Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
60 views

Computer Assignment

Allama Iqbal BBA ist semester assignment Autumn 2020

Uploaded by

Fatima Safdar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Computer Assignment

Allama Iqbal BBA ist semester assignment Autumn 2020

Uploaded by

Fatima Safdar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Running Head Computer 1

Name: Kaneez Fatima

Roll No: cb437247

Level: BBA (4 YEARS)


Semester: Autumn 2020
Submitted to: Raja Noman Ajmal
Course: Fundamentals of Computer (8403)
Running Head Computer 2

Assignment no 1
Q. 1 In today’s world computer systems are vital. What role do computer systems
play in our society? Explain with real life examples.
Introduction of Computer:
Computer is an electronic machine used to solve different according to a set of
instructions given to it. A computer can accept data, process data into useful information
and store it for later use. The word computer derives from compute that means to
calculate. Computer can be used as calculating machine to produce results at a very
high speed. However, the calculation is not the only use of computer. It can be used or
different purposes. People use computers to solve different problems quickly and easily.
It has changed the way of life. Computer is very important nowadays. They are used in
our daily life. Computers are available in different shapes and sizes [ CITATION Tason \l
1033 ].

Importance of Computer systems in modern society


Computers are now a fact of life. Computers have created a very effective information
system to help streamline the management of an organization. This makes it a much
needed tool for every business, banking, government, entertainment, daily life, industry,
education, and administration. It can be said of all large organizations, whether the
department government or private, use a computer for a variety of their daily business
and it is the fastest growing industries in the world today. Each organization usually has
one or more large computer systems and a number of microcomputer. The system is a
great computer for data processing tasks, while many small microcomputer to use as
word processing. Computers have become part of our lives is essential.
Role of computer system in our society
Computer plays a very vital role in our society. It has changed the way of our life. There
are both positive and negative impacts of computer on our society.
Positive Impacts of Computer on society:
The use of computer technology has affected every field of life. People are using
computers of performing different tasks quickly and easily. The use of computers make
different tasks easier. It saves a lot of time and effort. It also reduces overall cost to
complete a task. Many organizations are using computer for keeping the records of
their customers. Banks are using computers for maintaining accounts and managing
financial transactions. The banks are providing the facility of online banking. The
customers can check their account balance by using the internet. They can also make
financial transactions online. The transactions are handled easily and quickly with
computerized systems. People are using computers for paying their bills. They are
getting information from the internet. They are also using computers to manage their
home budgets etc.
Running Head Computer 3

Computers are used in education field to improve teaching and learning process.
Computer is used in colleges to provide the methods of teaching in different ways. It is
used to educate the students effectively. Many computer based educational programs
are available. The students can learn to read, to count, and to speak foreign language.
Many educational games are becoming popular in the students. Moreover, the
computer is being used in every field of life such as medical, business, industry, airline
and weather forecasting etc.[ CITATION Tason \l 1033 ].

Role of Computer in many ways


Role of Computer at Home
Computer can be used at home in following ways
Home Budget
Computer can be used to manage the home budget. The user can easily calculate the
expenses and income. It is easy to list all expenses in one column and income in other
column. Different types of calculation can be applied on the columns to plan home
budget.
Computer Games
An important use of computer at home is playing game. Different types of games are
available. The games are source of entertainment and recreation. Many games are
available that are specially developed to improve your mental capability and thinking
power.
Working from Home
People can manage the office work at home. The owner of company can check the
work of employees from home. He can control his office while sitting at home.
Chatting
People can chat with friends on internet. Different messages, files and information can
be sent to them.
Role of Computer in Education
Computer can be used in education to improve teaching and learning process. It is used
in colleges to provide teaching methods in different ways. It is used to educate students
effectively. Computer can be used in education in following ways:
Distance Learning
Distance learning is a learning methodology using computers. The students do not need
to come to institutes. The institute provides the reading material and students attend
Running Head Computer 4

virtual classroom. In virtual classroom teacher delivers lecture at his own workplace.
The student can attend lecture by connecting to a network. The student can ask
question to the teacher. The answers are given to the students by email.
Online Education
Many websites provide online education. The user can download educational material,
books and tutorials. Some universities provide online lectures for the students. Students
can ask questions and discuss problems by sending emails to these websites.
Computer-Aided learning
Computer aided learning is a process of using information technology to help teaching
and learning process. These programs include text, graphics and sound. Audios and
videos lectures are recorded on the CDs. CBT is a low cost solution for educating
people[ CITATION Tason \l 1033 ].
Role of Computer in Medical Fields
Hospitals and clinics use computers to keep patient records, plan doctors, nurses, and
other staff, inventory and purchase medications, medical tests, and medical diagnostics.
The use of computer equipment or the use of information technology has helped
doctors diagnose diseases. Obviously, the use of computers in the medical field makes
it possible to solve complex problems. Among the new information technologies that
help people with disabilities. Microprocessor voice systems help people with disabilities
talk to a terminal that signals a computer to perform a verbal task. Computer
development has also helped the blind to see, designed to communicate using a
speech synthesizer or keyboard. It can help them become more active and do things
they couldn’t do before. In addition to traditional data processing tasks such as patient
billing, medical statistics and personnel planning, and the like, computer tasks have also
been simplified and processed.
The hospital information system used can be stored in a centralized patient database. In
fact, using information technology, a computer is programmed to grow and analyze
bacteria, viruses, and other infectious agents to automatically detect and diagnose
diseases, which will allow hospitals and laboratories to begin treatment. For example, a
computer-supported demographic device (CAT) is used for this purpose. Computers are
also used by the patient to monitor psychological variables such as blood pressure,
body temperature, ECG (electrocardiograph) and to alert you if something unusual
happens. To do this, the computer should read the different variables and compare
them to the standard values. If something extraordinary happens, the computer will
draw the attention of doctors and nurses to the alert. Clearly, the computer has been
found to have a wide range of applications in the medical field [ CITATION Imp18 \l 1033 ].
Role of Computer in Banking and Financial
Running Head Computer 5

Data processing, which includes savings accounts, deposits, loans, investments,


business case analysis, and so on, is part of the operating budgets of organizations.
The tools used are standard and repetitive. A financial institution is the first consumer to
understand the importance of computers to save time. The use of financial institutions,
including electronic fund transfer activities, for example, the bank has a terminal in all
branches of the country, as well as in supermarkets, gas stations, schools, factories,
houses, hotels, etc.
The company will transfer employees' salaries to the account by entering the employee
identification numbers and then paying the money transferred to the merchant, hotel or
service station account during the purchase. Money transfer means electronic money
transfer, very efficient use is a safe and fast method of financial transactions. With a tool
called ETC, a person can also spend money or checks on an existing balance at any
time. Clearly, the main purpose of using computers in financial institutions can help
grow clients' business and provide better and more efficient services, reduce fraud in
financial transactions, and eliminate cash transactions in the business to run a cashless
business to create[ CITATION Imp18 \l 1033 ].
Negative impacts of computer on our society:
The use of computer has also created some problems in society which are as
follows:
 Unemployment
Different tasks are performed automatically by using computers. It reduces the
need of People and increase unemployment in society.
 Wastage of time
Many people are using computers without positive purpose. They play games
and chat for long time. It causes wastage of time and energy.
 Data Security
The data stored on computer can be accessed by unauthorized persons through
networks. It creates serious problems to data security.
 Health Risks
The improper and prolonged use of computer can result in injuries or disorders of
hands, wrists, elbows, eyes, neck and back. The users can avoid health risks by
using the computer in proper position. They must also take regular breaks while
using the computer for long time.
 Computer Crimes
People use computer for negative activities. They hack the credit card numbers
of the people and use them for shopping [ CITATION Tason \l 1033 ].
Running Head Computer 6

Q. 2 Define Utility Software. How does utility software enhance the overall
performance of an operating system? Explain with examples.
Utility software
Utility software is system software designed to help analyze, configure, optimize or
maintain a computer. Utility software usually focuses on how the computer infrastructure
operates. Due to this focus, utilities are often rather technical and targeted at people
with an advanced level of computer knowledge - in contrast to application software,
which allows users to do things like creating text documents, playing video games,
listening to music or viewing websites.
Performance of Utility software
The user can use utility program to perform maintenance tasks related to different
devices and programs. The utility software keeps the computer system running
smoothly. Most operating system include different built in utility programs. Some
functions and features that software utilities perform can be done manually but only by
experienced and professional. Most new users cannot carry out such operations, which
will improve the performance of his computer system manually. A computer system can
maintain upmost computer performance through utilities and are suggested how they
maintain computer performance below.
System Utility
A system tool is system software designed to improve or maintain system settings.
Operating software is a type of system software that supports a computing infrastructure
and separates it from application software designed to perform tasks that directly benefit
the general user.
List of System Utility
 Discipline management
 Debuggers
 Registry Cleaner
 Antivirus
Discipline management
The logical driver key is available for newer versions of Microsoft Windows. The design
of the article differs from that of a connector reader, flash reader and optics and disk
reader. This is an initial use of the partitions associated with spray tool reading. These
types of logical features are available for Windows XP. Some examples of disk
Running Head Computer 7

management tools are Paragon Partition Manager, Mini Tool Partition Wizard, OMI
Partition Assistant, etc.
Debuggers
And the logic of information and communication devices is specific to program specific
and specific applications. Program Principles and Programs for conducting surveys and
surveys are based on relevant indicators and code information sources.
Registry cleaner
Net Register of Restoration Points for Importers in addition to Information Technology.
This is because it promotes corruption in the Windows registry and integration and
malfunction of computers. However, this does not require maintenance. Three important
issues have been identified in this regard. Both of these applications are not available
for viruses and logic versions of other versions of Windows. When the operating system
crashes due to corruption in the registry, it actually appears. Like Windows 95, master
registry corruption can lead to the point where we need to reshape a hard drive and
reinstall the operating system as needed. Use of the network registry will be limited to
corruption in the Windows registry and will not be affected by the reformers. If we use
our registration regularly, we will show the issues first.
Of course, this is the most intelligent thing. It is certain that the information contained in
the system can be reinstalled and information about the information is not available.
Antivirus:
A type of software used to detect and remove virus is called antivirus. It contains
information about known viruses. It can detect and remove them. It also prevent new
viruses from entering into computer. McFAee and Norton are two most commonly used
antivirus programs in Windows operating system[ CITATION Tason \l 1033 ].

Spyware Remover:
A spyware remover is a program that detects and deletes spyware. Spyware is a
program that is placed in computer without user’s knowledge. It secretly collects
information about the user related to web browsing habits. It often enters a computer
when the user installs new program. Popular stand-alone spyware remover is spy
sweeper[ CITATION Tason \l 1033 ].
Firewall:
Firewall is used to detect and protect personal computer rom unauthorized instructions.
A firewall acts like a wall and a boundary between the computer and the internet. It only
allows such connections that have a trusted certificate with them. If a person is not
protected from such threats, other people can manipulate his computer or delete
everything from his computer.
Running Head Computer 8

Storage Device management utilities


Disk Defragmenter:
Disk Defragmenter software is used to reorganize the files on the disk. It manages the
un-used space on the disk so that the operating system may use data more quickly.
Defragging is a vital process which needs to take place on your hard drive. If a hard
drive is not defragmented, then over time the drive will slowly reduce the available
capacity on the drive and begin to create performance issues. When you defrag your
hard drive you re-arrange the order in which the data is stored on the drive to ensure
that the good files and folders are set first so that the computer doesn’t spend time
searching for them. The PC will arrange the data so that data that belongs together and
needs to be read together is actually put in the same place on the drive. You can defrag
your computer using the software utility called defraggler. This software will guarantee
your hard drives clean-up and tidying hence improve your operating systems
performance.
Disk Cleanup:
Disk cleanup utility is used to search and remove unnecessary files such as temporary
internet files, downloaded files and unused program files etc. This can help the
performance of a computer because it takes out and removes all of the waste
permanently.
Back up:
A backup utility is used to copy lies to another storage medium. Backup is used when
data is lost or deleted unexpectedly. The backup utility program provides an easy way
to take backup. A restore utility is used to restore the backed files to their original form.
File compressor:
File compressor is used to shrink the size of file. A smaller size of file makes it easier
and faster to send files over the internet. WinZip is an example of file compressor.
Driver Updates:
Updating your drivers is very important; whether it may be software updates or
hardware updates. Normally when you buy a printer, the printer comes with a software
driver CD. This familiarizes people with the fact that software need to be updated but
they are not normally familiar with updates for hardware devices, such as Intel devices,
graphics cards and chipsets. These need to be updated to improve computer
performance. New drivers are made by the company of the product and fix bugs,
improve the security of the devices and give better performance. To find out which
hardware and software drivers need updating, you could use a utility such as Driver
scanner 2013 from Uniblue. This tool will scan all your operating system to tell you what
drivers need updating. Having all your drivers updated your operating system should
run at optimum speed. Sam needs to update his drivers because this helps to fix bugs
and other performance issues.
Running Head Computer 9

Disk Burning:
Disk burning software is used to write text, graphics, audio and video files on a
recordable or rewriteable CD and DVD. It allows the user to backup data on optic disc.
Operating system Diagnostic:
Operating system diagnostics is when you come up across a problem and then your
computer gives you the option “diagnose problem”. The computer will then search for
the solution to the problem. Once it finishes diagnosing then it will either give you the
solution to the problem or it will tell you that it can’t find the solution. For example when
you internet is not connected and you open up your browser then it will give you some
advice for why your internet is coming on and it will also give you the diagnose problem
message. This will be of good use to Sam because he is new to computers and will not
have enough knowledge on solving his computer problems.
[ CITATION Tason \l 1033 ]

Q.NO.3 Define the term bitmap and vector and differentiate these file types.
Explain different ways to load graphic files in computer with examples.
Bitmap
Bit map graphs (also called 'raster') are made of low pixels of different colors that
together create an image. In the simplest form, cards have only two colors and each dot
is black or white. As the complexity increases, the image may have more colors; Photo
quality images can reach millions. Examples of bitmap graphic formats are GIF, JPEG,
PNG, TIFF, XBM, BMP and PCX fonts, as well as bitmap fonts (i.e. the screen). The
image displayed on a computer screen is part of a card with output from printers,
scanners, and similar devices. It is made using coloring programs like Adobe
Photoshop.
Vector
Vector graphs (also called "object-oriented") are made using mathematical formulas that
describe shapes, colors, and location. Instead of a grid of pixels, a vector graph consists
of shapes, curves, lines, and text that together create an image. Although the point map
view contains information about the color of each point, vector graphs provide
instructions for the location of each component. Even guitar graphics can be integrated
into vector graphics, so bitmap vector hybrid graphics work. However, some vector
information cannot be inserted. Examples of vector graphics are PICT, EPS and WMF,
as well as PostScript and TrueType fonts. It is made using GIS and CAD programs, as
well as drawing programs like FreeHand.
Difference between Bitmap and Vector
Running Head Computer
10

Parameter of Bitmap Vector


comparison
Definition A type of graphics A type of graphics
that are made up of that are made up of
small elements lines and curves.
called pixels.
Formats .jpg, .gif, .png, .psd, .ai, .svg, .ps,
.tiff .eps, .svf
Elements It uses pixels. It uses geometric
shapes
Resolution Resizing the image Resizing the image
affects its does not affect its
resolution resolution.
Suitable for This type is suitable This type is suitable
for photographs. for logos, clip arts,
and icons.
File size Comparatively Comparatively less
larger than vector than bitmap
images. images.
Software program It can be edited It can be edited
using Adobe using Adobe
Photoshop. Illustrator.
[ CITATION Dif \l 1033 ]

Ways to load graphic files in computer with examples.


PNG (portable network graphics)
PNG is a high quality file format that captures images. Is used. This file type is based
on unrecoverable compression, which means it supports high quality images that can
be used online, while retaining the color and brightness of the original image. Unlike
JPEG files, PNG supports transparent background images. So if you want a
background image, like a logo or product, you can save it as a PNG file and use it with a
different background. However, this file is not as simple as JPEG. Therefore, uploading
hundreds of large PNGs to your website or portfolio is not recommended as it takes up
a lot of space and ultimately increases the load time of your website. No one has time
for that.
Pros: Supports high quality files, transparent backgrounds.
Cons: Heavy file (slows down loading time and takes up too much space).
Best places to use: logos, site photos, social networks (profile photos, posts and cover
photos)
JPEG (Mixed Group of Photographers)
Running Head Computer
11

JPEG is a common form used by digital cameras and web images. This file format is
based on the disadvantages of compression, which means that it stores information that
is visible to viewers and deletes data that the human eye cannot comprehend. The
JPEG file is popular because it is lightweight but good enough for digital use. Due to the
size, not only does it load faster, but it can also be loaded on any platform, regardless of
size. This format can be viewed on any device without the need to download a special
image. However, it is important to note that whenever you save and compress a file as
a JPEG, the image loses its quality and becomes pixelated or grainy.
Pros: Easy file, included in almost any application.
Disadvantages: Loss of quality due to repeated storage.
The best places to use are: Web Design, Social Networks, and Photos from Photo
Folders.
GIF (Graphic Exchange Format)

You've probably heard of this type of file via the most popular, most popular feature
online: Animation! A GIF file is in the form of an instant image, which means that the
graphics consists of very small parts called pixels, as well as JPEG and PNG file
formats. This file type is based on LZW (Lampel Zeo-Welch), which is a special form of
data loss without data compression algorithm. GIFs are best suited for multi-color
graphics, such as simple schemes, shapes and logos, but also for saving measures.
For example, your company's icons appear in less than three colors or less in this color
scheme. Small file size suitable for use anywhere. However, not only will the sunset
look much heavier, but the color restrictions will also cause this distortion. The
advantage of this type of file is that it supports a transparent background, such as a
PNG file.
Advantages: Supports transparency and basic mobility.
Disadvantages: Poor display color
Great places to use: Short animation for social channels like Facebook and Twitter.
PDF (portable document format)
This file format is used for online documentation and printing. It was created by Adobe
to display files in the same format, regardless of the device they are viewing or the
software they use to open them. The reliability of PDF files allows you to create long
documents and share them with others without losing the original project: no more text,
no shorter images, and more. TPDF can include many different elements: text, images,
vector images, videos, audio and even interactive elements such as shapes and
buttons. This file can be created using applications from Adobe Photoshop, Illustrator,
Running Head Computer
12

InDesign and Acrobat to Microsoft Word, Google Docs and many more. But to view
PDF files, you will need a PDF reader on your device.
Pros: Saves the entire format, regardless of the device on which it is displayed.
Disadvantages: To view it, you need to have a PDF reader installed on your device.
Best places to use: online forms, documents and printing services.
PDF (portable document format)
This file format is also used to print online documents. It was created by Adobe to
display files in the same format, whether you open a display device or an application.
PDF links allow you to create longer documents and share them with others without
losing your original layout - no more text, shorter images and more. PDFs can contain
many different elements: text, photos, vector images, videos, audio files and even
interactive elements such as shapes and buttons. This file can be created with various
applications, from Adobe Photoshop, Illustrator, InDesign and Acrobat to Microsoft
Word, Google Docs and more. But to view a PDF, a PDF reader must be installed on
your device.
Pros: it retains the full format regardless of the device displayed on it.
Disadvantages: You need to install a PDF reader to view it.
Best places to use: online forms, documentation and printing services.
MP4 (Mobility Expert Group)
MP4 is a multimedia cache format, an excellent term for most of the videos we eat
online. This file contains videos, audio clips, and captions. Thanks to the compressed
format, the end result will be a very light file that you can easily download to your
favorite website or social media channel. MP4 can be played on all major media and
streamed online, so you do not need fantastic programs to watch it. In fact, it's a great
way to create or save videos for your website, social networks and more.
Pros: A light and convenient file for all important online media without any hassle.
Cons: we are looking for good and bad, but there seems to be no error in this file type.
Best places to use: social networks and videos on your site (Facebook, YouTube,
Vimeo, etc.).
[ CITATION 6Di \l 1033 ]
Running Head Computer
13

Q. 4 In the context of Computer Security Define the following in details:


(i) Threat
(ii) Vulnerability
(iii) Countermeasure

Computer Security:
Computer security is used to protect computer system and its resources such as
software, hardware and data. It protects a computer from damage or unauthorized
access. Different methods are used to ensure the security of a computer
system[ CITATION Tason \l 1033 ].

Importance of Computer security:


Computer is used in every field of life nowadays. It may be used to store the personal
information of a user or critical data of an organization. It is very important to maintain
the security of the computer system so that the data stored on it may not be accessed
by any unauthorized person.
There are many risks and threats to computer security. Computer security threat can be
a computer program, an event or a person that violates computer security. It may cause
loss of data and stealing of information. It may also affect the working of computer.
Computer security is very important to protect the computer from all these threats.
The most important objectives of computer security are as follow:
1. It makes sure that a computer or network is not used without permission.
2. It makes sure that the hardware is not damaged or stolen.
3. It makes sure that confidential information is not used without permission.
4. It makes sure that the system works without any problem[ CITATION
Tason \l 1033 ].

Threat:
Computer security Threat can be a computer program, an event or a person that
violates computer security. It may cause loss of data and stealing of information. It may
also affect the working of computer.

Hacker:
An act of unauthorized access to the computer or network is called hacking. A
Person who accesses a computer, network and its resources illegally is known as
Hacker. Hackers are computer experts and used their computer knowledge for negative
purpose. They break into the computer system and network to access the critical
information stored on it.
Some organizations hire the hackers to check the security of their network system.
These hackers user their skills to test the security system and identify any weakness in
it. Such hackers are known as white hat hacker or ethical hacker.
Running Head Computer
14

Problems Caused by Hacker:


The hacker may steal the following:
 The information of client or customer.
 Credit card details for unauthorized users
 Password to access computers and networks easily
 Email password to use email account without users knowledge
Hardware Theft:
Hardware theft and vandalism is another security threat. Hardware theft is a process of
stealing the hardware equipment such as hard disk or monitor etc. Hardware vandalism is a
process of defacing the hardware equipment. For example, an employee in an organization may
damage the keyboard or cut the wires etc.

Software Theft:
Software threats means that a person can steal software media, erase software
program or copy it without permission. For example, someone can steal the CD-ROM
that contains the software program. An angry employee may delete the installed
software from computer.
Information Theft:
Information threat is another critical security threat. It is process of stealing personal or
confidential information without permission. The stolen information can be further used
or illegal activities. For example, someone may steal the credit card number o another
person and use it to buy things.
System Failure:
System failure is also an important security threat. It occurs when the system does not
function properly for longer time. System failure may cause further loss of data, software
and hardware etc. It occurs due to various reasons such obsolete hardware, natural
disaster such as flood, fire or storm and fluctuation in power supply etc.
Virus:
Computer virus is one of the most familiar forms of risk to computer system. A virus is
program that may disturb the normal working of a computer system. Virus attaches itself
to files stored on lash drives email attachments and hard disks. It may cause many
damages to a computer system.
A virus can:
1. Damage data or software on the computer.
2. Delete some or all files on the computer system.
3. Destroy all data by formatting hard drive.
Running Head Computer
15

4. Display all political or false message every few times.


Denial of Service Attack:
A denial of service (DoS) attack slows down a computer system or network. It floods a
computer or network with request or information or data. The most common targets of
this attack are internet service providers (ISPs) and certain websites. The server under
the attack receives so many requests that it cannot respond to legitimate users.
Vulnerability:
Put simply, a vulnerability in a computer system is a flaw or weakness in a system or
network that could be exploited to cause damage or allow an attacker to manipulate the
system in some way.
This is different from a cyber threat in that although a cyber threat may involve an
external element, there are vulnerabilities in the computer system in the network
resource (for example, a computer, a database or even a specific application) for you.
Additionally, they are usually not the result of a deliberate effort by an attacker, although
cybercriminals exploit these loopholes in their attacks, leading some to use the terms
interchangeably.
How a computer is exploited depends on the nature of the vulnerability and the
motivation of the attacker. These vulnerabilities can exist due to unexpected interactions
of multiple software programs, system components, or underlying faults in a single
program. It is important to know that vulnerabilities exist in virtually every network, it is
not possible to identify and fix all of them due to the incredibly complex nature of
modern network architecture.
However, you can significantly reduce your risk of a data breach or similar event by
knowing some of the most common network vulnerabilities are and finding ways to
address them. Here are a few security vulnerability types to watch out for:
Types of security vulnerabilities:
Cybersecurity vulnerabilities can be categorized into different types according to
different criteria. Where is the vulnerability that caused it, or how can it be exploited?
Some of these types of widespread vulnerabilities are:
• Network Vulnerabilities: These are network hardware or program issues that could
compromise your network by a third party. Examples include unprotected Wi-Fi public
internet access points and improperly configured firewalls.
• Operating system vulnerabilities. These are specific operating system vulnerabilities
that hackers can exploit to access or damage resources on which the operating system
is installed. For example, the default overuse account found in some hidden backend
programs and operating system installations.
Running Head Computer
16

• Human vulnerability. The weakest link in many cybersecurity architectures is the


human element. Users error can easily reveal sensitive data, create access point that
can be exploited by attackers and disrupt the system.
Countermeasure:
A countermeasure is an action or method that is applied to prevent, avert or reduce
potential threats to computers, servers, networks, operating system or information
systems. Countermeasure tools include anti-virus software and firewalls.
Countermeasure can take the form of software, hardware and mode of behavior.
Software countermeasures include:
 Personal firewalls
 Application firewalls
 Anti-virus software
 Spyware detection
 Pop-up blockers
The most common hardware countermeasure is a router that can prevent the IP
address of an individual computer from being directly visible on the internet. Other
hardware countermeasures include
 Biometric authentication systems
 Physical restriction of access to computer and peripherals
 Intrusion detectors
 Alarms
Behavioral countermeasures include:
 Frequent deletion of stored cookies and temporary files from web browsers
 Regular scanning for other viruses and malware
 Regular installation of updates and patches for operating system
 Refusing to click on link that appear within e-mail messages
 Refraining from opening e-mail messages and attachments from unknown
senders
 Staying away from questionable websites
 Regularly backing up data on external media
In military application, a countermeasure is a system or strategy intended to prevent an
enemy from compromising a target. This can be done by shielding, concealing or
moving the target, creating decoys or otherwise confusing the enemy [ CITATION Tec06 \l
1033 ].
Running Head Computer
17

Q.NO.5 (i) Why some people prefer alternative methods to input over a standard
keyboard and mouse?
These tools are designed to make it easier for students with disabilities to use
computers and related technologies. Have been prepared. Some alternative input
devices include touch screens, custom keyboards, and gamepads that guide the pointer
using body parts such as the chin, arms, or legs. Some of the emerging technologies in
this area are “sip and puff” systems developed by companies such as Microsoft to
perform simple functions of calculating and calculating the expiration date. Screen
keyboards are another area of data entry technology that allows K-12 students to better
use computers and mobile devices to learn.
Technology is growing rapidly. Technology is often changing our lives to make things
easier and better or them. Nowadays people using alternative methods for convenience.
You do not have to pay to use the keyboard to control your computer. There are several
ways to enter text, browse the web, and perform other basic on-screen tasks.
Alternatives to Standard Keyboard
On the on-screen keyboard
You can use a mouse or mouse button to select letters on the screen
Keyboard. It can also work with a single idea switch, where the user has to select a row
and then a column. Although only one switch can be used, it can control the computer.
Switch
If the user is physically or cognitively unable to use the keyboard or pointer, the main
reference point may be to use the switch input. A switch is just a button that, when
activated, sends a signal to a computer. This signal can then be used to launch various
software packages.
Discovery switch
The Discover switch replaces the computer keyboard and mouse for people with
cerebral palsy and other physical disabilities, preventing them from choosing directly
from the mouse or keyboard. The switch is available in various shapes and sizes and
can be used with any controlled movement of the body. Switches work well with cause-
and-effect programs and programs that need them easy choice. A small switch interface
box is needed to connect the switch to the computer.
Small keyboard
Smaller keyboards are easier to find and are often suitable for individual users. It can fit
between the arms of a standard wheelchair. The actual keyboard dimensions are very
similar to a standard keyboard. Space is usually saved by removing the numeric keypad
and reducing the space around the edit and function keys.
Running Head Computer
18

Ergonomic keyboard
Ergonomic keyboard is designed for people who want to touch with both hands. These
keyboards usually add a split between the keyboards they use each hand to reduce
tension in the wrist and arm. There are many variations of this design. Some ergonomic
keyboards have a stable distribution, while others, as pictured
Above, set to allow angle and height. In addition to the dual design (available from
various ergonomics and accessibility providers), PCD Maltron is developing an
ergonomic keyboard for users who want to use it to touch all their fingers.
Alternatives to Mouse
Standard computer mice come in all shapes and sizes, but they also need to be moved
anywhere on the desk. You need to hold them in the same position when you press the
button. As a result, they face many challenges for people with disabilities.
Drag lock
Many programs require you to "drag and drop" images or text from one location to
another. To do this, move the item, hold down the mouse button, move it to a new
location, and release the button. This can be difficult for people with disabilities. A useful
feature to learn about this problem is “lock”. With this feature, you can easily move an
item (click the button and release it), move to a new location and click the same button
again to release the item. The traction lock function is available on most shafts. It could
be an additional button on the device that always acts as a drag key, or it could be your
button. You can create settings for your operating system to create a key.
Trackball
The trackball is basically a sharp mouse. Even if you put your mouse on the table, the
trackball is a stable tool. The ball up is pushed forward with the fingers, thumbs and
palms. Large track balls are usually suitable for walking.
Pen tools
They are held in the hand like a feather and have two main forms:
Device working in the same way as a mouse: move it and turn the ball and move the
cursor in the direction (relative movement).
[ CITATION Tason \l 1033 ][ CITATION Tason \l 1033 ]

• Device you use to move the tablet: The tablet is the area on the screen, so if you touch
the center of the tablet, the cursor or mouse pointer will be in the center of the screen.
This is called graphical tables. It is widely used for bullet shooting and more detailed
work.
Joystick
Running Head Computer
19

This type of device works similarly to wheelchair control. If the mouse pointer moves
quickly, when the joystick is pushed fully forward. Joyce's wand in the photo has a built-
in shield, shutter, and button that sends a double click.

(ii) Describe the use of Speech Recognition Systems with examples


Speed Recognition:
Speed recognition, also referred to as speech-to-text or voice recognition, is technology
that recognizes speech, allowing voice to serve as the main interference between the
human and the computer.
Use of speed recognition system in education:
While language recognition has a potential benefit for students with physical disabilities
and severe learning disabilities, this technology has not been implemented consistently
in the classroom over the years. However, with the advancement of technology, many
issues have been resolved. If you haven't used language recognition with your students
lately, it might be time to take a look. Microsoft and Apple both have included speech
recognition features in their operating systems, so you can easily test those features
with your students to see if speech recognition might be right for them.
Use of speed recognition system in daily life:
Speech Recognition and Text Speech Programs There are many programs for disabled
and disabled users. The use of text-to-speech helps hard writers to write more and
provide alternative access to computers for people with physical disabilities. Other
programs include language recognition for learning a foreign language, voice-activated
products for the blind, and many popular traditional technologies.

New technological changes have led to innovation in many leading customer service
industry applications. We've made extensive use of speech recognition technology in
our daily lives, without even considering it many times over: automatic phone menus
and directories, voice-activated mobile dialing, and built-in voice commands on mobile
phones are just a few things. We do Here are some examples for you. Health and legal
professionals use verbal identification on a daily basis to consolidate notes and rewrite
important information. New uses of this technology include military applications,
navigation systems, car voice recusals (Ford SYC), smart homes built using voice
control devices, and video games such as EndWorks that allow players to use only their
voice allowing your troops to command [ CITATION NCT \l 1033 ].
At work
Running Head Computer
20

Voice recognition technology in the workplace has evolved after the inclusion of simple
tasks to increase efficiency, as well as the tasks traditionally required by people.
Examples of office tasks that digital assistants can or want to perform
• Search for reports or documents on your computer
• Use data to create graphs or tables
• Specify the information you want to include in the document
• Document print on request
• Start the video conference
• Schedule meetings
• Record the minutes
• Arrange a trip
In the bank
The purpose of the banking and financial sector is the recognition of the language to
reduce friction for the customer. Voice banking services can significantly reduce the
need for customer service and reduce staff costs. A personal banking assistant can in
turn increase customer satisfaction and loyalty.
How language recognition can improve banking:
• Ask for information about your balance, transactions and consumption habits without
opening your mobile phone
• Pay
• Get information about your transaction history
In the field of marketing
Voice search can take on a new dimension in the way marketers reach their users. As
people interact with their devices, marketers need to examine changes in user data and
behavioral trends.
 Data: With speed recognition, there will be a new type of data available or
marketers to analyze. People’s accents, speech patterns, and vocabulary can be
used to interpret a consumer’s location, age, and other information regarding
their demographics, such as their culture affiliation.
 Behavior: While typing necessitates a certain extent of brevity, speaking allows
or longer, more conversational searches. Marketers and optimizers may need to
focus on long tail keywords and producing conversational content to say ahead
of these trends.
Running Head Computer
21

In Healthcare
In an environment where seconds are crucial and sterile operating conditions are a
priority, hand free, immediate access to information can have positive impact on patient
safety and medical efficiency.
Benefits include:
 Quickly finding information from medical records
 Nurses can be reminded processes or given specific instructions
 Less paperwork
 Less time inputting data
 Nurses can ask or administrative information, such as number of patients on a
floor and number available units
The most significant concern using speech recognition in healthcare is the content the
digital assistant has access to. It has been recognized that the content will need to be
supplied and validated by recognized medical institutions, in order or it to be a viable
option in this field.
In language learning
One of the most transformative applications of speech recognition technology from a
human perspective is its ability to remove language barriers and culture boundaries in
aspects of social lie and in the workplace.
A world without language barriers opens up great possibilities or collaboration among
various countries and culture perhaps contributing to a faster rate of innovation as a
result of the increased diversity[ CITATION App19 \l 1033 ].

Reference
(NCTI), N. C. (n.d.). Speech Recognition for Learning. Retrieved from Reading Rockets:
https://www.readingrockets.org

6 Different Types of Files and How to Use Them. (n.d.). Retrieved from WiX Blog: https://www.wix.com/

Applications of Speech Recognition. (2019, March 28). Retrieved from getsmarter:


https://www.getsmarter.com

Contributor, T. (2006, june). SearchSoftwareQuality. Retrieved from TechTarget:


https://searchsoftwarequality.techtarget.com

Difference Between Bitmap and Vector (With Table). (n.d.). Retrieved from https://askanydifference.com

Importance Of Computers In Society Information Technology Essay. (2018, November). Retrieved from
UKEssays: https://www.ukessays.com

Mustafa, T. (9th Edition). The Concepts of Information Technology. Faislabad: Kitab Markaz.
Running Head Computer
22

The End

You might also like