Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Practical Exam DCO-315

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

JAMIA MILLIA ISLAMIA

Practical Exam
of
Computer System & Maintainance (DCO-315)

Diploma in Computer Engineering 


Third Semester

Submitted by:     Submitted to:

Student Name: Zainul Aabidin Dr. Mohd Sadiq &


Roll No.: 20DCS058 Mr. Mohd Arif
Computer Engg. Section
University Polytechnic, JMI
// Classify the components of computers with the help of a
diagram.
Computer systems consist of three components as shown in below image: Central
Processing Unit, Input devices and Output devices. Input devices provide data
input to processor, which processes data and generates useful information that’s
displayed to the user through output devices. This is stored in computer’s
memory.

CPU (Central Processing Unit)

CPU is considered as the brain of the computer. CPU performs all types
of data processing operations. It stores data, intermediate results, and
instructions (program). It controls the operation of all parts of the
computer.

CPU itself has the following three components −


 ALU (Arithmetic Logic Unit)

 Memory Unit

 Control Unit

Central Processing Unit (CPU) consists of the following features −

 CPU is considered as the brain of the computer.

 CPU performs all types of data processing operations.

 It stores data, intermediate results, and instructions (program).

 It controls the operation of all parts of the computer.


CPU itself has following three components.

 Memory or Storage Unit

 Control Unit

 ALU(Arithmetic Logic Unit)


Memory or Storage Unit

This unit can store instructions, data, and intermediate results. This unit
supplies information to other units of the computer when needed. It is
also known as internal storage unit or the main memory or the primary
storage or Random Access Memory (RAM).

Its size affects speed, power, and capability. Primary memory and
secondary memory are two types of memories in the computer.
Functions of the memory unit are −

 It stores all the data and the instructions required for processing.

 It stores intermediate results of processing.

 It stores the final results of processing before these results are


released to an output device.

 All inputs and outputs are transmitted through the main memory.

Control Unit

This unit controls the operations of all parts of the computer but does
not carry out any actual data processing operations.

Functions of this unit are −

 It is responsible for controlling the transfer of data and instructions


among other units of a computer.
 It manages and coordinates all the units of the computer.

 It obtains the instructions from the memory, interprets them, and


directs the operation of the computer.

 It communicates with Input/Output devices for transfer of data or


results from storage.

 It does not process or store data.

ALU (Arithmetic Logic Unit)

This unit consists of two subsections namely,

 Arithmetic Section

 Logic Section

Arithmetic Section

Function of arithmetic section is to perform arithmetic operations like


addition, subtraction, multiplication, and division. All complex
operations are done by making repetitive use of the above operations.

Logic Section

Function of logic section is to perform logic operations such as


comparing, selecting, matching, and merging of data.
Input Unit

This unit contains devices with the help of which we enter data into the
computer. This unit creates a link between the user and the computer.
The input devices translate the information into a form understandable
by the computer.

Following are some of the important input devices which are used in a
computer −

 Keyboard

 Mouse

 Joy Stick

 Light pen

 Track Ball

 Scanner

 Graphic Tablet

 Microphone

 Magnetic Ink Card Reader(MICR)

 Optical Character Reader(OCR)


 Bar Code Reader

 Optical Mark Reader(OMR)

Keyboard

Keyboard is the most common and very popular input device which
helps to input data to the computer. The layout of the keyboard is like
that of traditional typewriter, although there are some additional keys
provided for performing additional functions.

Keyboards are of two sizes 84 keys or 101/102 keys, but now


keyboards with 104 keys or 108 keys are also available for Windows
and Internet.

Mouse

Mouse is the most popular pointing device. It is a very famous cursor-


control device having a small palm size box with a round ball at its
base, which senses the movement of the mouse and sends
corresponding signals to the CPU when the mouse buttons are pressed.

Generally, it has two buttons called the left and the right button and a
wheel is present between the buttons. A mouse can be used to control
the position of the cursor on the screen, but it cannot be used to enter
text into the computer.

Advantages

 Easy to use

 Not very expensive

 Moves the cursor faster than the arrow keys of the keyboard.

Joystick

Joystick is also a pointing device, which is used to move the cursor


position on a monitor screen. It is a stick having a spherical ball at its
both lower and upper ends. The lower spherical ball moves in a socket.
The joystick can be moved in all four directions.

The function of the joystick is similar to that of a mouse. It is mainly


used in Computer Aided Designing (CAD) and playing computer
games.
Output Unit

The output unit consists of devices with the help of which we get the
information from the computer. This unit is a link between the
computer and the users. Output devices translate the computer's output
into a form understandable by the users.

Following are some of the important output devices used in a computer.

 Monitors

 Graphic Plotter

 Printer

Monitors

Monitors, commonly called as Visual Display Unit (VDU), are the


main output device of a computer. It forms images from tiny dots,
called pixels that are arranged in a rectangular form. The sharpness of
the image depends upon the number of pixels.

There are two kinds of viewing screen used for monitors.

 Cathode-Ray Tube (CRT)

 Flat-Panel Display
Cathode-Ray Tube (CRT) Monitor

The CRT display is made up of small picture elements called pixels.


The smaller the pixels, the better the image clarity or resolution. It takes
more than one illuminated pixel to form a whole character, such as the
letter ‘e’ in the word help.

A finite number of characters can be displayed on a screen at once. The


screen can be divided into a series of character boxes - fixed location on
the screen where a standard character can be placed. Most screens are
capable of displaying 80 characters of data horizontally and 25 lines
vertically.
Printers

Printer is an output device, which is used to print information on paper.

There are two types of printers −

 Impact Printers

 Non-Impact Printers

Impact Printers

Impact printers print the characters by striking them on the ribbon,


which is then pressed on the paper.

Characteristics of Impact Printers are the following −

 Very low consumable costs

 Very noisy

 Useful for bulk printing due to low cost

 There is physical contact with the paper to produce an image

These printers are of two types −

 Character printers

 Line printers

Character Printers
Character printers are the printers which print one character at a time.

These are further divided into two types:

 Dot Matrix Printer(DMP)

 Daisy Wheel

Dot Matrix Printer

In the market, one of the most popular printers is Dot Matrix Printer.
These printers are popular because of their ease of printing and
economical price. Each character printed is in the form of pattern of
dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9)
which come out to form a character which is why it is called Dot Matrix
Printer.
// Discuss how computer affects your life.

Computers and its uses grew rapidly and widely through out the world.
They are used to deal with many tasks due to their various potential. It
helps to resolve problems human life encounters in daily life. Therefore,
they have more influence on our life. The impact of computer usage on
our life obviously identified as Savings of Money, Time and Effort. To
understand the depth of computer intervention in human life, have a look
at developments happened in the areas of Communication, Education,
Utility facilities and Health care.
Within the last 3 decades, computer has been recognized as the most life
changing and successful invention solving problems in human life.
Today, where business caters, there you find applying computer usage.
Look at educational sector, health, transportation, or communication
sector, we can see the influence and application of computer. It's
difficult to survive a business without adopting computer usage either
directly or indirectly in this modern world.

The subject "Computer and Human Life" has become one of the most
interesting subject in schools and colleges. Thus, in many essays and
group discussions, particularly in schools and colleges, students are
often asked to write "How have computers changed our life?" or
"Influence of Computers in Human Life".

Computer has been intervened to every sphere of human life such as


Mobile phones, TV shows, Supermarkets, Hospitals, Railways,
Matrimonial, Share Tradings, Online Purchasing, Banking, Sports,
Traffic controls, Security Surveillance systems, Job Recruitment,
Robotics, Machine Learning, Artificial Intelligence etc. are a few of
them, perhaps difficult to list all.

1. COMPUTER AND HUMAN LIFE CORRELATED WITH


COMMUNICATION
Computer can bring people closer together and facilitate contacts
between them using Email, Chatting, Videoconferencing, Mobile
Phones and Social Medias. It saves time, efforts and money compared
with letters used, before making influence of computers in human life.
These days, we seldom use hand written letters, put in the envelopes and
transport over long distances because most of us have computer and
education to make use of it.

Print media, Television and Radio play important role in our life. They
too have influence of computers from production, control, storage and
broadcasting. Using computers we are able to create a document, display
it on screen, modify and print it on a printer or publish in front of the
world through world wide web. Computer connected with internet has
ability to publish ideas, thoughts, criticism etc, instantly across the
world. Social networking sites
like, Facebook, Twitter, blogger, Youtube, Whatsapp etc. opens another
sophisticated yet easy to use viral communication, reveals the
importance of computer and human life. If it is not exaggerated, our
younger generation has become addicted to use these modern tools. A
majority of college students cannot have a day without login to at least
one social networking site.

2. INFLUENCE OF COMPUTER IN EDUCATION


No doubt! Computer has made massive makeover in education field.
Three decades ago, if anyone has a doubt to be clarified in a learning
process, finding right expert itself was a cumbersome task and there may
not be available further opinion about the subject. Although the different
and more easiest clarification or solution are available on the other side
of the world, we were unable to know its whereabouts because lack of
communication. In this modern world, our "Guru" as all we know is
"Google search" being evolved as Human Assist adopting Artificial
Intelligence (the latest trends in Computer application).

Table
t PC for Education

In education sector, teaching and learning reached new highs after


started using computers in our life. We can find answers virtually on any
subjects in a moment, and can communicate this information to number
of ways in real time. Needless to say, we can see every educational
institution has interaction of students with computers and most of them
are equipped with smart class rooms.
The invention of tablet computer made smooth transition to student with
computer from heavy bags carrying books and other learning
accessories.

Libraries have gone digital as well, so the public have access larger


amount of information virtually anywhere. Connecting to
the internet gives us access to worlds of information right at our
fingertips and anywhere. Distant education through online and online
exams are getting more popular and becomes the paradigm of the higher
education.

3. A NEW ERA IN EDUCATION - MOOC


Most of the universities offer distant education and exams using online
channels to their students in which many famous universities have made
tie-ups with MOOC providers. MOOCs become a paradigm in the heart
of real knowledge seekers who gets new horizon to the world of learning
with learner's convenience.

WHAT IS MOOC?

MOOC is the acronym for Massive Open Online Course. The title itself
declare that learner has to be online for MOOC's course, ie., connected
through internet. It taught by various universities all around the world
with the help of MOOC technology. MOOCs are available (both free
and paid) for anyone with an internet connection, time and thirst for
knowledge. Some of the popular MOOC providers
include Coursera, edX, Udacity, and FutureLearn partnered with
universities, companies, and professors to provide MOOCs. A learner
has to signup with MOOC technology provider's website or mobile
application prior joining a course.

EDUCATION THROUGH MOOC

Some popular universities partnered with online education providers, for


example, Coursera, Khanacademy are famous among them. More and
more universities added day by day to Massive Open Online Course
(MOOC) concept in education. It brings learning process to the learner's
convenience as well as unlimited participants.

MOOC course
4. INFLUENCE OF COMPUTER IN UTILITY FACILITIES
Computer also facilitate comfort to our life and provides convenience.
For transportation, it facilitate the way people travel. Airways,
Roadways and waterways uses computers to control their operation. It
saves time and relieve severity of traveling difficulties.

GPS and map application permits us to go virtually anywhere in the


world without fear and deviation. If we straggled in a city or desolated
place, these technology help us reaching exactly where we want to
be. Google Map capable to predict time required, traffic conditions,
traffic block, weather status and sometimes, giving vital advises and
alerts about the roads and destinations we are traveling. GPS enabled
map devices have become a standard equipment in modern vehicles.

Other utility facilities like Electricity, Water, Agriculture, etc. are more
sophisticated and improved by computer influence.

Computer simplifies Security and Monitoring system using access


control and CCTV surveillance system. It helps bringing down robbery,
theft and violence in sensitive areas. Most of the educational institutions,
industries, offices, shops, traffic signals, railway stations, trains have
equipped these facilities.

5. COMPUTER BRINGS TREMENDOUS PROGRESS IN


HEALTH CARE SECTOR
Computers provide potential for improving the effectiveness of medical
care. It uses storing data of hospital such as patient data and medical
information. Doctors and nurses can access to this data easier which
resulted in decreasing the process of time. In addition, many operations
are no longer manually perform, rather computers are used to manage
these tasks.

6. LATEST TRENDS AND NEAR FUTURE EXPECTATIONS BY


COMPUTERS
While discussing changes computer has made in human life, it's worth
mentioning the changes computer bring in the near future. Some of the
predicted changes are of Artificial Intelligence (AI), Machine Learning
(ML), Interest Based Education, 3D Printing, Driver-less Vehicles and
Space Traveling.

ARTIFICIAL INTELLIGENCE (AI)

Artificial intelligence takes over work places of repetitive jobs, reduce


human intervention upto the end of job cycle. Minimum or nil
supervision and management for production units. Factories will be
transformed into one single machine that accept raw material at one
point and the other point receives output of finished products. In
between there won't be any kind of human work force, supervision or
management employees.
MACHINE LEARNING (ML)

Machines are being capable to learn new things to accomplish what


humans want to get it done. It will be task based learning that machines
become smarter devices human wanted to make use of.

INTEREST BASED EDUCATION

New dimensions and methods will be adopted for teaching and learning.
In our traditional system, most learners taught the subject they never
liked or interested. A few of them are lucky mastering subjects they
loved or interested. In the near future, computer can predict which is the
flair subject a person can learn and interact actively. This way education
will be more smarter than ever.

3D PRINTING

3D printing sweepstakes in the small scale manufacturing industry. Once


3D printing become affordable and common, it will badly affect
traditional small scale manufacturers.

CONCLUSION TO "HOW HAVE COMPUTERS CHANGED


OUR LIFE"
To conclude, computers have changed our life beyond imagination and
continue to play important role on human life and behaviors. It provides
advanced facilities for our life and also create effective learning,
production, control and utilization.
// What is a computer virus? Discuss the types of viruses in
detail and how you will deal with them.

A computer virus is a malicious piece of computer code designed to


spread from device to device. A subset of malware, these self-copying
threats are usually designed to damage a device or steal data.

Think of a biological virus – the kind that makes you sick. It’s
persistently nasty, keeps you from functioning normally, and often
requires something powerful to get rid of it. A computer virus is very
similar. Designed to replicate relentlessly, computer viruses infect your
programs and files, alter the way your computer operates or stop it from
working altogether.

Various types of viruses:

File Virus:

This type of virus infects the system by appending itself to the end of a
file. It changes the start of a program so that the control jumps to its
code. After the execution of its code, the control returns back to the main
program. Its execution is not even noticed. It is also called a Parasitic
virus because it leaves no file intact but also leaves the host functional.
Boot sector Virus:

It infects the boot sector of the system, executing every time system is
booted and before the operating system is loaded. It infects other
bootable media like floppy disks. These are also known as memory
viruses as they do not infect the file systems.

Macro Virus:

Unlike most viruses which are written in a low-level language(like C or


assembly language), these are written in a high-level language like
Visual Basic. These viruses are triggered when a program capable of
executing a macro is run. For example, the macro viruses can be
contained in spreadsheet files.

Source code Virus:

It looks for source code and modifies it to include virus and to help
spread it.

Resident Virus
A resident virus stores itself on your computer’s memory which allows it
to infect files on your computer. This virus can interfere with your
operating system leading to file and program corruption.

Polymorphic Virus:

A virus signature is a pattern that can identify a virus(a series of bytes


that make up virus code). So in order to avoid detection by antivirus a
polymorphic virus changes each time it is installed. The functionality of
the virus remains the same but its signature is changed.

Encrypted Virus:

In order to avoid detection by antivirus, this type of virus exists in


encrypted form. It carries a decryption algorithm along with it. So the
virus first decrypts and then executes.

Stealth Virus:
It is a very tricky virus as it changes the code that can be used to detect
it. Hence, the detection of viruses becomes very difficult. For example, it
can change the read system call such that whenever the user asks to read
a code modified by a virus, the original form of code is shown rather
than infected code.

Tunneling Virus:

This virus attempts to bypass detection by antivirus scanner by installing


itself in the interrupt handler chain. Interception programs, which remain
in the background of an operating system and catch viruses, become
disabled during the course of a tunneling virus. Similar viruses install
themselves in device drivers.

Multipartite Virus:

This type of virus is able to infect multiple parts of a system including


the boot sector, memory, and files. This makes it difficult to detect and
contain.
Armored Virus:

An armored virus is coded to make it difficult for antivirus to unravel


and understand. It uses a variety of techniques to do so like fooling
antivirus to believe that it lies somewhere else than its real location or
using compression to complicate its code.

Browser Hijacker:

As the name suggests this virus is coded to target the user’s browser and
can alter the browser settings. It is also called the browser redirect virus
because it redirects your browser to other malicious sites that can harm
your computer system.

How to Deal with Viruses


Step 1: Use a reliable antivirus program

If you already have antivirus software installed on your computer and it


still got infected with a virus, the software you were using is most likely
unreliable. Uninstall it, and get a new one. You can download one online
or buy an installer from your local tech shop. Either way, it’s best to get
the paid version of your preferred program rather than its free
counterpart, so that you can get access to its full host of features.

Some of the best antivirus software programs in the market right now
include Norton Security, McAfee Antivirus, Kaspersky Anti-
Virus, Bitdefender, and Webroot.

Step 2: Scan your computer

A wide variety of malicious programs exist today, and some of the most
common include trojans, viruses, worms, and ransomware. In order to
check if your computer is actually infected with any of these (as well as
identify which of them may have infected your computer), perform a full
scan of your computer using your new antivirus software, and make sure
that the antivirus is fully updated before you start the scan.

This may take a while, depending on the number of files on your


computer and the number of drives on it, so be patient. Once it’s done,
you’ll know exactly which file on which drive is infected.
Step 3: Remove the malware

Once your software identifies the infection, it will provide you with
prompts on how to treat it. Antivirus programs all have different
methods, but some of the most common options include permanent
deletion of the virus or storing it in a secure folder (a.k.a. “quarantine”)
where it won’t be able to cause more damage.

Step 4: Stop future infections

When it comes to virus protection, prevention is always better than cure.


You can prevent your computer from getting infected by taking these
precautionary measures:

Perform scans using your antivirus software at regular intervals. Most


programs have the option to schedule automatic scans based on your
preferred degree of frequency: daily, weekly, bi-weekly, and so on.

Do not open suspicious-looking emails. They could be infected with


spyware.

Only visit secure websites. (URLs beginning with https://)

Download Virtual Private Network (VPN) software. You’re probably


wondering: “Does VPN protect against viruses?” A VPN encrypts your
online traffic, which means hackers won’t be able to inject malware into
your systems through an insecure connection.

You might also like