Question 1
OPERATING SYSTEM USED IN DESKTOPS/LAPTOPS
List of latest operating system that are used in desktops/laptops :
* Microsoft windows
* Mac OS
* DOS
* UNIX and LINUX
Most users in the world used Microsoft Windows as its operating system.
HOW OPERATING SYSTEM WORKS?
- * It manages the hardware and software resources of the system. In a desktop computer, these resources include such things as the processor, memory, disk space and more.
- * Computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit (CPU). It's the operating system's job to make sure that each application gets its fair share of your computer's finite resources in the most efficient way possible.
- * The operating system provides a consistent set of rules for applications to use in order to be able to interface with your computer's hardware.
Operating
System
|
Advantage
|
Disadvantage
|
Microsoft
windows
|
v
consumer-oriented.
Tightly integrated.
|
v
vulnerable
to viruses. Tightly integrated
|
Mac OS
|
v Mac viruses
are rare compared to PCs, but mac viruses do exist.
v Very user friendly.
v Able to run both Windows and OSX.
v Great computer for professional applications
such as business, photo editing, rendering, movie editing, etc.
v Unix based, thus more secure + stable.
v Good multimedia computer.
|
v Upgradeability is limited.
v Overpriced.
v Interface is flashy and childish, bullshit.
v People who switched from a PC to a Mac may be
confused for the first few days.
v Many programs do not work on Macs. (unless
you buy OSX software).
v Nearly ALL PC games DONT work on a MAC.
v Fixing macs is rather difficult than fixing
PCs.
|
DOS
|
v
The advantages of MS-DOS is
that it was the most popular operating system for IBM computers in the early
1980s and it was very easy for novices to learn and use
|
v
The disadvantages of MS-DOS
is that it was replaced by more advanced operating systems and is now an old
operating system
v
While graphical user
interfaces are now used, MS-DOS uses a character-based interface.
|
UNIX and
LINUX
|
v No need to worry about viruses.
v
|
v Shows its technical origins and derivation
from Unix in things like tar (short for Tape ARchive) cp (copy without the
vowels) and other command line tools which are often used as back-ends for
GUI programs.
|
Question 2
ANDROID
|
|
WINDOWS 8
|
GOOGLE PLAY
|
DISTRIBUTOR
|
MICROSOFT CORP
|
ORIGINALITY OF GOOGLE PLAY APPLICATIONS WAS EASILY TO BE COPIED
NOWADAYS
|
THE
ORIGINALITY OF OPERATING SYSTEM
|
ORIGINALITY OF WINDOWS 8 OF MICROSOFT STILL CAN BE MAINTAINED
|
NEED TO DOWNDLOAD APPLICATIONS TO READ OR VIEW FILES/PDF.
|
FILE OR DOC. VIEWING
|
ALREADY AVAILABLE WITH MICROSOFT TOOLS OFFICE (e.g MICROSOFT WORDS ,
POWERPOINT , EXCEL)
|
ONCE UPGRADED , THE PREVIOUS INSTALLENT TERMINATED
|
VERSION UPGRADES
|
EVENTHOUGH IT IS UPGRADED , THE PREVIOUS APPLICATION IS STILL THERE
|
OFTEN
|
VERSION UPDATES APP
|
SELDOM
|
MORE THAN 700K APPS
|
APPS AVAILABLE
|
AROUND 100K APPS
|
MORE THAN WINDOWS USER
|
USERS
|
LESS THAN ANDROID USER
|
|
THE SPEED , STABILITY AND FEATURES OF ANDROID CAN VARY FROM ONE TO
ANOTHER , BUT WINDOWS PHONE IS FRIENDLY AND FAST.
|
|
*CONCLUSION WE MADE , ANDROID WAS MORE TO SOCIAL WHILE WINDOWS MORE TO EDUCATIONAL AND BUSSINESS WORKING.
Posted by Unknown
- Firefox vs Internet Explorer
- Thunderbird vs Microsoft Outlook
- Abiword vs Microsoft Word
- OpenOffice vs Microsoft Excel and Microsoft Powerpoint
- VLC Media Player vs Windows Media Player, Quick Player and Real Player.
No.
|
Types of threats and malicious
program
|
The effect on device
|
How to repaired or remove
|
1
|
Ransomware
trojans (e.g. Pgcoder, FBI Virus)
|
Encrypt data
files on the infected system, then demand money from the victims in exchange
for the decryption key. This type of malware adds insult to injury - not only
has the victim lost access to their own important files, they've also become
victim to extortion.
|
To detect and remove
ransomware and other malicious software that might be installed on your
computer, run a full-system scan with an appropriate, up-to-date, security
solution. The following Microsoft products can detect and remove this threat:
|
2
|
Keylogger
trojan
|
Surreptitious software that monitors your
keystrokes, logging them to a file and sending them off to remote attackers.
Some keyloggers are sold as commercial software - the type a parent might use
to record their children's online activities or a suspicious spouse might
install to keep tabs on their partner. Keyloggers may record all keystrokes,
or they may be sophisticated enough to monitor for specific activity - like
opening a web browser pointing to your online banking site. When the desired
behavior is observed, the keylogger goes into record mode, capturing your
login username and password.
|
The best way
to remove keyloggers is to make use of software that work in many ways to get
rid of this hidden virus. It is quite easy to run software to remove keylogger.
In order to make the most out of the software, it is imperative to run it at
least once in a week. This is a must to keep a Trojan, like keylogger, at bay
and to protect your data and necessary information from hackers. However,
prior downloading any removal software makes sure you are shopping it from a
reputed and authorized site. Else others can refill it with unwanted viruses,
instead of cleaning it.
|
3
|
Storm worm
|
gives attackers full access to the
system (hence the term 'root') and typically hides the files, folders,
registry edits, and other components it uses. In addition to hiding itself, a
rootkit typically hides other malicious files that it may be bundled with.
|
Most antivirus
programs that have been updated with the latest worm definitions will detect
and remove the worm. You can also use an online worm scanner if you don’t
have one installed. This type of program is available from companies such as
Trend Micro and Symantec. A free anti-malware program, such as Malwarebytes
or Spybot Search & Destroy, will also do the trick. Another program that
can defeat the Storm worm might already be installed on your computer: The
Microsoft Malicious Software Removal Tool (MSRT) is a free program you can
use to remove the Storm worm from your system.
|
4
|
Android plankton origin 2
|
Hide itself in apps that addressed
themselves as supplementary programs to Angry Birds, but when in the device
would steal user browser data and could access a remote server to add even
more malicious files to the device.
|
You would need to
remove the entire application, and check for the viruses in the entire file
directory of yours. If there is something fishy that you still find, the only
way you can proceed is re-installation of the operating system. The two
things you need to do is delete the application along with the app data and
memory of the app.
|
Posted by Unknown
Question 1
Target group: Students.
We choose a Laptop
- Intel Pentium (Dual-Core) processor (1.86 GHz)
- 2 MB L2 Cache
- 4GB DDR3 , SDRAM
- 2.5" SATA
- Super Multi DVD +/-R/RW
- Integrated Intel HD-Graphics 3000
We choose laptop because it is easier to carry around unlike desktop. Besides, students nowadays only use laptops for their studies for example in doing assignments, obtaining information via Internet and connecting with lecturers online, so, this type is better and user-friendly. Though it was difficult to be upgraded, for example to upgrade its RAM, we might consider to use a portable external hard-disk instead.
For student , we also preferred to use Intel Pentium with Dual-Core Processors as it less expensive compare to i7/i5/i3. With Dual-Core means it got two processing units to decrease heat in cpu by increasing more its efficiency during working. The different between i7 core and pentium is only based on speed and cache (5%). Our thoughts , students did not work on video encoding , unless watching youtube. So to do a research and assignments , it is preferably to choose Intel Pentium with Dual Core.
Many operating systems can be used on Intel Pentium. So , we choose to use Windows 7 as Windows 8 just new in operating system.
h3group4.blogspot.com
We've decided to compare our choice with Group 4 from Hayat 3.
They choose a laptop with Intel Core I7.
As we all know it, a laptop with a processor of Intel Core I7 costs much more than a laptop with a processor of Intel Pentium. Since our target group are students, a cheap laptop will do. Most of time, students will use their laptop to do assignments and researchers. Intel Pentium can do those little stuffs as well. It maximize the usage of the processors. On the other hand, if a student only uses a laptop for assignments and researches with the processor of Intel I7, then the usage of the processor will be a waste since it is not being use thoroughly.
Question 3
Raspberry Pi is a new hardware of this modern technology era.
We kind of intrested into this Raspberry Pi because it might be carried anywhere in pockets and also can connect to the internet connection as this things was plugged in (on). Raspberry Pi is built for learning programming.
THE SIMILARITIES BETWEEN RASPBERRY PI AND COMPUTER
- COME COMPATIBLE WITH WEB-CAM
- CAN CONNECT TO THE INTERNET CONNECTION
- ALSO NEED RAM FOR STORAGE MEMORY
- CAN PLAY DVD+/-R/RW
- USB PORT
RASPBERRY PI
- LOW COST
- SMALL SIZE AND CAN BE CARRIED ANYWHERE
- DOESN'T USE BATTERY SOURCES
- NEED SCREEN TO PLUGGED IN ( e.g. TV)
- OPERATING SYSTEM - ARM V6 ONLY
- HIGH COST
- BIGGER IN SIZE ( BUT NOTEBOOKS CAN BE CARRIED ANYWHERE)
- CAN USE BATTERY AS A SECOND SOURCE TO SWITCH ON
- COMPACT WITH SCREEN ALREADY
- CAN USE ANY OS(OPERATING SYSTEM) AND PROCESSORS
![]() |
ASUS X44H - OUR CHOSEN LAPTOP ;) |
Posted by Unknown
Posted by Bryan Marshall
So yeah.. As you've read by the title, I'm sure you'll know what I mean. Of course it's about listen. Well; ,it's not about that 'listen listen listen' cases.. But something we all should know about.. The importance of listening. As we came into this world, the first thing that we actually is neither walking nor talking. But actually, the first thing we learnt was listening. Am i right??? Well, yeahhh... listening skill is very crucial and important in our daily life actually.. Where it involves you and the other party. It may sounds easy to you, BUT... if you didn't practice it, you may fail in another thing also...
Here's a bit of the importance of listening that i've read somewhere else through website. Enjoy reading it! :)
KEY POINTS
- The listening process involves five stages: receiving, understanding, evaluating, remembering, and responding.
- Active listening is a particular communication technique that requires the listener to provide feedback on what he or she hears to the speaker.
- Three main degrees of active listening are repeating, paraphrasing, and reflecting.
TERMS
- Listening The active process by which we make sense of, assess, and respond to what we hear.
- Active listening A particular communication technique that requires the listener to provide feedback on what he or she hears to the speaker.
EXAMPLES
- Fully engaged listening might involve listening to a lecture, taking notes, considering what's being said, and asking questions.
FIGURES
fig. 2 Degrees of Active Listening
There are several degrees of active listening.
Listening Is More than Just Hearing
Active Listening
Posted by Unknown