Short Note On | ANSWER |
---|---|
Application Software | Application software is a software aimed at performing a specific task that makes our computer truly useful. These programs come in the form of files that you install on your hard disk. It can be customize and developed according to a user’s needs. Example payroll programs are used for accounting and payment system in organization. |
Abacus | The earliest known device to record computation was abacus. It dated back to ancient time and was invented by Chinese. Ten beads were strung onto wires attached to a frame. Addition and subtraction were read from the final position of the beads. It was the first manual tool used in calculating answer problems that provided information and in a primitive way storing the result. |
Jacquard’s Loom: | The Jacquard’s loom was invented by Joseph Jacquard in 1801. Jacquard built his loom to automate the process of weaving rugs and clothing. It did this using punch cards that told the machine what pattern to weave. Where there was a hole in the card the machine would weave and where there was no hole the machine would not weave. The process can also be used for patterned knitwear and machine knitted textiles. |
Napier’s Bones | Napier’s bones is manually – operated calculating device created by John Napier of Merchiston for calculation of products and quotients of numbers. The complete device usually includes a base board with rim, the user place Napier’s rods inside the rim to conduct multiplication or division. |
High Level Language | A High-Level Language is a programming language designed to simplify computer programing. It enables development of a program in a much more user- friendly programing content using the language structure. In order to execute a high level language program, it should be translated into machine language either by using Compiler or an Interpreter. |
Compiler | A Compiler is a translator
program which translates a high level languages in to machine language. Every
program must be compiled before it is executed. It scans the entire program
first and then translates into machine code. This process is called
compilation. |
Interpreter | An Interpreter is another type of
translator program, which is used for translating programs written in High
level language into machine language programs. In contrast to a compiler, an
interpreter does not translate the whole program prior to its execution.
Interpreter executes a source code line by line. |
Power-On Self Test | POST is a routines stored in
computer’s ROM. It is the initial set of diagnostic test performed by the
computer right after it’s power on, with the intent to check for any hardware
related issue. |
Cache | Cache Memory: This is very
special type of high-speed memory. This memory cannot be accessed by the user.
The main function of the cache memory is to make the program and data available
to the CPU very fast. Cache is a high speed, high performance memory to which
read/write operation can be done faster than RAM. It acts as a buffer between
the CPU and the primary memory. The size of cache memory can vary from 512 KB
to 2MB. |
High Level Language | High level language is developed to create application programs which
are not dependent upon machines. It permits the user to understandable codes,
using the language structure. In order to execute a high-level language
program, it should be translated into machine language either using a compiler
or an interpreter. |
Low Level Language | It is a machine dependent language which offers few control instructions
and data types. Each statement in a program written in a low-level language
usually corresponds to one machine instruction. |
Assembly Language | Assembly language is designed mainly to replace each machine code with an understandable mnemonic code. To execute an assembly language program, it should be first converted into an equivalent machine language program. |
Operating System | An operating system is a software program that enables the computer
hardware to communicate and operates with the computer software. It controls
the flow of signals from the CPU to various parts of the computer. Examples:
Windows, LINUX, MACOS, UNIX etc. |
Assembler | An assembler is a program that converts an assembly language program
into machine language program. Each language is usually converted into one
machine instruction. |
Compiler | A compiler is a software program that compiles machine language
instructions for every program’s instruction of high-level language. It is a
program translator and scans the entire program first and then translate it
into machine code. The translation process is called compilation. |
Interpreter | An interpreter is a program that translate one statement of high-level
language program into machine code and then execute it. |
Magnetic Media | Any storage medium that utilizes magnetic patterns to represent information is considered magnetic media. Good examples of a magnetic media and magnetic storage is a tape drive, floppy diskette, and hard drive. |
Optical Media | Optical media refers to any data storage device or equipment that uses optical data storage and retrieval techniques to read and write data. It stores data digitally on a media device and uses a laser to read data from it. Optical media is also known as optical storage. Example- CD, DVD and Blu-Ray disc etc. |
Control Panel | The
control panel is normally part of the system's graphical user interface (GUI),
which provides easy management and access to panel components. Control panel
can be used to change virtually all setting in your computer. |
Screen Saver | Screen
saver is a utility program that displays a moving image on the screen after a
set time interval. The original purpose of a screensaver is to prevent screen
from burning out due to continuous radiations but it can be used for
entertainment. |
Taskbar | The taskbar is an element of an operating system located at the bottom of the screen. It allows you to locate and launch programs through Start and the Start menu, or view any program that's currently open. On the right side of the taskbar is the Notification Area that allows you to check the date and time, items running in the background. |
Changing the Clock settings | The
computer’s internal clock and calendar provides correct date and time. Sometime
you have to change and adjust the date and time to keep them accurate. To change
the time and date, Right click clock in taskbar, go adjust date/time, then
change date time, then change calendar settings. |
Hacking | Hacking is unauthorized use of computer system or a network to exploit
the security to gain access to personal data or business data. An example of computer
hacking can be: using a password cracking algorithm to gain access to a
computer system. Computers have become mandatory to run a successful business. |
Copy Protection | It is a technique to prevent the illegal or unauthorized copying of a
software product. Here a software lock is placed on a computer program on the
distribution medial like CDs, DVDs, by a software developer. |
Software Piracy | Software piracy is the unauthorized
duplication of computer software. it is a term used to describe the act of
illegally using, copying or distributing software without ownership or legal
rights. Under copyright law, software piracy occurs when copyright protected
software is copied, distributed, modified or sold. Software piracy is
considered direct copyright infringement when it denies copyright holders due
compensation for use of their creative works. |
Spamming | Spamming is the activity of sending
unsolicited e-mail or unsolicited messages to large numbers of recipients for
the purpose of commercial advertising, for the purpose of non-commercial
proselytizing, for any prohibited purpose, allure people to join inline
communities or compare for some irrelevant issues which cost the sender very
little and more is borne by recipients. |
Phishing | Phishing is an e-mail fraud method in which the perpetrator sends out
legitimate- looking in an attempt to gather personal and financial information
from the recipients. |
Encryption | Encryption is an important security feature that can protect your
computer data from being read by unscrupulous eyes. Encryption reorganizes the
data of a computer file to make it unreadable, so it serves as one of the most
effective ways to protect your data. OR
Encryption is the process of translating plain text data (plaintext)
into something that appears to be random and meaningless (ciphertext). |
Decryption | Decryption is a process of converting encoded/encrypted data in a form
that is readable and understood by a human or a computer. This method is
performed by un-encrypting the text manually or by using keys used to encrypt
the original data. OR
Decryption is the process of converting ciphertext back to plaintext. |
Boot Sector Virus: | A Boot sector virus is a type of virus that infects the boot sector of floppy disks or the hard disks. It replaces the boot record program, which is responsible for loading the OS in memory, copying elsewhere on the disk or overwrite it. |
Polymorphic virus | Polymorphic viruses are very
difficult to detect or remove. It is because these viruses change their code
each time an infected file is executed. However, the anti-virus programs
usually detect the presence of any virus by detecting its code. These types of
viruses are also capable of replicating easily. OR A
Polymorphic virus is a type of virus that changes its signature (binary
pattern) every time it replicates and infects a new file in order to keep from
being detected by an anti-virus. |
Macro Virus | A macro virus is a computer virus
that infects data files which are accessed more frequently by the computer
uses. When an infected file is opened, the macro virus releases a sequence of
actions that begin automatically. These actions cause damage to the computer
and its applications. |
Program Virus | A program virus is a virus that
infects executable program files. When the infected file is executed, the virus
becomes active in the memory, making copies of itself and infecting file on
disk. |
Malware | Malware is a program designed to
gain access to computer systems, normally for the benefit of some third party,
without the user's permission. Malware can be Spyware or Adware: |
Spyware | Spyware is infiltration software
that secretly monitors unsuspecting users. It can enable a hacker to obtain
sensitive information, such as passwords, from the user's computer. |
Adware | Adware is a type of malware
software, that quietly collects information about you, such as browsing history
and search results, while at the same time feeding you ads, and it does all of
this without asking for your consent that can reduce your computer’s
productivity and efficiency. |
0 Comments