Archive for September 2013
Question 1
OPERATING SYSTEM USED IN DESKTOPS/LAPTOPS
List of latest operating system that are used in desktops/laptops :
* Microsoft windows
* Mac OS
* DOS
* UNIX and LINUX
Most users in the world used Microsoft Windows as its operating system.
HOW OPERATING SYSTEM WORKS?
- * It manages the hardware and software resources of the system. In a desktop computer, these resources include such things as the processor, memory, disk space and more.
- * Computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit (CPU). It's the operating system's job to make sure that each application gets its fair share of your computer's finite resources in the most efficient way possible.
- * The operating system provides a consistent set of rules for applications to use in order to be able to interface with your computer's hardware.
Operating
System
|
Advantage
|
Disadvantage
|
Microsoft
windows
|
v
consumer-oriented.
Tightly integrated.
|
v
vulnerable
to viruses. Tightly integrated
|
Mac OS
|
v Mac viruses
are rare compared to PCs, but mac viruses do exist.
v Very user friendly.
v Able to run both Windows and OSX.
v Great computer for professional applications
such as business, photo editing, rendering, movie editing, etc.
v Unix based, thus more secure + stable.
v Good multimedia computer.
|
v Upgradeability is limited.
v Overpriced.
v Interface is flashy and childish, bullshit.
v People who switched from a PC to a Mac may be
confused for the first few days.
v Many programs do not work on Macs. (unless
you buy OSX software).
v Nearly ALL PC games DONT work on a MAC.
v Fixing macs is rather difficult than fixing
PCs.
|
DOS
|
v
The advantages of MS-DOS is
that it was the most popular operating system for IBM computers in the early
1980s and it was very easy for novices to learn and use
|
v
The disadvantages of MS-DOS
is that it was replaced by more advanced operating systems and is now an old
operating system
v
While graphical user
interfaces are now used, MS-DOS uses a character-based interface.
|
UNIX and
LINUX
|
v No need to worry about viruses.
v
|
v Shows its technical origins and derivation
from Unix in things like tar (short for Tape ARchive) cp (copy without the
vowels) and other command line tools which are often used as back-ends for
GUI programs.
|
Question 2
ANDROID
|
|
WINDOWS 8
|
GOOGLE PLAY
|
DISTRIBUTOR
|
MICROSOFT CORP
|
ORIGINALITY OF GOOGLE PLAY APPLICATIONS WAS EASILY TO BE COPIED
NOWADAYS
|
THE
ORIGINALITY OF OPERATING SYSTEM
|
ORIGINALITY OF WINDOWS 8 OF MICROSOFT STILL CAN BE MAINTAINED
|
NEED TO DOWNDLOAD APPLICATIONS TO READ OR VIEW FILES/PDF.
|
FILE OR DOC. VIEWING
|
ALREADY AVAILABLE WITH MICROSOFT TOOLS OFFICE (e.g MICROSOFT WORDS ,
POWERPOINT , EXCEL)
|
ONCE UPGRADED , THE PREVIOUS INSTALLENT TERMINATED
|
VERSION UPGRADES
|
EVENTHOUGH IT IS UPGRADED , THE PREVIOUS APPLICATION IS STILL THERE
|
OFTEN
|
VERSION UPDATES APP
|
SELDOM
|
MORE THAN 700K APPS
|
APPS AVAILABLE
|
AROUND 100K APPS
|
MORE THAN WINDOWS USER
|
USERS
|
LESS THAN ANDROID USER
|
|
THE SPEED , STABILITY AND FEATURES OF ANDROID CAN VARY FROM ONE TO
ANOTHER , BUT WINDOWS PHONE IS FRIENDLY AND FAST.
|
|
*CONCLUSION WE MADE , ANDROID WAS MORE TO SOCIAL WHILE WINDOWS MORE TO EDUCATIONAL AND BUSSINESS WORKING.
Posted by Unknown
Reply
Question 1
People nowadays prefer to use open software because of the
availability of the source code and the right to modify them. People can use
the source code and modify it into something they prefer to. They also have the
right to redistributae and improves the source code, they can easily share it
with their friends and even change the code if there are something they don’t
like about.
5 Popular Open Source Software:
- Firefox vs Internet Explorer
- Thunderbird vs Microsoft Outlook
- Abiword vs Microsoft Word
- OpenOffice vs Microsoft Excel and Microsoft Powerpoint
- VLC Media Player vs Windows Media Player, Quick Player and Real Player.
Question 2
No.
|
Types of threats and malicious
program
|
The effect on device
|
How to repaired or remove
|
1
|
Ransomware
trojans (e.g. Pgcoder, FBI Virus)
|
Encrypt data
files on the infected system, then demand money from the victims in exchange
for the decryption key. This type of malware adds insult to injury - not only
has the victim lost access to their own important files, they've also become
victim to extortion.
|
To detect and remove
ransomware and other malicious software that might be installed on your
computer, run a full-system scan with an appropriate, up-to-date, security
solution. The following Microsoft products can detect and remove this threat:
|
2
|
Keylogger
trojan
|
Surreptitious software that monitors your
keystrokes, logging them to a file and sending them off to remote attackers.
Some keyloggers are sold as commercial software - the type a parent might use
to record their children's online activities or a suspicious spouse might
install to keep tabs on their partner. Keyloggers may record all keystrokes,
or they may be sophisticated enough to monitor for specific activity - like
opening a web browser pointing to your online banking site. When the desired
behavior is observed, the keylogger goes into record mode, capturing your
login username and password.
|
The best way
to remove keyloggers is to make use of software that work in many ways to get
rid of this hidden virus. It is quite easy to run software to remove keylogger.
In order to make the most out of the software, it is imperative to run it at
least once in a week. This is a must to keep a Trojan, like keylogger, at bay
and to protect your data and necessary information from hackers. However,
prior downloading any removal software makes sure you are shopping it from a
reputed and authorized site. Else others can refill it with unwanted viruses,
instead of cleaning it.
|
3
|
Storm worm
|
gives attackers full access to the
system (hence the term 'root') and typically hides the files, folders,
registry edits, and other components it uses. In addition to hiding itself, a
rootkit typically hides other malicious files that it may be bundled with.
|
Most antivirus
programs that have been updated with the latest worm definitions will detect
and remove the worm. You can also use an online worm scanner if you don’t
have one installed. This type of program is available from companies such as
Trend Micro and Symantec. A free anti-malware program, such as Malwarebytes
or Spybot Search & Destroy, will also do the trick. Another program that
can defeat the Storm worm might already be installed on your computer: The
Microsoft Malicious Software Removal Tool (MSRT) is a free program you can
use to remove the Storm worm from your system.
|
4
|
Android plankton origin 2
|
Hide itself in apps that addressed
themselves as supplementary programs to Angry Birds, but when in the device
would steal user browser data and could access a remote server to add even
more malicious files to the device.
|
You would need to
remove the entire application, and check for the viruses in the entire file
directory of yours. If there is something fishy that you still find, the only
way you can proceed is re-installation of the operating system. The two
things you need to do is delete the application along with the app data and
memory of the app.
|
Posted by Unknown
Powered by Blogger.