Computer Assignment
Computer Assignment
Assignment no 1
Q. 1 In today’s world computer systems are vital. What role do computer systems
play in our society? Explain with real life examples.
Introduction of Computer:
Computer is an electronic machine used to solve different according to a set of
instructions given to it. A computer can accept data, process data into useful information
and store it for later use. The word computer derives from compute that means to
calculate. Computer can be used as calculating machine to produce results at a very
high speed. However, the calculation is not the only use of computer. It can be used or
different purposes. People use computers to solve different problems quickly and easily.
It has changed the way of life. Computer is very important nowadays. They are used in
our daily life. Computers are available in different shapes and sizes [ CITATION Tason \l
1033 ].
Computers are used in education field to improve teaching and learning process.
Computer is used in colleges to provide the methods of teaching in different ways. It is
used to educate the students effectively. Many computer based educational programs
are available. The students can learn to read, to count, and to speak foreign language.
Many educational games are becoming popular in the students. Moreover, the
computer is being used in every field of life such as medical, business, industry, airline
and weather forecasting etc.[ CITATION Tason \l 1033 ].
virtual classroom. In virtual classroom teacher delivers lecture at his own workplace.
The student can attend lecture by connecting to a network. The student can ask
question to the teacher. The answers are given to the students by email.
Online Education
Many websites provide online education. The user can download educational material,
books and tutorials. Some universities provide online lectures for the students. Students
can ask questions and discuss problems by sending emails to these websites.
Computer-Aided learning
Computer aided learning is a process of using information technology to help teaching
and learning process. These programs include text, graphics and sound. Audios and
videos lectures are recorded on the CDs. CBT is a low cost solution for educating
people[ CITATION Tason \l 1033 ].
Role of Computer in Medical Fields
Hospitals and clinics use computers to keep patient records, plan doctors, nurses, and
other staff, inventory and purchase medications, medical tests, and medical diagnostics.
The use of computer equipment or the use of information technology has helped
doctors diagnose diseases. Obviously, the use of computers in the medical field makes
it possible to solve complex problems. Among the new information technologies that
help people with disabilities. Microprocessor voice systems help people with disabilities
talk to a terminal that signals a computer to perform a verbal task. Computer
development has also helped the blind to see, designed to communicate using a
speech synthesizer or keyboard. It can help them become more active and do things
they couldn’t do before. In addition to traditional data processing tasks such as patient
billing, medical statistics and personnel planning, and the like, computer tasks have also
been simplified and processed.
The hospital information system used can be stored in a centralized patient database. In
fact, using information technology, a computer is programmed to grow and analyze
bacteria, viruses, and other infectious agents to automatically detect and diagnose
diseases, which will allow hospitals and laboratories to begin treatment. For example, a
computer-supported demographic device (CAT) is used for this purpose. Computers are
also used by the patient to monitor psychological variables such as blood pressure,
body temperature, ECG (electrocardiograph) and to alert you if something unusual
happens. To do this, the computer should read the different variables and compare
them to the standard values. If something extraordinary happens, the computer will
draw the attention of doctors and nurses to the alert. Clearly, the computer has been
found to have a wide range of applications in the medical field [ CITATION Imp18 \l 1033 ].
Role of Computer in Banking and Financial
Running Head Computer 5
Q. 2 Define Utility Software. How does utility software enhance the overall
performance of an operating system? Explain with examples.
Utility software
Utility software is system software designed to help analyze, configure, optimize or
maintain a computer. Utility software usually focuses on how the computer infrastructure
operates. Due to this focus, utilities are often rather technical and targeted at people
with an advanced level of computer knowledge - in contrast to application software,
which allows users to do things like creating text documents, playing video games,
listening to music or viewing websites.
Performance of Utility software
The user can use utility program to perform maintenance tasks related to different
devices and programs. The utility software keeps the computer system running
smoothly. Most operating system include different built in utility programs. Some
functions and features that software utilities perform can be done manually but only by
experienced and professional. Most new users cannot carry out such operations, which
will improve the performance of his computer system manually. A computer system can
maintain upmost computer performance through utilities and are suggested how they
maintain computer performance below.
System Utility
A system tool is system software designed to improve or maintain system settings.
Operating software is a type of system software that supports a computing infrastructure
and separates it from application software designed to perform tasks that directly benefit
the general user.
List of System Utility
Discipline management
Debuggers
Registry Cleaner
Antivirus
Discipline management
The logical driver key is available for newer versions of Microsoft Windows. The design
of the article differs from that of a connector reader, flash reader and optics and disk
reader. This is an initial use of the partitions associated with spray tool reading. These
types of logical features are available for Windows XP. Some examples of disk
Running Head Computer 7
management tools are Paragon Partition Manager, Mini Tool Partition Wizard, OMI
Partition Assistant, etc.
Debuggers
And the logic of information and communication devices is specific to program specific
and specific applications. Program Principles and Programs for conducting surveys and
surveys are based on relevant indicators and code information sources.
Registry cleaner
Net Register of Restoration Points for Importers in addition to Information Technology.
This is because it promotes corruption in the Windows registry and integration and
malfunction of computers. However, this does not require maintenance. Three important
issues have been identified in this regard. Both of these applications are not available
for viruses and logic versions of other versions of Windows. When the operating system
crashes due to corruption in the registry, it actually appears. Like Windows 95, master
registry corruption can lead to the point where we need to reshape a hard drive and
reinstall the operating system as needed. Use of the network registry will be limited to
corruption in the Windows registry and will not be affected by the reformers. If we use
our registration regularly, we will show the issues first.
Of course, this is the most intelligent thing. It is certain that the information contained in
the system can be reinstalled and information about the information is not available.
Antivirus:
A type of software used to detect and remove virus is called antivirus. It contains
information about known viruses. It can detect and remove them. It also prevent new
viruses from entering into computer. McFAee and Norton are two most commonly used
antivirus programs in Windows operating system[ CITATION Tason \l 1033 ].
Spyware Remover:
A spyware remover is a program that detects and deletes spyware. Spyware is a
program that is placed in computer without user’s knowledge. It secretly collects
information about the user related to web browsing habits. It often enters a computer
when the user installs new program. Popular stand-alone spyware remover is spy
sweeper[ CITATION Tason \l 1033 ].
Firewall:
Firewall is used to detect and protect personal computer rom unauthorized instructions.
A firewall acts like a wall and a boundary between the computer and the internet. It only
allows such connections that have a trusted certificate with them. If a person is not
protected from such threats, other people can manipulate his computer or delete
everything from his computer.
Running Head Computer 8
Disk Burning:
Disk burning software is used to write text, graphics, audio and video files on a
recordable or rewriteable CD and DVD. It allows the user to backup data on optic disc.
Operating system Diagnostic:
Operating system diagnostics is when you come up across a problem and then your
computer gives you the option “diagnose problem”. The computer will then search for
the solution to the problem. Once it finishes diagnosing then it will either give you the
solution to the problem or it will tell you that it can’t find the solution. For example when
you internet is not connected and you open up your browser then it will give you some
advice for why your internet is coming on and it will also give you the diagnose problem
message. This will be of good use to Sam because he is new to computers and will not
have enough knowledge on solving his computer problems.
[ CITATION Tason \l 1033 ]
Q.NO.3 Define the term bitmap and vector and differentiate these file types.
Explain different ways to load graphic files in computer with examples.
Bitmap
Bit map graphs (also called 'raster') are made of low pixels of different colors that
together create an image. In the simplest form, cards have only two colors and each dot
is black or white. As the complexity increases, the image may have more colors; Photo
quality images can reach millions. Examples of bitmap graphic formats are GIF, JPEG,
PNG, TIFF, XBM, BMP and PCX fonts, as well as bitmap fonts (i.e. the screen). The
image displayed on a computer screen is part of a card with output from printers,
scanners, and similar devices. It is made using coloring programs like Adobe
Photoshop.
Vector
Vector graphs (also called "object-oriented") are made using mathematical formulas that
describe shapes, colors, and location. Instead of a grid of pixels, a vector graph consists
of shapes, curves, lines, and text that together create an image. Although the point map
view contains information about the color of each point, vector graphs provide
instructions for the location of each component. Even guitar graphics can be integrated
into vector graphics, so bitmap vector hybrid graphics work. However, some vector
information cannot be inserted. Examples of vector graphics are PICT, EPS and WMF,
as well as PostScript and TrueType fonts. It is made using GIS and CAD programs, as
well as drawing programs like FreeHand.
Difference between Bitmap and Vector
Running Head Computer
10
JPEG is a common form used by digital cameras and web images. This file format is
based on the disadvantages of compression, which means that it stores information that
is visible to viewers and deletes data that the human eye cannot comprehend. The
JPEG file is popular because it is lightweight but good enough for digital use. Due to the
size, not only does it load faster, but it can also be loaded on any platform, regardless of
size. This format can be viewed on any device without the need to download a special
image. However, it is important to note that whenever you save and compress a file as
a JPEG, the image loses its quality and becomes pixelated or grainy.
Pros: Easy file, included in almost any application.
Disadvantages: Loss of quality due to repeated storage.
The best places to use are: Web Design, Social Networks, and Photos from Photo
Folders.
GIF (Graphic Exchange Format)
You've probably heard of this type of file via the most popular, most popular feature
online: Animation! A GIF file is in the form of an instant image, which means that the
graphics consists of very small parts called pixels, as well as JPEG and PNG file
formats. This file type is based on LZW (Lampel Zeo-Welch), which is a special form of
data loss without data compression algorithm. GIFs are best suited for multi-color
graphics, such as simple schemes, shapes and logos, but also for saving measures.
For example, your company's icons appear in less than three colors or less in this color
scheme. Small file size suitable for use anywhere. However, not only will the sunset
look much heavier, but the color restrictions will also cause this distortion. The
advantage of this type of file is that it supports a transparent background, such as a
PNG file.
Advantages: Supports transparency and basic mobility.
Disadvantages: Poor display color
Great places to use: Short animation for social channels like Facebook and Twitter.
PDF (portable document format)
This file format is used for online documentation and printing. It was created by Adobe
to display files in the same format, regardless of the device they are viewing or the
software they use to open them. The reliability of PDF files allows you to create long
documents and share them with others without losing the original project: no more text,
no shorter images, and more. TPDF can include many different elements: text, images,
vector images, videos, audio and even interactive elements such as shapes and
buttons. This file can be created using applications from Adobe Photoshop, Illustrator,
Running Head Computer
12
InDesign and Acrobat to Microsoft Word, Google Docs and many more. But to view
PDF files, you will need a PDF reader on your device.
Pros: Saves the entire format, regardless of the device on which it is displayed.
Disadvantages: To view it, you need to have a PDF reader installed on your device.
Best places to use: online forms, documents and printing services.
PDF (portable document format)
This file format is also used to print online documents. It was created by Adobe to
display files in the same format, whether you open a display device or an application.
PDF links allow you to create longer documents and share them with others without
losing your original layout - no more text, shorter images and more. PDFs can contain
many different elements: text, photos, vector images, videos, audio files and even
interactive elements such as shapes and buttons. This file can be created with various
applications, from Adobe Photoshop, Illustrator, InDesign and Acrobat to Microsoft
Word, Google Docs and more. But to view a PDF, a PDF reader must be installed on
your device.
Pros: it retains the full format regardless of the device displayed on it.
Disadvantages: You need to install a PDF reader to view it.
Best places to use: online forms, documentation and printing services.
MP4 (Mobility Expert Group)
MP4 is a multimedia cache format, an excellent term for most of the videos we eat
online. This file contains videos, audio clips, and captions. Thanks to the compressed
format, the end result will be a very light file that you can easily download to your
favorite website or social media channel. MP4 can be played on all major media and
streamed online, so you do not need fantastic programs to watch it. In fact, it's a great
way to create or save videos for your website, social networks and more.
Pros: A light and convenient file for all important online media without any hassle.
Cons: we are looking for good and bad, but there seems to be no error in this file type.
Best places to use: social networks and videos on your site (Facebook, YouTube,
Vimeo, etc.).
[ CITATION 6Di \l 1033 ]
Running Head Computer
13
Computer Security:
Computer security is used to protect computer system and its resources such as
software, hardware and data. It protects a computer from damage or unauthorized
access. Different methods are used to ensure the security of a computer
system[ CITATION Tason \l 1033 ].
Threat:
Computer security Threat can be a computer program, an event or a person that
violates computer security. It may cause loss of data and stealing of information. It may
also affect the working of computer.
Hacker:
An act of unauthorized access to the computer or network is called hacking. A
Person who accesses a computer, network and its resources illegally is known as
Hacker. Hackers are computer experts and used their computer knowledge for negative
purpose. They break into the computer system and network to access the critical
information stored on it.
Some organizations hire the hackers to check the security of their network system.
These hackers user their skills to test the security system and identify any weakness in
it. Such hackers are known as white hat hacker or ethical hacker.
Running Head Computer
14
Software Theft:
Software threats means that a person can steal software media, erase software
program or copy it without permission. For example, someone can steal the CD-ROM
that contains the software program. An angry employee may delete the installed
software from computer.
Information Theft:
Information threat is another critical security threat. It is process of stealing personal or
confidential information without permission. The stolen information can be further used
or illegal activities. For example, someone may steal the credit card number o another
person and use it to buy things.
System Failure:
System failure is also an important security threat. It occurs when the system does not
function properly for longer time. System failure may cause further loss of data, software
and hardware etc. It occurs due to various reasons such obsolete hardware, natural
disaster such as flood, fire or storm and fluctuation in power supply etc.
Virus:
Computer virus is one of the most familiar forms of risk to computer system. A virus is
program that may disturb the normal working of a computer system. Virus attaches itself
to files stored on lash drives email attachments and hard disks. It may cause many
damages to a computer system.
A virus can:
1. Damage data or software on the computer.
2. Delete some or all files on the computer system.
3. Destroy all data by formatting hard drive.
Running Head Computer
15
Q.NO.5 (i) Why some people prefer alternative methods to input over a standard
keyboard and mouse?
These tools are designed to make it easier for students with disabilities to use
computers and related technologies. Have been prepared. Some alternative input
devices include touch screens, custom keyboards, and gamepads that guide the pointer
using body parts such as the chin, arms, or legs. Some of the emerging technologies in
this area are “sip and puff” systems developed by companies such as Microsoft to
perform simple functions of calculating and calculating the expiration date. Screen
keyboards are another area of data entry technology that allows K-12 students to better
use computers and mobile devices to learn.
Technology is growing rapidly. Technology is often changing our lives to make things
easier and better or them. Nowadays people using alternative methods for convenience.
You do not have to pay to use the keyboard to control your computer. There are several
ways to enter text, browse the web, and perform other basic on-screen tasks.
Alternatives to Standard Keyboard
On the on-screen keyboard
You can use a mouse or mouse button to select letters on the screen
Keyboard. It can also work with a single idea switch, where the user has to select a row
and then a column. Although only one switch can be used, it can control the computer.
Switch
If the user is physically or cognitively unable to use the keyboard or pointer, the main
reference point may be to use the switch input. A switch is just a button that, when
activated, sends a signal to a computer. This signal can then be used to launch various
software packages.
Discovery switch
The Discover switch replaces the computer keyboard and mouse for people with
cerebral palsy and other physical disabilities, preventing them from choosing directly
from the mouse or keyboard. The switch is available in various shapes and sizes and
can be used with any controlled movement of the body. Switches work well with cause-
and-effect programs and programs that need them easy choice. A small switch interface
box is needed to connect the switch to the computer.
Small keyboard
Smaller keyboards are easier to find and are often suitable for individual users. It can fit
between the arms of a standard wheelchair. The actual keyboard dimensions are very
similar to a standard keyboard. Space is usually saved by removing the numeric keypad
and reducing the space around the edit and function keys.
Running Head Computer
18
Ergonomic keyboard
Ergonomic keyboard is designed for people who want to touch with both hands. These
keyboards usually add a split between the keyboards they use each hand to reduce
tension in the wrist and arm. There are many variations of this design. Some ergonomic
keyboards have a stable distribution, while others, as pictured
Above, set to allow angle and height. In addition to the dual design (available from
various ergonomics and accessibility providers), PCD Maltron is developing an
ergonomic keyboard for users who want to use it to touch all their fingers.
Alternatives to Mouse
Standard computer mice come in all shapes and sizes, but they also need to be moved
anywhere on the desk. You need to hold them in the same position when you press the
button. As a result, they face many challenges for people with disabilities.
Drag lock
Many programs require you to "drag and drop" images or text from one location to
another. To do this, move the item, hold down the mouse button, move it to a new
location, and release the button. This can be difficult for people with disabilities. A useful
feature to learn about this problem is “lock”. With this feature, you can easily move an
item (click the button and release it), move to a new location and click the same button
again to release the item. The traction lock function is available on most shafts. It could
be an additional button on the device that always acts as a drag key, or it could be your
button. You can create settings for your operating system to create a key.
Trackball
The trackball is basically a sharp mouse. Even if you put your mouse on the table, the
trackball is a stable tool. The ball up is pushed forward with the fingers, thumbs and
palms. Large track balls are usually suitable for walking.
Pen tools
They are held in the hand like a feather and have two main forms:
Device working in the same way as a mouse: move it and turn the ball and move the
cursor in the direction (relative movement).
[ CITATION Tason \l 1033 ][ CITATION Tason \l 1033 ]
• Device you use to move the tablet: The tablet is the area on the screen, so if you touch
the center of the tablet, the cursor or mouse pointer will be in the center of the screen.
This is called graphical tables. It is widely used for bullet shooting and more detailed
work.
Joystick
Running Head Computer
19
This type of device works similarly to wheelchair control. If the mouse pointer moves
quickly, when the joystick is pushed fully forward. Joyce's wand in the photo has a built-
in shield, shutter, and button that sends a double click.
New technological changes have led to innovation in many leading customer service
industry applications. We've made extensive use of speech recognition technology in
our daily lives, without even considering it many times over: automatic phone menus
and directories, voice-activated mobile dialing, and built-in voice commands on mobile
phones are just a few things. We do Here are some examples for you. Health and legal
professionals use verbal identification on a daily basis to consolidate notes and rewrite
important information. New uses of this technology include military applications,
navigation systems, car voice recusals (Ford SYC), smart homes built using voice
control devices, and video games such as EndWorks that allow players to use only their
voice allowing your troops to command [ CITATION NCT \l 1033 ].
At work
Running Head Computer
20
Voice recognition technology in the workplace has evolved after the inclusion of simple
tasks to increase efficiency, as well as the tasks traditionally required by people.
Examples of office tasks that digital assistants can or want to perform
• Search for reports or documents on your computer
• Use data to create graphs or tables
• Specify the information you want to include in the document
• Document print on request
• Start the video conference
• Schedule meetings
• Record the minutes
• Arrange a trip
In the bank
The purpose of the banking and financial sector is the recognition of the language to
reduce friction for the customer. Voice banking services can significantly reduce the
need for customer service and reduce staff costs. A personal banking assistant can in
turn increase customer satisfaction and loyalty.
How language recognition can improve banking:
• Ask for information about your balance, transactions and consumption habits without
opening your mobile phone
• Pay
• Get information about your transaction history
In the field of marketing
Voice search can take on a new dimension in the way marketers reach their users. As
people interact with their devices, marketers need to examine changes in user data and
behavioral trends.
Data: With speed recognition, there will be a new type of data available or
marketers to analyze. People’s accents, speech patterns, and vocabulary can be
used to interpret a consumer’s location, age, and other information regarding
their demographics, such as their culture affiliation.
Behavior: While typing necessitates a certain extent of brevity, speaking allows
or longer, more conversational searches. Marketers and optimizers may need to
focus on long tail keywords and producing conversational content to say ahead
of these trends.
Running Head Computer
21
In Healthcare
In an environment where seconds are crucial and sterile operating conditions are a
priority, hand free, immediate access to information can have positive impact on patient
safety and medical efficiency.
Benefits include:
Quickly finding information from medical records
Nurses can be reminded processes or given specific instructions
Less paperwork
Less time inputting data
Nurses can ask or administrative information, such as number of patients on a
floor and number available units
The most significant concern using speech recognition in healthcare is the content the
digital assistant has access to. It has been recognized that the content will need to be
supplied and validated by recognized medical institutions, in order or it to be a viable
option in this field.
In language learning
One of the most transformative applications of speech recognition technology from a
human perspective is its ability to remove language barriers and culture boundaries in
aspects of social lie and in the workplace.
A world without language barriers opens up great possibilities or collaboration among
various countries and culture perhaps contributing to a faster rate of innovation as a
result of the increased diversity[ CITATION App19 \l 1033 ].
Reference
(NCTI), N. C. (n.d.). Speech Recognition for Learning. Retrieved from Reading Rockets:
https://www.readingrockets.org
6 Different Types of Files and How to Use Them. (n.d.). Retrieved from WiX Blog: https://www.wix.com/
Difference Between Bitmap and Vector (With Table). (n.d.). Retrieved from https://askanydifference.com
Importance Of Computers In Society Information Technology Essay. (2018, November). Retrieved from
UKEssays: https://www.ukessays.com
Mustafa, T. (9th Edition). The Concepts of Information Technology. Faislabad: Kitab Markaz.
Running Head Computer
22
The End