Computer Parts Function and Importance 1
Computer Parts Function and Importance 1
KINDS OF CPU
KINDS OF RANDOM
ACCESS MEMORY
(RAM)
KINDS OF VIDEO
GRAPHICS ARRAY
PORT
KINDS OF POWER
SUPPLY
KINDS OF HARD
DRIVE
is a command and
Serial Advanced
transport protocol that
Technology Attachment defines how data is
(SATA) transferred between a
computer's motherboard
and mass storage devices,
such as hard disk drives
(HDDs), optical drives and
solid-state drives (SSDs).
KIND OF MOUSE
KINDS OF PRINTER
Inkjet printers One of the most common
printing units found across
Australian homes is the
inkjet printer. Despite
being first developed in
the 1950s, inkjet printers
today are still hugely
popular and widely
available.
Computer viruses come in various types, each with its own characteristics and impact
on computer performance and security.
1. File Infectors:
- File infectors attach themselves to executable files (e.g., .exe or .dll files) and
replicate by infecting other executable files on the system. They can corrupt or modify
files, leading to system instability, crashes, and data loss.
3. Macro Viruses:
- Macro viruses infect documents and spreadsheets that contain macros, such as
those created in Microsoft Word or Excel. They exploit the macro programming
language to execute malicious code when the infected document is opened. Macro
viruses can damage or modify documents, compromise sensitive information, and
spread to other documents through email attachments or shared files.
4. Polymorphic Viruses:
- Polymorphic viruses use encryption and mutation techniques to change their
appearance each time they infect a new file or system. This makes them difficult to
detect by antivirus software, as their signatures change with each infection.
Polymorphic viruses can evade detection and spread rapidly, causing widespread
damage to systems and networks.
5. Worms:
- Worms are standalone programs that replicate themselves and spread across
networks without requiring user intervention. They exploit vulnerabilities in operating
systems or network protocols to infect systems and propagate to other devices.
Worms can consume network bandwidth, overload servers, and create backdoors for
remote attackers to exploit.
6. Trojan Horses:
- Trojan horses masquerade as legitimate software or files to trick users into
executing them. Once activated, they perform malicious actions, such as stealing
sensitive information, installing backdoors, or downloading additional malware.
Trojan horses can compromise system security and privacy, leading to data breaches
and financial loss.
7. Ransomware:
- Ransomware encrypts files on the infected system and demands a ransom payment
in exchange for decryption keys. It can encrypt critical files, rendering them
inaccessible, and display ransom notes demanding payment to restore access.
Ransomware can cause significant data loss, financial damage, and disruption to
business operations.
Overall, computer viruses can have severe consequences for computer performance
and security, ranging from data corruption and loss to system crashes and
unauthorized access. Protecting against viruses requires proactive measures, such as
using antivirus software, keeping software updated, practicing safe computing habits,
and regularly backing up important data.
To prevent virus infections and protect your computer from malware, including
viruses, you can implement several proactive measures and best practices.
4. Be Wary of Downloads:
- Download software, files, and media content only from reputable and trusted
sources. Avoid downloading pirated software, cracked applications, or files from
peer-to-peer networks, as they may contain viruses or other malicious software.
5. Enable Firewall Protection:
- Enable the built-in firewall on your computer or use a third-party firewall solution
to monitor and control incoming and outgoing network traffic. Firewalls can help
block unauthorized access and prevent malware from communicating with remote
servers.
By following these prevention methods and best practices, you can significantly
reduce the risk of virus infections and protect your computer from malware threats.
Remember to stay vigilant, keep your software updated, and adopt a proactive
approach to cybersecurity.