio and microphone port
S-video jack is obviously for S-Video port.
This monitor jack is intended for the VGA (Video Graphic Array) port
This USB (Universal Serial Bus) plug is intended for USB port. Modern or new model of peripherals like printer,
camera, scanners and even other portable computer attachments used USB type of plugs.
This printer cable jack is intended for the parallel port
RJ45 ("RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface and the "45" simply
refers to the number of the interface standard) is a type of connector commonly used for Ethernet networking
Power cord is the most important cord because it connects the computer to the main source of electricity to make
it functional.
SOFTWARE
is the set of instructions (also called a program) that guides the hardware to operate effectively. Software can be
split into two main types:
System Software
Application Software
SYSTEM SOFTWARE-Any software required to support the production or execution of application programs, but which is
not specific to any particular application. Common operating systems include Windows, the Macintosh OS, OS/2 and
UNIX
APPLICATION SOFTWARE – DESIGNED TO HELP THE USER TO PERFORM SINGULAR OR MULTIPLE RELATED TASKS.
EXAMPLES OF APPLICATION SOFTWARE ARE AS FOLLOWS:
 Word processing software - Creates, edits, saves, and prints documents. Example: MS Word, WordPerfect, Ami
Pro, MacWrite.
Spreadsheet software - An electronic spreadsheet consisting of rows and columns is used to present and analyze
data. Example: MS Excel, Lotus 123, Quattro Pro
Database management software - Used to structure a database, a large collection of computer programs. Data is
organized as fields and records for easy retrieval. Example: MS Access, dBase, Fox Pro, Oracle.
Graphic software - Graphics programs display results of data manipulation for easier analysis and presentation.
Example: Macromedia Flash, Harvard Graphics, 3D Studio Max, Adobe Photoshop
PEOPLE WARE
Refers to people involved in the data processing operations such as the system administrator, office workers, students
and others
COMPONENTS OF SYSTEM UNIT
System unit- at first glance, a simple engineering solution in the form of a box. But it has an important purpose, to
combine essential components for the computer to work. Its main functions are to protect the computer from external
influences and mechanical damage and maintain an optimal temperature regime inside. Typically the system unit is
made of aluminum, steel, or plastic.
BASIC PARTS OF SYSTEM UNIT
MOTHERBOARD- The motherboard is the main internal hardware component of the system unit. This board is called the
"motherboard" because it has all the connectors that connect to the other hardware components of the computer
system (video card, RAM, sound card, hard drive, etc.) and links them together.
Processor/ CPU (Central Processing Unit)- The CPU is a hardware component responsible for all operations that is carried
out in the computer’s system which is why most computer users refer to it as the brain of the computer and it is held on
the motherboard by a slot.
RAM (Random Access Memory)- The RAM is connected directly to the motherboard and carries out a fast exchange of
information with the processor.
Hard Drive-The main storage device of a computer system is a hard disk or hard disk drive. Unlike RAM, which
temporarily stores data, the main function of a hard drive is to permanently store information, files, and other
documents, and also allows data to be retrieved, but it is non-volatile (data will not be lost when the computer is shut
down)
CD/DVD Rom- Compact disc(CD) and digital versatile disc (DVD) are storage devices onto which certain amount of audio
files, data and other computer files can be stored. Videos can also be stored on them as well.
Power Supply-provides power to the PC. It also performs the functions of stabilization and protection against minor
interference in the electrical network..
Computer Fan-During operations by the computer the CPU produces a lot of heat and heat could always cause damage
to your computer, that is why the CPU fan is put in place to keep the CPU under the required temperature
Motherboard- The motherboard serves as a single platform to connect all of the parts of a computer together. It
connects the CPU, memory, hard drives, optical drives, video card, sound card, and other ports and expansion cards
directly or via cables. It can be considered as the backbone of a computer.
Motherboard Components
1. Mouse & keyboard
2. USB
3. Parallel port
4. CPU Chip
5. RAM slots
6. Floppy controller
7. IDE controller
8. PCI slot
9. ISA slot
10. CMOS Battery
11. AGP slot
12. CPU slot
13. Power supply plug-in

THE CPU- It is known as the microprocessor or the processor. It is the brain of the computer, and it is responsible for
retrieving and executing instructions.
Two types of Memory
1. Primary Memory ○ RAM ○ ROM
2. Secondary Memory ○ Hard Drive ○ Flashdrive ○ CDs
1. Primary Memory
 Primary memory is computer memory that a processor or computer accesses first or directly. It allows a
processor to access running execution applications and services that are temporarily stored in a specific memory
location.
● Primary memory is also known as primary storage or main memory.
● RAM ( Random Access Memory ) One of the most important components in determining your system's performance.
RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is
actively using so that it can be accessed quickly
● ROM ( Read Only Memory ) Is a type of non-volatile memory used in computers and other electronic devices. Data
stored in ROM cannot be electronically modified after the manufacture of the memory device
What is a Cache Memory?
● Cache memory is small, high speed Ram buffer located between CPU and the main memory.
● Cache memory hold copy of the instructions (Instruction cache) or data (Operand or data cache) currently being used
by the CPU
2. Secondary Memory
Secondary Storage Devices
1. Magnetic Storage Based Magnetic storage or magnetic recording is the storage of data on a magnetized medium.
Magnetic storage uses different patterns of magnetisation in a magnetizable material to store data and is a form of non-
volatile memory. The information is accessed using one or more read/write heads.
2. Semi-Conductor Based A substance that has specific electrical properties that enable it to serve as a foundation for
computers and other electronic devices. It is typically a solid chemical element or compound that conducts electricity
under certain conditions but not others.
3. Optical Storage Based Any storage type in which data is written and read with a laser. Typically, data is written to
optical media such as compact discs (CDs) and digital versatile discs (DVDs).
Uses of Computer
Computers are playing a vital role in almost every field and making our day-to-day tasks more manageable. Computers
were only used to perform complex numerical calculations in a previous time, but they have reached too far and now
perform many different roles. They are now performing diverse set functions from complicated calculations to
generating business reports, bill generation to education, programming or development to entertainment, etc.
Because of their characteristics and powerful functionalities, computers are used in various fields, such as homes,
businesses, government offices, research organizations, educational institutions, medical, entertainment, etc.
Computers have taken industries and businesses to a whole new level. In this article, we have elaborated the most
common uses of computers in different fields.
Business
Currently, computers can be seen in almost every business. Computers are almost part of a business setup because they
increase productivity and help race in a competitive environment. In businesses, computers are primarily used to store
and manage accounts and personal data, maintain projects, track inventory status, and make reports and presentations.
Besides, computers are best suited for transaction processing because they are more accurate and faster than humans.
Computers also help people analyze their investment, expenses, profits, sales and many other aspects of the business
Science
Scientists are amongst one of those people who use computers as their primary work tool. In science, research and
engineering, computers are best suited for collecting, analyzing, categorizing, and storing the data. They also help
scientists to exchange data with each other both internally and internationally. Computers enable scientists from
different locations (such as different countries) to work together on the same project with cloud support. Besides,
computers play a crucial role in launching, maintaining, controlling spacecraft, and operating many other technologies
Government
In the government sector, computers are beneficial. They are getting used to performing various functions in different
departments and improving their services' quality, efficiency, and productivity. Some examples of such services are city
planning, traffic control, law enforcement, infrastructure developments, and tourism. In most cases, the primary
purposes of using computers are performing data processing tasks, maintaining citizens' database, and promoting a
paperless environment. Apart from this, computers are playing a crucial role in the country's defense system. They are
helping in missile development, rocket, satellite launches, etc
Health and Medical
Computers are radically changing the methods of diagnosis in hospitals. They are used for maintaining patients'
information, records, live monitoring of patients, X-rays, and more. Everything is being digitized with the help of
computers. Computers help configure lab-tools, monitor heart rate, and blood pressure, etc. Doctors get extra
advantages in treating patients with proper drugs and medicines. Additionally, computers enable doctors to exchange
patient's data easily with other medical specialists. Besides, advanced surgical devices are based on robotics that helping
surgeons to conduct complex operations and surgeries remotely
Education
Different educational materials (such as images, videos, e-books, etc.) in one place. All such information can be accessed
through the Internet. Additionally, computers are best suited for online classes, online tutoring, online examinations,
and creating assignments and projects. Apart from this, they can also be used to maintain and monitor student
performance and other information
Industry
Computers are used in industries to perform various tasks, such as maintaining inventory, interior designing, designing
samples or virtual products, communicating over video conferencing, and more. Online marketing has made it easier for
people to buy products in rural areas. Online trading in stock markets has also seen a significant revolution due to its
easy participation potential. Computers have enabled people from different levels of different locations to participate
easily in stock marketing
Banking
Banking has become so advanced in the past few years. Most countries use online banking systems where customers
can access their data directly using computers and the Internet. People can check their account balance, transfer money,
and pay online bills, including credit cards. Besides, Banks use computers to perform transactions and store customer
data, transaction records, etc. Banks have reduced the number of manual errors, number of employees, and costs to a
great extent by using computers. ATMs are the best example of computers that are helping people to withdraw and
deposit the money themselves
Entertainment
Computers nowadays are one of the best mediums for entertainment. Computers can be used to watch movies, play
games, listen to music, etc. Computers combined with MIDI instruments can be used to record audio through artificial
instruments. Besides, people can also enjoy recording their videos with webcam and apply several entertaining AI
effects. Several Photo editor programs are also available with fabulous powerful features
Safety and Security
Computers are capable of working together with different equipment, tools, and technologies. When it comes to safety,
computers are widely being used with the security camera. Almost every private and government organizations are
equipped with security cameras to monitor people and goods. Also, these cameras are helping security intelligence
agencies to identify terrorists or criminals in public places. Computers attached with a fingerprint scanner and face-
recognition technology have made it harder for fraudsters to use fake identities and take government benefits using
someone else's identity. Security systems have become so powerful with the introduction of computer technology and
the Internet
Communication
Computers have become one of the primary sources of communication. Modern computers come with a built-in
webcam and microphone to make use of communication easier. People can use software like Skype and Hangout to
connect with other people over the Internet. Because of the videoconferencing feature, people can connect with audio
and video. Computers help families connect to their relatives, businesses to organize meetings, and companies to take
interviews, between two different locations that are too far. Apart from this, older communications methods such as
emails are also still used widely
Number System And Number System Conversion
NUMBER SYSTEMS

❖ The system used to count discrete units is called number system.

❖ There are four systems of arithmetic which are often used in digital electronics.

➢ Decimal Number System

➢ Binary Number System

➢ Octal Number System

➢ Hexa Decimal Number System


DECIMAL NUMBER SYSTEM

❖ Decimal number system contains 10 digits: 0,1,2,3,4,5,6,7,8,9; and that is why its base or radix is 10.

❖ Here radix means total number of digits used in any system.

❖ To indicate digits greater than 9 (nine) we shall use the sum of these digits times power of 10
BINARY NUMBER SYSTEM

❖ The binary number system is also a positional numbering system.

❖ Instead of using 10 digits, 0-9, the binary system uses only two digits, 0 and 1.

❖ The binary number system is also known as base 2. The values of the positions are calculated by taking 2 to some
power.

❖ Why is the base 2 for binary numbers? o Because we use 2 digits, the digits 0 and 1
Computer Viruses
What is a computer Virus?
A computer virus much like a flu virus, is designed to spread from host to host and has the ability to replicate itself.
Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and
spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious
code or program written to alter the way a computer operates and is designed to spread from one computer to another.
A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to
execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the
system software by corrupting or destroying data.
History of Computer Viruses
 The first computer virus was called “Creeper system” created in 1971 by Bob Thomas of BBN technologies in the
US.
 Creeper was actually designed as a security test to see if a self-replicating program was possible. It was sort of.
With each new hard drive infected, Creeper would try to remove itself from the previous host. Creeper had no
malicious intent and only displayed a simple message: "I'M THE CREEPER. CATCH ME IF YOU CAN!"
 The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector
on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan Basit
and Amjad Farooq Alvi and was originally designed as a copy protection
WHY DO PEOPLE CREATE COMPUTER VIRUSES?
There are thousands and thousands of different viruses and malware on the Internet today. So, you may be asking, what
motivates people to create viruses and malware? There are three primary reasons why they create them:
 To make money.
 To steal account information.
 To cause problems and trouble for others
WHY DO PEOPLE CREATE COMPUTER VIRUSES?
MAKING MONEY
Many viruses, malware, and spyware found on computers do not harm the computer all that much, other than slow it
down. Instead, this malware is designed to capture information about the computer user and send it to the malware
creator. The information they collect is then used to target advertisements to your computer. These ads come in the
form of e-mails and pop-ups on your computer.
If enough computers get infected, they can earn money from all the ads displayed. The more ads they send out, the
more they get people to buy something or visit the advertiser. Sometimes, all it takes is one virus or malware program to
generate hundreds or thousands of ads on your computer.
WHY DO PEOPLE CREATE COMPUTER VIRUSES?
STEALING ACCOUNT INFORMATION
Online games and virtual goods have a real-life value attached to them, and malware is created to steal online account
information associated with online games. Using this type of malware, a person could access a victim's account and steal
their virtual goods and currency. They could even sell their ill-gotten virtual goods to other players for real money
CAUSING PROBLEMS AND TROUBLE
Some people create viruses and malware because they enjoy causing trouble and making others suffer. Some malware
can crash an entire network system and cause system outages for large companies, like banks or production companies.
In the end, it's the thrill of seeing the havoc and chaos they can create that drives them to create more viruses and
malware
VIRUS MISCHIEF The willful destruction of another's property.
Computer virus originated with earlier hackers who were having fun, causing mischief and was never intended to cause
serious harm to computers. Viruses are self-replicating programs that are spread from one computer to the other
through means including email links and malicious downloads available online and physical transfers through corrupted
removal storage devices.
VIRUS MISCHIEF Brief History of Computer Virus
program developers created Creeper, the first computer virus, to see if they could make a program move between
computers without human interference. It did, and so they created Reaper, the antivirus, which went around deleting
Creeper from any infected computer.
Viruses weren’t even called viruses until 1983, when computer scientist Frederick Cohen coined the term to describe
programs that could self-replicate. Three years later, Brain, the first IBM PC compatible virus was released
PROPAGATION TRICKS
Software propagation refers to the changing existing application code and spreading copies of the altered code to other
users. It was originally defined at the first international GNU General Public License Version 3 (GPLv3) Conference in
2006 to prevent GNU software from being covered under any nations copyright law. GNU software is meant to be free,
so the improvement of software and the distribution of the improvements is encouraged under the GNU General Public
License (GPL).
HOW THE VIRUS SPREAD
Viruses can be spread in several ways, including via networks, discs, email attachments, or external storage devices like
USB sticks. Since connections between devices were once far more limited than they are today, early computer viruses
were commonly spread through infected floppy disks. Today, links between internet-enabled devices are common,
providing ample opportunities for viruses to spread. According to the U.S. Cybersecurity and Infrastructure Security
Agency, infected email attachments are the most common means of circulating computer viruses. Most, but not all,
computer viruses require a user to take some form of action, like enabling "macros" or clicking a link, to spread.
Even if you’re careful, you can pick up computer viruses through normal Web activities like:
·Sharing music, files, or photos with other users
·Visiting an infected website
·Opening spam email or an email attachment
·Downloading free games, toolbars, media players and other system utilities
·Installing mainstream software applications without thoroughly reading license agreements
HOW INFECTION OCCUR?
Though they're not a living thing like you and me, computers can get "sick" from viruses, too. A computer virus is a
software program designed to replicate itself and spread to other machines. In most cases, the program is "malicious, "
meaning its purpose is to cause the computer malfunction in some way.
In general usage, the term "computer virus" includes all forms of "malware, " or malicious software.Instead of sniffles
and a fever, some common symptoms of a computer viral infection are slow performance, data loss and system crashes,
all of which can make people using the machine feel ill as well.Yet many technological diseases were designed to remain
hidden on a computer and not alert its user, so malware-infected machines may spread silently
WHAT ARE SOME VIRUS SYMPTOMPS
Computer virus is a type of malware that harm to your computer system such as deleting files, encrypt files, files turned
into shortcuts, formatting hard drive and replicate themselves or flood a network traffic. In this article, we will focus on
what are the 10 symptoms of computer viruses.
1. Your Computer is Slowing Down
2. Unexpected Pop-up Windows Appearing
3. Unwanted Programs Start Automatically
4. Missing Files and Programs
5. System Crashing
6. Out of Storage Space
7. Computer Malfunction
8. Blocked From Antivirus Sites
9. Advertisements on Web Browser
10. Files Turned into Shortcuts
FILE VIRUSES
A file-infecting virus is a type of malware that infects executable files with the intent to cause permanent damage or
make them unusable. A file-infecting virus overwrites code or inserts infected code into a executable file. This type of
virus can infect a number of operating systems, including Macintosh, Windows and Unix
BOOT SECTOR VIRUSES
A boot sector is a reserved section of a disk that contains the code and data needed to start the operating system (OS) of
a computer. A boot sector virus is a type of malware that infects a system’s boot partition or the Master Boot Record
(MBR) of a hard disk. During startup and before security software can be executed, the virus executes malicious code.
Once a computer is infected, a boot sector virus will try to infect every disk that is accessed on the infected system.
HOW DO COMPUTERS GET INFECTED WITH A BOOT SECTOR VIRUS?
A user’s computer gets infected by a boot sector virus when starting up a machine from an infected floppy disk or USB
drive. Email attachments can also contain a boot sector virus and these can also infect other computers on the network.
HOW TO PREVENT BOOT SECTOR VIRUS INFECTION?
The best way to prevent a boot sector virus is to stop the initial payload from installing. A good anti-malware or cyber
security solution that scans the boot sector and quarantines and removes the malicious files is one of the best ways to
stop this type of malware. Once a machine is infected, the user can format their drive and recover the OS, applications
and data with a full-image backup that was created prior to the infection. There are boot sector virus removal software
that you can also try.
SYMPTOMS OF A BOOT SECTOR VIRUS INFECTION
In many cases, a user may not know they are infected with a boot sector virus until they run an antivirus solution or
malware scan. Alternatively, the computer can start slowing down, files can suddenly disappear or start to get
encrypted. A few other possible symptoms that make this virus unique is that the computer won’t boot, it will boot to a
blue screen, or the OS will not start, and the user only sees text on a black screen with an error message that the boot
device cannot be found. This happens when the virus deletes or modifies the necessary boot files.
What is a Multipartite Viruses?
A multipartite virus, multipart virus, or hybrid virus is one that infects both the master boot record and executable files
on a hard drive in staggered stages. As they can infect more than one part of the system at once, they are the most
devastating of all computer virus types. These hybrid viruses are often hard to remove and, unless completely
eradicated, can reinfect the host system again. The multipartite virus can affect both the boot sector and the program
files at the same time, thus causing more damage than any other kind of virus. When the boot sector is infected, simply
turning on the computer will trigger a boot sector virus because it latches on to the hard drive that contains the data
that is needed to start the computer. Once the virus has been triggered, destructive payloads are launched throughout
the program files.A multipartite virus infects computer systems multiple times and at different times. In order for it to be
eradicated, the entire virus must be removed from the system.Discovered by Friðrik Skúlason in 1989, the Ghostball
virus was the first multipartite virus.
HOW DO MULTIPARTITE VIRUSES WORK?
Multipartite viruses spread when an infected computer is booted up, this characteristic is known as a “boot infector, ”
and it’s particularly troublesome since it targets essential areas of the computer’s hard drive. They can also spread by
attaching themselves to executable files.
SIGNS YOUR SYSTEM IS INFECTED
• Constant pop-up messages warning you that your computer has low memory. As the virus spreads to the executable
files, it will automatically consume memory.
• The computer's hard drive may be reformatted. Specific types of multipartite viruses do this in an effort to override
anti-malware solutions. Even if anti-malware software removes the infection, the virus may reformat the hard drive in
an effort to reinfect the computer.
PREVENTION IS KEY A multipartite virus can render a computer inoperable for even the simplest of tasks and as is the
case with any virus prevention is usually the first and best line of defence.
• Install a reputable anti-malware software
• Don’t open an email attachment you weren’t expecting
• Don’t download anything from a non-trusted online source
• Regularly update your antivirus software
• Back up important files
REMOVING A MULTIPARTITE VIRUS
As previously stated, multipartite viruses are difficult to remove due to their diverse characteristics and hybrid malicious
codes. However, there are ways to remove a multipartite virus from your system.
STEP 1:
• Create a bootable rescue disk of your antivirus software by firstly downloading a bootable package of your antivirus
software
• Next insert an empty disc into your computer’s CD/DVD drive
• After doing that go to the search field of your computer and type “Create a System Repair Disc” , and press enter
• Once you’ve done that a system repair disc window should appear and you can select the drive and click create disc.
STEP 2:
• Shut down your computer and wait a few minutes before turning it back on
• When your computer is booting up, navigate to the setup section and select the CD/DVD option in the boot order and
click save. Your computer should start booting from the recovery disk
• Once you’ve done this the antivirus software will run a virus scan and remove the multipartite virus from your
computer
• When the virus has been removed, make sure to restart your computer
MACRO VIRUSES
With malware like ransomware, spyware, computer worms, and certain Trojan horses attacking our privacy and financial
security, legacy threats like viruses have taken a backseat for a few reasons. For one, while viruses can be destructive to
our data, they can’t hijack our computers for ransom or snoop on us. For the other, your operating system's baked-in
security software can stop most viruses with signature-detection technology.
In terms of cybersecurity, a macro virus is a kind of virus that’s written in macro, a programming language rooted inside
software applications like Microsoft Office. This programming language is handy because it allows users to automate
tasks into a few keystrokes and enhance workflow. Unfortunately, the language is also vulnerable to the macro virus.
Like a typical virus, a macro virus operates by injecting its code into macros attached to the type of popular data files
associated with office work, like Microsoft Word, Excel, or PowerPoint files. It can also infect content like ActiveX
controls or COM add-ins
MACRO VIRUSES
Once a macro virus is part of the automated process of a macro, it only needs you to activate the files or enable the
macro to potentially perform any of the following actions:
Delete files
Corrupt files
Move files
Send files
Format storage drives
Drop pictures
Drop other more prolific malware
WHAT ARE THE CHARACTERISTICS OF A MACRO VIRUS?
A macro virus shares the traits of a typical computer virus. Like a regular computer virus, a macro virus needs human
interaction to activate. However, much like Trojan horse malware, a virus can deliver other malware to your system. It
also uses deception like a Trojan to spread by hiding under seemingly legitimate files
EMAIL WORMS
An Email-Worm (also known as a mass-mailer or less commonly, an Internet worm) is a type of worm that distributes
copies of itself in an infectious executable files attached to fake email messages
DOS ATTACKS
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a
crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the
service or resource they expected.
Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media
companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of
significant information or other assets, they can cost the victim a great deal of time and money to handle.
There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the
system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood
attacks include:
 Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address
than the programmers have built the system to handle. It includes the attacks listed below, in addition to others
that are designed to exploit bugs specific to certain applications or networks
 ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on
the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic.
This attack is also known as the smurf attack or ping of death.
 SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all open
ports are saturated with requests and none are available for legitimate users to connect to.
WHAT IS A VIRUS HOAX?
A virus hoax is a false warning about a computer virus. Typically, the warning arrives in an email note or is distributed
through a note in a company's internal network.
HOW TO IDENTIFY A VIRUS HOAX
When receiving a virus alert, recipients can typically tell a hoax email by its sensational claims. For example, the
malicious software would cause their hard drive to implode or the operating system to crash.
Typically, they also include fake quotes from reputable news outlets, like CNN, and cybersecurity or antivirus software
providers, like Symantec, and urgent emotive language to scare the reader into taking a particular action.
WHAT IS A VIRUS HOAX?

 Antichrist. This hoax message stated that McAfee and Microsoft had discovered the virus that was sent via email
with the subject line: "SURPRISE?!!!!!!!!!!" It then made the readers hard disk unusable.
 Irina. This was a warning sent out about a nonexistent virus by a publisher to promote an interactive book with
that name.
 Black in the White House. This virus hoax carried a chain message that warned users that opening the file would
unleash an Olympic torch that would burn down their C drive.
 Goodtimes. This message warned computer users that a computer virus that went by the name "Good Time"
was circulating and that they should delete any email that mentioned the phrase in the subject line.
 Budweiser Frogs, aka BUDSAVER.EXE. Taken from the iconic Budweiser commercials, this supposed virus was
said to steal a user's login information and corrupt their hard drive.
WHAT DOES A VIRUS LOOK LIKE?
A virus might appear in your email as an attachment, perhaps pretending to be an image or a security update from
Microsoft. Frequent system crashes and error messages, unexpected pop-up windows and new applications
(toolbars, etc.) that appear without you downloading them. Virus researchers use tools like Interactive Disassembler
Pro (IDA) to reverse engineer malware.
PROTECTING YOUR COMPUTER
The best way to deal with a virus is to prevent it in the first place by using antivirus protection and antispyware
software. It’s important to keep these applications up to date, as well as regularly updating your operating system
and making sure that your browser’s security settings are current. Regularly back up your files (to the cloud or safe
external hard drive) in case they become corrupted or deleted. Use a security tool to evaluate your device and find
out how vulnerable it might be.
ANTI VIRUS MEASURE
These days the responsibility for the computer and the software that protects it is falling more and more on
individual users, so the risks of computers becoming infected is increasing. To protect your computer, avoid danger,
and prevent infection to other computers, please be sure to take the preventative measures shown below.
HOW TO AVOID IN GETTING A VIRUS
It is very important to make sure your computer has the latest security installed and to update your OS periodically.
Windows users should use Microsoft Windows Update and Mac users should use Apple Software Update.
WINDOWS 10
To ensure effective antivirus protection, we recommend you use Windows Defender. Windows Defender has the
same functions as McAfee VirusScan, and it is built into the Windows OS. Because of this, any future problems can
also be addressed through Windows Update.
WINDOWS 8.1
To ensure effective antivirus protection, we recommend you use Windows Defender. Windows Defender has the
same functions as McAfee VirusScan, and it is built into the Windows OS. Because of this, any future problems can
also be addressed through Windows Update.
MAC OS
Antivirus Software for Mac OS is not fully integrated into the OS like Windows. Apple Corporation recommends users
take the following measures to ensure antivirus protection. Please be sure to take the following steps after
uninstalling McAfee VirusScan.
INTERNET
WHO INVENTED INTERNET?

You might also like