Professional Documents
Culture Documents
Computer Motherboard Components and The Functions, Manufactures & Others
Computer Motherboard Components and The Functions, Manufactures & Others
There once was an attempt to extend ISA into a 32-bit bus, called Extended Industry Standard
Architecture (EISA). The attempt wasn’t very successful and the EISA was largely replaced by the
later VESA Local Bus and the PCI bus.
11. Parallel port
A parallel port is a kind of interface for attaching peripherals on desktops. The name of this kind of
port is derived from the way the data is sent. That is, the parallel ports send multiple bits of data
at the same time. Serial interfaces, on the contrary, send bits one data at once. To achieve parallel
data transfer, there are multiple data lines in the parallel port cables. The parallel port cable is
larger than the cable of a contemporary serial port, which only has one data line within.
Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub. Hub
distributes this request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to transfer the
data to another device. A switch is better than Hub as it does not broadcast the message
over the network, i.e., it sends the message to the device for which it belongs to. Therefore,
we can say that switch sends the message directly from source to the destination.
A computer network can be categorized by their size. A computer network is mainly of four
types:
LAN(Local Area Network)
o PAN(Personal Area Network)
o MAN(Metropolitan Area Network)
o WAN(Wide Area Network)
There are three primary ways an email virus can infect a victim's email and computer:
1. via a phishing email
2. included in an attachment
3. embedded within the email body
Email viruses often look like executable files with extensions such as the following:
.exe,.dll,.com,.bat,.cmd,.pif,.scr,.dot,.xls,.xlt,.docm,.pdf,etc
What Is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of
security rules.
They establish a barrier between secured and controlled internal networks that can
be trusted and untrusted outside networks, such as the Internet.
A firewall can be hardware, software, or both.
Protect my PC from viruses
Don't open email messages from unfamiliar senders, or email attachments that you
don't recognize -
Use a pop-up blocker with your internet browser -
If you're using Microsoft Edge, make sure SmartScreen is turned on -
Pay attention to Windows SmartScreen notifications -
Keep Windows updated -
Use your internet browser's privacy settings -
Make sure User Account Control (UAC) is turned on -
Make sure that Tamper Protection is turned on -
What is Cybercrime?
Cybercrime is defined as an unlawful action against any person using a computer, its
systems, and its online or offline applications.
It occurs when information technology is used to commit or cover an offense.
However, the act is only considered Cybercrime if it is intentional and not accidental.
Example of Cybercrime
Here, are some most commonly occurring Cybercrimes:
The fraud did by manipulating computer network
Unauthorized access to or modification of data or application
Intellectual property theft that includes software piracy
Industrial spying and access to or theft of computer materials
Writing or spreading computer viruses or malware
Digitally distributing child pornography
Cybercrime Attack Types
Cybercrime can attack in various ways. Here, is some most common cybercrime attack
mode:
Hacking:
It is an act of gaining unauthorized access to a computer system or network.
Denial Of Service Attack:
In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills
their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.
Software Piracy:
Theft of software by illegally copying genuine programs or counterfeiting. It also includes
the distribution of products intended to pass for the original.
Phishing:
Pishing is a technique of extracting confidential information from the bank/financial
institutional account holders by illegal ways.
Spoofing:
It is an act of getting one computer system or a network to pretend to have the identity of
another computer. It is mostly used to get access to exclusive privileges enjoyed by that
network or computer