Escolar Documentos
Profissional Documentos
Cultura Documentos
ml
“Assignment Sample of computer fundamental for even student”
Microprocessor
A microprocessor (sometimes simply referred to as a processor) is an integrated circuit
designed to process instructions. It is the most important, and usually the most expensive,
Component of a computer.
• Optical discs are portable and can be read on many different devices
• Very inexpensive
• Memory is retained even when the power is turned off
• Durable and last a long time
• Archived data cannot be overwritten on read only CD-R, DVD-R, BD-R formats
• Can random access data no matter where or when it was stored
Disadvantages of Optical Storage Devices
• Require special drives to read/write.
• Compared to other storage devices they have little storage
• Can be expensive per GB/TB
• There are compatibility issues with different drives
• Lack of standards for grading quality and for longevity tests
• You can write once on read only CD-R, DVD-R, BD-R formats
Solid State Storage Device (SSD)
Solid state drives use flash memory and could possibly make conventional hard drives
obsolete. They are compatible with SATA or SAS, and use standard form factors of 3.5-, 2.5-
or 1.8-inch.
Benefits of Solid State Storage Devices
Solid State Storage Devices are durable, reliable, have a long service life and they can rewrite
and erase data very often.
Advantages of Solid State Storage Devices
• Startup faster due to no spin-up and they are faster than magnetic hard drives
• When seeks on the hard disk seeks are limited they have faster launch times
• They last longer and some are waterproof
• All data stored can be scanned quickly for security purposes
Disadvantages of Solid State Storage Devices
• Solid State Storage devices are expensive
• Vulnerable to abrupt power loss, magnetic fields, and electrical and static charges
• Limited writes cycles wear out after 100,000-300,000
2
Downloaded from http://cse1822.ml Created by Muneeb Mushtaq
Downloaded from http://cse1822.ml
• High endurance
• Larger erase blocks make random write speeds slow
3) Compare and contrast the technologies and applications for ink jet, laser, and dot matrix
printers?
Keep visiting website http://cse1822.ml for answer answer will be soon uploaded
4) List ways you can protect your computer system hardware from theft and damage?
1) During the day, it is imperative to use a security cable to lock down portable equipment, such
as a laptop, even while working on them. A security cable will discourage a casual thief who
walks by. They aren't foolproof since they can be cut with the right tools, but they will slow
down a thief.
2) Do NOT rely on a security cable overnight! Instead, store portable devices in a locked cabinet
overnight and during weekends/holidays. Don't leave a spare key in your office even if it's
hidden! If you need a lockable cabinet, talk to Facilities Services. Don't take equipment home
as a security measure--only do this if you need to work from home.
3) Lock down other valuable equipment such as desktop computers, scanners and printers. Lock
equipment to large, immobile objects and make sure the cable can't be slipped off or easily
removed by taking apart furniture.
4) Keep doors and windows locked when not in your office. Don't leave computer equipment in
plain sight of windows.
5) For personal equipment, mark your contact information permanently on the device. Etchers
are available from Community Safety.
6) Make note of the serial numbers of your personal equipment and keep it in a safe place so you
can easily report it to the police.
7) Disable auto-login and password protect your screen saver or log out of your computer when
not in use.
5) List at least ten functions performed by utilities included with Windows and Mac
operating systems?
In MacOS:
1) Activity monitor
2) AppleScript and Automator
3) Boot camp Assistant
4) Digital Color Meter
5) Disk Utility
In Windows OS:
1) Backup
2) Character map
3) Disk cleanup
4) Disk defragmenter
5) Security center
3
Downloaded from http://cse1822.ml Created by Muneeb Mushtaq
Downloaded from http://cse1822.ml
6) Describe three ways that word processing software can help improve your writing?
1) Thesaurus:
Your word processing software is likely to include a thesaurus, which can help you find a
synonym for a word so that you can make your writing more varied and interesting.
2) grammar checker:
A grammar checker reads through your document and points out potential grammatical
trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with
nouns.
3) Spelling Checker:
Most word processing software includes a spelling checker that marks misspelled
words in a document. You can easily correct a misspelled word as you type, or you can run
the spelling checker when you finish entering all the text.
7) List at least six key features of presentation software?
Presentation software highlights include:
1) Bulleted lists to summarize the points in your presentation
2) Graphics to make your presentation visually interesting
3) Transitions between slides to keep your audience’s attention
4) Speaker notes to help you remember what to say
5) Themes and templates to give your slides a professional appearance
6) Conversion routines to package presentations as PDF files and YouTube videos
8) List and describe the two main types of files included in a local software installation?
.exe file (Executable file):
Component of a software package is an executable file designed to be started by users
or automatically launched by the operating system. On PCs, these programs are sometimes
referred to as EXE files (pronounced “E-X-E”) because of the .exe file extension appended to
the program name. For example, the main executable file for Microsoft Word would be called
Word.exe. For Macs, the executable program usually has an .app file extension. Microsoft
Word running on a Mac would be called Word.app.
.dll file (dynamic link library file):
DLL files, also called Dynamic Link Libraries, contain a collection of executable
functions and information that can be used by a variety of Windows programs. A .DLL
file cannot run on its own. It is loaded and used by a program executable (EXE file), so
you should not try to run them on their own.
6
Downloaded from http://cse1822.ml Created by Muneeb Mushtaq
Downloaded from http://cse1822.ml
Overhead Costs
Depending on the storage requirements, consumers might have to invest, but it’s a one-time
expenditure which is usually considered as an asset. Firms with lower IT budgets usually opt
for procurement of hard drives as it’s an investment which is one time. This is quite the
opposite if you’ve signed up for storage as service wherein an invoice pops-up every month.
Security of Devices
Be it physical or digital, security is one of the most crucial aspects in both storage types.
Most users with no technical background wouldn’t usually understand the risks associated
with the transfer of files via. an insecure medium. For that reason file/data
encryption before transfers is strongly recommended.
We are well aware of the risks associated over the Internet, though scammers and fraudsters
usually pose an increased risk during festive seasons, yet one must stay protected otherwise
too. For online transfers, use of secure encrypted mediums can be a key to keeping your data
safe from thefts.
8
Downloaded from http://cse1822.ml Created by Muneeb Mushtaq
Downloaded from http://cse1822.ml
The Cost Factor
As referred earlier, users get an advantage with using Cloud wherein they are only changed
basis of the consumed resources. Eventually with time the data increases too, adding more to
the expenditure. Therefore in order to keep the cost under control, one may choose to
segregate the data based on its sensitivity and keep only which is utmost essential, while the
back dated data can be stored over a local storage.
9
Downloaded from http://cse1822.ml Created by Muneeb Mushtaq