LIJIT SEARCH

Computer operators


Computer operators oversee the operation of computer hardware systems, ensuring that these machines are used as efficiently and securely as possible. They control the console of either a mainframe digital computer or a group of minicomputers and set controls on the computers and peripheral devices required to run computer tasks or “jobs.”

Operators maintain logbooks or operating records for each job run and list any events, such as malfunctions, that occur during their shift. Other computer operators perform and monitor routine tasks, such as tape backup, virus checking, software upgrading, and basic maintenance or help programmers and systems analysts test and debug new programs. Computer processing operations regularly run around-the-clock, allowing opportunities for evening, night, or weekend work. However, increased automation and telecommunication systems lessen the need for full-time coverage of operations and permits many operators to monitor systems remotely.

Java



Java is a plug-in language, like Flash. It was designed to be more capable than Flash, but it didn't really catch on. The language is still used for other things, often on servers, but very few people actually use it for "applets" any more.You probably didn't install it yourself. It probably came on your computer. Sun Microsystems pay a lot of computer manufacturers to install it before it leaves the factory. They wanted Java to be everywhere; they had dreams that eventually you'd download all of your software. Even your word processor and your video games. And then it wouldn't matter if you had a Mac or Windows or anything else. Very subversive.

Well, it didn't work out, but they still put it out there. And they're pretty obnoxious about keeping it updated. It's not dangerous. They put a LOT of work into making it safe, so you can go ahead and update it. Or just un-install it, and your life will not be noticeably worse. To un-install it, go to the Control Panel and click Add/Remove programs. Scroll down to Java and hit Remove. Your computer will work just fine and maybe faster for having it gone.

Computer Hacking

Computer Hacking
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

It is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Computer Graphics


The term computer graphics includes almost everything on computers that is not text or sound. Today almost every computer can do some graphics, and people have even come to expect to control their computer through icons and pictures rather than just by typing.
Here in our lab at the Program of Computer Graphics, we think of computer graphics as drawing pictures on computers, also called rendering. The pictures can be photographs, drawings, movies, or simulations -- pictures of things which do not yet exist and maybe could never exist. Or they may be pictures from places we cannot see directly, such as medical images from inside your body.
We spend much of our time improving the way computer pictures can simulate real world scenes. We want images on computers to not just look more realistic, but also to BE more realistic in their colors, the way objects and rooms are lighted, and the way different materials appear. We call this work "realistic image synthesis", and the following series of pictures will show some of our techniques in stages from very simple pictures through very realistic ones.

Computer security


Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively

The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources.

Computer crime

Computer crime
Computer crime is a form of crime where the Internet or computers are used as a medium to commit crime.It is also called cybercrime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories:

(1) crimes that target computer networks or devices directly.
(2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Basic Computer Hardware Information

Basic Computer Hardware
Basic Computer Hardware Information
This is a very short course about computers. It won't make you into a computer technician, but it will let you talk to one without thinking they are speaking a foreign language. The computers we are interested in are the general-purpose personal computers like we use at our desk, rather than the specialized computer under the hood of your car, or the big mainframe computers that the IRS uses to keep track of us all.

For our purposes, a computer can be defined as a machine for processing and storing information electronically. To be useful, it must have a way for us to get information into the machine, and some way to get it out afterwards so we can see it. Therefore, a computer has four basic functions:

1. Input
2. Processing
3. Storage
4. Output

Computer Games


"Computer Games" is a single by New Zealand group, Mi-Sex released in 1979 in Australia and New Zealand and in 1981 throughout Europe. It was the single that launched the band, and was hugely popular, particularly in Australia and New Zealand. It was produced by Peter Dawkins.

Computer Games is a 1982 album by funk musician George Clinton, released on Capitol Records. Though technically Clinton's first "solo" album, the record featured most of the same personnel who had appeared on recent albums by Parliament and Funkadelic, both formally disbanded by Clinton in 1981. Conceived in the aftermath of a period marked by financial and personal struggles for Clinton, "Computer Games" restored his popularity for a short time before P-Funk fell victim to renewed legal problems and scant label support in the mid 1980s.

A laptop

laptop
A laptop computer, usually called a notebook computer by manufacturers, is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than 5 pounds and is 3 inches or less in thickness. Among the best-known makers of laptop computers are IBM, Apple, Compaq, Dell, and Toshiba.
Laptop computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. A laptop can effectively be turned into a desktop computer with a docking station, a hardware frame that supplies connections for peripheral input/output devices such as a printer or larger monitor. The less capable port replicator allows you to connect a laptop to a number of peripherals through a single plug.

Laptops usually come with displays that use thin-screen technology. The thin film transistor or active matrix screen is brighter and views better at different angles than the STN or dual-scan screen. Laptops use several different approaches for integrating a mouse into the keyboard, including the touch pad, the trackball, and the pointing stick. A serial port also allows a regular mouse to be attached. The PC Card is insertable hardware for adding a modem or network interface card to a laptop. CD-ROM and digital versatile disc drives may be built-in or attachable.

Computer Software Definition

Computer Software Definition
Software is a generic term for organized collections of computer data and instructions, often broken into two major categories: system software that provides the basic non-task-specific functions of the computer, and application software which is used by users to accomplish specific tasks. It is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details such as transferring data from memory to disk, or rendering text onto a display. Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, text editors, user authentication and management tools, and networking and device control software.

Application software, on the other hand, is used to accomplish specific tasks other than just running the computer system. Application software may consist of a single program, such as an image viewer; a small collection of programs is called a software package. That work closely together to accomplish a task, such as a spreadsheet or text processing system; a larger collection (often called a software suite) of related but independent programs and packages that have a common user interface or shared data format, such as Microsoft Office, which consists of closely integrated word processor, spreadsheet, database, etc.; or a software system, such as a database management system, which is a collection of fundamental programs that may provide some service to a variety of other independent applications.

Software is created with programming languages and related utilities, which may come in several of the above forms: single programs like script interpreters, packages containing a compiler, linker, and other tools; and large suites that include editors, debuggers, and other tools for multiple languages.


Different Types of Computer Viruses

Different Types of Computer Viruses
Different Types of Computer Viruses
There are Different Types of Computer Viruses could be classified in origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack etc.
Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system.

Desktop Computer

desktop computers
Desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Prior to the wide spread of microprocessors, a computer that could fit on a desk was considered remarkably small. Desktop computers come in a variety of types ranging from large vertical tower cases to small form factor models that can be tucked behind an LCD monitor. "Desktop" can also indicate a horizontally-oriented computer case usually intended to have the display screen placed on top to save space on the desk top. Most modern desktop computers have separate screens and keyboards. Tower cases are desktop cases in the earlier sense, though not in the latter. Cases intended for home theater PC systems are usually considered to be desktop cases in both senses, regardless of orientation and placement.

Computer world

computer world
Computer World is the eighth studio album created by Kraftwerk and released in 1981. It was released in German as Computerwelt. The album deals with the themes of the rise of computers within society. The compositions are credited to Ralf Hütter, Florian Schneider, and Karl Bartos. The sound of the album is more reliant on purely electronics and vocals.

In keeping with the album’s concept, Kraftwerk showcased their music on an ambitious world tour and issued several versions of the single, "Pocket Calculator". The song is also sung in German—"Taschenrechner", French—"Mini Calculateur", and Japanese—"Dentaku". While not major, it should also be noted that there are a few noticeable differences in the album mixes used on the English- and German-language releases.

As was the case with the two previous albums, Computer World was released both as German and English language editions. Instead of translating everything verse by verse. Some lyrics were omitted. Most notably the opening title track, "Computer world". The English lyrics misses the reference to the collection of peoples' personal data "Finanzamt und das BKA - Haben unsere Daten da" by agencies such as the tax authorities and the police. Similarly the refrain Computerwelt - Denn Zeit ist Geld is simplified.

Computer networking

ComputerNetwork
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors.

Computer networking is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology. Computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines.

There are different network methods are:

1. Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building.
2. Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state.
3. Wide area network (WAN) that is usually a larger network that covers a large geographic area.
4. Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.

All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[2] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[3]). Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs

Computer viruses

Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the executable file or program. Executable files include Macintosh "system files" [such as system extensions, INITs and control panels] and application programs [such as word processing programs and spreadsheet programs.] Viruses work the same ways in Windows or DOS machines by infecting zip or exe files.

A virus is inactive until you execute an infected program or application OR start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.