Sabado, Agosto 13, 2011

ans. of Quiz 9

1. Define the term, computer security risks, and briefly describe the types 
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, 
unethical employee, cyber-extortionist, and cyberterrorist. 
ans.
       Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators.

Hacker- refers to a computer programmer who is able to create usable computer programs where none previously existed. 
Cracker- is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
Script kiddy- is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities.
Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyber-extortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.

2. Describe various types of Internet and network attacks (computer viruses, 
worms, Trojan horses, root kits, botnets, denial of service attacks, back 
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots. 
ans.
      A computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
A worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate program.
A root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
To take precautions against this malware:
1. Do not start a computer with removable media in the drives or ports.
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source.
4. Install an antivirus program and a personal firewall.
5. Stay informed about any new virus alert or virus hoax.
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.


3. Discuss techniques to prevent unauthorized computer access and use.
ans.
      Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.


4. Identify safeguards against hardware theft and vandalism.
ans.
      Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.


5. Explain the ways software manufacturers protect against software piracy. 
ans.
      Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explain why it is necessary.
ans.
      Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.


7. Discuss the types of devices available that protect computers from system failure. 

ans.
      A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.

8. Explain the options available for backing up computer resources. 
ans.
      A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.

9. Identify risks and safeguards associated with wireless communications. 
ans.
     Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.

10. Discuss ways to prevent health-related disorders and injuries due to
computer use. 
ans.
     A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CPS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 
ans.
     Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
ans.
     Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following.  
An electronic profile combines data about an individual's Web use with data from public sources, which then is sold.
A cookie is a file that a Web server stores on a computer to collect data about the user.
Spyware is a program placed on a computer that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window.
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information.
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web.

Miyerkules, Agosto 10, 2011

ans. of Quiz. 8

1. A database is an organized collection of data for one or more purposes, usually in digital form. database implies that the data is managed to some level of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn often implies the use of a general-purpose Database management system (DBMS).
 
2. File maintenance technique refers to the procedures that keep data current. Validation technique is the process of comparing data with a set of rules or values to find out if the data is correct.
 
3.
  • Character it can be a number, letter,punctuation mark and other symbols.
  • Field it is a combination of related character or bytes.
  • Record is a group of files.
  • File is a collection of related records stored in a storage medium.

4.A data dictionary, as defined in the IBM Dictionary of Computing, is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.". A File maintenance is a data-processing operation in which a master file is updated on the basis of one or more transaction files. A Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. A backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
 
5. In File processing approach each department or area within an organization has its own set of data files.Two major weaknesses of file processing systems are redundant data and isolated data while in Database approach many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.

6.
  • Relational database, stores data in tables that consists of rows and columns. Each row has a primary key and each column has a unique name.
  • Object-oriented database (OODB) stores data in objects;often use an object query language to manipulate and retrieve data.
  • Multidimensional database stores data in dimensions;allows users to access and analyze any view of the database data and no standard query language exists.
7. A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.

8.Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

  • Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed.
  • Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
  • Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 
  • Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
  • Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
  • Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
  • Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
9. Database Analysts and Database Administrators are responsible for managing and coordinating all database activities.
Database Analysts (DA) - focuses on the meaning and usage of data. The DA decides on the placement of fields, defines the relationships among data, and identifies user's access privilege.
Database Administrators (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages data security, monitors database performance, and checks backup and recovery procedures.

Lunes, Hulyo 25, 2011

ans. of Quiz 7

1. Discuss the components required for successful communications.
  • Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. Successful communications requires a sending device that initiates a transmission instruction, a communications device that connects the sending device to a communications channel, acommunications channel on which the data travels, a communications device that connects the communications channel to a receiving device, and a receiving device that accepts the transmission of data, instructions, or information.
2. Identify various sending and receiving devices.

  • Sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.Micrucomputers, minicomputersand mainframes all can serve as sending and receiving devices.
3. Describe uses of computer communications.



  • Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today's computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations.


  • Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.


                                                                                                                                                                                    
4. List advantages of using a network.
  • Speed. Sharing and transferring files within Networks are very rapid. thus saving time, while maintaining the integrity of the files.
  • Cost. Individually licensed copies of many popular software programs can be costly. Networkable versions are available at considerable savings. Shared programs, on a network allows for easier upgrading of the program on one single file server, instead of upgrading individual workstation.
  • Security. Sensitive files and programs on a network are passwords protected or designated as "copy inhibit," so that you do not have to worry about illegal copying of programs.
  • Centralized Software Management. Software can be loaded on one computer (the file server) eliminating that need to spend time and energy installing updates and tracking files on independent computers throughout the building.
  • Resource Sharing. Resource such as, printer, fax machines and modems can be shared.
  • Electronic Mail. E-mail aids in personal and professional communication Electronic mail on a LAN can enable staff to communicate within the building having to leave their desk.
  • Flexible Access. Access their files from computers throughout the firm.
  • Work group Computing. Workgroup software (such as Microsoft BackOffice) allows many users to work on a document or project concurrently.
  • A network is a collection of computers and devices connected together via communications devices and transmission media. Advantages of using a network include facilitating communications, sharing hardware, sharing data and information, sharing software, and transferring funds.

5. Differentiate among client/server, peer-to-peer, and P2P networks.

  • server a computer program running to serve the needs or requests of other programs (referred to in this context as "clients") which may or may not be running on the same computer. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application.
6. Describe the various network communications standards.

  • Network communication standards are certain rules and specifications framed by standard organizations for manufacturing network hardware and developing network software.

7. Explain the purpose of communications software.



9. Describe commonly used communications devices.


10. Discuss different ways to set up a home network.

Sabado, Hulyo 23, 2011

ans: of Quiz. 5

1. A storage device is a hardware device capable of storing information. There are two storage devices used in computers; a primary storagedevice such as computer RAM and a secondary storage device such as a computer hard disk drive. In the picture to the right, is an example of a Drobo, an external secondary storage device. In computers, a storage medium is any technology (including devices and materials) used to place, keep, and retrieve data. A medium is an element used in communicating a message; on a storage medium, the "messages" - in the form of data - are suspended for use when needed. The plural form of this term is storage media. Although the term storage includes both primary storage (memory), a storage medium usually means a place to hold secondary storage such as that on a hard disk or tape.
2. A tape drive is a data storage device that reads and writes data on amagnetic tape. It is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and long archival stability.
A tape drive provides sequential access storage, unlike a disk drive, which provides random access storage. A disk drive can move its read/write head(s) to any random part of the disk in a very short amount of time, but a tape drive must spend a considerable amount of time winding tape between reels to read any one particular piece of data. As a result, tape drives have very slow average seek times. Despite the slow seek time, tape drives can stream data to and from tape very quickly. For example, popular Linear Tape-Open drives can reach, as of 2010, continuous data transfer rates of up to 140 MB/s, which is comparable to hard disk drives.
3. solid-state drive (SSD) is a data storage device that uses solid-state memoryto store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive. SSDs are distinguished from traditionalhard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read/write heads.memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras,mobile phoneslaptop computersMP3 players, and video game consoles. They are small, re-recordable, and able to retain data without power.USB flash driveconsists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy dis ExpressCard is an interface to allow peripheral devices to be connected to a computer, usually a laptop computer. Formerly called NEWCARD, the ExpressCard standard specifies the design of slots built into the computer and of cards which can be inserted into ExpressCard slots. The cards contain electronic circuitry and connectors to which external devices can be connected. The ExpressCard standard replaces the PC Card (also known as PCMCIA) standards.
4. The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio CD players have been commercially available since October 1982.Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression. The product is aimed at consumers. Software to view and perform simple edits to images is included on the CD.DVD is an optical disc storage media format, invented and developed byPhilipsSonyToshiba, and Panasonic in 1995. DVDs offer higher storage capacity than compact discs while having the same dimensions.Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede theDVD format. The disc diameter is 120 mm and disc thickness 1.2 mm plasticoptical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB (23.31GiB) per layer, with dual layer discs (50 GB), the norm for feature-length video discs. Triple layer discs (100 GB) and quadruple layers (128 GB) are available for BD-XL Blu-ray re-writer drives. Currently movie production companies have not utilized the triple or quadruple layer discs, most consumers owned Blu-ray players will not be able to read the additional layers, while newer Blu-ray players may require a firmware update to play the triple and quadruple sized discs.
5. An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer and range from small inexpensive consumer models to very large professional machines that can cost up to thousands of dollars.laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. As with digital photocopiers and multifunction printers(MFPs), laser printers employ a xerographic printing process, but differ from analog photocopiers in that the image is produced by the direct scanning of alaser beam across the printer's photoreceptor.An MFP (Multi Function Product/Printer/ Peripheral), multifunctionalall-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small businesssetting (the SOHO market segment), or to provide centralized document management/distribution/production in a large-office setting.thermal printer (ordirect thermal printer) produces a printed image by selectively heating coatedthermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image. Two-color direct thermal printers can print both black and an additional color (often red) by applying heat at two different temperatures.

ans: of Quiz. 3


1. Output is data that has been processed into a useful form called information. Four types of output are text, graphics, audio, and video. Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. Graphics are digital representations of nontext information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). Audio is music, speech, or any other sound. Video consists of images played back at speeds to provide the appearance of full motion. An output device is any computer component capable of conveying information to a user.
2.liquid crystal display (LCD) is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals (LCs). LCs do not emit light directly.

They are used in a wide range of applications, including computer monitorstelevision, instrument panels, aircraft cockpit displayssignage, etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have displaced cathode ray tube (CRT) displays in most applications. They are usually more compact, lightweight, portable, less expensive, more reliable, and easier on the eyes.[citation needed] They are available in a wider range of screen sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image burn-in.
Plasma displays are bright (1,000 lux or higher for the module), have a wide color gamut, and can be produced in fairly large sizes—up to 150 inches (3.8 m) diagonally. They have a very low-luminance "dark-room" black level compared to the lighter grey of the unilluminated parts of an LCD screen (i.e. the blacks are blacker on plasmas and greyer on LCDs). LED-backlit LCD televisions have been developed to reduce this distinction. The display panel itself is about 6 cm (2.5 inches) thick, generally allowing the device's total thickness (including electronics) to be less than 10 cm (4 inches). Plasma displays use as much power per square meter as a CRT or an AMLCD television. Power consumption varies greatly with picture content, with bright scenes drawing significantly more power than darker ones – this is also true of CRTs. Typical power consumption is 400 watts for a 50-inch (127 cm) screen. 200 to 310 watts for a 50-inch (127 cm) display when set to cinema mode. Most screens are set to 'shop' mode by default, which draws at least twice the power (around 500–700 watts) of a 'home' setting of less extreme brightness. Panasonic has greatly reduced power consumption ("1/3 of 2007 models"). Panasonic states that PDPs will consume only half the power of their previous series of plasma sets to achieve the same overall brightness for a given display size. The lifetime of the latest generation of plasma displays is estimated at 100,000 hours of actual display time, or 27 years at 10 hours per day. This is the estimated time over which maximum picture brightness degrades to half the original value.
Plasma display screens are made from glass, which reflects more light than the material used to make an LCD screen. This causes glare from reflected objects in the viewing area. Companies such as Panasonic coat their newer plasma screens with an anti-glare filter material. Currently, plasma panels cannot be economically manufactured in screen sizes smaller than 32 inches. Although a few companies have been able to make plasma EDTVs this small, even fewer have made 32in plasma HDTVs. With the trend toward larger and larger displays, the 32in screen size is rapidly disappearing. Though considered bulky and thick compared to their LCD counterparts, some sets such as Panasonic's Z1 and Samsung's B860 series are as slim as one inch thick making them comparable to LCDs in this respect.
High-definition television (or HDTV) is video that has resolutionsubstantially higher than that of traditional television systems (standard-definition TV, or SDTV, or SD). HDTV has one or two million pixels per frame, roughly five times that of SD. Early HDTV broadcasting used analog techniques, but today HDTV is digitally broadcast using video compression.
3. The system unit, sometimes called the chassis, is a box-like case housing the electronic components of a computer that are used to process data. System unit components include the processor, memory module, cards, ports, and connectors. Many of the system unit’s components reside on a circuit board called the motherboard. The motherboard contains many different types of chips, or small pieces of semi conducting material, on which one or more integrated circuits (IC) are etched. An integrated circuit is a microscopic pathway capable of carrying electronic current. Each IC can contain millions of transistors, which act as switches for electronic signals.
4. 

Control unit is responsible for supervising the operation of the entire computer system.

·         Arithmetic/logic unit (ALU) provides the computer with logical and computational capabilities.

·         Register is a storage location inside the processor.

5. bit (a contraction of binary digit) is the basic unit of information incomputing and telecommunications; it is the amount of information stored by a digital device or other physical system that exists in one of two possible distinct states.
When the user presses any letter using the keyboard the electronic signal from that letter is sent to the system unit. Then the system unit converts it to its binary code and stored in memory for processing. After processing the binary code for that particular letter is converted to an image and displayed on the output device(monitor).
6. Word Processing Software allows users to create, edit a document. Example: MS Word, Word Pad etc.
Spreadsheet Software allows users to create document and perform calculation. Example: Excel, Lotus1-2-3 etc.
Database Software allows users to store and retrieve vast amount of data. Example: MS Access, MySQL, Oracle etc.
Presentation Graphic Software allows users to create visual presentation. Example: MS Power Point
Multimedia Software allows users to create image, audio, video etc. Example: Real Player, Media Player etc.
7. People use productivity software to become more effective and efficient while performing daily activities. Word processingsoftware allows users to create and manipulate documents that contain text and graphics. With word processing software, you can insert clip art into a document; change marginsfind and replacetext; use a spelling checker to check spelling; place a header andfooter at the top and the bottom of a page; and vary font(character design), font size (character scale), and font style(character appearance).
With spreadsheet software, data is organized in rows and columns, which collectively are called a worksheet. The intersection of a row and column, called a cell, can contain alabel (text), a value (number), or a formula or function that performs calculations on the data and displays the result.
Database software allows you to create and manage a database. A database is a collection of data organized to allow access, retrieval, and use of that data. A query is used to retrieve data according to specified criteria, which are restrictions the data must meet.
Presentation graphics software is used to create presentations that communicate ideas, messages, and other information to a group through a slide show. You can use a clip gallery to enhance your presentation with clip art images, pictures, video clips, and audio clips.
personal information manager (PIM) is software that includes anappointment calendar to schedule activities, an address book to maintain names and addresses, and a notepad to record ideas, reminders, and important information. A software suite is a collection of individual applications sold as a single package.
Project management software allows you to plan, schedule, track, and analyze the progress of a project. Accounting software helps companies record and report their financial transactions.
Power users often use software that allows them to work with graphics and multimedia. Computer-aided design (CADsoftwareassists in creating engineering, architectural, and scientific designs. Desktop publishing (DTP) software is used to design and produce sophisticated documents. DTP is developed specifically to support page layout, which is the process of arranging text and graphics in a document. Paint software is used to draw graphical images with various on-screen tools. Image editing softwareprovides the capability to modify existing images. Video editing software and audio editing software can be used to modify videoand audio segments.
Multimedia authoring software is used to create electronic interactive presentations that can include text, images, video, audio, and animation. Web page authoring software is designed to create Web pages and to organize, manage, and maintain Web sites.
Many software applications are designed specifically for use at home or for personal or educational use. Integrated softwarecombines several productivity software applications that share a similar interface and common features into a single package.Personal finance software is an accounting program that helps pay bills, balance a checkbook, track income and expenses, follow investments, and evaluate financial plans. Legal softwareassists in the creation of legal documents and provides legal advice. Tax preparation software guides users through the process of filing federal taxes. Personal DTP software helps develop conventional documents by asking questions, presenting predefined layouts, and supplying standard text.
Photo-editing software is used to edit digital photographs. A clip art/image gallery is a collection of clip art and photographs that can be used in all types of documents. Home design/landscaping software assists with planning or remodeling. Educational software teaches a particular skill and exists for about any subject.Reference software provides valuable and thorough information for all individuals. Entertainment software includes interactive games, videos, and other programs designed to support a hobby or provide amusement.
One of the main reasons people use computers is to communicate and share information. E-mail software is used to create, send, receive, forward, store, print, and delete e-mail (electronic mail). A Web browser is a software application used to access and view Web pages. A chat client is software that allows you to connect to a chat room, which permits users to chat via the computer. Anewsreader is a software program used to participate in anewsgroup, which is an online area on the Web where users conduct written discussion about a particular subject. An instant messenger is a software program installed to use instant messaging (IM), a real-time communications service that notifies you when one or more people are online and then allows you to exchange messages or files. Groupware is a software application that helps groups of people on a network work together and share information. A videoconference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data.
8. Advantages of Web Applications
·         No special configurations of changes are need on user’s PCs.
·         Lower costs
·         Centralized data is secure and easy to backup.
·         Updates can be made quickly and easily.
·         Information is accessible to a wide audience anywhere in the world.
·         Available 24 hours a day, 7 days a week.
·         Everybody has a browser – familiar interface encourages use.
·         Online training can be completed at user’s own time and pace.
·         Always up-to-date.
9. The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers andterminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANETMark I at NPL in the UKCYCLADESMerit NetworkTymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.
In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network(CSNET) and again in 1986 when NSFNET provided access tosupercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.
Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mailinstant messagingVoice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forumsblogs,social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) andInternet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.
10. 

1. Hard Drive (Internal)

Internal Hard Drive
You computer's hard drive is the first most important type of storage. Anything that you download, applications that you install, your pictures, videos and music are all stored directly to your hard drive. Basically, anything that is on your computer is stored to your internal hard drive. Internal hard drive capacity is measured in gigabytes. For example, you may have a 500GB SATA hard drive on your computer. Also, internal computer hard drives have different speeds such as 5400RPM and 7200RPM. This reading is the speed that the hard drive disk spins. A faster hard drive will have higher RPM. The faster the hard drive spins, the faster your hard drive can read data, as well as write data.

2.       External Hard Drives

External Hard Drive
External hard drives are exactly the same as internal drives, with one exception. Rather then being enclosed inside your computer, external hard drives have their own separate casing and sit externally to your computer. External hard drives can connect to your computer in a variety of ways. Some common connection types are: USB 2.0, ESATA, Firewire 400 and Firewire 800. External hard drives measure capacity in gigabytes and have different speeds as well. For the most part, external hard drives are used for backup and storing files that a computer user may want to transport.

3.       Network Attached Storage

NAS Server
Another common form of computer storage is network attached storage or NAS. Network attached storage is a method commonly used by businesses to share files between computers. A NAS is simply a storage device connected to a computer network. This is beneficial because many computers can read and write to a NAS. Network attached storage capacity is measured in gigabytes. Also, NASs are available with different hard drive speeds.
Many at home computer users often create their own NAS devices by connecting an external hard drive to their router. This allows them to access it wirelessly, as well as share it with other computers.

4.       Optical Media Storage

Optical Drive
Optical media storage is basically writing data to a CD or DVD. When your burn a CD, you are storing songs and music on the CD so that you can listen to it later. If you are burning a DVD, you are storing a video on it so that you can watch it later. CD-RW and DVD-RW media has the capability to be recorded on and erased later if necessary. This makes optical media storage ideal for transporting relatively small amounts of data.

5.       Flash Drives

Flash Drive
Flash drives, or thumb drives, are one of the newest forms of computer storage. These drives connect to any computer by way of USB. Often times, students as well as business professionals, use flash drives as a simple way to transport text documents to and from work, and to and from school. When flash drives were first released, storage capacity was rather limited. However, companies are now manufacturing flash drives with huge storage capacities, up to 64GB.