LIJIT SEARCH

Networking Basics

This category covers the basic fundamentals of computer networking. It also serves as an introduction for those new to computer networking. Every great network started from the simplest network. This article takes a look at the most basic network and a few of its requirements.Converting decimal numbers into binary numbers is one of the most common and simplest procedures to perform. Want to know more about the conversion of decimal numbers into binary numbers? Then, please read on.

This article is a brief explanation on how to convert decimals and decimal fractions to octal, a base-8 number system that uses eight unique symbols (0,1,2,3,4,5,6 and 7).A connector is best known for providing a physical link between two components. But there are different connectors depending on the type of connection being made and each has its own feature. Find out more about connectors. What exactly is an Ethernet network? Let´s take a look at some of its basic properties, and get a little information about some of the equipment needed for local and wide area network.

Computers For Kids

Computers For Kids is a registered charity located in Windsor, Ontario. Our facility includes a 24,000 square foot warehouse dedicated to refurbishing and recycling electronics. Our goal is to seek out serviceable electronic donations, both personal and corporate, so that we may assist the children of our community with computer access.We are dedicated to transforming unwanted computers into educational tools for children in need. In doing so, we are helping to preserve the environment through the responsible reuse and recycling of electronic waste.We recognize the importance of computer literacy and believe that all children should have access to computer technology.Founded in early 2004, Computers for Kids has partnered to open over 40 after school and summer programs. We have also made individual placements of computers that are benefiting over 2000 special needs youth. All of this has helped us to divert over 2.5 million lbs. of electronic waste from area landfills.
Electronic waste, e-waste, e-scrap, or Waste Electrical and Electronic Equipment (WEEE) describes loosely discarded, surplus, obsolete, broken, electrical or electronic devices. In Ontario, this includes Desktop computers, Portable computers, Computer peripherals, Monitors, Televisions, Printing devices, Telephones (physical and accessories), Cellular phones, PDA’s and pagers, Audio and video players, Cameras, Equalizers, (pre)amplifiers, Radios, Receivers, Speakers, Tuners, Turntables, Video players/projectors, Video recorders, and Personal hand held computers.E-waste contains a number of very serious contaminants such as lead, cadmium, beryllium, and brominated flame retardants. It also contains a number of valuable materials, including copper, steel, plastics, etc.
There is also a rapidly growing problem of young people falling behind in school because they lack access to computer technology away from school.Computers for Kids accepts donation of all OES Phase 1 and Phase 2 materials. For a complete list, please see the attached file.There are other organizations that will accept your unwanted electronic waste, but by giving to Computers for Kids, you are helping us to fulfill our mandate of ensuring that no child falls behind because they don't have access to computer technology away from school.You are also helping to ensure that we leave this world a better place than we found it!

Stanford University's Computer Science

Stanford University's Computer Science Department is part of the School of Engineering. The department offers the degrees Bachelor of Science, Master of Science, and Doctor of Philosophy. It also participates in the following undergraduate inter-disciplinary programs: Computer Systems Engineering, Symbolic Systems, and Mathematical and Computational Sciences.

Founded in 1965, the Department of Computer Science is a center for research and education at the undergraduate and graduate levels. Strong research groups exist in areas of artificial intelligence, robotics, foundations of computer science, scientific computing, and systems. Basic work in computer science is the main research goal of these groups, but there is also a strong emphasis on interdisciplinary research and on applications that stimulate basic research.

Fields in which interdisciplinary work has been undertaken include chemistry, genetics, linguistics, physics, medicine and various areas of engineering, construction, and manufacturing. Close ties are maintained with researchers with computational interests in other university departments. In addition, both faculty and students commonly work with investigators at nearby research or industrial institutions. The main educational goal is to prepare students for research and teaching careers either in universities or in industry.

Founded in Melbourne, Australia in 1978, Computershare (ASX: CPU) has grown (largely through overseas acquisitions) to become the world's largest share registry business.In brief, Computershare is a leading financial market services and technology provider managing over 14,000 corporate accounts totalling over 100 million shareholder accounts. Basically, Computershare specializes in the corporate trust, stock transfer and employee share plan services for thousands of issuers and millions of securityholder accounts.

Some twenty years after its founding, in 1997, the Australian-based company Computershare began to expand its evergrowing registry business to include financial markets in New Zealand and the United Kingdom.

In subsequent years, Computershare expanded its business into Ireland, South Africa, and Hong Kong. Since the year 2000, Computershare had extended its global position by acquiring an important role in the American and Canadian markets. In particular, through the acquisition of the stock transfer sectors of Harris Bank in the US and Montreal Trust in Canada. Moreover, since 2004, Computershare has made itself present in emerging markets such as Russia and India by amassing considerable stock in respective registry market's. Also in 2004, by purchasing Pepper Global, formerly Pepper Technologies AG, Computershare expanded into the German market. For the most part, the entry into these new markets were accomplished through financial acquisitions of existing registrar corporations.

computer technology

A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.

Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers. Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into small pocket devices, and can be powered by a small battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.

The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a netbook to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity

An operating system

An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless.
As computers have progressed and developed so have the types of operating systems. Below is a basic list of the different types of operating systems and a few examples of operating systems that fall into each of the categories. Many computer operating systems will fall into more than one of the below categories.
GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. See our GUI dictionary definition for a complete definition.

A multi-user operating system allows for multiple users to use the same computer at the same time and/or different times. See our multi-user dictionary definition for a complete definition for a complete definition.An operating system that is capable of allowing multiple software processes to run at the same time

Computer Engineering

Assuming you haven't been living in a cave or under a rock for the last few decades, you are probably aware that an amazing computer revolution has rapidly changed the way much of the world works. Developments in radio, television, radar, transistors, computers, and robotics have fundamentally altered human life. The field of Computer Engineering is at the epicenter of this development. It encompasses a wide range of topics including operating systems, computer architecture, computer networks, robotics, artificial intelligence, and computer-aided design. If you major in Computer Engineering, you'll learn all about the hardware and software aspects of computer science. You'll gain a solid understanding of circuit theory and electronic circuits, too. Also, because Computer Engineering is closely linked with Electrical Engineering, the fields are found in the same department at many universities. Consequently, many undergraduate programs incorporate most of the core curricula in both electrical engineering and computer science so graduates will be prepared to work in either field. Computer Engineering is a difficult major but it's a major that's in demand. Software engineering companies, telecommunications firms, designers of digital hardware, and many other business enterprises hire Computer Engineering majors right out of college and pay them well. Computer Engineering also makes great preparation for medical school, business school, and law school

Networking and the Internet

Computers have been used to coordinate information between multiple locations since the 1950s. The U.S. military's SAGE system was the first large-scale example of such a system, which led to a number of special-purpose commercial systems like Sabre.[32]
In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it produced was called the ARPANET.[33] The technologies that made the Arpanet possible spread and evolved.
In time, the network spread beyond academic and military institutions and became known as the Internet. The emergence of networking involved a redefinition of the nature and boundaries of the computer. Computer operating systems and applications were modified to include the ability to define and access the resources of other computers on the network, such as peripheral devices, stored information, and the like, as extensions of the resources of an individual computer. Initially these facilities were available primarily to people working in high-tech environments, but in the 1990s the spread of applications like e-mail and the World Wide Web, combined with the development of cheap, fast networking technologies like Ethernet and ADSL saw computer networking become almost ubiquitous. In fact, the number of computers that are networked is growing phenomenally. A very large proportion of personal computers regularly connect to the Internet to communicate and receive information. "Wireless" networking, often utilizing mobile phone networks, has meant networking is becoming increasingly ubiquitous even in mobile computing environments.

A computer

A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.
Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers .Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space. Simple computers are small enough to fit into small pocket devices, and can be powered by a small battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.
The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a netbook to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.

Computer science

Computer science or computing science is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. It is frequently described as the systematic study of algorithmic processes that create, describe, and transform information. According to Peter J. Denning, the fundamental question underlying computer science is, "What can be efficiently automated?" Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describe computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to people.
The general public sometimes confuses computer science with careers that deal with computers. computer is such as the noun Information Technology, or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement software such as games and web-browsers, and using that understanding to create new programs or improve existing ones.

Computer operators


Computer operators oversee the operation of computer hardware systems, ensuring that these machines are used as efficiently and securely as possible. They control the console of either a mainframe digital computer or a group of minicomputers and set controls on the computers and peripheral devices required to run computer tasks or “jobs.”

Operators maintain logbooks or operating records for each job run and list any events, such as malfunctions, that occur during their shift. Other computer operators perform and monitor routine tasks, such as tape backup, virus checking, software upgrading, and basic maintenance or help programmers and systems analysts test and debug new programs. Computer processing operations regularly run around-the-clock, allowing opportunities for evening, night, or weekend work. However, increased automation and telecommunication systems lessen the need for full-time coverage of operations and permits many operators to monitor systems remotely.

Java



Java is a plug-in language, like Flash. It was designed to be more capable than Flash, but it didn't really catch on. The language is still used for other things, often on servers, but very few people actually use it for "applets" any more.You probably didn't install it yourself. It probably came on your computer. Sun Microsystems pay a lot of computer manufacturers to install it before it leaves the factory. They wanted Java to be everywhere; they had dreams that eventually you'd download all of your software. Even your word processor and your video games. And then it wouldn't matter if you had a Mac or Windows or anything else. Very subversive.

Well, it didn't work out, but they still put it out there. And they're pretty obnoxious about keeping it updated. It's not dangerous. They put a LOT of work into making it safe, so you can go ahead and update it. Or just un-install it, and your life will not be noticeably worse. To un-install it, go to the Control Panel and click Add/Remove programs. Scroll down to Java and hit Remove. Your computer will work just fine and maybe faster for having it gone.

Computer Hacking

Computer Hacking
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

It is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Computer Graphics


The term computer graphics includes almost everything on computers that is not text or sound. Today almost every computer can do some graphics, and people have even come to expect to control their computer through icons and pictures rather than just by typing.
Here in our lab at the Program of Computer Graphics, we think of computer graphics as drawing pictures on computers, also called rendering. The pictures can be photographs, drawings, movies, or simulations -- pictures of things which do not yet exist and maybe could never exist. Or they may be pictures from places we cannot see directly, such as medical images from inside your body.
We spend much of our time improving the way computer pictures can simulate real world scenes. We want images on computers to not just look more realistic, but also to BE more realistic in their colors, the way objects and rooms are lighted, and the way different materials appear. We call this work "realistic image synthesis", and the following series of pictures will show some of our techniques in stages from very simple pictures through very realistic ones.

Computer security


Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively

The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources.

Computer crime

Computer crime
Computer crime is a form of crime where the Internet or computers are used as a medium to commit crime.It is also called cybercrime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories:

(1) crimes that target computer networks or devices directly.
(2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Basic Computer Hardware Information

Basic Computer Hardware
Basic Computer Hardware Information
This is a very short course about computers. It won't make you into a computer technician, but it will let you talk to one without thinking they are speaking a foreign language. The computers we are interested in are the general-purpose personal computers like we use at our desk, rather than the specialized computer under the hood of your car, or the big mainframe computers that the IRS uses to keep track of us all.

For our purposes, a computer can be defined as a machine for processing and storing information electronically. To be useful, it must have a way for us to get information into the machine, and some way to get it out afterwards so we can see it. Therefore, a computer has four basic functions:

1. Input
2. Processing
3. Storage
4. Output

Computer Games


"Computer Games" is a single by New Zealand group, Mi-Sex released in 1979 in Australia and New Zealand and in 1981 throughout Europe. It was the single that launched the band, and was hugely popular, particularly in Australia and New Zealand. It was produced by Peter Dawkins.

Computer Games is a 1982 album by funk musician George Clinton, released on Capitol Records. Though technically Clinton's first "solo" album, the record featured most of the same personnel who had appeared on recent albums by Parliament and Funkadelic, both formally disbanded by Clinton in 1981. Conceived in the aftermath of a period marked by financial and personal struggles for Clinton, "Computer Games" restored his popularity for a short time before P-Funk fell victim to renewed legal problems and scant label support in the mid 1980s.

A laptop

laptop
A laptop computer, usually called a notebook computer by manufacturers, is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than 5 pounds and is 3 inches or less in thickness. Among the best-known makers of laptop computers are IBM, Apple, Compaq, Dell, and Toshiba.
Laptop computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. A laptop can effectively be turned into a desktop computer with a docking station, a hardware frame that supplies connections for peripheral input/output devices such as a printer or larger monitor. The less capable port replicator allows you to connect a laptop to a number of peripherals through a single plug.

Laptops usually come with displays that use thin-screen technology. The thin film transistor or active matrix screen is brighter and views better at different angles than the STN or dual-scan screen. Laptops use several different approaches for integrating a mouse into the keyboard, including the touch pad, the trackball, and the pointing stick. A serial port also allows a regular mouse to be attached. The PC Card is insertable hardware for adding a modem or network interface card to a laptop. CD-ROM and digital versatile disc drives may be built-in or attachable.

Computer Software Definition

Computer Software Definition
Software is a generic term for organized collections of computer data and instructions, often broken into two major categories: system software that provides the basic non-task-specific functions of the computer, and application software which is used by users to accomplish specific tasks. It is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details such as transferring data from memory to disk, or rendering text onto a display. Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, text editors, user authentication and management tools, and networking and device control software.

Application software, on the other hand, is used to accomplish specific tasks other than just running the computer system. Application software may consist of a single program, such as an image viewer; a small collection of programs is called a software package. That work closely together to accomplish a task, such as a spreadsheet or text processing system; a larger collection (often called a software suite) of related but independent programs and packages that have a common user interface or shared data format, such as Microsoft Office, which consists of closely integrated word processor, spreadsheet, database, etc.; or a software system, such as a database management system, which is a collection of fundamental programs that may provide some service to a variety of other independent applications.

Software is created with programming languages and related utilities, which may come in several of the above forms: single programs like script interpreters, packages containing a compiler, linker, and other tools; and large suites that include editors, debuggers, and other tools for multiple languages.


Different Types of Computer Viruses

Different Types of Computer Viruses
Different Types of Computer Viruses
There are Different Types of Computer Viruses could be classified in origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack etc.
Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system.

Desktop Computer

desktop computers
Desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Prior to the wide spread of microprocessors, a computer that could fit on a desk was considered remarkably small. Desktop computers come in a variety of types ranging from large vertical tower cases to small form factor models that can be tucked behind an LCD monitor. "Desktop" can also indicate a horizontally-oriented computer case usually intended to have the display screen placed on top to save space on the desk top. Most modern desktop computers have separate screens and keyboards. Tower cases are desktop cases in the earlier sense, though not in the latter. Cases intended for home theater PC systems are usually considered to be desktop cases in both senses, regardless of orientation and placement.

Computer world

computer world
Computer World is the eighth studio album created by Kraftwerk and released in 1981. It was released in German as Computerwelt. The album deals with the themes of the rise of computers within society. The compositions are credited to Ralf Hütter, Florian Schneider, and Karl Bartos. The sound of the album is more reliant on purely electronics and vocals.

In keeping with the album’s concept, Kraftwerk showcased their music on an ambitious world tour and issued several versions of the single, "Pocket Calculator". The song is also sung in German—"Taschenrechner", French—"Mini Calculateur", and Japanese—"Dentaku". While not major, it should also be noted that there are a few noticeable differences in the album mixes used on the English- and German-language releases.

As was the case with the two previous albums, Computer World was released both as German and English language editions. Instead of translating everything verse by verse. Some lyrics were omitted. Most notably the opening title track, "Computer world". The English lyrics misses the reference to the collection of peoples' personal data "Finanzamt und das BKA - Haben unsere Daten da" by agencies such as the tax authorities and the police. Similarly the refrain Computerwelt - Denn Zeit ist Geld is simplified.

Computer networking

ComputerNetwork
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors.

Computer networking is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology. Computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines.

There are different network methods are:

1. Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building.
2. Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state.
3. Wide area network (WAN) that is usually a larger network that covers a large geographic area.
4. Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.

All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[2] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[3]). Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs

Computer viruses

Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the executable file or program. Executable files include Macintosh "system files" [such as system extensions, INITs and control panels] and application programs [such as word processing programs and spreadsheet programs.] Viruses work the same ways in Windows or DOS machines by infecting zip or exe files.

A virus is inactive until you execute an infected program or application OR start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

Computer History

ComputerHistory

The first computers were people. The earlier mechanical computers. Electronic computers were given this name because they performed the work that had previously been assigned to people. It was used to describe those human beings whose job it was to perform the repetitive calculations required to compute such things as navigational tables, tide charts, and planetary positions for astronomical almanacs. Imagine you had a job where hour after hour, day after day, you were to do nothing but compute multiplications. Boredom would leading to carelessness,quickly set in, leading to mistakes. And even on your best days you wouldn't be producing answers very fast. Therefore, inventors have been searching for hundreds of years for a way to mechanize this task.

Some history date and inverter name are follow:

1. The oldest ABACUS was used in 300 B.C. by Babylonians.The abacus is still in use today.
2. In 1617 an eccentric Scotsman named John Napier invented LOGARITHMS. Napier also invented an ALTERNATIVE TO TABLE. The logarithm values were carved on ivory sticks which are now called NAPIER'S BONES.
3. CALCULATING CLOCK was invented by German professor Wilhelm Schickard in 1623.
4. In 1642 Blaise Pascal, at age 19, invented the PASCALINE.
5. In 1801 the Frenchman Joseph Marie Jacquard invented PUNCHED CARD.
6. In 1822 the English mathematician Charles Babbage invented DIFFERENCE ENGINE and ANALYTIC ENGINE
7. Hollerith invention known as the HOLLERITH DESK.

There are many inverter in computer history some are given up.

computer game

computer game
A personal computer game is a game played on a personal computer, rather than on a video game console or arcade machine. Computer games have evolved from the simple graphics and gameplay of early titles like Spacewar, to a wide range of more visually advanced titles.

PC games are created by one or more game developers, often in conjunction with other specialists and either published independently or through a third party publisher. They may then be distributed on physical media such as DVDs and CDs, as Internet-downloadable, possibly freely redistributable, software, or through online delivery services such as Direct2Drive and Steam. PC games often require specialized hardware in the user's computer in order to play, such as a specific generation of graphics processing unit or an Internet connection for online play, although these system requirements vary from game to game.

Antivirus software

Antivirus software
Antivirus software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware for which no signature exists yet. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

Internet

Internet
The internet is a worldwide public network of computers on which people can join and use multiple services such as sharing of information. The World Wide Web (WWW) is one of the major services of the internet who hosts information of almost about anything one might like to search. Search engines are being used to browse through the available sources of information. It can make discovering of information an easy to use game. The internet offers communication services where people can use to conduct friends and family that may live in a different country. Chat rooms is the most common way for communication through which people have the chance to communicate with other people that have never met before, or that live in different countries.




E-mails are another form for communicating with family and friends and have now replaced the traditional hand-written letters. Social networking sites are websites that offer people the chance to create a profile for themselves, describing likes and dislikes and the expectations of a person from other people. The purpose of these sites is to enable members to meet other members for relationships, friendships or just simple acquaintanceships. Lastly, the internet can offer services for downloading. Downloading on the computer might include music, movies and programs.

Computer viruses

Computer viruses
Computer viruses are small software programs that are designed to spread from one computer to another.A virus might corrupt or delete data on your computer. It is use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.To help avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.Computer virusesComputer viruses

Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

Computer Software

software
Software is a generic term for organized collections of computer data and instructions. There are two major categories: system software that provides the basic non-task-specific functions of the computer, and application software which is used by users to accomplish specific tasks.Define one software.


System software is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details such as transferring data from memory to disk, or rendering text onto a display. Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, text editors, user authentication (login) and management tools, and networking and device control software.


Software is created with programming languages and related utilities, which may come in several forms. Single programs like script interpreters, packages containing a compiler, linker, and other tools; and large suites (often called Integrated Development Environments) that include editors, debuggers, and other tools for multiple languages.

CPU

cpu
The Central Processing Unit (CPU) or the processor is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. This term has been in use in the computer industry at least since the early 1960s [1]. The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same.
Early CPUs were custom-designed as a part of a larger, sometimes one-of-a-kind, computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. This standardization trend generally began in the era of discrete transistor mainframes and minicomputers and has rapidly accelerated with the popularization of the integrated circuit (IC). The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. Modern microprocessors appear in everything from automobiles to cell phones and children's toys.

computer hardware

computer hardware
Your PC (Personal Computer) is a system, consisting of many components. Some of those components, like Windows XP, and all your other programs, are software. The stuff you can actually see and touch, and would likely break if you threw it out a fifth-story window, is hardware.
Not everybody has exactly the same hardware. But those of you who have a desktop system, like the example shown in Figure 1, probably have most of the components shown in that same figure. Those of you with notebook computers probably have most of the same components. Only in your case the components are all integrated into a single book-sized portable unit.The system unit is the actual computer; everything else is called a peripheral device. Your computer's system unit probably has at least one floppy disk drive, and one CD or DVD drive, into which you can insert floppy disks and CDs. There's another disk drive, called the hard disk inside the system unit, as shown in Figure 2. You can't remove that disk, or even see it. But it's there. And everything that's currently "in your computer" is actually stored on that hard disk. (We know this because there is no place else inside the computer where you can store information!).
The floppy drive and CD drive are often referred to as drives with removable media or removable drives for short, because you can remove whatever disk is currently in the drive, and replace it with another. Your computer's hard disk can store as much information as tens of thousands of floppy disks, so don't worry about running out of space on your hard disk any time soon. As a rule, you want to store everything you create or download on your hard disk. Use the floppy disks and CDs to send copies of files through the mail, or to make backup copies of important items.

computer

computer
A programmable machine. The two principal characteristics of a computer. One is it responds to a specific set of instructions in a well-defined manner. Another is it can execute a prerecorded list of instructions. Modern computers are electronic and digital. The actual machinery wires, transistors, and circuits is called hardware. The instructions and data are called software.

All general-purpose computers require the following hardware components:

memory :A computer to store, at least temporarily, data and programs. mass storage

Device : Allows a computer to permanently retain large amounts of data. Common mass storage devices include disk drives and tape drives.

Input device : Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer.

Output device : A display screen, printer, or other device that lets you see what the computer has accomplished.

Central processing unit (CPU): The heart of the computer, this is the component that actually executes instructions. In addition to these components, many others make it possible for the basic components to work together efficiently. For example, every computer requires a bus that transmits data from one part of the computer to another.