Ict Projectwork by Henry

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

ICT PROJECTWORK BY HENRY (22/11/2023.

STORAGE DEVICES.

STORAGE DEVICES are devices that store information either permenently or temporarily.

WE have four types of storage devices.

1. Primary Storage Devices: These are also known as internal memory and main memory.
This is a section of the CPU that holds program instructions, input data, and intermediate
results. It is generally smaller in size. RAM (Random Access Memory) and ROM (Read
Only Memory) are examples of primary storage1.
2. Secondary Storage Devices: Secondary storage is a memory that is stored external to the
computer. It is mainly used for the permanent and long-term storage of programs and
data. Hard Disks, CDs, DVDs, Pen/Flash drives, SSD, etc, are examples of secondary
storage1.
3. Tertiary Storage Devices: Tertiary Memory is a type of Memory that is rarely used in
personal computers and due to this, tertiary memory is not considered to be an important
one. Tertiary memory works automatically without human intervention1.
4. Cloud and Virtual Storage: Storing data online and in cloud storage is becoming
popular as people need to access their data from multiple devices2.
The sequence of events in processing information, which includes (1) input, (2) processing, (3)
storage and (4) output. The input stage can be further broken

We have four information processing cycle stages.

: A computer program that can copy itself and infect a computer without permission or
knowledge of the user. Vital Information Resources Under Siege

 Browser Hijacker. ...


 Web Scripting Virus. ...
 Boot Sector Virus. ...
 Polymorphic Virus. ...
 Resident Virus. ...
 Multipartite Virus
An antivirus product is a program designed to detect and remove viruses and other kinds of
malicious software from your computer or laptop

 Bitdefender: Best Overall.


 Avira: Best Value for Your Money.
 AVG: Best for Solo Entrepreneurs.
 McAfee: Best for Multi-Device Protection.
 Malwarebytes: Best for Real-Time Protection.
 Avast: Best for Remote Workers.
 F-Secure: Best for Plan Customization.
 G DATA: Best for Comprehensive Features.

You might also like