Fundamentals of Computer Studies

Total Page:16

File Type:pdf, Size:1020Kb

Fundamentals of Computer Studies See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/258339295 FUNDAMENTALS OF COMPUTER STUDIES Book · November 2013 CITATIONS READS 0 428,735 1 author: Jeleel Adekunle ADEBISI University of Ilorin 47 PUBLICATIONS 52 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Computer knowledge View project Wastes Recycling: Materials Scientists Approach View project All content following this page was uploaded by Jeleel Adekunle ADEBISI on 21 May 2014. The user has requested enhancement of the downloaded file. EXPERT SOLUTION CONSULTS (ESC) FUNDAMENTALS OF COMPUTER STUDIES Computer Training Expert Solution Consults Fundamentals of Computer Studies TABLES OF CONTENTS TABLES OF CONTENTS ............................................................................................................................................................................. II AIMS AND OBJECTIVES OF THE COURSE .......................................................................................................................................... 1 INTRODUCTION ............................................................................................................................................................................................ 1 USES OF COMPUTERS .............................................................................................................................................................................. 1 HISTORY OF COMPUTING....................................................................................................................................................................... 2 GENERATIONS OF COMPUTERS ........................................................................................................................................................... 3 First Generation - 1940-1956: Vacuum Tubes....................................................................................................................................... 3 Second Generation - 1956-1963: Transistors......................................................................................................................................... 3 Third Generation - 1964-1971: Integrated Circuits............................................................................................................................... 3 Fourth Generation - 1971-Present: Microprocessors ........................................................................................................................... 3 Fifth Generation - Present and Beyond: Artificial Intelligence ............................................................................................................ 4 SOFTWARE AND HARDWARE ................................................................................................................................................................. 4 DIFFERENT PARTS OF A COMPUTER AND THEIR USES............................................................................................................... 4 The monitor............................................................................................................................................................................................... 5 The system box or computer console....................................................................................................................................................... 5 The keyboard (Pressing) .......................................................................................................................................................................... 5 The Mouse (Clicking and Dragging)....................................................................................................................................................... 6 The Peripherals......................................................................................................................................................................................... 7 Disk Size Conversion Chart (Bits, Bytes, Kilobytes, Megabytes and Gigabytes)................................................................................. 8 TYPES OF COMPUTERS.............................................................................................................................................................................. 8 ANATOMY OF COMPUTER SYSTEM ..................................................................................................................................................... 9 COMPUTER HARDWARE......................................................................................................................................................................... 9 THE CENTRAL PROCESSING UNIT (CPU)............................................................................................................................................ 9 INPUT DEVICES........................................................................................................................................................................................10 OUTPUT DEVICES....................................................................................................................................................................................11 STORAGE DEVICES.................................................................................................................................................................................11 SYSTEM MEMORY...................................................................................................................................................................................11 HARDWARE CONNECTIONS ..................................................................................................................................................................12 COMPUTER SOFTWARE ..........................................................................................................................................................................12 SYSTEM SOFTWARE...............................................................................................................................................................................12 OPERATING SYSTEM.....................................................................................................................................................................................13 Function of the OS..................................................................................................................................................................................14 Classification of OS................................................................................................................................................................................14 The Difference between Windows &Macs ............................................................................................................................................14 UTILITY SOFTWARE......................................................................................................................................................................................14 APPLICATION SOFTWARE....................................................................................................................................................................15 CLASSIFICATION OF COMPUTERS ACCORDING TO SIZE ........................................................................................................15 COMPUTER VIRUSES AND SECURITY................................................................................................................................................16 COMPUTER VIRUSES..............................................................................................................................................................................16 TYPES OF VIRUSES .......................................................................................................................................................................................16 HOW VIRUSES ARE SPREAD .........................................................................................................................................................................17 PREVENTION OF COMPUTER VIRUS .............................................................................................................................................................17 VIRUS DETECTION........................................................................................................................................................................................18 COMPUTER SECURITY...........................................................................................................................................................................18 BASIC COMPUTER MAINTENANCE ....................................................................................................................................................19 MAINTENANCE........................................................................................................................................................................................19 PREVENTIVE MAINTENANCE........................................................................................................................................................................19
Recommended publications
  • TR-SBA-Research-0512-01: Fast and Efficient Browser Identification With
    Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting Technical Report TR-SBA-Research-0512-01 Martin Mulazzani∗, Philipp Reschl; Markus Huber∗, Manuel Leithner∗, Edgar Weippl∗ *SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria [email protected] Abstract. While web browsers are becoming more and more important in everyday life, the reliable detection of whether a client is using a specific browser is still a hard problem. So far, the UserAgent string is used, which is a self-reported string provided by the client. It is, however, not a security feature, and can be changed arbitrarily. In this paper, we propose a new method for identifying Web browsers, based on the underlying Javascript engine. We set up a Javascript confor- mance test and calculate a fingerprint that can reliably identify a given browser, and can be executed on the client within a fraction of a sec- ond. Our method is three orders of magnitude faster than previous work on browser fingerprinting, and can be implemented in just a few hun- dred lines of Javascript. Furthermore, we collected data for more than 150 browser and operating system combinations, and present algorithms to calculate minimal fingerprints for each of a given set of browsers to make fingerprinting as fast as possible. We evaluate the feasibility of our method with a survey and discuss the consequences for user privacy and security. This technique can be used to enhance state-of-the-art session management (with or without SSL), as it can make session hijacking considerably more difficult. 1 Introduction Today, the Web browser is a central component of almost every operating sys- tem.
    [Show full text]
  • My Cloud EX2 Ultra
    My Cloud™ EX2 Ultra Privater Cloud-Speicher Bedienungsanleitung WD Service und Support Sollten Probleme auftreten, geben Sie uns bitte Gelegenheit, sie zu beheben, bevor Sie das Produkt zurücksenden. Viele technische Fragen können über unsere Knowledge Base oder unseren E-Mail-Support unter http://support.wd.com beantwortet werden. Falls Sie dort keine geeignete Antwort finden oder Sie einen persönlichen Kontakt bevorzugen, rufen Sie WD unter der unten angegebenen Telefonnummer Ihres Landes an. Ihr Produkt schließt eine 30-tägige kostenlose telefonische Unterstützung während der Garantiezeit ein. Diese 30-tägige Frist beginnt mit dem Datum Ihres ersten telefonischen Kontakts mit dem technischen Support von WD. Der E-Mail-Support ist für die gesamte Garantiezeit kostenlos, und unsere gesamte Knowledge Base ist rund um die Uhr verfügbar. Damit wir Sie weiterhin über neue Funktionen und Serviceleistungen informieren können, denken Sie bitte daran, Ihr Produkt im Internet zu registrieren unter http://register.wd.com. Zugriff auf den Onlinesupport Auf unserer Produktsupport-Website unter http://support.wd.com können Sie unter den folgenden Themen wählen: Downloads – Laden Sie Treiber, Software und Updates für Ihr WD-Produkt herunter. Registrierung – Registrieren Sie Ihr WD-Produkt, um die neuesten Updates und Sonderangebote zu erhalten. Garantie- und Austauschservices – Informationen über Garantie, Produktersatz (RMA), RMA-Status und Datenwiederherstellung. Knowledge Base – Suchen Sie nach Schlüsselwort, Ausdruck oder Antwort-ID. Installation – Hier finden Sie online Hilfe zur Installation Ihres WD-Produkts oder Ihrer Software. WD Community – Tauschen Sie Ihre Gedanken mit anderen WD-Benutzern aus. Online-Schulungszentrum – Kommen Sie hierhin, um das meiste aus Ihrem privaten Cloud-Speichergerät herauszuholen: (http://www.wd.com/setup).
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Share Brother Printer DCP-1610W with Linux CUPS and Samba Windows Share
    ? Walking in Light with Christ - Faith, Computing, Diary Linux, UNIX, FreeBSD, Windows, Mac OS - Hacks, Goodies, Tips and Tricks and The True Meaning of life http://www.pc-freak.net/blog Enable printing from Windows and Macs remotely through Linux Print server - Share Brother Printer DCP-1610W with Linux CUPS and Samba Windows Share Author : admin I've recently bought a new Printer model Brother DCP 1610W and as in my home I have already a small Linux router and a web server where this blog and a couple of other websites runs and I need multiple PC / notebook / mobile phone enabled people to print on the Printer easily pretty much like a Printing server for a Small Office environment. To do that of course I needed it configured to be accessible remotely for print via LAN and Wireless network. The task is not a complex one and printing remotely over the network is a standard thing many company organizations / universities and univerities does for quite some time and hence nowadays most printers are network connect ready so you just have to place them inside your home or corporate network and use the time to configure them via their web configuration interface or even some have their own embedded wifi adapter, as well as many printers nowdays can even be ready to print directly by just 1 / 17 ? Walking in Light with Christ - Faith, Computing, Diary Linux, UNIX, FreeBSD, Windows, Mac OS - Hacks, Goodies, Tips and Tricks and The True Meaning of life http://www.pc-freak.net/blog connecting the Printer to the Wi-Fi network and installing its drivers on a Win host.
    [Show full text]
  • EDFS 687 Technology Education for Teachers
    EDFS 687 Technology Education for Teachers College of Charleston EDFS 687 Technology Education for Teachers Course Term- Spring, 2010 Credit Hours- 3 Meeting Time and Place: W 4:00-6:45 - ECTR 214 Instructor's Name: Dr. Bob Perkins Office Hours: Tuesday & Thursday 2:00 - 4:30 Office Location: 86 Wentworth St. Office phone/ 953-5699 Fax/ 953-8109 Email: [email protected] Web Page http://perkinsr.people.cofc.edu/classes/EDFS687/ Course Description: This is an introductory course for pre-service and in-service teachers using technology in the classroom. Students become familiar with application software such as word processing, databases and hypermedia, desktop publishing, and telecommunications, and learn to evaluate hardware and software. Course Text/Materials: Required Text: ● Thorsen, T. (2006). TechTactics: Technology for teachers. Boston: Pearson / A. B. Longman. Optional Software: ● Microsoft Office 2003 for Students and Teachers ● SmartTech Notebook software (instructions for downloading are available in WebCT) Other: ● USB Flash Drive; ● access to WebCT & Edisto email account file:///K|/Arachne/classes/EDFS687/EDFS687Perkins.htm (1 of 7)2/1/2010 1:49:38 PM EDFS 687 Technology Education for Teachers Course Objectives: All teacher preparation programs in the School of Education (SOE) are guided by a commitment to Making the Teaching Learning Connection through three Elements of Teacher Competency (ETC) which are at the heart of the SOE Conceptual Framework: ● 1. Understanding and valuing the learner, ● 2. Knowing what and how to teach and asses and how to create environments in which learning occurs, and ● 3. Understanding yourself as a professional. These three competencies underlie all learning objectives in this course, helping the candidate develop the knowledge, skills, and dispositions necessary to become an effective teacher.
    [Show full text]
  • An Information Infrastructure for High-Energy Physics
    World-Wide Web: An Information Infrastructure for High-Energy Physics T.J. Berners-Lee, R. Cailliau, J.-F. Groff, B. Pollermann C.E.R.N., 1211 Geneva 23, Switzerland ABSTRACT The World-Wide Web (W3) initiative encourages physicists to share information using wide-area networks. The W3 software provides easy hypertext navigation and information retrieval in a consistent manner to a vast store of existing data and future hypertext. The client-server architecture uses global conventions for document identifiers, a set of common access protocols, and an ever-widening set of transfer formats. The HTTP protocol is introduced which allows servers, sometimes simple shell scripts, to provide data and take advantage of a range of hypertext browsers on many platforms. Existing data may be put on the ªwebº by a gateway without affecting data management procedures. Internet archives, news, ªWAISº and ªGopherº systems are already included in the web. The future will see multiple data formats being handled by negotiation between client and server, and hypertext editors bringing collaborative authorship in the information universe. The need In few disciplines is the need for wide-area hypertext so apparent and at the same time so soluble as in particle physics. The need arises from the geographical dispersion of large collaborations, and the fast turnover of fellows, students, and visiting scientists who must get ªup to speedº on projects and leave a lasting contribution before leaving. Fortunately, the community necessarily has a good computing and network infrastructure. Much information is in fact available on-line, but references to it involve complicated instructions regarding host names, logon passwords, terminal types and commands to type, sometimes needing the skilled interpretation of a network ªguruº.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 21 Release Notes Symantec Netrecon Security Update 21 Release Notes
    Symantec NetRecon™ 3.6 Security Update 21 Release Notes Symantec NetRecon Security Update 21 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040831 Copyright Notice Copyright 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 24 Release Notes Symantec Netrecon Security Update 24 Release Notes
    Symantec NetRecon™ 3.6 Security Update 24 Release Notes Symantec NetRecon Security Update 24 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040930 Copyright Notice Copyright 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]